Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of Reformat proxy docs refresh into release/1.16.x #18696

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
357 commits
Select commit Hold shift + click to select a range
310bc68
Update Consul K8s Upgrade Doc Updates (#17921)
natemollica-nm Jun 27, 2023
6f5da97
Update sameness-group.mdx (#17915)
Jun 28, 2023
b168132
Update create-sameness-groups.mdx (#17927)
Jun 28, 2023
7dbba6c
deps: coredns v1.10.1 (#17912)
loshz Jun 28, 2023
67a239a
Ensure RSA keys are at least 2048 bits in length (#17911)
jm96441n Jun 28, 2023
f019457
tlsutil: Fix check TLS configuration (#17481)
beautifulentropy Jun 28, 2023
6f660e5
docs: Deprecations for connect-native SDK and specific connect native…
Jun 28, 2023
bdf4fad
Revert "Add workflow to verify linux release packages (#17904)" (#17942)
jmurret Jun 28, 2023
1b1f33f
Fixes Secondary ConnectCA update (#17846)
Ranjandas Jun 29, 2023
a60b363
fixing typo in link to jwt-validations-with-intentions doc (#17955)
jm96441n Jun 29, 2023
85b78fe
Fix streaming backend link (#17958)
Jun 29, 2023
1512ea3
Dynamically create jwks clusters for jwt-providers (#17944)
roncodingenthusiast Jun 29, 2023
f7305b2
website: remove deprecated agent rpc docs (#17962)
loshz Jun 29, 2023
2736e64
Fix missing BalanceOutboundConnections in v2 catalog. (#17964)
hashi-derek Jun 29, 2023
2af6bc4
feature - [NET - 4005] - [Supportability] Reloadable Configuration -…
absolutelightning Jun 30, 2023
5b7f360
Fix formatting codeblocks on APIgw docs (#17970)
im2nguyen Jun 30, 2023
50a9d1b
Remove POC code (#17974)
Jun 30, 2023
9ce89c4
update doc (#17910)
xwa153 Jun 30, 2023
0b1299c
Remove duplicate and unused newDecodeConfigEntry func (#17979)
cthain Jun 30, 2023
f096fc5
docs: samenessGroup YAML examples (#17984)
boruszak Jun 30, 2023
df85dd8
Add changelog entry for 1.16.0 (#17987)
nathancoleman Jun 30, 2023
dc6ea1b
Fix typo (#17198)
evanphx Jul 1, 2023
8039427
Expose JWKS cluster config through JWTProviderConfigEntry (#17978)
roncodingenthusiast Jul 4, 2023
4f0bdd3
Integration test for ext-authz Envoy extension (#17980)
cthain Jul 4, 2023
0094dbf
Fix incorrect protocol for transparent proxy upstreams. (#17894)
hashi-derek Jul 5, 2023
8af4ad1
feat: include nodes count in operator usage endpoint and cli command …
JadhavPoonam Jul 5, 2023
b94095d
[OSS] Improve Gateway Test Coverage of Catalog Health (#18011)
DanStough Jul 5, 2023
7f3446e
Fixes Traffic rate limitting docs (#17997)
Ranjandas Jul 5, 2023
2c2e628
Fix removed service-to-service peering links (#17221)
karras Jul 5, 2023
7ef807d
docs: Sameness "beta" warning (#18017)
boruszak Jul 5, 2023
548829a
updated typo in tab heading (#18022)
trujillo-adam Jul 5, 2023
7689a5e
Document that DNS lookups can target cluster peers (#17990)
jcjones Jul 5, 2023
ada3938
Add first integration test for jwt auth with intention (#18005)
roncodingenthusiast Jul 6, 2023
f7d399f
fix stand-in text for name field (#18030)
trujillo-adam Jul 6, 2023
820cdbb
removed sameness conf entry from failover nav (#18033)
trujillo-adam Jul 6, 2023
85f2ae0
docs - add service sync annotations and k8s service weight annotation…
Jul 6, 2023
b9a6a74
docs - add jobs use case for service mesh k8s (#18037)
Jul 7, 2023
b0a2e33
address feedback (#18045)
Jul 7, 2023
f4b0804
Add verify server hostname to tls default (#17155)
fulviodenza Jul 10, 2023
1b08626
[OSS] Fix initial_fetch_timeout to wait for all xDS resources (#18024)
DanStough Jul 10, 2023
7decc30
ui: fix typos for peer service imports (#17999)
krastin Jul 11, 2023
da79997
test: fix FIPS inline cert test message (#18076)
DanStough Jul 11, 2023
a30ba33
Fix a couple typos in Agent Telemetry Metrics docs (#18080)
Jul 11, 2023
bfb9212
docs updates - cluster peering and virtual services (#18069)
Jul 11, 2023
0e58c89
Update service-mesh-compare.mdx (#17279)
david3a Jul 11, 2023
bd5af7f
Update helm docs on main (#18085)
curtbushko Jul 11, 2023
3dc6f8f
ci: use gotestsum v1.10.1 [NET-4042] (#18088)
nfi-hashicorp Jul 12, 2023
51d8eb8
Docs: Update proxy lifecycle annotations and consul-dataplane flags (…
curtbushko Jul 12, 2023
f472164
Pass configured role name to Vault for AWS auth in Connect CA (#17885)
t-davies Jul 12, 2023
ebfed56
Docs for dataplane upgrade on k8s (#18051)
lkysow Jul 12, 2023
f51a9d2
docs - update upgrade index page to not recommend consul leave. (#18100)
