Skip to content

Dedicated UI token configuration parameter for Consul Server #22293

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
sky-philipalmeida opened this issue Apr 24, 2025 · 1 comment
Open

Comments

@sky-philipalmeida
Copy link

sky-philipalmeida commented Apr 24, 2025

Notice

The present request applies to Consul Server instances

Feature Description

After activating ACL on the consul server I bumped into an issue.

I want to set up service checks for the Consul Server itself but to do that I need to specify a default token with the proper permission to register service checks.

The problem is, when you specify a default token with access such as service write the UI is affected and no longer protected, seems default token on a server instance will be used as the default token for the UI also.

The present feature request pruposes the creation of a parameter that enables to specify a token only for the UI and another as the default decoupling functions such as add service checks for a consul server instances from the UI default token permissions.

Hope this makes sense to you :)

@sky-philipalmeida sky-philipalmeida changed the title Dedicated UI token configuration parameter for Consul server Dedicated UI token configuration parameter for Consul Server Apr 24, 2025
@blake
Copy link
Contributor

blake commented Apr 30, 2025

I want to set up service checks for the Consul Server itself but to do that I need to specify a default token with the proper permission to register service checks.

Are you trying to register services and checks on the Consul servers by specifying them in the agent config file? If so, you'll want to use the config_file_service_registration token that was introduced in Consul 1.15.0 instead of the default token so that you can avoid the permission issue you've highlighted.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants