Commit Graph

19191 Commits (693c8a4706e10bc8cd212ceaf0b6728045e96e17)

Author SHA1 Message Date
Evan Culver a3be5a5a82
connect: Bump Envoy 1.20 to 1.20.7, 1.21 to 1.21.5 and 1.22 to 1.22.5 (#14831) 2022-10-04 13:15:01 -07:00
Paul Glass 23e52a1040
docs: Consul Dataplane Version Compatibility (#14710)
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-10-04 15:02:28 -05:00
Kyle Schochenmaier f64ff29d43
update helm docs for consul-k8s 1.0.0-beta1 (#14875) 2022-10-04 12:59:53 -07:00
Derek Menteer 678adb3154
Add peering integration tests (#14836)
Add peering integration tests.
2022-10-04 13:51:04 -05:00
Eric Haberkorn 1b565444be
Rename `PeerName` to `Peer` on prepared queries and exported services (#14854) 2022-10-04 14:46:15 -04:00
Jeff Boruszak f2d42f97d5
Merge pull request #14870 from hashicorp/docs/hyperlink-fixes
docs: Windows tutorial hyperlink fix #2
2022-10-04 13:16:14 -05:00
Ashlee M Boyer bf2edc4414
Remove unneeded in params 2022-10-04 14:13:57 -04:00
Ashlee M Boyer c9236128bf
Fixing broken links 2022-10-04 14:00:32 -04:00
boruszak 904ab64a57 Link fix 2022-10-04 12:42:59 -05:00
Jeff Boruszak 31436b66e0
Merge pull request #14867 from hashicorp/docs/hyperlink-fixes
docs: Windows VM tutorial link fix
2022-10-04 12:26:21 -05:00
boruszak 213b50b170 Tutorial link fix 2022-10-04 12:19:24 -05:00
Jeff Boruszak 87d7bd8a40
Merge pull request #14794 from hashicorp/docs/cluster-peering
docs: Cluster peering 1.14 beta release
2022-10-04 10:46:57 -05:00
Jeff Boruszak 9b99795530
Merge pull request #14770 from hashicorp/docs/agentless-beta
docs: Consul Dataplane (Agentless) Beta
2022-10-04 10:41:43 -05:00
Jeff Boruszak eedfca25c8
Merge pull request #14769 from hashicorp/docs/consul-on-windows-vms
docs: Consul on Windows VMs Envoy bootstrapping
2022-10-04 10:41:11 -05:00
trujillo-adam 6f1d7fcd02
Merge pull request #14779 from hashicorp/docs/invoke-services-from-lambda
Docs/invoke services from lambda
2022-10-04 08:37:48 -07:00
boruszak c1f71e3ef8 list 2022-10-04 10:37:39 -05:00
boruszak 9792f9ea26 Reverts + fix 2022-10-04 10:37:39 -05:00
Luke Kysow 960c42854b
Remove terminal colouring from test output so it is (#14810)
more readable in CI.

```
Running primary verification step for case-ingress-gateway-multiple-services...
�[34;1mverify.bats
�[0m�[1G   ingress proxy admin is up on :20000�[K�[75G 1/12�[2G�[1G ✓ ingress proxy admin is up on :20000�[K
�[0m�[1G   s1 proxy admin is up on :19000�[K�[75G 2/12�[2G�[1G ✓ s1 proxy admin is up on :19000�[K
�[0m�[1G   s2 proxy admin is up on :19001�[K�[75G 3/12�[2G�[1G ✓ s2 proxy admin is up on :19001�[K
�[0m�[1G   s1 proxy listener should be up and have right cert�[K�[75G 4/12�[2G�[1G ✓ s1 proxy listener should be up and have right cert�[K
�[0m�[1G   s2 proxy listener should be up and have right cert�[K�[75G 5/12�[2G�[1G ✓ s2 proxy listener should be up and have right cert�[K
�[0m�[1G   ingress-gateway should have healthy endpoints for s1�[K�[75G 6/12�[2G�[31;1m�[1G ✗ ingress-gateway should have healthy endpoints for s1�[K
�[0m�[31;22m   (from function `assert_upstream_has_endpoints_in_status' in file /workdir/primary/bats/helpers.bash, line 385,
```