jmurret Jul 12, 2023
2f20c77
Displays Consul version of each nodes in UI nodes section (#17754)
vijayraghav-io Jul 12, 2023
d1f5d9b
api gw 1.16 updates (#18081)
eddie-rowe Jul 12, 2023
3b3aa1f
[NET-4103] ci: build s390x (#18067)
loshz Jul 12, 2023
efe9816
:ermahgerd "Sevice Mesh" -> "Service Mesh" (#18116)
nv-hashi Jul 13, 2023
c328ba8
Split pbmesh.UpstreamsConfiguration as a resource out of pbmesh.Upstr…
ishustava Jul 13, 2023
a2c6953
[NET-4895] ci - api tests and consul container tests error because of…
jmurret Jul 13, 2023
68863b4
Add ingress gateway deprecation notices to docs (#18102)
Jeff-Apple Jul 13, 2023
2229206
Add docs for jwt cluster configuration (#18004)
roncodingenthusiast Jul 14, 2023
ad6364a
Docs: fix unmatched bracket for health checks page (#18134)
huikang Jul 14, 2023
5208ea9
NET-4657/add resource service client (#18053)
JadhavPoonam Jul 14, 2023
747a4c7
Fix bug with Vault CA provider (#18112)
Jul 14, 2023
5af7390
[NET-4897] net/http host header is now verified and request.host that…
jmurret Jul 14, 2023
691bc96
add a conditional around setting LANFilter.AllSegments to make sure i…
jmurret Jul 14, 2023
05b665e
chore: bump upgrade integrations tests to 1.15, 116 [NET-4743] (#18130)
nfi-hashicorp Jul 14, 2023
e719478
re org resource type registry (#18133)
xwa153 Jul 15, 2023
5930518
fix: update delegateMock used in ENT (#18149)
JadhavPoonam Jul 17, 2023
bcc6a9d
Use JWT-auth filter in metadata mode & Delegate validation to RBAC fi…
roncodingenthusiast Jul 17, 2023
f7c5ba5
Support Consul Connect Envoy Command on Windows (#17694)
absolutelightning Jul 17, 2023
e52ea0e
Change docs to say 168h instead of 7d for server_rejoin_age_max (#18154)
Jul 17, 2023
33d898b
[OSS] test: improve xDS listener code coverage (#18138)
DanStough Jul 17, 2023
03cf37e
Re-order expected/actual for assertContainerState in consul container…
roncodingenthusiast Jul 17, 2023
07fce86
group and document make file (#17943)
xwa153 Jul 17, 2023
6200536
Add `testing/deployer` (neé `consul-topology`) [NET-4610] (#17823)
nfi-hashicorp Jul 17, 2023
9214457
[NET-4792] Add integrations tests for jwt-auth (#18169)
roncodingenthusiast Jul 18, 2023
548a5ca
Add FIPS reference to consul enterprise docs (#18028)
im2nguyen Jul 18, 2023
cd3fc9e
add peering_commontopo tests [NET-3700] (#17951)
nfi-hashicorp Jul 18, 2023
2e326e2
docs - remove Sentinel from enterprise features list (#18176)
Jul 19, 2023
29cdb75
[NET-4865] Bump golang.org/x/net to 0.12.0 (#18186)
zalimeni Jul 19, 2023
003370d
Call resource mutate hook before validate hook (NET-4907) (#18178)
analogue Jul 19, 2023
e8dd04d
[NET-4865] security: Update Go version to 1.20.6 (#18190)
zalimeni Jul 19, 2023
18bc041
Improve XDS test coverage: JWT auth edition (#18183)
roncodingenthusiast Jul 19, 2023
271e5af
update readme.md (#18191)
NiniOak Jul 19, 2023
72999bb
Update submodules to latest following 1.16.0 (#18197)
zalimeni Jul 19, 2023
1ef5dfc
SEC-090: Automated trusted workflow pinning (2023-07-18) (#18174)
hashicorp-tsccr[bot] Jul 19, 2023
1c7fcdf
Fix Backport Assistant PR commenting (#18200)
zalimeni Jul 20, 2023
ada767f
resource: Pass resource to Write ACL hook instead of just resource Id…
analogue Jul 20, 2023
2c5a09b
Explicitly enable WebSocket upgrades (#18150)
blake Jul 20, 2023
5cd2876
docs: fix the description of client rpc (#18206)
huikang Jul 20, 2023
7e6ce76
NET-4804: Add dashboard for monitoring consul-k8s (#18208)
huikang Jul 20, 2023
2793761
[OSS] Improve xDS Code Coverage - Clusters (#18165)
DanStough Jul 20, 2023
c2066b9
NET-4222 take config file consul container (#18218)
huikang Jul 21, 2023
47d445d
Envoy Integration Test Windows (#18007)
absolutelightning Jul 21, 2023
926db9c
fix typos and update ecs compat table (#18215)
trujillo-adam Jul 21, 2023
c932d79
[OSS] proxystate: add proxystate protos (#18216)
ndhanushkodi Jul 21, 2023
7e01fcf
ci: don't verify s390x (#18224)
loshz Jul 21, 2023
6671d7e
[CC-5718] Remove HCP token requirement during bootstrap (#18140)
jjacobson93 Jul 21, 2023
c138f24
[NET-4122] Doc guidance for federation with externalServers (#18207)
zalimeni Jul 21, 2023
8e3a1dd
[OSS] Improve xDS Code Coverage - Endpoints and Misc (#18222)
DanStough Jul 21, 2023
7ce539e
Clarify license reporting timing and GDPR compliance (#18237)
judithpatudith Jul 21, 2023
2b0d64e
