Commit Graph

18530 Commits (485e1b5d4ef0a2ac80a44a1afc78cafa0028d23a)

Author SHA1 Message Date
DanStough 485e1b5d4e fix(peering): generate token metrics only for leader 2022-09-14 11:37:30 -04:00
DanStough 2a2debee64 feat(peering): validate server name conflicts on establish 2022-09-14 11:37:30 -04:00
Kyle Havlovitz 60cee76746
Merge pull request #14516 from hashicorp/ca-ttl-fixes
Fix inconsistent TTL behavior in CA providers
2022-09-13 16:07:36 -07:00
Kyle Havlovitz d67bccd210 Update intermediate pki mount/role when reconfiguring Vault provider 2022-09-13 15:42:26 -07:00
Kyle Havlovitz f46955101a connect/ca: Clarify behavior around IntermediateCertTTL in CA config 2022-09-13 15:42:26 -07:00
DanStough 0150e88200 feat: add PeerThroughMeshGateways to mesh config 2022-09-13 17:19:54 -04:00
malizz e743eefbd1
update enforcing consecutive 5xx type to pointer type (#14592)
* update enforcing condecutive 5xx type to pointer type

* update test
2022-09-13 13:59:44 -07:00
Derek Menteer 0aa13733a0
Add CSR check for number of URIs. (#14579)
Add CSR check for number of URIs.
2022-09-13 14:21:47 -05:00
Luke Kysow 15043de647
Document integration tests (#14391) 2022-09-13 10:00:02 -07:00
Derek Menteer db83ff4fa6 Add input validation for auto-config JWT authorization checks. 2022-09-13 11:16:36 -05:00
cskh f22685b969
Config-entry: Support proxy config in service-defaults (#14395)
* Config-entry: Support proxy config in service-defaults

* Update website/content/docs/connect/config-entries/service-defaults.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-12 10:41:58 -04:00
John Cowen 4a9f6101c9
ui: Pass through default environment settings when when booting dev/test (#14519)
* ui: Add initial peering listing acceptance tests (#14522)
2022-09-12 11:22:06 +01:00
John Cowen ad616a35d3
ui: Fix up tippy console warning... (#14524)
...enabling/disabling now depends on whether the string is non-empty
2022-09-12 11:21:26 +01:00
John Cowen 4a6253d689
ui: Action docs typo (#14512) 2022-09-12 10:39:13 +01:00
Eric Haberkorn 45a5f28a60
Update the service resolver documentation to include cluster peering failover and redirects (#14513)
Update the service resolver documentation to include cluster peering failover and redirects
2022-09-09 16:57:23 -04:00
Kyle Schochenmaier 208dd1452a
[docs] use values.yaml instead of config.yaml everywhere for helm configurations (#14554)
* use values.yaml instead of config.yaml everywhere for helm values
* update docs
2022-09-09 13:56:33 -07:00
Blake Covarrubias 25895b8942 docs: Fix redirect to K8s and VM multi-cluster docs
This commit fixes an oversight from PR #14009 where the K8s and VMs
multi-cluster docs were moved, but not redirected to the proper
location.
2022-09-09 12:41:33 -07:00
Eric Haberkorn aa8268e50c
Implement Cluster Peering Redirects (#14445)
implement cluster peering redirects
2022-09-09 13:58:28 -04:00
Kyle Schochenmaier 6e046315c6
[docs] update CNI docs to indicate how the CNI plugin is installed (#14546)
* update CNI docs to indicate that the CNI plugin is installed through the helm chart
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Paul Banks <banks@banksco.de>
2022-09-09 12:28:15 -05:00
skpratt b761589340
add non-double-prefixed metrics (#14193) 2022-09-09 12:13:43 -05:00
Krastin Krastev b0218ea35b
docs: fix helm stanza in admin-partitions (#14523) 2022-09-09 09:58:53 -07:00
Chris S. Kim 7370f0a953
Fix test ordering (#14543) 2022-09-09 11:11:54 -04:00
skpratt 19f79aa9a6
PR #14057 follow up fix: service id parsing from sidecar id (#14541)
* fix service id parsing from sidecar id

* simplify suffix trimming
2022-09-09 09:47:10 -05:00
Dan Upton 1c2c975b0b
xDS Load Balancing (#14397)
Prior to #13244, connect proxies and gateways could only be configured by an
xDS session served by the local client agent.

In an upcoming release, it will be possible to deploy a Consul service mesh
without client agents. In this model, xDS sessions will be handled by the
servers themselves, which necessitates load-balancing to prevent a single
server from receiving a disproportionate amount of load and becoming
overwhelmed.

