Book Image

Simplifying Service Management with Consul

By : Robert E. Jackson
Book Image

Simplifying Service Management with Consul

By: Robert E. Jackson

Overview of this book

Within the elastic and dynamic nature of cloud computing, efficient and accurate service discovery provides the cornerstone for all communications. HashiCorp Consul facilitates this service discovery efficiently and securely, independent of the operating environment. This book will help you build a solid understanding of both the concepts and applications of HashiCorp Consul. You'll begin by finding out what you can do with Consul, focusing on the conceptual views of configuration samples along with Terraform code to expedite lab environment and hands-on experimentation, which will enable you to apply Consul effectively in your everyday lives. As you advance, you'll learn how to set up your own Consul cluster and agents in a single datacenter or location and understand how Consul utilizes RAFT and GOSSIP protocols for communication. You'll also explore the practical applications of primary Consul use cases, including communication flows and configuration and code examples. With that knowledge, you'll extend Consul across datacenters to discuss the applicability of multiple regions, multiple clouds, and hybrid cloud environments. By the end of this Consul book, you will have the tools needed to create and operate your own Consul cluster and be able to facilitate your service discovery and communication.
Table of Contents (12 chapters)
1
Section 1: Consul Use Cases and Architecture
6
Section 2: Use Cases Deep Dive

Role up your identity

As part of enabling production for a service, we need to work with who is going to access the system, and what they can do. This is typically referred to as Role-Based Access Control, or RBAC. We also want to be able to maintain an audit trail for the system. This last part is becoming increasingly important as we get out of that trusted walled garden network and into the cloud. I can't tell you how many times, even in a controlled environment, I had to go back and figure out what changed and when that broke my system! In the interests of full disclosure, an Enterprise-level license for Consul is required to implement this level of functionality.

The actual process of logging in to the Consul system can certainly be managed by using ACLs and then treating any human like a machine by giving them their own particular access token. However, these tokens aren't as simple as Jean Valjean's 24601. So, inevitably, somebody will end up writing their...