Skip to content

Commit

Permalink
backport of commit 7d9bc82
Browse files Browse the repository at this point in the history
  • Loading branch information
ccapurso committed Nov 22, 2022
1 parent 79cc894 commit ebc5ebb
Show file tree
Hide file tree
Showing 6 changed files with 11 additions and 0 deletions.
2 changes: 2 additions & 0 deletions website/content/api-docs/secret/consul.mdx
Expand Up @@ -8,6 +8,8 @@ description: This is the API documentation for the Vault Consul secrets engine.

@include 'x509-sha1-deprecation.mdx'

@include 'consul-dataplane-compat.mdx'

This is the API documentation for the Vault Consul secrets engine. For general
information about the usage and operation of the Consul secrets engine, please
see the [Vault Consul documentation](/docs/secrets/consul).
Expand Down
Expand Up @@ -16,6 +16,8 @@ a default health check. When Consul is configured as the storage backend, the st

~> **Version information:** The `service_registration` configuration option was introduced in Vault 1.4.0.

@include 'consul-dataplane-compat.mdx'

- **HashiCorp Supported** – Consul Service Registration is officially supported
by HashiCorp.

Expand Down
2 changes: 2 additions & 0 deletions website/content/docs/configuration/storage/consul.mdx
Expand Up @@ -15,6 +15,8 @@ key-value store. In addition to providing durable storage, inclusion of this
backend will also register Vault as a service in Consul with a default health
check.

@include 'consul-dataplane-compat.mdx'

- **High Availability** – the Consul storage backend supports high availability.

- **HashiCorp Supported** – the Consul storage backend is officially supported
Expand Down
Expand Up @@ -10,6 +10,8 @@ description: |-

@include 'helm/version.mdx'

@include 'consul-dataplane-compat.mdx'

The below `values.yaml` can be used to set up a five server Vault cluster using
Consul as a highly available storage backend, Google Cloud KMS for Auto Unseal.

Expand Down
2 changes: 2 additions & 0 deletions website/content/docs/secrets/consul.mdx
Expand Up @@ -8,6 +8,8 @@ description: The Consul secrets engine for Vault generates tokens for Consul dyn

@include 'x509-sha1-deprecation.mdx'

@include 'consul-dataplane-compat.mdx'

The Consul secrets engine generates [Consul](https://www.consul.io/) API tokens
dynamically based on Consul ACL policies.

Expand Down
1 change: 1 addition & 0 deletions website/content/partials/consul-dataplane-compat.mdx
@@ -0,0 +1 @@
~> **Compatibility information:** As of Consul 1.14.0, Consul on Kubernetes uses [Consul Dataplane](https://developer.hashicorp.com/consul/docs/connect/dataplane) by default instead of client agents. Vault does not currently support Consul Dataplane. Please follow the Consul 1.14.0 [upgrade guide](https://developer.hashicorp.com/consul/docs/k8s/upgrade#upgrading-to-consul-dataplane) to ensure that your Consul on Kubernetes deployment continues to use client agents.

0 comments on commit ebc5ebb

Please sign in to comment.