@@ -8,9 +8,6 @@ description: >-
8
8
9
9
# Consul Service Mesh
10
10
11
- ~ > ** Note:** This guide requires Nomad 0.10.0 or later and Consul 1.6.0 or
12
- later.
13
-
14
11
~ > ** Note:** Nomad's service mesh integration requires Linux network namespaces.
15
12
Consul service mesh will not run on Windows or macOS.
16
13
@@ -58,7 +55,7 @@ The Consul service mesh integration with Nomad requires [Consul 1.6 or
58
55
later.] ( https://releases.hashicorp.com/consul/1.6.0/ ) The Consul agent can be
59
56
run in dev mode with the following command:
60
57
61
- ** Note** : Nomad's Consul service mesh integration requires Consul in your ` $PATH `
58
+ ~ > ** Note: ** Nomad's Consul service mesh integration requires Consul in your ` $PATH `
62
59
63
60
``` shell-session
64
61
$ consul agent -dev
@@ -96,6 +93,23 @@ For JSON configurations:
96
93
}
97
94
```
98
95
96
+ #### Consul ACLs
97
+
98
+ ~ > ** Note:** Starting in Nomad v1.3.0, Consul Service Identity ACL tokens automatically
99
+ generated by Nomad on behalf of Connect enabled services are now created in [ ` Local ` ]
100
+ rather than Global scope, and are no longer replicated globally.
101
+
102
+ To facilitate cross-Consul datacenter requests of Connect services registered by
103
+ Nomad, Consul agents will need to be configured with [ default anonymous] [ anon_token ]
104
+ ACL tokens with ACL policies of sufficient permissions to read service and node
105
+ metadata pertaining to those requests. This mechanism is described in Consul [ #7414 ] [ consul_acl ] .
106
+ A typical Consul agent anonymous token may contain an ACL policy such as:
107
+
108
+ ``` hcl
109
+ service_prefix "" { policy = "read" }
110
+ node_prefix "" { policy = "read" }
111
+ ```
112
+
99
113
### Nomad
100
114
101
115
Nomad must schedule onto a routable interface in order for the proxies to
@@ -326,11 +340,15 @@ dashes (`-`) are converted to underscores (`_`) in environment variables so
326
340
327
341
## Limitations
328
342
343
+ - The minimum Consul version to use Connect with Nomad is Consul v1.8.0.
329
344
- The ` consul ` binary must be present in Nomad's ` $PATH ` to run the Envoy
330
345
proxy sidecar on client nodes.
331
346
- Consul service mesh using network namespaces is only supported on Linux.
332
347
- Prior to Consul 1.9, the Envoy sidecar proxy will drop and stop accepting
333
348
connections while the Nomad agent is restarting.
334
349
335
350
[ count-dashboard ] : /img/count-dashboard.png
351
+ [ consul_acl ] : https://github.com/hashicorp/consul/issues/7414
336
352
[ gh-9907 ] : https://github.com/hashicorp/nomad/issues/9907
353
+ [ `Local` ] : https://www.consul.io/docs/security/acl/acl-tokens#token-attributes
354
+ [ anon_token ] : https://www.consul.io/docs/security/acl/acl-tokens#special-purpose-tokens
0 commit comments