Fix Github Workflow File (#18241)
absolutelightning Jul 22, 2023
a11dba7
NET-4996 - filter go-tests and test-integration workflows from runnin…
jmurret Jul 23, 2023
8b46bac
Align build arch matrix with enterprise (#18235)
zalimeni Jul 24, 2023
639210e
Revert "NET-4996 - filter go-tests and test-integration workflows fro…
jmurret Jul 24, 2023
efb45fe
resource: Add scope to resource type registration [NET-4976] (#18214)
analogue Jul 24, 2023
b162c51
Fix some inconsistencies in jwt docs (#18234)
jm96441n Jul 24, 2023
b7cdd18
NET-1825: More new ACL token creation docs (#18063)
Jul 24, 2023
4d3f9a1
grafana: add the panel resource usage of connect injector (#18247)
huikang Jul 24, 2023
9a82df2
[NET-3700] Backfill changelog entry for c2bbe67 and 7402d06 (#18259)
zalimeni Jul 24, 2023
319a223
NET-4897 - update comment to include the current issue url from the g…
jmurret Jul 24, 2023
090e869
fix typos, style, and improper links (#18269)
trujillo-adam Jul 24, 2023
31d2813
member cli: add -filter expression to flags (#18223)
huikang Jul 25, 2023
9b540e2
go-tests: disable s390x (#18273)
loshz Jul 25, 2023
02cf177
docs: Update ext-authz documentation for kubernetes (#18281)
gautambaghel Jul 26, 2023
d147c3e
docs: Consul on Kubernetes specific upgrade info (#18230)
boruszak Jul 26, 2023
e37f702
Fix typo in Envoy extensions doc (#18284)
zalimeni Jul 26, 2023
e29ceab
docs: K8s secondary DC requirements (#18280)
boruszak Jul 26, 2023
5caa0ae
api-gateway: subscribe to bound-api-gateway only after receiving api-…
nathancoleman Jul 26, 2023
09b251f
Update K8s changelog to address cloud auto-join change in 1.0.0 (#18293)
Jul 26, 2023
cf4deeb
Update list of Envoy versions (#18300)
zalimeni Jul 26, 2023
cbfeb6c
[NET-4904] Update list of Envoy versions in docs (#18306)
zalimeni Jul 27, 2023
449e050
Update actions for TSCCR (#18317)
curtbushko Jul 28, 2023
6ada2e0
Fix topology view when displaying mixed connect-native/normal service…
apollo13 Jul 31, 2023
356b29b
Stop JWT provider from being written in non default namespace (#18325)
roncodingenthusiast Jul 31, 2023
18a5edd
docs: Fix some comments (#17118)
cuishuang Jul 31, 2023
b1b05f0
[NET-4703] Prevent partial application of Envoy extensions (#18068)
zalimeni Jul 31, 2023
3894940
docs: Simplify example jq commands by removing pipes (#18327)
blake Jul 31, 2023
bb6fc63
fix typo in create a mesh token docs (#18337)
roncodingenthusiast Aug 1, 2023
6424ef6
[CC-5719] Add support for builtin global-read-only policy (#18319)
jjacobson93 Aug 1, 2023
e459399
[NET-5121] proxystate: move protos to subdirectory to avoid conflicts…
ndhanushkodi Aug 1, 2023
13ce787
resource: adding various helpers for working with resources (#18342)
rboyer Aug 1, 2023
2a8bf5d
Wasm integration tests for local and remote wasm files (#17756)
johnlanda Aug 1, 2023
828567c
[HCP Telemetry] Periodic Refresh for Dynamic Telemetry Configuration …
Achooo Aug 1, 2023
67fc93e
NET-4240 - Snapshots are failing on Windows (#18302)
absolutelightning Aug 2, 2023
a33001f
Register ProxyStateTemplate Resource (#18316)
ishustava Aug 2, 2023
905e371
[NET-5146] security: Update Go version to 1.20.7 and `x/net` to 0.13.…
zalimeni Aug 2, 2023
9c227e2
mesh: adding the protobuf types and resources backing mesh config v2 …
rboyer Aug 3, 2023
284e3bd
[OSS] test: xds coverage for routes (#18369)
DanStough Aug 3, 2023
8e5e16d
Fix policy lookup to allow for slashes (#18347)
jjacobson93 Aug 3, 2023
89aac4b
add some initial CODEOWNERS (#18346)
rboyer Aug 3, 2023
0a48a24
Add redirects for mesh-gateway docs (#18377)
im2nguyen Aug 4, 2023
1f28ac2
expose grpc as http endpoint (#18221)
xwa153 Aug 4, 2023
1ebd001
bimapper: fix a bug and add some more test coverage (#18387)
rboyer Aug 4, 2023
38c356c
[docs] Fix ServiceDefaults example in distributed tracing (#17212)
ilpianista Aug 4, 2023
417ae9f
Fix #17730 - Dev mode has new line (#18367)
absolutelightning Aug 5, 2023
48effe5
chore: make go-mod-tidy (#18388)
rboyer Aug 7, 2023
63cc037
resource: Make resource read tenancy aware (#18397)
analogue Aug 7, 2023
96ce4da
Not using chmod - fixed integration test for Enterprise (#18401)
absolutelightning Aug 8, 2023
2096f23
replaced ordered list of rate limit ops with flow diagram (#18398)
trujillo-adam Aug 8, 2023
7902ae2
Upgrade test: remove outdated test and disable log due to verbosity (…
