Book Image

Simplifying Service Management with Consul

By : Robert E. Jackson
Book Image

Simplifying Service Management with Consul

By: Robert E. Jackson

Overview of this book

Within the elastic and dynamic nature of cloud computing, efficient and accurate service discovery provides the cornerstone for all communications. HashiCorp Consul facilitates this service discovery efficiently and securely, independent of the operating environment. This book will help you build a solid understanding of both the concepts and applications of HashiCorp Consul. You'll begin by finding out what you can do with Consul, focusing on the conceptual views of configuration samples along with Terraform code to expedite lab environment and hands-on experimentation, which will enable you to apply Consul effectively in your everyday lives. As you advance, you'll learn how to set up your own Consul cluster and agents in a single datacenter or location and understand how Consul utilizes RAFT and GOSSIP protocols for communication. You'll also explore the practical applications of primary Consul use cases, including communication flows and configuration and code examples. With that knowledge, you'll extend Consul across datacenters to discuss the applicability of multiple regions, multiple clouds, and hybrid cloud environments. By the end of this Consul book, you will have the tools needed to create and operate your own Consul cluster and be able to facilitate your service discovery and communication.
Table of Contents (12 chapters)
1
Section 1: Consul Use Cases and Architecture
6
Section 2: Use Cases Deep Dive

Controlling access with access control

At the heart of Consul's functionality is a distributed key/value store. Through the gossip protocol, anything that one node learns can be shared with other nodes in the cluster. This not only applies to our three main use cases, but often, operators will utilize Consul to distribute configuration parameters that the associated components can utilize. This can be very helpful if you want to quickly change the logging level on all machines. This is especially the reason why, in any production deployment, the importance of securing Consul can't be understated. Utilizing the TLS keys, as we discussed in the previous section, we can validate and secure the communications between the clients and the servers. If we didn't do this, it would be possible for somebody to pretend to be part of the cluster.

The access control system within Consul provides an additional level of control regarding what each node can do on the network –...