Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Go to file
hc-github-team-consul-core bc111cb215
Backport of fix: add AccessorID property to PUT token request into release/1.15.x (#16662)
2 years ago
.changelog Backport of fix: add AccessorID property to PUT token request into release/1.15.x (#16662) 2 years ago
.circleci [OSS] connect: Bump Envoy 1.22.5 to 1.22.7, 1.23.2 to 1.23.4, 1.24.0 to 1.24.2, add 1.25.1, remove 1.21.5 (#16274) (#16491) 2 years ago
.github Backport of JIRA pr check: Filter out OSS/ENT merges into release/1.15.x (#16594) 2 years ago
.release backport of commit ec864cb31a (#16414) 2 years ago
acl Synthesize anonymous token pre-bootstrap when needed (#16200) 2 years ago
agent backport of commit 78bb205fc3 (#16635) 2 years ago
api Backport of Allow HCP metrics collection for Envoy proxies into release/1.15.x (#16611) 2 years ago
bench
build-support Backport of [OSS] security: update go to 1.20.1 into release/1.15.x (#16314) 2 years ago
command Backport of Allow HCP metrics collection for Envoy proxies into release/1.15.x (#16611) 2 years ago
connect emit metrics for global rate limiting (#15891) 2 years ago
contributing
docs Adding experimental support for a more efficient LogStore implementation (#16176) 2 years ago
envoyextensions bump consul/api to v1.20.0 and consul/sdk to v0.13.1 2 years ago
grafana
internal Protobuf Modernization (#15949) 2 years ago
ipaddr
lib Backport of Suppress AlreadyRegisteredError to fix test retries into release/1.15.x (#16504) 2 years ago
logging Run config entry controller routines on leader (#16054) 2 years ago
proto Backport of Add ServiceResolver RequestTimeout for route timeouts to make TerminatingGateway upstream timeouts configurable into release/1.15.x (#16520) 2 years ago
proto-public Backport of [OSS] security: update go to 1.20.1 into release/1.15.x (#16314) 2 years ago
sdk backport of commit 748e2a76cb (#16328) 2 years ago
sentinel
service_os
snapshot removes ioutil usage everywhere which was deprecated in go1.16 (#15297) 2 years ago
test bump api and sdk modules 2 years ago
testrpc Pass remote addr of incoming HTTP requests through to RPC(..) calls (#15700) 2 years ago
tlsutil Backport of [OSS] security: update go to 1.20.1 into release/1.15.x (#16314) 2 years ago
tools/internal-grpc-proxy grpc: rename public/private directories to external/internal (#13721) 2 years ago
troubleshoot bump consul/api and consul/envoyextensions 2 years ago
types agent: convert listener config to TLS types (#12522) 3 years ago
ui Backport of fix: add AccessorID property to PUT token request into release/1.15.x (#16662) 2 years ago
version Bump version for next release 2 years ago
website Backport of First cluster grpc service should be NodePort for the second cluster to connect into release/1.15.x (#16653) 2 years ago
.dockerignore
.gitignore grpc: `protoc` plugin for generating gRPC rate limit specifications (#15564) 2 years ago
.golangci.yml removes ioutil usage everywhere which was deprecated in go1.16 (#15297) 2 years ago
CHANGELOG.md Update changelog for 1.15.1 patch release 2 years ago
Dockerfile backport of commit a0598b81a3 (#16363) 2 years ago
GNUmakefile Backport of [OSS] security: update go to 1.20.1 into release/1.15.x (#16314) 2 years ago
LICENSE [COMPLIANCE] Update MPL-2.0 LICENSE (#14964) 2 years ago
NOTICE.md
README.md Fixed broken links referring to tutorials running as local agent (#14954) 2 years ago
Vagrantfile
fixup_acl_move.sh Fixup script 2 3 years ago
go.mod bump sdk,api,envoyextensions, and troubleshoot modules 2 years ago
go.sum Bump x/time to 0.3.0 and fix related breakage linked to RPCRateLimit (#16241) 2 years ago
main.go Backport of [OSS] security: update go to 1.20.1 into release/1.15.x (#16314) 2 years ago

README.md

Consul logo Consul

Docker Pulls Go Report Card

Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.

Consul provides several key features:

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Mesh - Consul Service Mesh enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections with Transparent Proxy.

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

Consul runs on Linux, macOS, FreeBSD, Solaris, and Windows and includes an optional browser based UI. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website: https://consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance. For contributions specifically to the browser based UI, please refer to the UI's README.md for guidance.