huikang Aug 8, 2023
43d8898
bump testcontainers-go from 0.22.0 and remove pinned go version in in…
huikang Aug 8, 2023
91d331b
Add ServiceEndpoints Mutation hook tests (#18404)
mkeeler Aug 8, 2023
bfc519f
catalog: add FailoverPolicy mutation and validation hooks (#18390)
rboyer Aug 8, 2023
e235c8b
NET-5115 Add retry + timeout filters for api-gateway (#18324)
sarahalsmiller Aug 8, 2023
42efc11
catalog: adding a controller to reconcile FailoverPolicy resources (#…
rboyer Aug 9, 2023
facd5b0
fix the error in ent repo (#18421)
xwa153 Aug 9, 2023
948ce8b
build: updates for 1.16.1 release (#18415)
DanStough Aug 9, 2023
bb1a288
update ECS links (#18419)
eddie-rowe Aug 9, 2023
10f69d8
docs: fix incorrect proxy-defaults config in Lua Envoy extension (#18…
nvanthao Aug 10, 2023
bee12c6
resource: Make resource write tenancy aware (#18423)
analogue Aug 10, 2023
05604ee
[NET-5217] [OSS] Derive sidecar proxy locality from parent service (#…
zalimeni Aug 10, 2023
6c8ca0f
NET-4984: Update APIGW Config Entries for JWT Auth (#18366)
jm96441n Aug 10, 2023
6981658
k8s compat - Openshift versions (#18307)
Aug 10, 2023
df11e4e
APIGW: Update HTTPRouteConfigEntry for JWT Auth (#18422)
jm96441n Aug 10, 2023
5fb9df1
[COMPLIANCE] License changes (#18443)
hashicorp-copywrite[bot] Aug 11, 2023
5717cbd
Net-2708/delete resource endpoint (#18420)
JadhavPoonam Aug 11, 2023
b4cdfbb
Disable deep-copy codegen verification for now. (#18446)
mkeeler Aug 11, 2023
66bcaa3
build: upgrade to latest buf v1.26.0 (#18426)
rboyer Aug 11, 2023
4a0afb5
NET-4952 Add docs for export command (#18425)
nathancoleman Aug 11, 2023
559c61e
Net-2712/resource hcl parsing (#18250)
JadhavPoonam Aug 11, 2023
cda884a
read endpoint (#18268)
xwa153 Aug 11, 2023
f88d4fe
Net-2707/list resource endpoint (#18444)
JadhavPoonam Aug 15, 2023
d565056
Fix incorrect yaml in examples (#18463)
lkysow Aug 15, 2023
0e94f48
NET-5187: Upgrade test timeout due to log producer errors (#18461)
NiniOak Aug 15, 2023
6b7ccd0
[NET-4799] [OSS] xdsv2: listeners L4 support for connect proxies (#18…
ndhanushkodi Aug 15, 2023
217107f
resource: Make resource list tenancy aware (#18475)
analogue Aug 15, 2023
adf8ddb
[COMPLIANCE] License update (#18479)
hashicorp-copywrite[bot] Aug 16, 2023
b8acd78
docs: specify manual server metadata intervention (#18477)
loshz Aug 16, 2023
5ca8cd6
docs: Update OpenShift compatibility (#18478)
Aug 16, 2023
e6c1c47
resource: Make resource delete tenancy aware (#18476)
analogue Aug 16, 2023
9e9800e
Add license-checker action that fails when any backported file contai…
nathancoleman Aug 16, 2023
aa21b12
docs: Update K8s TGW tutorial to reliably obtain role ID (#18474)
blake Aug 16, 2023
d488fc7
NET-5371 License checker pt2 (#18491)
nathancoleman Aug 16, 2023
ea7b419
README - Update KV use case to Dynamic App Configuration (#18301)
Aug 16, 2023
cbedbc0
README - re-order badges and update hub link (#18498)
Aug 17, 2023
61b7c0d
[NET-5163] Support locality testing in consul-container (#18484)
zalimeni Aug 17, 2023
b80c525
NET-4853 - xds v2 - implement base connect proxy functionality for cl…
jmurret Aug 17, 2023
c533a51
Fix HCL (#18513)
lkysow Aug 17, 2023
92cfb4a
NET-4932 - xds v2 - implement base connect proxy functionality for en…
jmurret Aug 17, 2023
97b41d9
Support custom watches on controller (#18439)
Aug 17, 2023
9ea182f
NET-4858 - xds v2 - implement base connect proxy functionality for ro…
jmurret Aug 17, 2023
cc596ce
bimapper: allow to untrack links and support reference or id (#18451)
ishustava Aug 18, 2023
0b580ff
bimapper: fix data race (#18519)
ishustava Aug 18, 2023
d3837e3
CI Split integration tests to run nightly and every PR (#18518)
huikang Aug 18, 2023
5af4bbb
Fix broken links caught in weekly report (#18522)
im2nguyen Aug 18, 2023
587663d
Create nightly test-integration for consul release branch (#18530)
huikang Aug 21, 2023
eab88bf
docs: Fix spelling errors across various pages on the site (#18533)
blake Aug 21, 2023
e5842cd
Make proto-public license MPL (#18531)
analogue Aug 21, 2023
217d305
NET-4943 - Implement ProxyTracker (#18535)
jmurret Aug 21, 2023
6d22179
resource: Make resource watchlist tenancy aware (#18539)
analogue Aug 21, 2023
547f4f8
Reduce required type arguments for DecodedResource (#18540)
mkeeler Aug 22, 2023
53e28a4
OSS -> CE (community edition) changes (#18517)
analogue Aug 22, 2023
