Consul
Consul Intention Delete
Command: consul intention delete
Corresponding HTTP API Endpoints: [DELETE] /v1/connect/intentions/exact, [DELETE] /v1/connect/intentions/:uuid
The intention delete command deletes a matching intention.
The table below shows this command's required ACLs. Configuration of blocking queries and agent caching are not supported from commands, but may be from the corresponding HTTP endpoint.
| ACL Required | 
|---|
| intentions:write1 | 
1 Intention ACL rules are specified as part of a service rule. See Intention Management Permissions for more details.
Deprecated - The one argument form of this command is deprecated in
Consul 1.9.0. Intentions no longer need IDs when represented as
service-intentions config
entries.
Usage
Usage:
SRC and DST can both take several forms.
Enterprise Options
- -partition=<string>- Specifies the partition to query. If not provided, the partition will be inferred from the request's ACL token, or will default to the- defaultpartition. Partitions are a Consul Enterprise feature added in v1.11.0.
- -namespace=<string>- Specifies the namespace to query. If not provided, the namespace will be inferred from the request's ACL token, or will default to the- defaultnamespace. Namespaces are a Consul Enterprise feature added in v1.7.0.
API Options
- -ca-file=<value>- Path to a CA file to use for TLS when communicating with Consul. This can also be specified via the- CONSUL_CACERTenvironment variable.
- -ca-path=<value>- Path to a directory of CA certificates to use for TLS when communicating with Consul. This can also be specified via the- CONSUL_CAPATHenvironment variable.
- -client-cert=<value>- Path to a client cert file to use for TLS when- verify_incomingis enabled. This can also be specified via the- CONSUL_CLIENT_CERTenvironment variable.
- -client-key=<value>- Path to a client key file to use for TLS when- verify_incomingis enabled. This can also be specified via the- CONSUL_CLIENT_KEYenvironment variable.
- -http-addr=<addr>- Address of the Consul agent with the port. This can be an IP address or DNS address, but it must include the port. This can also be specified via the- CONSUL_HTTP_ADDRenvironment variable. In Consul 0.8 and later, the default value is http://127.0.0.1:8500, and https can optionally be used instead. The scheme can also be set to HTTPS by setting the environment variable- CONSUL_HTTP_SSL=true. This may be a unix domain socket using- unix:///path/to/socketif the agent is configured to listen that way.
- -tls-server-name=<value>- The server name to use as the SNI host when connecting via TLS. This can also be specified via the- CONSUL_TLS_SERVER_NAMEenvironment variable.
- -token=<value>- ACL token to use in the request. This can also be specified via the- CONSUL_HTTP_TOKENenvironment variable. If unspecified, the query will default to the token of the Consul agent at the HTTP address.
- -token-file=<value>- File containing the ACL token to use in the request instead of one specified via the- -tokenargument or- CONSUL_HTTP_TOKENenvironment variable. This can also be specified via the- CONSUL_HTTP_TOKEN_FILEenvironment variable.
Examples
Delete an intention from "web" to "db" with any action:
$ consul intention delete web db
Delete an intention by unique ID:
$ consul intention delete 4ffed935-439c-695d-4f51-f4fc0b12a7a7