Skip to content

Commit

Permalink
docs(peering): remove beta references
Browse files Browse the repository at this point in the history
  • Loading branch information
DanStough committed Nov 11, 2022
1 parent 4870c4c commit 6c3cc13
Show file tree
Hide file tree
Showing 5 changed files with 13 additions and 37 deletions.
6 changes: 2 additions & 4 deletions website/content/docs/architecture/index.mdx
Expand Up @@ -105,10 +105,8 @@ In the following diagram, the servers in each data center participate in a WAN g
</Tab>
</Tabs>

### Cluster peering (beta)
### Cluster peering

You can create peering connections between two or more independent clusters so that services deployed to different datacenters or admin partitions can communicate. An [admin partition](/docs/enterprise/admin-partitions) is a feature in Consul Enterprise that enables you to define isolated network regions that use the same Consul servers. In the cluster peering model, you create a token in one of the datacenters or partitions and configure another datacenter or partition to present the token to establish the connection.

-> **Cluster peering is currently in beta:** Functionality associated with cluster peering is subject to change. You should never use the beta release in secure environments or production scenarios. Features in beta may have performance issues, scaling issues, and limited support.

Refer to [What is Cluster Peering?](/docs/connect/cluster-peering) for additional information.
Refer to [What is Cluster Peering?](/docs/connect/cluster-peering) for additional information.
Expand Up @@ -8,22 +8,20 @@ description: >-

# Create and Manage Cluster Peering Connections

~> **Cluster peering is currently in beta:** Functionality associated with cluster peering is subject to change. You should never use the beta release in secure environments or production scenarios. Features in beta may have performance issues, scaling issues, and limited support.<br /><br />Cluster peering is not currently available in the HCP Consul offering.

A peering token enables cluster peering between different datacenters. Once you generate a peering token, you can use it to establish a connection between clusters. Then you can export services and create intentions so that peered clusters can call those services.

## Create a peering connection

Cluster peering is not enabled by default on Consul servers. To peer clusters, you must first configure all Consul servers so that `peering` is `enabled` and the gRPC port(8502) accepts traffic from the peering cluster (e.g., `client_addr="0.0.0.0"`). For additional information, refer to [Configuration Files](/docs/agent/config/config-files).
Cluster peering is enabled by default on Consul servers as of 1.14. For additional information, like disabling peering, refer to [Configuration Files](/docs/agent/config/config-files).

After enabling peering for all Consul servers, complete the following steps in order:
Use the following steps to create a peering connection:

1. Create a peering token
1. Establish a connection between clusters
1. Export services between clusters
1. Authorize services for peers

You can generate peering tokens and initiate connections on any available agent using either the API or the Consul UI. If you use the API, we recommend performing these operations through a client agent in the partition you want to connect.
You can generate peering tokens and initiate connections on any available agent using either the API, CLI, or the Consul UI. If you use the API or CLI, we recommend performing these operations through a client agent in the partition you want to connect.

The UI does not currently support exporting services between clusters or authorizing services for peers.

Expand Down
20 changes: 3 additions & 17 deletions website/content/docs/connect/cluster-peering/index.mdx
Expand Up @@ -7,8 +7,6 @@ description: >-

# What is Cluster Peering?

~> **Cluster peering is currently in beta**: Functionality associated with cluster peering is subject to change. You should never use the beta release in secure environments or production scenarios. Features in beta may have performance issues, scaling issues, and limited support. <br/><br/>Cluster peering is not currently available in the HCP Consul offering.

You can create peering connections between two or more independent clusters so that services deployed to different partitions or datacenters can communicate.

## Overview
Expand Down Expand Up @@ -43,23 +41,11 @@ Regardless of whether you connect your clusters through WAN federation or cluste
| Forwards service requests for service discovery | &#9989; | &#10060; |
| Shares key/value stores | &#9989; | &#10060; |

## Beta release features and constraints

The cluster peering beta release includes the following features and functionality:

- **Consul v1.14 beta only**: Dynamic traffic control with a service resolver config entry can target failover and redirects to service instances in a peered cluster.
- Consul datacenters that are already federated stay federated. You do not need to migrate WAN federated clusters to cluster peering.
- Mesh gateways for _service to service traffic_ between clusters are available. For more information on configuring mesh gateways across peers, refer to [Service-to-service Traffic Across Peered Clusters](/docs/connect/gateways/mesh-gateway/service-to-service-traffic-peers).
- You can generate peering tokens, establish, list, read, and delete peerings, and manage intentions for peering connections with both the API and the UI.
- You can configure [transparent proxies](/docs/connect/transparent-proxy) for peered services.
- You can use the [`peering` rule for ACL enforcement](/docs/security/acl/acl-rules#peering) of peering APIs.
## Important Cluster Peering Constraints