c4b3234
CI: fix envoy versions in CI of release branch (#18538)
huikang Aug 22, 2023
570c84d
catalog: add failover mode enum validation (#18545)
rboyer Aug 22, 2023
55723c5
mesh: add validation for the new pbmesh resources (#18410)
rboyer Aug 22, 2023
0d60380
xds controller: resolve ServiceEndpoints references in ProxyStateTemp…
Aug 22, 2023
17667a1
mesh: adding type aliases for mesh resource usage (#18448)
rboyer Aug 22, 2023
4f9955d
Update trust bundle into proxy-state-template (#18550)
Aug 22, 2023
5b88aae
catalog: validating Protocol and Health enums on Service, Workload, a…
rboyer Aug 22, 2023
8a93124
chore: fix missing/incorrect license headers (#18555)
rboyer Aug 22, 2023
a1755d1
fix for , non presence of consul-version meta (#18464)
vijayraghav-io Aug 22, 2023
a1cd3f8
feat: add experiments flag to testserver sdk (#18541)
DanStough Aug 23, 2023
b37587b
bug: prevent go routine leakage due to existing DeferCheck (#18558)
huikang Aug 23, 2023
63fa78a
NET-5382 & PLAT-1159: Do not trigger workflow if only doc files are i…
NiniOak Aug 23, 2023
34eb700
UI: community verbiage (#18560)
natmegs Aug 23, 2023
2cc2c6b
Fix Windows FIPS Build (#18357)
absolutelightning Aug 24, 2023
82993fc
CE port of enterprise extension (#18572)
Aug 24, 2023
067a011
resource: Make resource listbyowner tenancy aware (#18566)
analogue Aug 24, 2023
59ab57f
NET-5147: Added placeholder structs for JWT functionality (#18575)
jm96441n Aug 24, 2023
2225bf0
resource: Make resource writestatus tenancy aware (#18577)
analogue Aug 24, 2023
051f250
NET-5338 - NET-5338 - Run a v2 mode xds server (#18579)
jmurret Aug 24, 2023
c8ef063
CI: send slack notification on failed nightly job (#18578)
huikang Aug 25, 2023
ecdcde4
CE commit (#18583)
Aug 25, 2023
2f58e05
Fix broken link on sameness group page (#18511)
im2nguyen Aug 28, 2023
0e17e98
Fix typo in permissive mTLS docs (#18551)
im2nguyen Aug 28, 2023
7bc30e9
Set concurrency for workflows (#18567)
curtbushko Aug 28, 2023
180c1e2
test: run automated tests against Vault 1.11 - 1.14 (#18590)
jkirschner-hashicorp Aug 28, 2023
48c8a83
Reduce the frequency of metric exports to minutely (#18584)
Aug 28, 2023
0e60650
NET-4944 - wire up controllers with proxy tracker (#18603)
jmurret Aug 29, 2023
797e42d
Watch the ProxyTracker from xDS controller (#18611)
Aug 29, 2023
f8812ed
Distinguish v2 catalog Protocol unset from default (#18612)
zalimeni Aug 29, 2023
58e5658
Added OpenTelemetry Access Logging Envoy extension (#18336)
hdkshingala Aug 30, 2023
0f48b7a
[HCP Telemetry] Move first TelemetryConfig Fetch into the TelemetryCo…
Achooo Aug 30, 2023
255aa15
update comments and docs about running envoy integration tests with t…
jmurret Aug 30, 2023
65e3904
first commit; reformat PD conf entry
trujillo-adam Aug 31, 2023
c790d92
updated proxies overview page
trujillo-adam Aug 31, 2023
a4ebb03
added Deploy SM proxy usage and removed reg index
trujillo-adam Aug 31, 2023
56733fb
moved sidecar proxy usage to main proxy folder
trujillo-adam Aug 31, 2023
1ab22a7
recast sidecar reg page as Deploy sidecar services
trujillo-adam Aug 31, 2023
7f7ea98
backport of commit 1ab22a78f305097b469573e51c8a161e0d46449b
trujillo-adam Aug 31, 2023
2ae727f
backport of commit 8903c8ce936b1a46ee1a0a43d55b6de3612d85cf
trujillo-adam Aug 31, 2023
1e2557f
backport of commit 67e332826daa44cf736f711ac83af1cc38ab84e5
trujillo-adam Aug 31, 2023
1ec5d8d
backport of commit 3345473c10ea65d7925fcd3bce04384b18ecfd59
trujillo-adam Aug 31, 2023
fddaa25
backport of commit d838e5de9eb7a87ef961a4f7a447e7bbd92def6c
trujillo-adam Aug 31, 2023
c5510a1
backport of commit a1c35174cccd0f24e1c8f3c5563cc28f5e5d8bff
trujillo-adam Aug 31, 2023
7ea0d74
backport of commit 066079064991055d890354e89aeb8276ef4c57c8
trujillo-adam Aug 31, 2023
0243d78
backport of commit baae1ed358f5b79acc30ed9890d5ecd2ab6d4b43
trujillo-adam Aug 31, 2023
276a858
Merge 1ab22a78f305097b469573e51c8a161e0d46449b into backport/docs/pro…
hc-github-team-consul-core Sep 6, 2023
2a69150
backport of commit ef186faf8978035e0e60c6fd68a274c969c73d49
trujillo-adam Aug 31, 2023
e9a01a2
Merge branch 'release/1.16.x' into backport/docs/proxy-defaults-refor…
trujillo-adam Sep 7, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1,129 changes: 671 additions & 458 deletions website/content/docs/connect/config-entries/proxy-defaults.mdx

