Mesh
The configuration entry allows you to define a global default configuration that applies to all service mesh proxies. Settings in this config entry apply across all namespaces and federated datacenters.
Enforce that service mesh mTLS traffic uses TLS v1.2 or newer.
HCL
- HCL
- Kubernetes YAML
- JSON
Kind = "mesh"
TLS {
Incoming {
TLSMinVersion = "TLSv1_2"
}
}
apiVersion: consul.hashicorp.com/v1alpha1
kind: Mesh
metadata:
name: mesh
spec:
tls:
incoming:
tlsMinVersion: TLSv1_2
apiVersion: consul.hashicorp.com/v1alpha1
kind: Mesh
metadata:
name: mesh
spec:
incoming:
tlsMinVersion: TLSv1_2
{
"Kind": "mesh",
"TLS": {
"Incoming": {
"TLSMinVersion": "TLSv1_2"
}
}
}
Note that the Kubernetes example does not include a partition
field. Configuration entries are applied on Kubernetes using custom resource definitions (CRD), which can only be scoped to their own partition.
Mesh Destinations Only
Only allow transparent proxies to dial addresses in the mesh.
HCL
- HCL
- Kubernetes YAML
- JSON
Kind = "mesh"
TransparentProxy {
MeshDestinationsOnly = true
}
Kind = "mesh"
MeshDestinationsOnly = true
}
apiVersion: consul.hashicorp.com/v1alpha1
kind: Mesh
metadata:
name: mesh
spec:
transparentProxy:
{
"Kind": "mesh",
"TransparentProxy": {
"MeshDestinationsOnly": true
}
}
{
"Kind": "mesh",
"TransparentProxy": {
"MeshDestinationsOnly": true
}
}
Note that the Kubernetes example does not include a partition
field. Configuration entries are applied on Kubernetes using custom resource definitions (CRD), which can only be scoped to their own partition.
- Must be set to
mesh
Namespace
(string: "default")
Enterprise
- Must be set to
default
. The configuration will apply to all namespaces.(string: "default")
Enterprise
- Specifies the name of the admin partition in which the configuration entry applies. Refer to the Admin Partitions documentation for additional information.
(map<string|string>: nil)
- Specifies arbitrary KV metadata pairs. Added in Consul 1.8.4.-
- MeshDestinationsOnly
(bool: false)
- Determines whether sidecar proxies operating in transparent mode can proxy traffic to IP addresses not registered in Consul’s mesh. If enabled, traffic will only be proxied to upstream proxies or Connect-native services. If disabled, requests will be proxied as-is to the original destination IP address. Consul will not encrypt the connection.
- MeshDestinationsOnly
(TLSConfig: <optional>)
- TLS configuration for the service mesh.Incoming
(TLSDirectionConfig: <optional>)
- TLS configuration for inbound mTLS connections targeting the public listener onconnect-proxy
andterminating-gateway
proxy kinds.(string: "")
- Set the default minimum TLS version supported. One ofTLS_AUTO
, ,TLSv1_1
,TLSv1_2
, orTLSv1_3
. If unspecified, Envoy v1.22.0 and newer will default to TLS 1.2 as a min version, while older releases of Envoy default to TLS 1.0.(string: "")
- Set the default maximum TLS version supported. Must be greater than or equal toTLSMinVersion
. One ofTLS_AUTO
,TLSv1_0
,TLSv1_1
,TLSv1_2
, orTLSv1_3
. If unspecified, Envoy will default to TLS 1.3 as a max version for incoming connections.CipherSuites
(array<string>: <optional>)
- Set the default list of TLS cipher suites to support when negotiating connections using TLS 1.2 or earlier. If unspecified, Envoy will use a . The list of supported cipher suites can seen in consul/types/tls.go and is dependent on underlying support in Envoy. Future releases of Envoy may remove currently-supported but insecure cipher suites, and future releases of Consul may add new supported cipher suites if any are added to Envoy.
(TLSDirectionConfig: <optional>)
- TLS configuration for outbound mTLS connections dialing upstreams fromconnect-proxy
andingress-gateway
proxy kinds.TLSMinVersion
(string: "")
- Set the default minimum TLS version supported. One ofTLS_AUTO
,TLSv1_0
,TLSv1_1
,TLSv1_2
, orTLSv1_3
. If unspecified, Envoy v1.22.0 and newer , while older releases of Envoy default to TLS 1.0.TLSMaxVersion
(string: "")
- Set the default maximum TLS version supported. Must be greater than or equal toTLSMinVersion
. One ofTLS_AUTO
,TLSv1_0
,TLSv1_1
,TLSv1_2
, orTLSv1_3
. If unspecified, Envoy will default to TLS 1.2 as a max version for outgoing connections, but future Envoy releases .CipherSuites
(array<string>: <optional>)
- Set the default list of TLS cipher suites to support when negotiating connections using TLS 1.2 or earlier. If unspecified, Envoy will use a . The list of supported cipher suites can seen in consul/types/tls.go and is dependent on underlying support in Envoy. Future releases of Envoy may remove currently-supported but insecure cipher suites, and future releases of Consul may add new supported cipher suites if any are added to Envoy.
Configuration entries may be protected by .
Creating, updating, or deleting a config entry requires operator:write
.