Deploy Consul Service Mesh on Kubernetes
Consul can be deployed as a service mesh control plane that provides service-to-service connection authorization and encryption using mutual TLS. In this tutorial you will learn how to configure Consul as your Kubernetes service mesh to encrypt and control traffic between services.
Secure Applications with Service Sidecar Proxies
Deploy applications on Kubernetes using Consul service mesh to encrypt and control traffic between services with mTLS.
Enforce a Zero-trust Network with Consul Service Mesh
Define intentions to introduce a zero-trust network security approach in your Kubernetes cluster.
Secure Consul and Registered Services on Kubernetes
Secure Consul on Kubernetes using gossip encryption, TLS certificates, Access Control Lists, and Consul intentions.
Layer 7 Observability with Consul Service Mesh, Prometheus, Grafana, and Kubernetes
Collect and visualize layer 7 metrics from services in your Kubernetes cluster using Consul service mesh, Prometheus, and Grafana.
Secure Consul Agent Communication with TLS Encryption
Secure RPC and consensus communication by creating and deploying certificates to Consul agents.
Secure Service Mesh Communication Across Kubernetes Clusters
Secure service-to-service communication across multiple Kubernetes clusters with Consul's mesh gateway feature.
Secure Service Communication with Consul Service Mesh and Envoy
Gain hands-on experience with Consul service mesh using internal proxies or Envoy as sidecar proxies.
Use Terraform to Register External Services
Register external services with Consul using the Terraform Consul provider.