Commit Graph

18880 Commits

Author SHA1 Message Date
trujillo-adam faf1769433 update to main what is consul page 2022-09-13 16:00:44 -07:00
Kyle Havlovitz 33e616987c Update intermediate pki mount/role when reconfiguring Vault provider 2022-09-13 15:42:26 -07:00
Kyle Havlovitz 1ded025400 connect/ca: Clarify behavior around IntermediateCertTTL in CA config 2022-09-13 15:42:26 -07:00
trujillo-adam 2110d62049 minor updates to dup docs landing page 2022-09-13 15:21:25 -07:00
DanStough fca4042bd9 feat: add PeerThroughMeshGateways to mesh config 2022-09-13 17:19:54 -04:00
boruszak 7e40cbc6ac /docs/connect/config-entries 2022-09-13 16:04:13 -05:00
malizz 017f00e6d4
update enforcing consecutive 5xx type to pointer type (#14592)
* update enforcing condecutive 5xx type to pointer type

* update test
2022-09-13 13:59:44 -07:00
boruszak f149fd7f4e /docs/connect/proxies 2022-09-13 15:58:57 -05:00
boruszak 3d50f8abff /docs/connect/gateways/mesh-gateways 2022-09-13 15:55:24 -05:00
boruszak ad9b8789e8 /docs/connect/gateways 2022-09-13 15:52:02 -05:00
boruszak 56b808d4ad /connect/cluster-peering 2022-09-13 15:50:15 -05:00
boruszak ccd86bf254 /docs/connect 2022-09-13 15:48:39 -05:00
boruszak c014ba6b6c /docs/connect/observability 2022-09-13 15:34:10 -05:00
boruszak dc5038c50e /docs/connect/ca 2022-09-13 15:30:45 -05:00
boruszak 0edfe69885 /docs/connect/l7-traffic 2022-09-13 15:26:51 -05:00
boruszak 788eab543e /docs/connect/native 2022-09-13 15:24:43 -05:00
boruszak 608e5e265f /docs/connect/registration 2022-09-13 15:22:38 -05:00
boruszak a349c4af3a /docs/concepts 2022-09-13 15:00:43 -05:00
boruszak 19436ca471 /docs/architecture 2022-09-13 14:58:34 -05:00
boruszak 40f1d6c51e /docs/internals 2022-09-13 14:55:30 -05:00
boruszak a973e8a023 /docs/agent 2022-09-13 14:45:42 -05:00
boruszak c89922499c /docs/agent/config 2022-09-13 14:41:42 -05:00
boruszak 0ae0702e08 /docs/discovery 2022-09-13 14:38:47 -05:00
boruszak 1e920748d6 /docs/integrate 2022-09-13 14:36:17 -05:00
boruszak 0b33745f44 /docs/security/acl 2022-09-13 14:32:13 -05:00
boruszak 6d0f7c2857 /docs/security 2022-09-13 14:27:16 -05:00
boruszak b560dbefd5 /docs/security/security-models 2022-09-13 14:26:07 -05:00
Derek Menteer 5d1487e167
Add CSR check for number of URIs. (#14579)
Add CSR check for number of URIs.
2022-09-13 14:21:47 -05:00
Luke Kysow 8e4e0c23aa
Document integration tests (#14391) 2022-09-13 10:00:02 -07:00
Derek Menteer cfcd9f2a2c Add input validation for auto-config JWT authorization checks. 2022-09-13 11:16:36 -05:00
cskh 6196be1f98
Config-entry: Support proxy config in service-defaults (#14395)
* Config-entry: Support proxy config in service-defaults

