Book Image

Simplifying Service Management with Consul

By : Robert E. Jackson
Book Image

Simplifying Service Management with Consul

By: Robert E. Jackson

Overview of this book

Within the elastic and dynamic nature of cloud computing, efficient and accurate service discovery provides the cornerstone for all communications. HashiCorp Consul facilitates this service discovery efficiently and securely, independent of the operating environment. This book will help you build a solid understanding of both the concepts and applications of HashiCorp Consul. You'll begin by finding out what you can do with Consul, focusing on the conceptual views of configuration samples along with Terraform code to expedite lab environment and hands-on experimentation, which will enable you to apply Consul effectively in your everyday lives. As you advance, you'll learn how to set up your own Consul cluster and agents in a single datacenter or location and understand how Consul utilizes RAFT and GOSSIP protocols for communication. You'll also explore the practical applications of primary Consul use cases, including communication flows and configuration and code examples. With that knowledge, you'll extend Consul across datacenters to discuss the applicability of multiple regions, multiple clouds, and hybrid cloud environments. By the end of this Consul book, you will have the tools needed to create and operate your own Consul cluster and be able to facilitate your service discovery and communication.
Table of Contents (12 chapters)
1
Section 1: Consul Use Cases and Architecture
6
Section 2: Use Cases Deep Dive

Summary

Wow—that was a long chapter, but just look at how far we've come! Utilizing Packer and Terraform, you've created your very own Consul cluster with three server nodes rafted together and four client nodes gossiping away. You have an HTTP service running and advertised on that cluster, and Consul is already monitoring its health status. And here, your high-school teachers thought you would never amount to anything…oh, wait, that was me. Well, a hearty congratulations to you.

Now that we have those communication paths throughout our system, we need to be wary of cowans and eavesdroppers. We not only have to secure all of that communication, but when we start adding more services to our cluster, we need to keep them protected as well. It's going to get thick, so before we start, grab a beverage, take a nap, or listen to some music, and prepare to secure our assets!