Book Image

Simplifying Service Management with Consul

By : Robert E. Jackson
Book Image

Simplifying Service Management with Consul

By: Robert E. Jackson

Overview of this book

Within the elastic and dynamic nature of cloud computing, efficient and accurate service discovery provides the cornerstone for all communications. HashiCorp Consul facilitates this service discovery efficiently and securely, independent of the operating environment. This book will help you build a solid understanding of both the concepts and applications of HashiCorp Consul. You'll begin by finding out what you can do with Consul, focusing on the conceptual views of configuration samples along with Terraform code to expedite lab environment and hands-on experimentation, which will enable you to apply Consul effectively in your everyday lives. As you advance, you'll learn how to set up your own Consul cluster and agents in a single datacenter or location and understand how Consul utilizes RAFT and GOSSIP protocols for communication. You'll also explore the practical applications of primary Consul use cases, including communication flows and configuration and code examples. With that knowledge, you'll extend Consul across datacenters to discuss the applicability of multiple regions, multiple clouds, and hybrid cloud environments. By the end of this Consul book, you will have the tools needed to create and operate your own Consul cluster and be able to facilitate your service discovery and communication.
Table of Contents (12 chapters)
1
Section 1: Consul Use Cases and Architecture
6
Section 2: Use Cases Deep Dive

Chapter 3: Keep It Safe, Stupid, and Secure Your Cluster!

At this point, you may be saying to yourself, Wow, two chapters and I'm done. Well, sorry to break it to you, but you are currently very much exposed. Yes, we've built a basic Consul cluster, consisting of three servers and four clients, but there is no security around that system. Essentially, we've built a glass house with no doors, so anybody can walk in, and anybody can see what's going on inside. Kind of creepy, isn't it?

To understand how we're going to protect our system, and more importantly our services, let's take a look at all of the areas where we are exposed:

  • System communication – We have seen how all the Consul components communicate freely with each other. Anybody can join that cluster without verification, and anybody can listen in.
  • Who can do what – Even if you are verified and authenticated within the cluster, we need to make sure that the scope...