You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/consul/v1.22.x/content/docs/automate/kv/store.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,5 +89,5 @@ Success! Deleted keys with prefix: redis
89
89
```
90
90
91
91
<Warningtitle="Security warning">
92
-
To mitigate vulnerability [CVE-2025-11392], Consul does not allow path escapes, directory escapes, leading spaces, or trailing spaces in keys, beginning with Consul v1.22.0. If you have any existing keys in this format and want to continue using the same keys, set the `disable_kv_key_validation` parameter to `true` in the Consul agent configuration. We strongly recommend using validated keys unless you have a specific reason to disable it for legacy compatibility.
92
+
By default, Consul does not allow path escapes, directory escapes, leading spaces, or trailing spaces in keys, beginning with Consul v1.22.0. If you have any existing keys in this format and want to continue using the same keys, set the `disable_kv_key_validation` parameter to `true` in the Consul agent configuration. We strongly recommend using validated keys unless you have a specific reason to disable it for legacy compatibility.
Copy file name to clipboardExpand all lines: content/consul/v1.22.x/content/docs/integrate/index.mdx
+6-9Lines changed: 6 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,6 @@ description: >-
10
10
The HashiCorp Consul Integration Program enables prospective partners to build integrations with HashiCorp Consul that are reviewed and verified by HashiCorp. You can integrate with any of the following Consul versions:
11
11
12
12
-**Self-Managed**. Community Edition, always free
13
-
-**HashiCorp Cloud Platform (HCP)**. A hosted version of Consul managed in the cloud
14
13
-**Consul Enterprise**. Self-managed, with additional features for custom deployments
15
14
16
15
The program is intended to be largely self-service with links to resources, code samples, documentation, and clear integration steps.
@@ -35,7 +34,7 @@ By leveraging Consul's RESTful HTTP API system, prospective partners are able to
35
34
36
35
**Infrastructure**: There are two integration options in this category: natively through a direct integration with Consul or via Consul-Terraform-Sync (CTS). By leveraging Consul's powerful **Network Infrastructure Automation (NIA)*** capabilities through CTS, changes in an infrastructure are seamlessly automated when Consul detects a change in its service catalog. For example, these integrations could be used to automate IP updates of load balancers or firewall security policies by leveraging Consul service discovery.
37
36
38
-
-> **Network Infrastructure Automation (NIA)***: These integrations leverage Consul's service catalog to seamlessly integrate with Consul-Terraform-Sync (CTS) to automate changes in network infrastructure via a publisher-subscriber method. Refer to the [NIA documentation](/consul/docs/integrate/nia) for details.
37
+
-> **Network Infrastructure Automation (NIA)**: These integrations leverage Consul's service catalog to seamlessly integrate with Consul-Terraform-Sync (CTS) to automate changes in network infrastructure via a publisher-subscriber method. Refer to the [NIA documentation](/consul/docs/integrate/nia) for details.
39
38
40
39
**Consul integration verification badges**: Partners will be issued the Consul Enterprise badge for integrations that work with [Consul Enterprise features](/consul/docs/enterprise) such as namespaces. Each badge would be displayed on HashiCorp's partner page as well as be available for posting on the partner's own website to provide better visibility and differentiation of the integration for joint customers.
41
40
@@ -113,11 +112,11 @@ Here are links to resources, documentation, examples and best practices to guide
113
112
-[Consul Integration with Layer5 Meshery](https://www.hashicorp.com/integrations/layer5-io/consul)
114
113
-[Consul Integration with VMware Tanzu Application Service](/consul/tutorials/cloud-integrations/sync-pivotal-cloud-services?utm_source=docs)
115
114
116
-
#### Infrastructure:
115
+
#####Infrastructure
117
116
118
117
-> **Note**: The types of integration areas below could be developed to natively work with Consul or through leveraging Consul-Terraform-Sync and Consul's network automation capabilities.