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
---
layout: docs
page_title: Deploy service mesh proxies
description: >-
Envoy and other proxies in Consul service mesh enable service-to-service communication across your network. Learn how to deploy service mesh proxies in this topic.
---

# Deploy service mesh proxies services

This topic describes how to create, register, and start service mesh proxies in Consul. Refer to [Service mesh proxies overview](/consul/docs/connect/proxies) for additional information about how proxies enable Consul functionalities. For information about deployed sidecar proxies, refer to [Deploy sidecar proxy services](/consul/docs/connect/proxies/deploy-sidecar-services).

## Overview

Complete the following steps to deploy a service mesh proxy:

1. It is not required, but you can create a proxy defaults configuration entry that contains global passthrough settings for all Envoy proxies.
1. Create a service definition file and specify the proxy configurations in the `proxy` block.
1. Register the service using the API or CLI.
1. Start the proxy service.

## Requirements

If [ACLs](/consul/docs/security/acl) are enabled and you want to configure global Envoy settings in the [proxy defaults configuration entry](/consul/docs/connect/config-entries/proxy-defaults), you must present a token with `operator:write` permissions. Refer to [Create a service token](/consul/docs/security/acl/tokens/create/create-a-service-token) for additional information.

## Configure global Envoy passthrough settings

If you want to define global passthrough settings for all Envoy proxies, create a proxy defaults configuration entry and specify default settings, such as access log configuration. [Service defaults configuration entries](/consul/docs/connect/config-entries/service-defaults) override proxy defaults and individual service configurations override both configuration entries.

1. Create a proxy defaults configuration entry and specify the following parameters:
- `Kind`: Must be set to `proxy-defaults`
- `Name`: Must be set to `global`
1. Configure any additional settings you want to apply to all proxies. Refer to [Proxy defaults configuration entry reference](/consul/docs/connect/config-entries/proxy-defaults) for details about all settings available in the configuraiton entry.
1. Apply the configuration by either calling the [`/config` API endpoint](/consul/api-docs/config) or running the [`consul config write` CLI command](/consul/commands/config/write). The following example writes a proxy defaults configuration entry from a local HCL file using the CLI:

```shell-session
$ consul config write proxy-defaults.hcl
```

## Define service mesh proxy

Create a service definition file and configure the following fields to define a service mesh proxy:

1. Set the `kind` field to `connect-proxy`. Refer to the [services configuration reference](/consul/docs/services/configuration/services-configuration-reference#kind) for information about other kinds of proxies you can declare.
1. Specify a name for the proxy service in the `name` field. Consul applies the configurations to any proxies you bootstrap with the same name.
1. In the `proxy.destination_service_name` field, specify the name of the service that the proxy represents.
1. Configure any additional proxy behaviors that you want to implement in the `proxy` block. Refer to the [Service mesh proxy configuration reference](/consul/docs/connect/proxies/proxy-config-reference) for information about all parameters.
1. Specify a port number where other services registered with Consul can discover and connect to the proxies service in the `port` field. To ensure that services only allow external connections established through the service mesh protocol, you should configure all services to only accept connections on a loopback address.

Refer to the [Service mesh proxy configuration reference](/consul/docs/connect/proxies/proxy-config-reference) for example configurations.

## Register the service

Provide the service definition to the Consul agent to register your proxy service. You can use the same methods for registering proxy services as you do for registering application services:

- Place the service definition in a Consul agent's configuration directory and start, restart, or reload the agent. Use this method when implementing changes to an existing proxy service.
- Use the `consul services register` command to register the proxy service with a running Consul agent.
- Call the `/agent/service/register` HTTP API endpoint to register the proxy service with a running Consul agent.

Refer to [Register services and health checks](/consul/docs/services/usage/register-services-checks) for instructions.

In the following example, the `consul services register` command registers a proxy service stored in `proxy.hcl`:

```shell-session
$ consul services register proxy.hcl
```

## Start the proxy

Envoy requires a bootstrap configuration file before it can start. Use the [`consul connect envoy` command](/consul/commands/connect/envoy) to create the Envoy bootstrap configuration and start the proxy service. Specify the ID of the proxy you want to start with the `-proxy-id` option.

