Skip to content

Commit

Permalink
Merge branch 'release/1.13.x' of github.com:hashicorp/consul into rel…
Browse files Browse the repository at this point in the history
…ease/1.13.x

manual backport
  • Loading branch information
trujillo-adam committed Dec 8, 2023
2 parents 481456c + 4f1d357 commit 5de426f
Show file tree
Hide file tree
Showing 9 changed files with 194 additions and 19 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/test-integrations.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ env:
GOTESTSUM_VERSION: "1.9.0"
CONSUL_BINARY_UPLOAD_NAME: consul-bin
# strip the hashicorp/ off the front of github.repository for consul
CONSUL_LATEST_IMAGE_NAME: ${{ endsWith(github.repository, '-enterprise') && github.repository || 'consul' }}
CONSUL_LATEST_IMAGE_NAME: ${{ github.repository }}

jobs:
setup:
Expand Down
6 changes: 3 additions & 3 deletions GNUmakefile
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ dev-build:

dev-docker: linux dev-build
@echo "Pulling consul container image - $(CONSUL_IMAGE_VERSION)"
@docker pull consul:$(CONSUL_IMAGE_VERSION) >/dev/null
@docker pull hashicorp/consul:$(CONSUL_IMAGE_VERSION) >/dev/null
@echo "Building Consul Development container - $(CONSUL_DEV_IMAGE)"
@# 'consul:local' tag is needed to run the integration tests
@# 'consul-dev:latest' is needed by older workflows
Expand All @@ -171,7 +171,7 @@ remote-docker: check-remote-dev-image-env
$(MAKE) GOARCH=amd64 linux
$(MAKE) GOARCH=arm64 linux
@echo "Pulling consul container image - $(CONSUL_IMAGE_VERSION)"
@docker pull consul:$(CONSUL_IMAGE_VERSION) >/dev/null
@docker pull hashicorp/consul:$(CONSUL_IMAGE_VERSION) >/dev/null
@echo "Building and Pushing Consul Development container - $(REMOTE_DEV_IMAGE)"
@docker buildx use default && docker buildx build -t '$(REMOTE_DEV_IMAGE)' \
--platform linux/amd64,linux/arm64 \
Expand All @@ -183,7 +183,7 @@ remote-docker: check-remote-dev-image-env
# should only run in CI and not locally.
ci.dev-docker:
@echo "Pulling consul container image - $(CONSUL_IMAGE_VERSION)"
@docker pull consul:$(CONSUL_IMAGE_VERSION) >/dev/null
@docker pull hashicorp/consul:$(CONSUL_IMAGE_VERSION) >/dev/null
@echo "Building Consul Development container - $(CI_DEV_DOCKER_IMAGE_NAME)"
@docker build $(NOCACHE) $(QUIET) -t '$(CI_DEV_DOCKER_NAMESPACE)/$(CI_DEV_DOCKER_IMAGE_NAME):$(GIT_COMMIT)' \
--build-arg CONSUL_IMAGE_VERSION=$(CONSUL_IMAGE_VERSION) \
Expand Down
2 changes: 1 addition & 1 deletion build-support/docker/Consul-Dev-Multiarch.dockerfile
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
ARG CONSUL_IMAGE_VERSION=latest
FROM consul:${CONSUL_IMAGE_VERSION}
FROM hashicorp/consul:${CONSUL_IMAGE_VERSION}
RUN apk update && apk add iptables
ARG TARGETARCH
COPY linux_${TARGETARCH}/consul /bin/consul
2 changes: 1 addition & 1 deletion build-support/docker/Consul-Dev.dockerfile
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ARG CONSUL_IMAGE_VERSION=latest
FROM consul:${CONSUL_IMAGE_VERSION}
FROM hashicorp/consul:${CONSUL_IMAGE_VERSION}
RUN apk update && apk add iptables
COPY consul /bin/consul
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,4 @@

package node

const consulImage = "consul"
const consulImage = "hashicorp/consul"
Original file line number Diff line number Diff line change
Expand Up @@ -259,7 +259,7 @@ Services = [

```yaml
apiVersion: consul.hashicorp.com/v1alpha1
Kind: ExportedServices
kind: ExportedServices
metadata:
name: default
spec:
Expand Down Expand Up @@ -333,7 +333,7 @@ Services = [

```yaml
apiVersion: consul.hashicorp.com/v1alpha1
Kind: ExportedServices
kind: ExportedServices
metadata:
name: finance
spec:
Expand Down Expand Up @@ -412,7 +412,7 @@ Services = [

```yaml
apiVersion: consul.hashicorp.com/v1alpha1
Kind: ExportedServices
kind: ExportedServices
metadata:
name: finance
spec:
Expand Down Expand Up @@ -487,7 +487,7 @@ Services = [