119
118
120
-
**Firewalls**
119
+
**Firewalls:**
121
120
122
121
**Network Infrastructure Automation:**
123
122
@@ -134,11 +133,9 @@ Here are links to resources, documentation, examples and best practices to guide
134
133
135
134
-[Load Balancing with NGINX and Consul Template](/consul/tutorials/load-balancing/load-balancing-nginx?utm_source=docs)
136
135
-[Load Balancing with HAProxy Service Discovery](/consul/tutorials/load-balancing/load-balancing-haproxy?utm_source=docs)
137
-
138
-
**Network Infrastructure Automation:**
139
136
140
-
-[Zero-Touch Configuration of Secure Apps across BIG-IP Tenants using CTS](https://community.f5.com/t5/technical-articles/zero-touch-configuration-of-secure-apps-across-big-ip-tenants/ta-p/300190)
141
-
-[Automate VMware Advanced Load Balancers (Avi) with Consul NIA](https://www.hashicorp.com/integrations/_vmware/consul)
137
+
-[Zero-Touch Configuration of Secure Apps across BIG-IP Tenants using CTS](https://community.f5.com/t5/technical-articles/zero-touch-configuration-of-secure-apps-across-big-ip-tenants/ta-p/300190)
138
+
-[Automate VMware Advanced Load Balancers (Avi) with Consul NIA](https://www.hashicorp.com/integrations/_vmware/consul)
142
139
143
140
**Application Delivery Controllers \(ADC\)**
144
141
@@ -148,7 +145,7 @@ Here are links to resources, documentation, examples and best practices to guide
148
145
**Domain Name Service (DNS) Automation**
149
146
150
147
-[Automate DNSimple public facing DNS records with Consul NIA](https://registry.terraform.io/modules/dnsimple/cts/dnsimple/latest)
151
-
-[Automate NS1 managed DNS with Consul NIA](https://github.com/ns1-terraform/terraform-ns1-record-sync-nia)
148
+
-[Automate UltraDNS with Consul-Terraform-Sync](https://github.com/ns1-terraform/terraform-ns1-record-sync-nia)
Copy file name to clipboardExpand all lines: content/consul/v1.22.x/content/docs/reference/k8s/annotation-label.mdx
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -237,11 +237,13 @@ The following Kubernetes resource annotations could be used on a pod to control
237
237
- `consul.hashicorp.com/consul-sidecar-cpu-request`- Override the default CPU request.
238
238
- `consul.hashicorp.com/consul-sidecar-memory-limit`- Override the default memory limit.
239
239
- `consul.hashicorp.com/consul-sidecar-memory-request`- Override the default memory request.
240
-
- `consul.hashicorp.com/enable-consul-dataplane-as-sidecar`- If this is set to `true`, then `consul-dataplane` will load as an init container and check the readiness using the startup probe. This will stall the initialisation of the application container until `consul-dataplane` is ready. Default value is `false`.
241
-
- `consul.hashicorp.com/sidecar-initial-probe-check-delay-seconds`- Number of seconds for the initial delay in Kubernetes before the startup probe starts checking the `consul-dataplane sidecar` container. Default value is `1`.
242
-
- `consul.hashicorp.com/sidecar-probe-period-seconds`- Number of seconds for the period between Kubernetes startup probe checks. Default value is `1`.
243
-
- `consul.hashicorp.com/sidecar-probe-failure-threshold`- Number of consecutive failures for the Kubernetes startup probe checks before restarting the `consul-dataplane` sidecar container. Default value is `1`.
244
-
- `consul.hashicorp.com/sidecar-probe-check-timeout-seconds`- Number of seconds for Kubernetes to trigger a timeout on startup probe checks. Default value is `1`.
240
+
241
+
- `consul.hashicorp.com/enable-consul-dataplane-as-sidecar`- If this is set to `true`, then `consul-dataplane` will load as an init container and check the readiness using the startup probe. This will stall the initialisation of the application container until `consul-dataplane` is ready. Default value is `false`.
242
+
- `consul.hashicorp.com/sidecar-initial-probe-check-delay-seconds`- Number of seconds for the initial delay in Kubernetes before the startup probe starts checking the `consul-dataplane sidecar` container. Default value is `1`.
243
+
- `consul.hashicorp.com/sidecar-probe-period-seconds`- Number of seconds for the period between Kubernetes startup probe checks. Default value is `1`.
244
+
- `consul.hashicorp.com/sidecar-probe-failure-threshold`- Number of consecutive failures for the Kubernetes startup probe checks before restarting the `consul-dataplane` sidecar container. Default value is `1`.
245
+
- `consul.hashicorp.com/sidecar-probe-check-timeout-seconds`- Number of seconds for Kubernetes to trigger a timeout on startup probe checks. Default value is `1`.
246
+
245
247
- `consul.hashicorp.com/enable-sidecar-proxy-lifecycle`- Override the default Helm value [`connectInject.sidecarProxy.lifecycle.defaultEnabled`](/consul/docs/reference/k8s/helm#v-connectinject-sidecarproxy-lifecycle-defaultenabled)
246
248
- `consul.hashicorp.com/enable-sidecar-proxy-shutdown-drain-listeners`- Override the default Helm value [`connectInject.sidecarProxy.lifecycle.defaultEnableShutdownDrainListeners`](/consul/docs/reference/k8s/helm#v-connectinject-sidecarproxy-lifecycle-defaultenableshutdowndrainlisteners)
247
249
- `consul.hashicorp.com/sidecar-proxy-lifecycle-shutdown-grace-period-seconds`- Override the default Helm value [`connectInject.sidecarProxy.lifecycle.defaultShutdownGracePeriodSeconds`](/consul/docs/reference/k8s/helm#v-connectinject-sidecarproxy-lifecycle-defaultshutdowngraceperiodseconds)
Copy file name to clipboardExpand all lines: content/consul/v1.22.x/content/docs/vm.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,8 +17,8 @@ Consul supports service networking for application workloads on multiple runtime
17
17
18
18
The following topics describe unique user actions, workflows, and goals related to installing Consul and operating it as a long-running daemon on multiple nodes in a network.
0 commit comments