Skip to content

Commit f564255

Browse files
committed
Additional content migration
1 parent b36250c commit f564255

File tree

4 files changed

+16
-17
lines changed

4 files changed

+16
-17
lines changed

content/consul/v1.22.x/content/docs/automate/kv/store.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,5 +89,5 @@ Success! Deleted keys with prefix: redis
8989
```
9090

9191
<Warning title="Security warning">
92-
To mitigate vulnerability [CVE-2025-11392], Consul does not allow path escapes, directory escapes, leading spaces, or trailing spaces in keys, beginning with Consul v1.22.0. If you have any existing keys in this format and want to continue using the same keys, set the `disable_kv_key_validation` parameter to `true` in the Consul agent configuration. We strongly recommend using validated keys unless you have a specific reason to disable it for legacy compatibility.
92+
By default, Consul does not allow path escapes, directory escapes, leading spaces, or trailing spaces in keys, beginning with Consul v1.22.0. If you have any existing keys in this format and want to continue using the same keys, set the `disable_kv_key_validation` parameter to `true` in the Consul agent configuration. We strongly recommend using validated keys unless you have a specific reason to disable it for legacy compatibility.
9393
</Warning>

content/consul/v1.22.x/content/docs/integrate/index.mdx

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ description: >-
1010
The HashiCorp Consul Integration Program enables prospective partners to build integrations with HashiCorp Consul that are reviewed and verified by HashiCorp. You can integrate with any of the following Consul versions:
1111

1212
- **Self-Managed**. Community Edition, always free
13-
- **HashiCorp Cloud Platform (HCP)**. A hosted version of Consul managed in the cloud
1413
- **Consul Enterprise**. Self-managed, with additional features for custom deployments
1514

1615
The program is intended to be largely self-service with links to resources, code samples, documentation, and clear integration steps.
@@ -35,7 +34,7 @@ By leveraging Consul's RESTful HTTP API system, prospective partners are able to
3534

3635
**Infrastructure**: There are two integration options in this category: natively through a direct integration with Consul or via Consul-Terraform-Sync (CTS). By leveraging Consul's powerful **Network Infrastructure Automation (NIA)*** capabilities through CTS, changes in an infrastructure are seamlessly automated when Consul detects a change in its service catalog. For example, these integrations could be used to automate IP updates of load balancers or firewall security policies by leveraging Consul service discovery.
3736

38-
-> **Network Infrastructure Automation (NIA)***: These integrations leverage Consul's service catalog to seamlessly integrate with Consul-Terraform-Sync (CTS) to automate changes in network infrastructure via a publisher-subscriber method. Refer to the [NIA documentation](/consul/docs/integrate/nia) for details.
37+
-> **Network Infrastructure Automation (NIA)**: These integrations leverage Consul's service catalog to seamlessly integrate with Consul-Terraform-Sync (CTS) to automate changes in network infrastructure via a publisher-subscriber method. Refer to the [NIA documentation](/consul/docs/integrate/nia) for details.
3938

4039
**Consul integration verification badges**: Partners will be issued the Consul Enterprise badge for integrations that work with [Consul Enterprise features](/consul/docs/enterprise) such as namespaces. Each badge would be displayed on HashiCorp's partner page as well as be available for posting on the partner's own website to provide better visibility and differentiation of the integration for joint customers.
4140

@@ -113,11 +112,11 @@ Here are links to resources, documentation, examples and best practices to guide
113112
- [Consul Integration with Layer5 Meshery](https://www.hashicorp.com/integrations/layer5-io/consul)
114113
- [Consul Integration with VMware Tanzu Application Service](/consul/tutorials/cloud-integrations/sync-pivotal-cloud-services?utm_source=docs)
115114

116-
#### Infrastructure:
115+
##### Infrastructure
117116

118117
-> **Note**: The types of integration areas below could be developed to natively work with Consul or through leveraging Consul-Terraform-Sync and Consul's network automation capabilities.
119118

120-
**Firewalls**
119+
**Firewalls:**
121120

122121
**Network Infrastructure Automation:**
123122

@@ -134,11 +133,9 @@ Here are links to resources, documentation, examples and best practices to guide
134133

135134
- [Load Balancing with NGINX and Consul Template](/consul/tutorials/load-balancing/load-balancing-nginx?utm_source=docs)
136135
- [Load Balancing with HAProxy Service Discovery](/consul/tutorials/load-balancing/load-balancing-haproxy?utm_source=docs)
137-
138-
**Network Infrastructure Automation:**
139136

140-
- [Zero-Touch Configuration of Secure Apps across BIG-IP Tenants using CTS](https://community.f5.com/t5/technical-articles/zero-touch-configuration-of-secure-apps-across-big-ip-tenants/ta-p/300190)
141-
- [Automate VMware Advanced Load Balancers (Avi) with Consul NIA](https://www.hashicorp.com/integrations/_vmware/consul)
