HashiCorp • Consul-Associate
Validates knowledge of HashiCorp Consul for service networking, covering Consul architecture and deployment, service registration and discovery, health checking, service mesh with intentions and traffic management, and the key/value store for configuration management.
Questions
629
Duration
60 minutes
Passing Score
70%
Difficulty
AssociateLast Updated
Feb 2026
The HashiCorp Certified: Consul Associate (003) validates foundational knowledge and practical skills with HashiCorp Consul, an open-source service networking platform. The certification covers the full spectrum of Consul capabilities, including service discovery, health monitoring, service mesh with sidecar proxies, access control lists (ACLs), gossip and TLS encryption, and key/value store usage for configuration management. Candidates are expected to understand Consul's architecture across single and multi-datacenter deployments, as well as its deployment on both virtual machines and Kubernetes environments.
The exam tests against Consul version 1.15 and includes objectives spanning 10 domains with 35 specific objectives. It distinguishes between Consul Community Edition and Consul Enterprise features, ensuring certified professionals can identify the boundaries of open-source capabilities versus commercial offerings. The certification is valid for two years, with recertification available starting six months before expiration by passing the current 003 version of the exam.
The Consul Associate certification targets cloud engineers who specialize in security, development, networking, or operations. Typical candidates include site reliability engineers (SREs), solutions architects, DevOps engineers, and platform engineers who work with service networking infrastructure in production environments.
Candidates should have foundational familiarity with Consul concepts and basic hands-on experience. While professional production experience with Consul is the ideal preparation baseline, HashiCorp acknowledges that candidates who have practiced all exam objectives in a personal lab or demo environment may also be sufficiently prepared. The exam is not suited for complete beginners to networking or distributed systems.
There are no formal prerequisites or required prior certifications to sit for the Consul Associate exam. However, HashiCorp recommends that candidates possess practical knowledge of containerization, basic terminal and CLI skills, networking fundamentals (TCP/IP, DNS, load balancing), an understanding of access control lists (ACLs), and familiarity with the TLS certificate lifecycle including certificate issuance, rotation, and revocation.
Candidates benefit most from hands-on experience deploying and operating Consul in real environments, including configuring Consul agents, registering services, setting up intentions in the service mesh, and managing gossip and RPC encryption. Prior exposure to Kubernetes is also advantageous given the exam covers Consul deployment on Kubernetes clusters.
The Consul Associate (003) exam consists of approximately 57 questions to be completed within 60 minutes. Question types include true/false, multiple choice (single answer), and multiple answer (select all that apply) formats. The exam is delivered online through a proctored testing environment and can be taken remotely. The passing score is 70%, and the exam fee is $70.50 USD. Retake policies allow one free retake if the candidate does not pass on the first attempt.
The exam is computer-based and does not include hands-on or lab components — it is a knowledge assessment only. Upon passing, candidates receive a digital badge via Credly and a downloadable certificate. Certifications are valid for two years from the date of passing.
The Consul Associate certification is valued by organizations adopting service mesh architectures, microservices, and zero-trust networking on cloud-native and hybrid infrastructure. Certified professionals are well-positioned for roles such as platform engineer, cloud infrastructure engineer, site reliability engineer, DevOps engineer, and solutions architect at companies standardizing on HashiCorp's product stack. Consul expertise is particularly sought after in enterprises running large-scale Kubernetes or multi-cloud deployments where service discovery and secure east-west traffic management are critical.
HashiCorp certifications are recognized across the industry as a signal of practical tool knowledge, and the Consul Associate complements adjacent certifications such as the Terraform Associate and Vault Associate for professionals building a broad HashiCorp credential portfolio. While specific salary premiums for Consul alone are not independently published, DevOps and cloud infrastructure engineers with HashiCorp certifications and service mesh expertise typically command salaries in the $110,000–$160,000+ USD range in North American markets, reflecting strong demand for professionals who can design and operate secure, scalable service networking platforms.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 629 questions.