```yaml
apiVersion: consul.hashicorp.com/v1alpha1
Kind: ExportedServices
kind: ExportedServices
metadata:
name: default
spec:
Expand Down Expand Up @@ -549,7 +549,7 @@ Services = [

```yaml
apiVersion: consul.hashicorp.com/v1alpha1
Kind: ExportedServices
kind: ExportedServices
metadata:
name: finance
spec:
Expand Down Expand Up @@ -613,7 +613,7 @@ Services = [

```yaml
apiVersion: consul.hashicorp.com/v1alpha1
Kind: ExportedServices
kind: ExportedServices
metadata:
name: finance
spec:
Expand Down
172 changes: 172 additions & 0 deletions website/content/docs/enterprise/license/utilization-reporting.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,172 @@
---
page_title: Automated license utilization reporting
description: >-
Learn what data HashiCorp collects to meter Enterprise license utilization. Enable or disable reporting. Review sample payloads and logs.
---

# Automated license utilization reporting

This topic describes how to enable automated license utilization reporting in Consul Enterprise. This feature automatically sends license utilization data to HashiCorp so that you do not have to manually collect and report it. It also enables you to review your license usage with the monitoring solution you already use, such as Splunk and Datadog, as you optimize and manage your deployments.

## Introduction

You can use automated license utilization report to understand how much additional networking infrastructure you can deploy under your current contract. This feature helps you protect against overutilization and budget for predicted consumption.

Automated reporting shares the minimum data required to validate license utilization as defined in our contracts. This data mostly consists of computed metrics, and it will never contain Personal Identifiable Information (PII) or other sensitive information. Automated reporting shares the data with HashiCorp using a secure unidirectional HTTPS API and makes an auditable record in the product logs each time it submits a report. This process is GDPR-compliant.

## Requirements

Automated license utilization reporting does not support _air-gapped installations_, which are systems with no network interfaces.

The following versions of Consul Enterprise support automated license utilization reporting:

- Patch releases of Consul Enterprise v1.13.9 and newer.

Download a supported release from the [Consul Versions](https://releases.hashicorp.com/consul/) page.

## Enable automated reporting

Before you enable automated reporting, make sure that outbound network traffic is configured correctly and upgrade your enterprise product to a version that supports it. If your installation is air-gapped or network settings are not in place, automated reporting will not work.

To enable automated reporting, complete the following steps:

1. [Allow outbound HTTPS traffic on port 443](#allow-outbound-https-traffic)
1. [Check product logs](#check-product-logs)

### Allow outbound HTTPS traffic on port 443

Make sure that your network allows HTTPS egress on port 443 from `https://reporting.hashicorp.services` by adding the following IP adddresses to your allow-list:

- `100.20.70.12`
- `35.166.5.222`
- `23.95.85.111`
- `44.215.244.1`

### Check product logs

Automatic license utilization reporting starts sending data within roughly 24 hours. Check the product logs for records that the data sent successfully.

<CodeBlockConfig hideClipboard>

```
[DEBUG] beginning snapshot export
[DEBUG] creating payload
[DEBUG] marshalling payload to json
[DEBUG] generating authentication headers
[DEBUG] creating request
[DEBUG] sending request
[DEBUG] performing request: method=POST url=https://census.license.hashicorp.services
[DEBUG] recording audit record
[INFO] reporting: Report sent: auditRecord={"payload":{"payload_version":"1","license_id":"d2cdd857-4202-5a45-70a6-e4b531050c34","product":"consul","product_version":"1.16.0-dev+ent","export_timestamp":"2023-05-26T20:09:13.753921087Z","snapshots":[{"snapshot_version":1,"snapshot_id":"0001J724F90F4XWQDSAA76ZQWA","process_id":"01H1CTJPC1S8H7Q45MKTJ689ZW","timestamp":"2023-05-26T20:09:13.753513962Z","schema_version":"1.0.0","service":"consul","metrics":{"consul.billable.nodes":{"key":"consul.billable.nodes","kind":"counter","mode":"write","value":2},"consul.billable.service_instances":{"key":"consul.billable.service_instances","kind":"counter","mode":"write","value":2}}}],"metadata":{}}}
[DEBUG] completed recording audit record
[DEBUG] export finished successfully"
```

</CodeBlockConfig>

If your installation is air-gapped or your network does not allow the correct egress, the logs show an error.