versus

```
Running primary verification step for case-ingress-gateway-multiple-services...
1..12
ok 1 ingress proxy admin is up on :20000
ok 2 s1 proxy admin is up on :19000
ok 3 s2 proxy admin is up on :19001
ok 4 s1 proxy listener should be up and have right cert
ok 5 s2 proxy listener should be up and have right cert
not ok 6 ingress-gateway should have healthy endpoints for s1
not ok 7 s1 proxy should have been configured with max_connections in services
ok 8 ingress-gateway should have healthy endpoints for s2
```
2022-10-04 08:35:19 -07:00
boruszak cf796ce330 More group fix attempts 2022-10-04 10:20:14 -05:00
boruszak b455e0d5c8 Tabs fix again 2022-10-04 10:00:53 -05:00
boruszak 631e7c1d7b Tab groups fix 2022-10-04 09:49:10 -05:00
trujillo-adam 6a7cda41a6
Apply suggestions from code review
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-10-04 07:39:37 -07:00
boruszak 6d0f58ffe5 Minor fixes 2022-10-04 09:31:31 -05:00
boruszak 99639b1316 Installation instructions moved 2022-10-04 09:29:16 -05:00
Jeff Boruszak 9e7c83a129
Apply suggestions from code review
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-10-04 09:26:07 -05:00
boruszak aa4b44c27f Move Installation instructions 2022-10-04 09:07:37 -05:00
vanphan24 f5cb922dd0
first commit with overview page (#14827)
* Why Choose Consul

Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-10-03 19:32:43 -07:00
Evan Culver 035e126fae
ci: Fix changelog-checker GHA workflow (#14842) 2022-10-03 16:49:24 -07:00
cskh 622804ad5b
fix flaky integration test (#14843) 2022-10-03 16:55:05 -04:00
boruszak 71b14a13fc PeerName changed to Peer - fix 2022-10-03 14:18:59 -05:00
boruszak 6eefbe0e9d Tutorial links 2022-10-03 14:08:57 -05:00
Jeff Boruszak 6b4d15f233
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 14:03:00 -05:00
Jeff Boruszak c1fedba08e
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 13:59:41 -05:00
Freddy d9fe3578ac
Merge pull request #14734 from hashicorp/NET-643-update-mesh-gateway-envoy-config-for-inbound-peering-control-plane-traffic 2022-10-03 12:54:11 -06:00
Jeff Boruszak 64dcb64d31
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 13:54:08 -05:00
freddygv b15d41534f Update xds generation for peering over mesh gws
This commit adds the xDS resources needed for INBOUND traffic from peer
clusters:

- 1 filter chain for all inbound peering requests.
- 1 cluster for all inbound peering requests.
- 1 endpoint per voting server with the gRPC TLS port configured.

There is one filter chain and cluster because unlike with WAN
federation, peer clusters will not attempt to dial individual servers.
Peer clusters will only dial the local mesh gateway addresses.
2022-10-03 12:42:27 -06:00
Freddy 74b87d49d3
Merge pull request #14694 from hashicorp/peering/mgw-addrs 2022-10-03 12:35:11 -06:00
Jeff Boruszak dc61cc1914
Update website/content/docs/connect/dataplane/consul-dataplane.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-10-03 12:55:55 -05:00
boruszak f4731bf0df Installation isntructions 2022-10-03 12:52:07 -05:00
freddygv a8c4d6bc55 Share mgw addrs in peering stream if needed
This commit adds handling so that the replication stream considers
whether the user intends to peer through mesh gateways.

The subscription will return server or mesh gateway addresses depending
on the mesh configuration setting. These watches can be updated at
runtime by modifying the mesh config entry.
2022-10-03 11:42:20 -06:00
freddygv 4ff9d475b0 Return mesh gateway addrs if peering through mgw 2022-10-03 11:35:10 -06:00
Jeff Boruszak 12aa3cac4a
Apply suggestions from code review 2022-10-03 11:38:43 -05:00
Jeff Boruszak 69189e0381
Update website/content/docs/connect/cluster-peering/index.mdx 2022-10-03 11:36:48 -05:00
Luke Kysow de04344e47
Update tech-specs.mdx (#14840) 2022-10-03 09:21:42 -07:00
Jeff Boruszak d1d9fd0a5c
Update website/content/docs/connect/dataplane/index.mdx
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 11:16:00 -05:00
boruszak 80bbf8995b Removed external server constraint 2022-10-03 11:15:12 -05:00
boruszak d80601e96e proxy default behavior constraint 2022-10-03 11:14:34 -05:00
Jeff Boruszak eb9895422d
Apply suggestions from code review
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:58:43 -05:00
Jeff Boruszak b530c14032
Update website/content/docs/connect/dataplane/index.mdx
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:51:24 -05:00
chappie ad7295e5d9
Merge pull request #14811 from hashicorp/chappie/dns
Add DNS gRPC proxying support
2022-10-03 08:02:48 -07:00