1. A platform team deploys Consul on Kubernetes using the Helm chart. They want to enable automatic sidecar proxy injection for all pods in the production namespace without requiring manual annotations on each pod. Which Helm configuration should they use? (Select one!)
Explanation
Setting connectInject.enabled to true enables the sidecar injection webhook, and setting connectInject.default to true makes injection the default behavior for all pods unless explicitly disabled with annotations. This eliminates the need for manual pod annotations. Creating a MutatingWebhookConfiguration manually is unnecessary as the Helm chart creates this automatically when connectInject is enabled. Setting server and client enabled values controls Consul agent deployment, not sidecar injection. Datacenter and meshGateway settings do not control automatic sidecar injection behavior.
2. A development team configures a service-router for the web service with an HTTP match block containing PathPrefix set to /api, a Header entry with Name set to x-version and Exact set to v2, and Methods set to [GET, POST]. The destination routes to the web service with ServiceSubset set to v2. A PUT request arrives with path /api/users and header x-version: v2. What happens? (Select one!)
Explanation
Service-router HTTP match blocks use AND logic across all configured criteria. For a request to match, it must satisfy the path criteria AND header criteria AND method criteria simultaneously. While the PUT request matches the PathPrefix /api and the header x-version: v2, it does not match the Methods criteria which only includes GET and POST. Since PUT is not in the allowed methods list, the entire match fails and the request does not route to the v2 subset. Instead, it routes to the default subset or follows subsequent route rules if configured.
3. A platform team deploys an ingress gateway on Kubernetes with TLS enabled and a listener on port 8080 with protocol http serving web service at hosts web.example.com. External clients report connection refused errors. Which two components should the team verify? (Select two!)
Multiple correct answersExplanation
Ingress gateways require proper Kubernetes Service configuration to expose listener ports to external clients. The Service must have port 8080 configured with an appropriate type like LoadBalancer or NodePort. Additionally, services referenced in ingress gateway listeners must have matching protocol configuration in service-defaults entries. The http protocol in the listener requires the web service to have protocol http in its service-defaults. TLS.Enabled on the ingress gateway applies to listener TLS termination and does not conflict with http protocol. Ingress gateway pods should not have connect-inject enabled as they run gateway binaries. Exported-services is for cluster peering, not ingress gateways.
4. A platform team configures Autopilot for a 5-server Consul cluster. They want to ensure new servers are fully stable before participating in Raft consensus voting. Which Autopilot parameter controls the minimum duration a new server must remain healthy before being promoted to a voting member? (Select one!)
Explanation
The server_stabilization_time parameter controls the minimum amount of time a server must remain in a healthy state before being promoted to a voting member in the Raft cluster. The default value is 10 seconds. This ensures new servers are stable before granting voting rights, preventing disruptions from unstable nodes. The last_contact_threshold parameter specifies the maximum time since leader contact before considering a server unhealthy. The max_trailing_logs parameter sets the maximum number of log entries a server can be behind the leader. The min_quorum parameter specifies the minimum number of servers required before Autopilot performs cleanup operations.
5. A development team creates a service-splitter configuration entry to implement canary deployments for their web service. They configure two splits: 95% traffic to the v1 subset and 10% traffic to the v2 subset. After applying the configuration, Consul rejects it with an error. What must the team change to fix the configuration? (Select one!)
Explanation
Service-splitter configuration entries require that the weights for all splits must sum to exactly 100. The example configuration totals 105 (95+10), which violates this requirement. Consul enforces strict validation of split weights to ensure deterministic traffic distribution. Valid configurations would be 95 and 5, or 90 and 10. Adding a third split with weight 0 would not solve the problem, as the total would still be 105. Weights are specified as integers representing percentages, not decimals. RequestTimeout is a service-resolver parameter and does not affect splitter weight validation.
One-time access to this exam