137+
- [Zero-Touch Configuration of Secure Apps across BIG-IP Tenants using CTS](https://community.f5.com/t5/technical-articles/zero-touch-configuration-of-secure-apps-across-big-ip-tenants/ta-p/300190)
138+
- [Automate VMware Advanced Load Balancers (Avi) with Consul NIA](https://www.hashicorp.com/integrations/_vmware/consul)
142139

143140
**Application Delivery Controllers \(ADC\)**
144141

@@ -148,7 +145,7 @@ Here are links to resources, documentation, examples and best practices to guide
148145
**Domain Name Service (DNS) Automation**
149146

150147
- [Automate DNSimple public facing DNS records with Consul NIA](https://registry.terraform.io/modules/dnsimple/cts/dnsimple/latest)
151-
- [Automate NS1 managed DNS with Consul NIA](https://github.com/ns1-terraform/terraform-ns1-record-sync-nia)
148+
- [Automate UltraDNS with Consul-Terraform-Sync](https://github.com/ns1-terraform/terraform-ns1-record-sync-nia)
152149

153150
**No-Code/Low-Code**
154151

content/consul/v1.22.x/content/docs/reference/k8s/annotation-label.mdx

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -237,11 +237,13 @@ The following Kubernetes resource annotations could be used on a pod to control
237237
- `consul.hashicorp.com/consul-sidecar-cpu-request` - Override the default CPU request.
238238
- `consul.hashicorp.com/consul-sidecar-memory-limit` - Override the default memory limit.
239239
- `consul.hashicorp.com/consul-sidecar-memory-request` - Override the default memory request.
240-
- `consul.hashicorp.com/enable-consul-dataplane-as-sidecar` - If this is set to `true`, then `consul-dataplane` will load as an init container and check the readiness using the startup probe. This will stall the initialisation of the application container until `consul-dataplane` is ready. Default value is `false`.
241-
- `consul.hashicorp.com/sidecar-initial-probe-check-delay-seconds` - Number of seconds for the initial delay in Kubernetes before the startup probe starts checking the `consul-dataplane sidecar` container. Default value is `1`.
242-
- `consul.hashicorp.com/sidecar-probe-period-seconds` - Number of seconds for the period between Kubernetes startup probe checks. Default value is `1`.
243-
- `consul.hashicorp.com/sidecar-probe-failure-threshold` - Number of consecutive failures for the Kubernetes startup probe checks before restarting the `consul-dataplane` sidecar container. Default value is `1`.
244-
- `consul.hashicorp.com/sidecar-probe-check-timeout-seconds` - Number of seconds for Kubernetes to trigger a timeout on startup probe checks. Default value is `1`.
240+
241+
- `consul.hashicorp.com/enable-consul-dataplane-as-sidecar` - If this is set to `true`, then `consul-dataplane` will load as an init container and check the readiness using the startup probe. This will stall the initialisation of the application container until `consul-dataplane` is ready. Default value is `false`.
242+
- `consul.hashicorp.com/sidecar-initial-probe-check-delay-seconds` - Number of seconds for the initial delay in Kubernetes before the startup probe starts checking the `consul-dataplane sidecar` container. Default value is `1`.
243+
- `consul.hashicorp.com/sidecar-probe-period-seconds` - Number of seconds for the period between Kubernetes startup probe checks. Default value is `1`.
244+
- `consul.hashicorp.com/sidecar-probe-failure-threshold` - Number of consecutive failures for the Kubernetes startup probe checks before restarting the `consul-dataplane` sidecar container. Default value is `1`.
245+
- `consul.hashicorp.com/sidecar-probe-check-timeout-seconds` - Number of seconds for Kubernetes to trigger a timeout on startup probe checks. Default value is `1`.
246+
245247
- `consul.hashicorp.com/enable-sidecar-proxy-lifecycle` - Override the default Helm value [`connectInject.sidecarProxy.lifecycle.defaultEnabled`](/consul/docs/reference/k8s/helm#v-connectinject-sidecarproxy-lifecycle-defaultenabled)
246248
- `consul.hashicorp.com/enable-sidecar-proxy-shutdown-drain-listeners` - Override the default Helm value [`connectInject.sidecarProxy.lifecycle.defaultEnableShutdownDrainListeners`](/consul/docs/reference/k8s/helm#v-connectinject-sidecarproxy-lifecycle-defaultenableshutdowndrainlisteners)
247249
- `consul.hashicorp.com/sidecar-proxy-lifecycle-shutdown-grace-period-seconds` - Override the default Helm value [`connectInject.sidecarProxy.lifecycle.defaultShutdownGracePeriodSeconds`](/consul/docs/reference/k8s/helm#v-connectinject-sidecarproxy-lifecycle-defaultshutdowngraceperiodseconds)

content/consul/v1.22.x/content/docs/vm.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ Consul supports service networking for application workloads on multiple runtime
1717

1818
The following topics describe unique user actions, workflows, and goals related to installing Consul and operating it as a long-running daemon on multiple nodes in a network.
1919

20-
- [Deploy Consul on VMs](/deploy/vm)
21-
- [Upgrade Consul on VMs](/upgrade/vm)
20+
- [Deploy Consul on VMs](/consul/docs/deploy/vm)
21+
- [Upgrade Consul on VMs](/consul/docs/upgrade/vm)
2222

2323
### Service networking on virtual machines
2424

0 commit comments

Comments
 (0)