The following example command starts an Envoy proxy for the `web-proxy` service:

```shell-session
$ consul connect envoy -proxy-id=web-proxy
```

For details about operating an Envoy proxy in Consul, refer to the [Envoy proxy reference](/consul/docs/connect/proxies/envoy).
286 changes: 286 additions & 0 deletions website/content/docs/connect/proxies/deploy-sidecar-services.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,286 @@
---
layout: docs
page_title: Deploy proxies as sidecar services
description: >-
You can register a service instance and its sidecar proxy at the same time. Learn about default settings, customizable parameters, limitations, and lifecycle behaviors of the sidecar proxy.
---

# Deploy sidecar services

This topic describes how to create, register, and start sidecar proxy services in Consul. Refer to [Service mesh proxies overview](/consul/docs/connect/proxies) for additional information about how proxies enable Consul functionalities. For information about deploying service mesh proxies, refer to [Deploy service mesh proxies](/consul/docs/connect/proxies/deploy-service-mesh-proxies).

## Overview

Sidecar proxies run on the same node as the single service instance that they handle traffic for.
They may be on the same VM or running as a separate container in the same network namespace.

You can attach a sidecar proxy to a service you want to deploy to your mesh:

1. It is not required, but you can create a proxy defaults configuration entry that contains global passthrough settings for all Envoy proxies.
1. Create the service definition and include the `connect` block. The `connect` block contains the sidecar proxy configurations that allow the service to interact with other services in the mesh.
1. Register the service using either the API or CLI.
1. Start the sidecar proxy service.

## Requirements

If [ACLs](/consul/docs/security/acl) are enabled and you want to configure global Envoy settings in the [proxy defaults configuration entry](/consul/docs/connect/config-entries/proxy-defaults), you must present a token with `operator:write` permissions. Refer to [Create a service token](/consul/docs/security/acl/tokens/create/create-a-service-token) for additional information.

## Configure global Envoy passthrough settings

If you want to define global passthrough settings for all Envoy proxies, create a proxy defaults configuration entry and specify default settings, such as access log configuration. [Service defaults configuration entries](/consul/docs/connect/config-entries/service-defaults) override proxy defaults and individual service configurations override both configuration entries.

1. Create a proxy defaults configuration entry and specify the following parameters:
- `Kind`: Must be set to `proxy-defaults`
- `Name`: Must be set to `global`
1. Configure any additional settings you want to apply to all proxies. Refer to [Proxy defaults configuration entry reference](/consul/docs/connect/config-entries/proxy-defaults) for details about all settings available in the configuraiton entry.
1. Apply the configuration by either calling the [`/config` API endpoint](/consul/api-docs/config) or running the [`consul config write` CLI command](/consul/commands/config/write). The following example writes a proxy defaults configuration entry from a local HCL file using the CLI:

```shell-session
$ consul config write proxy-defaults.hcl
```

## Define service mesh proxy

Create a service definition and configure the following fields:

1. Specify a name for the service you want to attach a sidecar proxy to in the `name` field. This field is required for all services you want to register in Consul.
1. Specify a port number where other services registered with Consul can discover and connect to the service in the `port` field. This field is required for all services you want to register in Consul.
1. Set the `connect` field to `{ sidecar_service: {} }`. The `{ sidecar_service: {} }` value is a macro that applies a set of default configurations that enable you to quickly implement a sidecar. Refer to [Sidecar service defaults](#sidecar-service-defaults) for additional information.
1. Configure any additional options for your service. Refer to [Services configuration reference](/consul/docs/services/configuration/services-configuration-reference) for details.

In the following example, a service named `web` is configured with a sidecar proxy:

<Tabs>

<Tab heading="HCL" group="hcl">

```hcl
service = {
name = "web"
port = 8080
connect = { sidecar_service = {} }
}
```

</Tab>

<Tab heading="JSON" group="json">

```json

{
"service": {
"name": "web",
"port": 8080,
"connect": { "sidecar_service": {} }
}
}

```

</Tab>

</Tabs>

When Consul processes the service definition, it generates the following configuration in place of the `sidecar_service` macro. Note that sidecar proxies services are based on the `connect-proxy` type:

<Tabs>

<Tab heading="HCL" group="hcl">

```hcl
services = [
{
name = "web"
port = 8080
}
checks = {
Interval = "10s"
Name = "Connect Sidecar Listening"
TCP = "127.0.0.1:20000"
}
checks = {
alias_service = "web"
name = "Connect Sidecar Aliasing web"
}
kind = "connect-proxy"
name = "web-sidecar-proxy"
port = 20000
proxy = {
destination_service_id = "web"
destination_service_name = "web"
local_service_address = "127.0.0.1"
local_service_port = 8080
}
]

```

</Tab>

<Tab heading="JSON" group="json">

```json
{
"services": [
{
"name": "web",
"port": 8080
},
{
"name": "web-sidecar-proxy",
"port": 20000,
"kind": "connect-proxy",
"checks": [
{
"Name": "Connect Sidecar Listening",
"TCP": "127.0.0.1:20000",
"Interval": "10s"
},
{
"name": "Connect Sidecar Aliasing web",
"alias_service": "web"
}
],
"proxy": {
"destination_service_name": "web",
"destination_service_id": "web",
"local_service_address": "127.0.0.1",
"local_service_port": 8080
}
}
]
}

```

</Tab>

</Tabs>

## Register the service

Provide the service definition to the Consul agent to register your proxy service. You can use the same methods for registering proxy services as you do for registering application services:

- Place the service definition in a Consul agent's configuration directory and start, restart, or reload the agent. Use this method when implementing changes to an existing proxy service.
- Use the `consul services register` command to register the proxy service with a running Consul agent.
- Call the `/agent/service/register` HTTP API endpoint to register the proxy service with a running Consul agent.

