Commit Graph

18804 Commits

Author SHA1 Message Date
Evan Culver 42423ffce2
connect: Bump Envoy 1.20 to 1.20.7, 1.21 to 1.21.5 and 1.22 to 1.22.5 (#14831) 2022-10-04 13:15:01 -07:00
Paul Glass d54966effc
docs: Consul Dataplane Version Compatibility (#14710)
Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-10-04 15:02:28 -05:00
Kyle Schochenmaier 25c0d6951b
update helm docs for consul-k8s 1.0.0-beta1 (#14875) 2022-10-04 12:59:53 -07:00
Derek Menteer 77d640c322
Add peering integration tests (#14836)
Add peering integration tests.
2022-10-04 13:51:04 -05:00
Eric Haberkorn 2178e38204
Rename `PeerName` to `Peer` on prepared queries and exported services (#14854) 2022-10-04 14:46:15 -04:00
Jeff Boruszak f5c8fe75e3
Merge pull request #14870 from hashicorp/docs/hyperlink-fixes
docs: Windows tutorial hyperlink fix #2
2022-10-04 13:16:14 -05:00
boruszak d4bf900032 Link fix 2022-10-04 12:42:59 -05:00
Jeff Boruszak 5d69df6a42
Merge pull request #14867 from hashicorp/docs/hyperlink-fixes
docs: Windows VM tutorial link fix
2022-10-04 12:26:21 -05:00
boruszak 89d986d2c4 Tutorial link fix 2022-10-04 12:19:24 -05:00
Jeff Boruszak 2a56d02992
Merge pull request #14794 from hashicorp/docs/cluster-peering
docs: Cluster peering 1.14 beta release
2022-10-04 10:46:57 -05:00
Jeff Boruszak 0ec726a959
Merge pull request #14770 from hashicorp/docs/agentless-beta
docs: Consul Dataplane (Agentless) Beta
2022-10-04 10:41:43 -05:00
Jeff Boruszak 1761c31fab
Merge pull request #14769 from hashicorp/docs/consul-on-windows-vms
docs: Consul on Windows VMs Envoy bootstrapping
2022-10-04 10:41:11 -05:00
trujillo-adam f3299a0c55
Merge pull request #14779 from hashicorp/docs/invoke-services-from-lambda
Docs/invoke services from lambda
2022-10-04 08:37:48 -07:00
boruszak 673935d55c list 2022-10-04 10:37:39 -05:00
boruszak eeb3c45a6c Reverts + fix 2022-10-04 10:37:39 -05:00
Luke Kysow 12ac96c356
Remove terminal colouring from test output so it is (#14810)
more readable in CI.

```
Running primary verification step for case-ingress-gateway-multiple-services...
�[34;1mverify.bats
�[0m�[1G   ingress proxy admin is up on :20000�[K�[75G 1/12�[2G�[1G ✓ ingress proxy admin is up on :20000�[K
�[0m�[1G   s1 proxy admin is up on :19000�[K�[75G 2/12�[2G�[1G ✓ s1 proxy admin is up on :19000�[K
�[0m�[1G   s2 proxy admin is up on :19001�[K�[75G 3/12�[2G�[1G ✓ s2 proxy admin is up on :19001�[K
�[0m�[1G   s1 proxy listener should be up and have right cert�[K�[75G 4/12�[2G�[1G ✓ s1 proxy listener should be up and have right cert�[K
�[0m�[1G   s2 proxy listener should be up and have right cert�[K�[75G 5/12�[2G�[1G ✓ s2 proxy listener should be up and have right cert�[K
�[0m�[1G   ingress-gateway should have healthy endpoints for s1�[K�[75G 6/12�[2G�[31;1m�[1G ✗ ingress-gateway should have healthy endpoints for s1�[K
�[0m�[31;22m   (from function `assert_upstream_has_endpoints_in_status' in file /workdir/primary/bats/helpers.bash, line 385,
```

