Skip to main content

Consul 1.19 improves Kubernetes workflows, snapshot support, and Nomad integration

HashiCorp Consul 1.19 simplifies external service registration in Consul on Kubernetes, boosts Nomad support, and adds even more enhancements.

HashiCorp Consul 1.19 is now generally available, reinforcing our commitment to improve the user experience, provide more flexibility, and enhance integration points. Consul is a service networking platform that provides global service discovery across any environment. Consul’s service mesh secures and connects network services running across multiple runtimes, platforms, clouds, and on-premises datacenters. Version 1.19 improves operator workflows to connect to external services, allow multi-location storage for Consul snapshots, and support additional Consul features for HashiCorp Nomad.

»Improved external service registration on Kubernetes

Consul 1.19 introduces a new Registration custom resource definition (CRD) that simplifies the process of registering external services into the mesh. Consul service mesh already supports routing to services outside of the mesh through terminating gateways. Those are still required, however there are advantages to using the new Registration CRD.

Prior to Consul 1.19, operators registered external services into the mesh using Consul’s catalog APIs and following this three-step process:

  1. Register the service into Consul’s catalog using the HTTP API.
  2. Create and assign an access control list (ACL) policy to the terminating gateway that lets it act as a proxy for the external service.
  3. Configure the terminating gateway to act as a proxy for the external service through the terminating gateway customer resource definition (CRD).

The new Registration CRD simplifies this process because it’s a Kubernetes-native method for registering services into Consul and automatically updating the terminating gateway ACLs. This provides operators with a consistent Kubernetes-centric workflow for registering and managing access to external services.

»Save Consul snapshots to multiple locations

The latest release allows Consul snapshots to be stored in multiple destinations. This is an upgrade to the snapshot agent in Consul Enterprise, which lets users take Consul snapshots for disaster recovery or to restore to a previously known state and configuration. Prior to 1.19, users could store snapshots to either a local path or to a remote object-store destination, but not both.

Consul 1.19 supports saving Consul snapshots to multiple destinations including NFS mounts, SAN attached storage, or object storage like Amazon S3, Google Cloud Storage, and Microsoft Azure Blob storage. This feature helps improve recovery time objectives (RTO) with higher availability that allows organizations to employ 3-2-1 backup strategies, which require that there are always three available copies stored across two different types of media, including one copy in an offsite location.

»Improved integration with Nomad

Consul has long supported multiple runtimes and platforms, which allow multi-cluster service discovery and service mesh capabilities in any on-premises or cloud environment. Consul supports runtimes for Kubernetes, virtual machines, Amazon ECS, AWS Lambda, and our own cluster orchestrator: Nomad.

Consul 1.19 further improves Nomad support with integrations for the Consul API gateway, transparent proxy, and enterprise features like admin partitions.

Users can now deploy Consul API gateways on Nomad, letting external clients reach services inside the mesh. This includes API requests from clients across various protocols (TCP/HTTP) to the appropriate backend service. The Consul API gateway also helps with load balancing ingress traffic to backend service instances, modifying HTTP headers for requests, and splitting traffic between multiple services based on weighted ratios.

Consul’s transparent proxy helps simplify adoption and usage of Consul service mesh. Prior to the support of transparent proxy, Consul service mesh on Nomad required addressing upstream services using the explicit address on the local proxy for the upstream service. With transparent proxy, service mesh traffic will automatically route to upstream services without requiring developers to change their application configuration.

Admin partitions provide multi-tenancy, allowing multiple teams to autonomously manage their application services. Admin partitions reduce overall management tasks and costs at scale by consolidating workloads across shared Consul and Nomad control planes. Admin partitions also simplify service discovery and traffic communication between multiple clouds and runtimes.

»Learn more about Consul 1.19

The latest Consul release provides significant improvements in many areas: Operators can more easily register and connect to external services. Options to store concurrent snapshots in multiple locations help improve availability. Nomad now has first-class feature support, similar to other runtimes, including Kubernetes and VMs. We are excited for customers to try out these new capabilities.

For details on registering external services using the new Registration CRD, please refer to the updated Consul documentation.

More details on the Consul integration with Nomad are available in the Nomad 1.8 release blog. A tutorial showing how to deploy Consul API gateway on Nomad is also available.

Get started with HashiCorp Consul through our many tutorials for both beginners and advanced users. You can start a free trial with HCP Consul or self-managed Consul Enterprise to test out commercial features like snapshot agent and admin partitions.

Sign up for the latest HashiCorp news

By submitting this form, you acknowledge and agree that HashiCorp will process your personal information in accordance with the Privacy Policy.

HashiCorp uses data collected by cookies and JavaScript libraries to improve your browsing experience, analyze site traffic, and increase the overall performance of our site. By using our website, you’re agreeing to our Privacy Policy and Cookie Policy.

The categories below outline which companies and tools we use for collecting data. To opt out of a category of data collection, set the toggle to “Off” and save your preferences.