Exploring HashiCorp Consul Service on Azure: Service Mesh with VM Workloads
As part of our release of HashiCorp Consul Service on Azure, we've released a set of HashiCorp Learn guides for HCS on Azure, as well as a video resource for helping deploy ACL's in Consul. It's highly encouraged to review these resources as you get started.
In this post, we expand on our previous blog by looking at extending our HashiCorp Consul Service (HCS) on Azure service mesh to include more than Kubernetes (AKS) clusters. Virtual Machines continue to be a critical part of most operator infrastructure environments, and knowing that workloads will continue to be heterogeneous, having a service mesh that seamlessly creates a consistent service networking experience between Virtual Machines and Containerized workloads is equally critical.
In the video above, we show how we can take Virtual Machines hosted in Microsoft Azure and bring them into the same Consul service mesh that our AKS cluster joined previously. This configuration currently requires connectivity between the Consul client nodes in the AKS and the Virtual Machine networks. We meet this requirement by peering the workload networks with each other and with the HCS network.
Once these machines are joined to the service mesh, we now have a common control-plane that allows us to consistently apply policies across the environment regardless of the underlying runtime environment. This includes the ability to secure service-to-service communication with mTLS encryption, add Layer 7 routing policies, or expose observability capabilities for both Consul and the workloads running inside it. You can take a look at deploying Consul’s service mesh capabilities in the HashiCorp Learn guide for Consul service mesh.
In this demonstration, we also show how we can use Terraform Cloud to not only deploy additional workloads into our HCS environment with the updated Azure Terraform Provider, but also how we can manage service mesh security policies (intentions) and application configurations “as-code” within Consul using the Consul Terraform Provider. These workload changes are deployed at code check-in leveraging Terraform Cloud’s GitHub VCS integration. To learn more, take a look at the HashiCorp Learn guides for HCS on Azure and Terraform Cloud.
Sign up for the latest HashiCorp news
More blog posts like this one
HashiCorp at AWS re:Invent: Your blueprint to cloud success
If you’re attending AWS re:Invent in Las Vegas, Dec. 2 - Dec. 6th, visit us for breakout sessions, expert talks, and product demos to learn how to take a unified approach to Infrastructure and Security Lifecycle Management.
Consul 1.20 improves multi-tenancy, metrics, and OpenShift deployment
HashiCorp Consul 1.20 is a significant upgrade for the Kubernetes operator and developer experience, including better multi-tenant service discovery, catalog registration metrics, and secure OpenShift integration.
New SLM offerings for Vault, Boundary, and Consul at HashiConf 2024 make security easier
The latest Security Lifecycle Management (SLM) features from HashiCorp Vault, Boundary, and Consul help organizations offer a smoother path to better security practices for developers.