<CodeBlockConfig hideClipboard>

```
[DEBUG] reporting: beginning snapshot export
[DEBUG] reporting: creating payload
[DEBUG] reporting: marshalling payload to json
[DEBUG] reporting: generating authentication headers
[DEBUG] reporting: creating request
[DEBUG] reporting: sending request
[DEBUG] reporting: performing request: method=POST url=https://census.license.hashicorp.services
[DEBUG] reporting: error status code received: statusCode=403
```

</CodeBlockConfig>

In this case, reconfigure your network to allow egress and check the logs again in roughly 24 hours to confirm that automated reporting works correctly.

## Opt out

If your installation is air-gapped or you want to manually collect and report on the same license utilization metrics, you can opt out of automated reporting.

Manually reporting these metrics can be time consuming. Opting out of automated reporting does not mean that you also opt out from sending license utilization metrics. Customers who opt out of automated reporting are still required to manually collect and send license utilization metrics to HashiCorp.

If you are considering opting out because you are worried about the data, we strongly recommend that you review the [example payloads](#example-payloads) before opting out. If you have concerns with any of the automatically reported data, raise these concerns with your account manager.

There are two methods for opting out of automated reporting:

- HCL configuration (recommended)
- Environment variable (requires restart)

We recommend opting out in your product's configuration file because it does not require a system restart. Add the following block to your `configuration.hcl` or `configuration.json` file.

```hcl
reporting {
license {
enabled = false
}
}
```

When opting out using an environment variable, the system provides a startup message confirming that you have disabled automated reporting. Set the following environment variable to disable automated reporting:

<CodeBlockConfig>

```shell-session
$ export OPTOUT_LICENSE_REPORTING=true
```

</CodeBlockConfig>

After you set the environment variable, restart your system to complete the process for opting out.

```shell-session
$ consul reload
```


Check your product logs roughly 24 hours after opting out to make sure that the system is not trying to send reports. Keep in mind that if your configuration file and environment variable differ, the environment variable setting takes precedence.

## Example payloads

HashiCorp collects the following utilization data as JSON payloads:
`exporter_version` - The version of the licensing exporter

<CodeBlockConfig hideClipboard>

```json
{
"payload": {
"payload_version": "1",
"license_id": "d2cdd857-4202-5a45-70a6-e4b531050c34",
"product": "consul",
"product_version": "1.16.0-dev+ent",
"export_timestamp": "2023-05-26T20:09:13.753921087Z",
"snapshots": [
{
"snapshot_version": 1,
"snapshot_id": "0001J724F90F4XWQDSAA76ZQWA",
"process_id": "01H1CTJPC1S8H7Q45MKTJ689ZW",
"timestamp": "2023-05-26T20:09:13.753513962Z",
"schema_version": "1.0.0",
"service": "consul",
"metrics": {
"consul.billable.nodes": {
"key": "consul.billable.nodes",
"kind": "counter",
"mode": "write",
"value": 2
},
"consul.billable.service_instances": {
"key": "consul.billable.service_instances",
"kind": "counter",
"mode": "write",
"value": 2
}
}
}
],
"metadata": {}
}
}
```

</CodeBlockConfig>
4 changes: 2 additions & 2 deletions website/content/docs/k8s/installation/install.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -308,7 +308,7 @@ metadata:
spec:
containers:
- name: example
image: 'consul:latest'
image: 'hashicorp/consul:latest'
env:
- name: HOST_IP
valueFrom:
Expand Down Expand Up @@ -345,7 +345,7 @@ spec:
spec:
containers:
- name: example
image: 'consul:latest'
image: 'hashicorp/consul:latest'
env:
- name: HOST_IP
valueFrom:
Expand Down
11 changes: 7 additions & 4 deletions website/data/docs-nav-data.json
Original file line number Diff line number Diff line change
Expand Up @@ -1209,6 +1209,10 @@
"title": "Overview",
"path": "enterprise/license/overview"
},
{
"title": "Automated License Utilization Reporting",
"path": "enterprise/license/utilization-reporting"
},
{
"title": "FAQ",
"path": "enterprise/license/faq"
Expand Down Expand Up @@ -1247,8 +1251,8 @@
"path": "api-gateway/usage/usage"
},
{
"title": "Reroute HTTP Requests",
"path": "api-gateway/usage/reroute-http-requests"
"title": "Reroute HTTP Requests",
"path": "api-gateway/usage/reroute-http-requests"
},
{
"title": "Route Traffic to Peered Services",
Expand All @@ -1257,8 +1261,7 @@
{
"title": "Error Messages",
"path": "api-gateway/usage/errors"
}

}
]
},
{
Expand Down

0 comments on commit 5de426f

Please sign in to comment.