
Gossip encryption protects only the internal communication between Consul agents. It does not encrypt ACL tokens, HTTP API traffic, or storage backends.
- Understand the Consul security threat model and the role of gossip encryption.
- Configure encryption for an existing Consul data center, even on a running cluster.
- Manage the complete lifecycle of gossip encryption keys:
| Lifecycle Stage | Action |
|---|---|
| Generate | Use consul keygen to produce a new encryption key. |
| Distribute | Propagate the key to every Consul agent’s encrypt setting. |
| Activate | Reload or restart agents so they begin using the new key. |
| Retire | Remove outdated keys from agent configurations once rotated out. |
Rotating or removing encryption keys without following a proper rollout plan can interrupt agent communication. Always validate connectivity after each step.