* Update website/content/docs/connect/config-entries/service-defaults.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-12 10:41:58 -04:00
John Cowen 9f14171f6c
ui: Pass through default environment settings when when booting dev/test (#14519)
* ui: Add initial peering listing acceptance tests (#14522)
2022-09-12 11:22:06 +01:00
John Cowen 2df2276ffa
ui: Fix up tippy console warning... (#14524)
...enabling/disabling now depends on whether the string is non-empty
2022-09-12 11:21:26 +01:00
John Cowen f0066ee262
ui: Action docs typo (#14512) 2022-09-12 10:39:13 +01:00
Eric Haberkorn 3d68f9bd4f
Update the service resolver documentation to include cluster peering failover and redirects (#14513)
Update the service resolver documentation to include cluster peering failover and redirects
2022-09-09 16:57:23 -04:00
Kyle Schochenmaier 4ad1491305
[docs] use values.yaml instead of config.yaml everywhere for helm configurations (#14554)
* use values.yaml instead of config.yaml everywhere for helm values
* update docs
2022-09-09 13:56:33 -07:00
boruszak 4fe732d881 /docs/enterprise/license 2022-09-09 14:57:15 -05:00
Blake Covarrubias 30106240a2 docs: Fix redirect to K8s and VM multi-cluster docs
This commit fixes an oversight from PR #14009 where the K8s and VMs
multi-cluster docs were moved, but not redirected to the proper
location.
2022-09-09 12:41:33 -07:00
boruszak f9ca69ae16 /docs/enterprise 2022-09-09 13:46:33 -05:00
boruszak c8ec0ea2e6 /docs/intro 2022-09-09 13:35:24 -05:00
boruszak 8dfb3de7a5 /docs/troubleshoot 2022-09-09 13:32:41 -05:00
boruszak f2d38503f9 /docs/install/index.mdx 2022-09-09 13:30:04 -05:00
boruszak c6476f4de6 /docs/install pages 2022-09-09 13:27:35 -05:00
Eric Haberkorn 1490eedfbc
Implement Cluster Peering Redirects (#14445)
implement cluster peering redirects
2022-09-09 13:58:28 -04:00
Kyle Schochenmaier 29772eac2a
[docs] update CNI docs to indicate how the CNI plugin is installed (#14546)
* update CNI docs to indicate that the CNI plugin is installed through the helm chart
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Paul Banks <banks@banksco.de>
2022-09-09 12:28:15 -05:00
skpratt cf6c1d9388
add non-double-prefixed metrics (#14193) 2022-09-09 12:13:43 -05:00
Krastin Krastev 7279c2e17d
docs: fix helm stanza in admin-partitions (#14523) 2022-09-09 09:58:53 -07:00
Chris S. Kim b52b0f6be7
Fix test ordering (#14543) 2022-09-09 11:11:54 -04:00
skpratt 1ae31a520a
PR #14057 follow up fix: service id parsing from sidecar id (#14541)
* fix service id parsing from sidecar id

* simplify suffix trimming
2022-09-09 09:47:10 -05:00
Dan Upton 9fe6c33c0d
xDS Load Balancing (#14397)
Prior to #13244, connect proxies and gateways could only be configured by an
xDS session served by the local client agent.

In an upcoming release, it will be possible to deploy a Consul service mesh
without client agents. In this model, xDS sessions will be handled by the
servers themselves, which necessitates load-balancing to prevent a single
server from receiving a disproportionate amount of load and becoming
overwhelmed.

This introduces a simple form of load-balancing where Consul will attempt to
achieve an even spread of load (xDS sessions) between all healthy servers.
It does so by implementing a concurrent session limiter (limiter.SessionLimiter)
and adjusting the limit according to autopilot state and proxy service
registrations in the catalog.

If a server is already over capacity (i.e. the session limit is lowered),
Consul will begin draining sessions to rebalance the load. This will result
in the client receiving a `RESOURCE_EXHAUSTED` status code. It is the client's
responsibility to observe this response and reconnect to a different server.

Users of the gRPC client connection brokered by the
consul-server-connection-manager library will get this for free.

The rate at which Consul will drain sessions to rebalance load is scaled
dynamically based on the number of proxies in the catalog.
2022-09-09 15:02:01 +01:00