Not all features and functionality are available in the beta release. In particular, consider the following technical constraints:
Consider the following technical constraints:

- Mesh gateways for _server to server traffic_ are not available.
- Services with node, instance, and check definitions totaling more than 50MB cannot be exported to a peer.
- The `service-splitter` and `service-router` configuration entry kinds cannot directly target a peer. To split or route traffic to a service instance on a peer, you must supplement your desired dynamic routing definition with a `service-resolver` config entry on the dialing cluster. Refer to [L7 traffic management between peers](/docs/connect/cluster-peering/create-manage-peering#L7-traffic) for more information.
- Two admin partitions in the same datacenter cannot be peered. Consider using [`exported-services`](/docs/connect/config-entries/exported-services#exporting-services-to-peered-clusters) directly.
- The `consul intention` CLI command is not supported. To manage intentions that specify services in peered clusters, use [configuration entries](/docs/connect/config-entries/service-intentions).
- Accessing key/value stores across peers is not supported.
- Because non-Enterprise Consul instances are restricted to the `default` namespace, Consul Enterprise instances cannot export services from outside of the `default` namespace to non-Enterprise peers.
- Cross-cluster mesh gateways are supported in `remote` mode only.
14 changes: 5 additions & 9 deletions website/content/docs/connect/cluster-peering/k8s.mdx
Expand Up @@ -7,10 +7,6 @@ description: >-

# Cluster Peering on Kubernetes

~> **Cluster peering is currently in beta:** Functionality associated
with cluster peering is subject to change. You should never use the beta release in secure environments or production scenarios. Features in
beta may have performance issues, scaling issues, and limited support.<br/><br/>Cluster peering is not currently available in the HCP Consul offering.

To establish a cluster peering connection on Kubernetes, you need to enable the feature in the Helm chart and create custom resource definitions (CRDs) for each side of the peering.

The following CRDs are used to create and manage a peering connection:
Expand All @@ -26,9 +22,9 @@ As of Consul v1.14, you can also [implement service failovers and redirects to c

You must implement the following requirements to create and use cluster peering connections with Kubernetes:

- Consul v1.13.1 or later
- Consul v1.14.0 or later
- At least two Kubernetes clusters
- The installation must be running on Consul on Kubernetes version 0.47.1 or later
- The installation must be running on Consul on Kubernetes version 1.0.0 or later

### Prepare for installation

Expand All @@ -53,7 +49,7 @@ Complete the following procedure after you have provisioned a Kubernetes cluster
```yaml
global:
name: consul
image: "hashicorp/consul:1.13.1"
image: "hashicorp/consul:1.14.0"
peering:
enabled: true
connectInject:
Expand Down Expand Up @@ -88,7 +84,7 @@ Install Consul on Kubernetes by using the CLI to apply `values.yaml` to each clu
```

```shell-session
$ helm install ${HELM_RELEASE_NAME} hashicorp/consul --create-namespace --namespace consul --version "0.47.1" --values values.yaml --kube-context $CLUSTER1_CONTEXT
$ helm install ${HELM_RELEASE_NAME} hashicorp/consul --create-namespace --namespace consul --version "1.0.0" --values values.yaml --kube-context $CLUSTER1_CONTEXT
```

1. In `cluster-02`, run the following commands:
Expand All @@ -98,7 +94,7 @@ Install Consul on Kubernetes by using the CLI to apply `values.yaml` to each clu
```

```shell-session
$ helm install ${HELM_RELEASE_NAME} hashicorp/consul --create-namespace --namespace consul --version "0.47.1" --values values.yaml --kube-context $CLUSTER2_CONTEXT
$ helm install ${HELM_RELEASE_NAME} hashicorp/consul --create-namespace --namespace consul --version "1.0.0" --values values.yaml --kube-context $CLUSTER2_CONTEXT
```

## Create a peering connection for Consul on Kubernetes
Expand Down
Expand Up @@ -7,8 +7,6 @@ description: >-

# Mesh Gateways between Peered Clusters

~> **Cluster peering is currently in beta**: Functionality associated with cluster peering is subject to change. You should never use the beta release in secure environments or production scenarios. Features in beta may have performance issues, scaling issues, and limited support.

Mesh gateways are required for you to route service mesh traffic between different Consul clusters. Clusters can reside in different clouds or runtime environments where general interconnectivity between all services in all clusters is not feasible.

Unlike mesh gateways for datacenters and partitions, mesh gateways between peers terminate mTLS sessions to decrypt data to HTTP services and then re-encrypt traffic to send to services. Data must be decrypted in order to evaluate and apply dynamic routing rules at the destination cluster, which reduces coupling between peers.
Expand Down

0 comments on commit 6c3cc13

Please sign in to comment.