versus

```
Running primary verification step for case-ingress-gateway-multiple-services...
1..12
ok 1 ingress proxy admin is up on :20000
ok 2 s1 proxy admin is up on :19000
ok 3 s2 proxy admin is up on :19001
ok 4 s1 proxy listener should be up and have right cert
ok 5 s2 proxy listener should be up and have right cert
not ok 6 ingress-gateway should have healthy endpoints for s1
not ok 7 s1 proxy should have been configured with max_connections in services
ok 8 ingress-gateway should have healthy endpoints for s2
```
2022-10-04 08:35:19 -07:00
boruszak 8321c88480 More group fix attempts 2022-10-04 10:20:14 -05:00
boruszak 40f1070271 Tabs fix again 2022-10-04 10:00:53 -05:00
boruszak a4e9427883 Tab groups fix 2022-10-04 09:49:10 -05:00
trujillo-adam e3a8a35358
Apply suggestions from code review
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-10-04 07:39:37 -07:00
boruszak dc3da3882d Minor fixes 2022-10-04 09:31:31 -05:00
boruszak b07c78d9da Installation instructions moved 2022-10-04 09:29:16 -05:00
Jeff Boruszak edde48b3e4
Apply suggestions from code review
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-10-04 09:26:07 -05:00
boruszak 960555233f Move Installation instructions 2022-10-04 09:07:37 -05:00
vanphan24 cdc3a9d2fc
first commit with overview page (#14827)
* Why Choose Consul

Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-10-03 19:32:43 -07:00
Evan Culver a1250b49c8
ci: Fix changelog-checker GHA workflow (#14842) 2022-10-03 16:49:24 -07:00
cskh 1b587e7d13
fix flaky integration test (#14843) 2022-10-03 16:55:05 -04:00
boruszak 21e9341e1b PeerName changed to Peer - fix 2022-10-03 14:18:59 -05:00
boruszak 19a9a56580 Tutorial links 2022-10-03 14:08:57 -05:00
Jeff Boruszak d42f7214f7
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 14:03:00 -05:00
Jeff Boruszak c820ef645f
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 13:59:41 -05:00
Freddy 89141256c7
Merge pull request #14734 from hashicorp/NET-643-update-mesh-gateway-envoy-config-for-inbound-peering-control-plane-traffic 2022-10-03 12:54:11 -06:00
Jeff Boruszak 3fc915aca2
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 13:54:08 -05:00
freddygv 0d61aa5d37 Update xds generation for peering over mesh gws
This commit adds the xDS resources needed for INBOUND traffic from peer
clusters:

- 1 filter chain for all inbound peering requests.
- 1 cluster for all inbound peering requests.
- 1 endpoint per voting server with the gRPC TLS port configured.

There is one filter chain and cluster because unlike with WAN
federation, peer clusters will not attempt to dial individual servers.
Peer clusters will only dial the local mesh gateway addresses.
2022-10-03 12:42:27 -06:00
Freddy 7ea726ed1f
Merge pull request #14694 from hashicorp/peering/mgw-addrs 2022-10-03 12:35:11 -06:00
Jeff Boruszak f81db7992d
Update website/content/docs/connect/dataplane/consul-dataplane.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-10-03 12:55:55 -05:00
boruszak 908ef42f41 Installation isntructions 2022-10-03 12:52:07 -05:00
freddygv 2c5caec97c Share mgw addrs in peering stream if needed
This commit adds handling so that the replication stream considers
whether the user intends to peer through mesh gateways.

The subscription will return server or mesh gateway addresses depending
on the mesh configuration setting. These watches can be updated at
runtime by modifying the mesh config entry.
2022-10-03 11:42:20 -06:00
freddygv 17463472b7 Return mesh gateway addrs if peering through mgw 2022-10-03 11:35:10 -06:00
Jeff Boruszak a637702413
Apply suggestions from code review 2022-10-03 11:38:43 -05:00
Jeff Boruszak fe82906dfb
Update website/content/docs/connect/cluster-peering/index.mdx 2022-10-03 11:36:48 -05:00
Luke Kysow e30f4c3a8a
Update tech-specs.mdx (#14840) 2022-10-03 09:21:42 -07:00
Jeff Boruszak 2dde03f0a3
Update website/content/docs/connect/dataplane/index.mdx
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 11:16:00 -05:00
boruszak 57bf426dec Removed external server constraint 2022-10-03 11:15:12 -05:00
boruszak 7fab79569c proxy default behavior constraint 2022-10-03 11:14:34 -05:00
Jeff Boruszak 60eef6a22d
Apply suggestions from code review
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:58:43 -05:00
Jeff Boruszak 319758864e
Update website/content/docs/connect/dataplane/index.mdx
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:51:24 -05:00
chappie f49332a151
Merge pull request #14811 from hashicorp/chappie/dns
Add DNS gRPC proxying support
2022-10-03 08:02:48 -07:00
trujillo-adam 52a28d51c5 applied feedback from review 2022-10-01 13:09:36 -07:00
Chris Chapman 1b24aafb23
Making suggested comments 2022-09-30 15:03:33 -07:00