Refer to [Register services and health checks](/consul/docs/services/usage/register-services-checks) for instructions.

In the following example, the `consul services register` command registers a proxy service stored in `proxy.hcl`:

```shell-session
$ consul services register proxy.hcl
```

## Start the proxy

Envoy requires a bootstrap configuration file before it can start. Use the [`consul connect envoy` command](/consul/commands/connect/envoy) to create the Envoy bootstrap configuration and start the proxy service. Specify the name of the service with the attached proxy with the `-sidecar-for` option.

The following example command starts an Envoy sidecar proxy for the `web` service:

```shell-session
$ consul connect envoy -sidecar-for=web
```

For details about operating an Envoy proxy in Consul, refer to [](/consul/docs/connect/proxies/envoy)

## Configuration reference

The `sidecar_service` block is a service definition that can contain most regular service definition fields. Refer to [Limitations](#limitations) for information about unsupported service definition fields for sidecar proxies.

Consul treats sidecar proxy service definitions as a root-level service definition. All fields are optional in nested definitions, which default to opinionated settings that are intended to reduce burden of setting up a sidecar proxy.

## Sidecar service defaults

The following fields are set by default on a sidecar service registration. With
[the exceptions noted](#limitations) any field may be overridden explicitly in
the `connect.sidecar_service` definition to customize the proxy registration.
The "parent" service refers to the service definition that embeds the sidecar
proxy.

- `id` - ID defaults to being `<parent-service-id>-sidecar-proxy`. This can't
be overridden as it is used to [manage the lifecycle](#lifecycle) of the
registration.
- `name` - Defaults to being `<parent-service-name>-sidecar-proxy`.
- `tags` - Defaults to the tags of the parent service.
- `meta` - Defaults to the service metadata of the parent service.
- `port` - Defaults to being auto-assigned from a configurable
range specified by [`sidecar_min_port`](/consul/docs/agent/config/config-files#sidecar_min_port)
and [`sidecar_max_port`](/consul/docs/agent/config/config-files#sidecar_max_port).
- `kind` - Defaults to `connect-proxy`. This can't be overridden currently.
- `check`, `checks` - By default we add a TCP check on the local address and
port for the proxy, and a [service alias
check](/consul/docs/services/usage/checks#alias-checks) for the parent service. If either
`check` or `checks` fields are set, only the provided checks are registered.
- `proxy.destination_service_name` - Defaults to the parent service name.
- `proxy.destination_service_id` - Defaults to the parent service ID.
- `proxy.local_service_address` - Defaults to `127.0.0.1`.
- `proxy.local_service_port` - Defaults to the parent service port.

### Example with overwritten configurations

In the following example, but the `sidecar_service` macro sets baselines configurations for the proxy, but the [proxy
upstreams](/consul/docs/connect/proxies/proxy-config-reference#upstream-configuration-reference)
and [built-in proxy
configuration](/consul/docs/connect/proxies/built-in) fields contain custom values:

```json
{
"name": "web",
"port": 8080,
"connect": {
"sidecar_service": {
"proxy": {
"upstreams": [
{
"destination_name": "db",
"local_bind_port": 9191
}
],
"config": {
"handshake_timeout_ms": 1000
}
}
}
}
}
```

## Limitations

The following fields are not supported in the `connect.sidecar_service` block:

- `id` - Sidecar services get an ID assigned and it is an error to override
this. This ensures the agent can correctly deregister the sidecar service
later when the parent service is removed.
- `kind` - Kind defaults to `connect-proxy` and there is currently no way to
unset this to make the registration be for a regular non-connect-proxy
service.
- `connect.sidecar_service` - Service definitions can't be nested recursively.
- `connect.native` - Currently the `kind` is fixed to `connect-proxy` and it's
an error to register a `connect-proxy` that is also service mesh-native.

## Lifecycle

Sidecar service registration is mostly a configuration syntax helper to avoid
adding lots of boiler plate for basic sidecar options, however the agent does
have some specific behavior around their lifecycle that makes them easier to
work with.

The agent fixes the ID of the sidecar service to be based on the parent
service's ID. This enables the following behavior.

- A service instance can _only ever have one_ sidecar service registered.
- When re-registering via API or reloading from configuration file:
- If something changes in the nested sidecar service definition, the change
will _update_ the current sidecar registration instead of creating a new
one.
- If a service registration removes the nested `sidecar_service` then the
previously registered sidecar for that service will be deregistered
automatically.
- When reloading the configuration files, if a service definition changes its
ID, then a new service instance _and_ a new sidecar instance will be
registered. The old ones will be removed since they are no longer found in
the config files.
Loading