Commit Graph

18929 Commits (90259d73661a7d9da50ced82e5148945229fcaf5)

Author SHA1 Message Date
Kyle Havlovitz d67bccd210 Update intermediate pki mount/role when reconfiguring Vault provider 2022-09-13 15:42:26 -07:00
Kyle Havlovitz f46955101a connect/ca: Clarify behavior around IntermediateCertTTL in CA config 2022-09-13 15:42:26 -07:00
trujillo-adam b80b91d516 minor updates to dup docs landing page 2022-09-13 15:21:25 -07:00
DanStough 0150e88200 feat: add PeerThroughMeshGateways to mesh config 2022-09-13 17:19:54 -04:00
boruszak 2b69d809ce /docs/connect/config-entries 2022-09-13 16:04:13 -05:00
malizz e743eefbd1
update enforcing consecutive 5xx type to pointer type (#14592)
* update enforcing condecutive 5xx type to pointer type

* update test
2022-09-13 13:59:44 -07:00
boruszak 38fd65bb2c /docs/connect/proxies 2022-09-13 15:58:57 -05:00
boruszak ebcb557ebf /docs/connect/gateways/mesh-gateways 2022-09-13 15:55:24 -05:00
boruszak f60da88228 /docs/connect/gateways 2022-09-13 15:52:02 -05:00
boruszak 76f044d7a3 /connect/cluster-peering 2022-09-13 15:50:15 -05:00
boruszak 653cfb431d /docs/connect 2022-09-13 15:48:39 -05:00
boruszak 2b122dd262 /docs/connect/observability 2022-09-13 15:34:10 -05:00
boruszak b79fb73468 /docs/connect/ca 2022-09-13 15:30:45 -05:00
boruszak df9702f9d1 /docs/connect/l7-traffic 2022-09-13 15:26:51 -05:00
boruszak 4b6fef4c97 /docs/connect/native 2022-09-13 15:24:43 -05:00
boruszak f76983f1fb /docs/connect/registration 2022-09-13 15:22:38 -05:00
boruszak 9c5de92d9f /docs/concepts 2022-09-13 15:00:43 -05:00
boruszak a95a7ec40f /docs/architecture 2022-09-13 14:58:34 -05:00
boruszak 76c064d1fd /docs/internals 2022-09-13 14:55:30 -05:00
boruszak f91f01c891 /docs/agent 2022-09-13 14:45:42 -05:00
boruszak add1b0a61c /docs/agent/config 2022-09-13 14:41:42 -05:00
boruszak 977ac69f1d /docs/discovery 2022-09-13 14:38:47 -05:00
boruszak 8d742d5fe7 /docs/integrate 2022-09-13 14:36:17 -05:00
boruszak 6c0f27f427 /docs/security/acl 2022-09-13 14:32:13 -05:00
boruszak 8a58aab610 /docs/security 2022-09-13 14:27:16 -05:00
boruszak dd8907c137 /docs/security/security-models 2022-09-13 14:26:07 -05:00
Derek Menteer 0aa13733a0
Add CSR check for number of URIs. (#14579)
Add CSR check for number of URIs.
2022-09-13 14:21:47 -05:00
Luke Kysow 15043de647
Document integration tests (#14391) 2022-09-13 10:00:02 -07:00
Derek Menteer db83ff4fa6 Add input validation for auto-config JWT authorization checks. 2022-09-13 11:16:36 -05:00
cskh f22685b969
Config-entry: Support proxy config in service-defaults (#14395)
* Config-entry: Support proxy config in service-defaults