This introduces a simple form of load-balancing where Consul will attempt to
achieve an even spread of load (xDS sessions) between all healthy servers.
It does so by implementing a concurrent session limiter (limiter.SessionLimiter)
and adjusting the limit according to autopilot state and proxy service
registrations in the catalog.

If a server is already over capacity (i.e. the session limit is lowered),
Consul will begin draining sessions to rebalance the load. This will result
in the client receiving a `RESOURCE_EXHAUSTED` status code. It is the client's
responsibility to observe this response and reconnect to a different server.

Users of the gRPC client connection brokered by the
consul-server-connection-manager library will get this for free.

The rate at which Consul will drain sessions to rebalance load is scaled
dynamically based on the number of proxies in the catalog.
2022-09-09 15:02:01 +01:00
Jeff Apple deda99a387
Merge pull request #14534 from hashicorp/docs/capigw-tech-spec-update
Docs: add limitations to Tech Specs
2022-09-08 14:47:39 -07:00
Jeff Apple 776c98d109
Update website/content/docs/api-gateway/tech-specs.mdx 2022-09-08 14:41:06 -07:00
Derek Menteer 9ff0be6950
Merge pull request #14294 from hashicorp/derekm/split-grpc-ports
Add separate grpc tls port.
2022-09-08 16:27:38 -05:00
Nathan Coleman f0e8d44c80
Update website/content/docs/api-gateway/tech-specs.mdx 2022-09-08 15:56:28 -04:00
Jeff Apple 86754cfe5a
Update website/content/docs/api-gateway/tech-specs.mdx
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
2022-09-08 12:55:15 -07:00
Jeff Apple 402ddd6dcd
Update website/content/docs/api-gateway/tech-specs.mdx
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
2022-09-08 12:54:02 -07:00
Derek Menteer f7c884f0af Merge branch 'main' of github.com:hashicorp/consul into derekm/split-grpc-ports 2022-09-08 14:53:08 -05:00
Jeff Apple a1eb38213a
Update website/content/docs/api-gateway/tech-specs.mdx
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
2022-09-08 12:51:44 -07:00
Derek Menteer bfe7c5e8af Remove rebuilding grpc server. 2022-09-08 13:45:44 -05:00
trujillo-adam 02f0617b60
Merge pull request #14353 from hashicorp/nia/docs-0.7.0
Nia/docs 0.7.0
2022-09-08 11:44:04 -07:00
Jeff Apple 16f5d7c381
Docs: add limitations to Tech Specs 2022-09-08 11:38:27 -07:00
trujillo-adam 001b1ed8cf fix to redirects file 2022-09-08 11:31:08 -07:00
Tu Nguyen d479d16761 Merge branch 'main' into nia/docs-0.7.0 2022-09-08 11:18:05 -07:00
Tu Nguyen 1db9f3ea2e Merge branch 'nia/docs-0.7.0' of ssh://github.com/hashicorp/consul into nia/docs-0.7.0 2022-09-08 11:17:58 -07:00
Tu Nguyen f17f176aa3 Merge branch 'main' of ssh://github.com/hashicorp/consul 2022-09-08 11:17:46 -07:00
trujillo-adam 6b37a25478 updated HA configuration ref 2022-09-08 11:16:34 -07:00
trujillo-adam 83ccbf1635 Apply suggestions from code review
Co-authored-by: Michael Wilkerson <62034708+wilkermichael@users.noreply.github.com>
2022-09-08 11:16:34 -07:00
trujillo-adam 3ec0f2cd4c Apply suggestions from code review
Co-authored-by: Michael Wilkerson <62034708+wilkermichael@users.noreply.github.com>
2022-09-08 11:16:34 -07:00
trujillo-adam 3ce564354e fixed bad links in status/cluster endpoint ref 2022-09-08 11:16:34 -07:00
trujillo-adam da77e68b27 applied AJs feedback and made a few additional improvements 2022-09-08 11:16:33 -07:00
trujillo-adam 9a856781ad udpated how to ID the leader in the usage docs 2022-09-08 11:16:33 -07:00
trujillo-adam acc184bd09 added no-HA API status error message to EMs page 2022-09-08 11:16:33 -07:00
trujillo-adam 3935eca83a added cluster endpoint to status API docs 2022-09-08 11:16:33 -07:00
Tu Nguyen 5db0240049 Apply suggestions from code review 2022-09-08 11:16:33 -07:00
trujillo-adam d4445f1029 Update website/content/docs/nia/usage/run-ha.mdx 2022-09-08 11:16:33 -07:00
trujillo-adam b153c965cb redirects for CTS 0.7 2022-09-08 11:15:45 -07:00