NOV 14 2018 THE CONSUL TEAMhtml
咱们很高兴地宣布HashiCorp Consul1.4 将将可普遍使用。Consul 是一个分布式服务网格, 可用于在任何运行平台以及公共或私有云之间的链接、安全和配置服务。此版本引入了一个彻底从新设计的 ACL系统和第一个具备多数据中心支持的企业级Consul Connect 功能。特别感谢咱们积极的社区成员在 RC期间提供的宝贵反馈。web
当即下载安全
咱们在今年6月推出了Connect功能, 使Consul 可以对流量进行细分, 并使用基于 TLS 的方法构建零信任网络。自最初发布以来, Consul团队一直专一于 production hardening 和扩展生态系统整合。咱们很高兴地宣布Connect在此版本中将可普遍使用。bash
对 Consul 的 ACL 系统进行了从新设计, 以简化操做和管理。这一变化涵盖了几个不一样的领域。网络
如今可使用公共存储器 ID 检索和修改 Token, 这些 ID 不一样于用于受权向 Consul 发出请求的秘密 ID ( API 交互中token
)。这样能够更安全地管理 ACL Token。app
还添加了一个策略数据模型, 该模型可应用于许多Token并可集中管理。这使操做员一个中心位置。能够为一组应用程序、业务单元或其余分组更新特定策略, 而且本次更新将应用于在该策略下建立的全部 Token。less
Consul web UI 容许对 Token 和策略进行全面管理。分布式
新的 ACL 系统包括一个新的 CLI 来管理 Token、策略和升级。这便可用于自动化也可用于手动管理。ide
在此示例中, 将建立一个新策略, 而后是附加到该策略的 Token。ui
$ consul acl policy create -name "example" -description "Example policy" -rules @rules.hcl
ID: ca44555b-a2d8-94de-d763-88caffdaf11f
Name: example
Description: Example policy
Datacenters:
Rules:
service_prefix "marketing-" {
policy = "read"
}
$ consul acl token create -description "www-app" -policy-id ca44555b
AccessorID: 986193b5-e2b5-eb26-6264-b524ea60cc6d
SecretID: ec15675e-2999-d789-832e-8c4794daa8d7
Description: www-app
Local: false
Create Time: 2018-10-22 15:33:39.01789 -0400 EDT
Policies:
ca44555b-a2d8-94de-d763-88caffdaf11f - example
复制代码
访问 ACL command 文档, 了解完整的示例及全部可用命令。
咱们设计了这个新系统, 容许来自旧 ACL 系统的就地升级, 旧系统将在自动迁移的同时为启用 ACL 的 clusters 的当前 API Token 保留兼容性。阅读完整的升级指南.
Consul 企业版增长了一个新的主要功能, 以扩展 connect 的功能, 使其超出单个群集用例的范围。Consul connect 如今支持在数据中心之间的意图复制和联合证书管理。这容许在任何数据中心的源服务和目标服务之间进行安全、受权的链接。意图的实时复制还可确保将一致的安全策略应用于服务, 不管服务驻留在原地或迁移到何处。
除了新的 UI外, 此版本还提供了新的特性、加强功能和bug修复。其中一些主要功能特性包括:
consul debug
命令, 该命令收集有关目标代理和群集的信息, 以帮助解决 incidents 和调试问题lb-*
以匹配服务lb-001
或lb-service-007
欲了解更多信息, 请访问 Consul 项目页面。咱们但愿你喜欢 Consul 1.4!
---
NOV 14 2018 THE CONSUL TEAM
We are excited to announce the general availability of HashiCorp Consul 1.4. Consul is a distributed service mesh to connect, secure, and configure services across any runtime platform and public or private cloud. This release introduces a completely redesigned ACL system and the first enterprise Consul Connect feature with multi-data center support. A special thanks to our active community members for their valuable feedback during the RC period.
We introduced the Connect feature in June this year, which enabled Consul to segment traffic and use a TLS-based approach to do zero trust networking. Since the initial release, the Consul team has focused on production hardening and expanding the ecosystem integration. We are pleased to announce the general availability of Connect in this release.
The ACL system in Consul has been redesigned to simplify operations and management. This change covered several different areas.
Tokens can now be retrieved and modified using public accessor IDs, which are different than the secret ID (token
in API interactions) used for authorizing requests to Consul. This allows for more secure management of ACL tokens.
A policy data model was also added, which can be applied to many tokens and managed centrally. This gives operators a central place to update a specific policy for a set of applications, business unit, or other groupings that will apply to all tokens created under that policy.
The Consul web UI allows for full management of tokens and policies.
The new ACL system includes a new CLI to manage tokens, policies, and upgrades. This can be used in automation or for manual management.
In this example, a new policy is created, followed by a token which is attached to that policy.
$ consul acl policy create -name "example" -description "Example policy" -rules @rules.hcl
ID: ca44555b-a2d8-94de-d763-88caffdaf11f
Name: example
Description: Example policy
Datacenters:
Rules:
service_prefix "marketing-" {
policy = "read"
}
$ consul acl token create -description "www-app" -policy-id ca44555b
AccessorID: 986193b5-e2b5-eb26-6264-b524ea60cc6d
SecretID: ec15675e-2999-d789-832e-8c4794daa8d7
Description: www-app
Local: false
Create Time: 2018-10-22 15:33:39.01789 -0400 EDT
Policies:
ca44555b-a2d8-94de-d763-88caffdaf11f - example
复制代码
Visit the ACL command documentation for a full set of examples and all the commands available.
We've designed this new system to allow for in-place upgrades coming from the old ACL system that will automatically migrate while retaining compatibility for current API tokens for clusters where ACLs are enabled. Read the full upgrade guide.
Consul Enterprise added a new major feature to extend Connect's capabilities beyond the single cluster use case. Consul Connect now supports replication of intentions and federated certificate management between data centers. This allows secure, authorized connections between source and destination services in any data center. The real-time replication of intentions also ensures that consistent security policies are applied to a service regardless of where it resides or migrates to.
In addition to the new UI, this release also delivers new features, enhancements and bug fixes. Some of the major features include:
consul debug
command which gathers information about the target agent and cluster to help resolve incidents and debug issueslb-*
to match services lb-001
or lb-service-007
For more information, please visit the Consul project page. We hope you enjoy Consul 1.4!