* Update website/content/docs/connect/config-entries/service-defaults.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-12 10:41:58 -04:00
John Cowen 4a9f6101c9
ui: Pass through default environment settings when when booting dev/test (#14519)
* ui: Add initial peering listing acceptance tests (#14522)
2022-09-12 11:22:06 +01:00
John Cowen ad616a35d3
ui: Fix up tippy console warning... (#14524)
...enabling/disabling now depends on whether the string is non-empty
2022-09-12 11:21:26 +01:00
John Cowen 4a6253d689
ui: Action docs typo (#14512) 2022-09-12 10:39:13 +01:00
Eric Haberkorn 45a5f28a60
Update the service resolver documentation to include cluster peering failover and redirects (#14513)
Update the service resolver documentation to include cluster peering failover and redirects
2022-09-09 16:57:23 -04:00
Kyle Schochenmaier 208dd1452a
[docs] use values.yaml instead of config.yaml everywhere for helm configurations (#14554)
* use values.yaml instead of config.yaml everywhere for helm values
* update docs
2022-09-09 13:56:33 -07:00
boruszak 8d181dacd6 /docs/enterprise/license 2022-09-09 14:57:15 -05:00
Blake Covarrubias 25895b8942 docs: Fix redirect to K8s and VM multi-cluster docs
This commit fixes an oversight from PR #14009 where the K8s and VMs
multi-cluster docs were moved, but not redirected to the proper
location.
2022-09-09 12:41:33 -07:00
boruszak eba36ba9b9 /docs/enterprise 2022-09-09 13:46:33 -05:00
boruszak a6cd059335 /docs/intro 2022-09-09 13:35:24 -05:00
boruszak 18e18440ed /docs/troubleshoot 2022-09-09 13:32:41 -05:00
boruszak e3f6a3a060 /docs/install/index.mdx 2022-09-09 13:30:04 -05:00
boruszak 7d09a93824 /docs/install pages 2022-09-09 13:27:35 -05:00
Eric Haberkorn aa8268e50c
Implement Cluster Peering Redirects (#14445)
implement cluster peering redirects
2022-09-09 13:58:28 -04:00
Kyle Schochenmaier 6e046315c6
[docs] update CNI docs to indicate how the CNI plugin is installed (#14546)
* update CNI docs to indicate that the CNI plugin is installed through the helm chart
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Paul Banks <banks@banksco.de>
2022-09-09 12:28:15 -05:00
skpratt b761589340
add non-double-prefixed metrics (#14193) 2022-09-09 12:13:43 -05:00
Krastin Krastev b0218ea35b
docs: fix helm stanza in admin-partitions (#14523) 2022-09-09 09:58:53 -07:00
Chris S. Kim 7370f0a953
Fix test ordering (#14543) 2022-09-09 11:11:54 -04:00
skpratt 19f79aa9a6
PR #14057 follow up fix: service id parsing from sidecar id (#14541)
* fix service id parsing from sidecar id

* simplify suffix trimming
2022-09-09 09:47:10 -05:00
Dan Upton 1c2c975b0b
xDS Load Balancing (#14397)
Prior to #13244, connect proxies and gateways could only be configured by an
xDS session served by the local client agent.

In an upcoming release, it will be possible to deploy a Consul service mesh
without client agents. In this model, xDS sessions will be handled by the
servers themselves, which necessitates load-balancing to prevent a single
server from receiving a disproportionate amount of load and becoming
overwhelmed.

This introduces a simple form of load-balancing where Consul will attempt to
achieve an even spread of load (xDS sessions) between all healthy servers.
It does so by implementing a concurrent session limiter (limiter.SessionLimiter)
and adjusting the limit according to autopilot state and proxy service
registrations in the catalog.

If a server is already over capacity (i.e. the session limit is lowered),
Consul will begin draining sessions to rebalance the load. This will result
in the client receiving a `RESOURCE_EXHAUSTED` status code. It is the client's
responsibility to observe this response and reconnect to a different server.

Users of the gRPC client connection brokered by the
consul-server-connection-manager library will get this for free.

The rate at which Consul will drain sessions to rebalance load is scaled
dynamically based on the number of proxies in the catalog.
2022-09-09 15:02:01 +01:00
Jeff Apple deda99a387
Merge pull request #14534 from hashicorp/docs/capigw-tech-spec-update
Docs: add limitations to Tech Specs
2022-09-08 14:47:39 -07:00