Commit Graph

18529 Commits

Author SHA1 Message Date
DanStough b37a2ba889 feat(peering): validate server name conflicts on establish 2022-09-14 11:37:30 -04:00
Kyle Havlovitz ea4d95a5c6
Merge pull request #14516 from hashicorp/ca-ttl-fixes
Fix inconsistent TTL behavior in CA providers
2022-09-13 16:07:36 -07:00
Kyle Havlovitz 33e616987c Update intermediate pki mount/role when reconfiguring Vault provider 2022-09-13 15:42:26 -07:00
Kyle Havlovitz 1ded025400 connect/ca: Clarify behavior around IntermediateCertTTL in CA config 2022-09-13 15:42:26 -07:00
DanStough fca4042bd9 feat: add PeerThroughMeshGateways to mesh config 2022-09-13 17:19:54 -04:00
malizz 017f00e6d4
update enforcing consecutive 5xx type to pointer type (#14592)
* update enforcing condecutive 5xx type to pointer type

* update test
2022-09-13 13:59:44 -07:00
Derek Menteer 5d1487e167
Add CSR check for number of URIs. (#14579)
Add CSR check for number of URIs.
2022-09-13 14:21:47 -05:00
Luke Kysow 8e4e0c23aa
Document integration tests (#14391) 2022-09-13 10:00:02 -07:00
Derek Menteer cfcd9f2a2c Add input validation for auto-config JWT authorization checks. 2022-09-13 11:16:36 -05:00
cskh 6196be1f98
Config-entry: Support proxy config in service-defaults (#14395)
* Config-entry: Support proxy config in service-defaults

* Update website/content/docs/connect/config-entries/service-defaults.mdx

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-09-12 10:41:58 -04:00
John Cowen 9f14171f6c
ui: Pass through default environment settings when when booting dev/test (#14519)
* ui: Add initial peering listing acceptance tests (#14522)
2022-09-12 11:22:06 +01:00
John Cowen 2df2276ffa
ui: Fix up tippy console warning... (#14524)
...enabling/disabling now depends on whether the string is non-empty
2022-09-12 11:21:26 +01:00
John Cowen f0066ee262
ui: Action docs typo (#14512) 2022-09-12 10:39:13 +01:00
Eric Haberkorn 3d68f9bd4f
Update the service resolver documentation to include cluster peering failover and redirects (#14513)
Update the service resolver documentation to include cluster peering failover and redirects
2022-09-09 16:57:23 -04:00
Kyle Schochenmaier 4ad1491305
[docs] use values.yaml instead of config.yaml everywhere for helm configurations (#14554)
* use values.yaml instead of config.yaml everywhere for helm values
* update docs
2022-09-09 13:56:33 -07:00
Blake Covarrubias 30106240a2 docs: Fix redirect to K8s and VM multi-cluster docs
This commit fixes an oversight from PR #14009 where the K8s and VMs
multi-cluster docs were moved, but not redirected to the proper
location.
2022-09-09 12:41:33 -07:00
Eric Haberkorn 1490eedfbc
Implement Cluster Peering Redirects (#14445)
implement cluster peering redirects
2022-09-09 13:58:28 -04:00
Kyle Schochenmaier 29772eac2a
[docs] update CNI docs to indicate how the CNI plugin is installed (#14546)
* update CNI docs to indicate that the CNI plugin is installed through the helm chart
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
Co-authored-by: Paul Banks <banks@banksco.de>
2022-09-09 12:28:15 -05:00
skpratt cf6c1d9388
add non-double-prefixed metrics (#14193) 2022-09-09 12:13:43 -05:00
Krastin Krastev 7279c2e17d
docs: fix helm stanza in admin-partitions (#14523) 2022-09-09 09:58:53 -07:00
Chris S. Kim b52b0f6be7
Fix test ordering (#14543) 2022-09-09 11:11:54 -04:00
skpratt 1ae31a520a
PR #14057 follow up fix: service id parsing from sidecar id (#14541)
* fix service id parsing from sidecar id

* simplify suffix trimming
2022-09-09 09:47:10 -05:00
Dan Upton 9fe6c33c0d
xDS Load Balancing (#14397)
Prior to #13244, connect proxies and gateways could only be configured by an
xDS session served by the local client agent.

In an upcoming release, it will be possible to deploy a Consul service mesh
without client agents. In this model, xDS sessions will be handled by the
servers themselves, which necessitates load-balancing to prevent a single
server from receiving a disproportionate amount of load and becoming
overwhelmed.

This introduces a simple form of load-balancing where Consul will attempt to
achieve an even spread of load (xDS sessions) between all healthy servers.
It does so by implementing a concurrent session limiter (limiter.SessionLimiter)
and adjusting the limit according to autopilot state and proxy service
registrations in the catalog.

If a server is already over capacity (i.e. the session limit is lowered),
Consul will begin draining sessions to rebalance the load. This will result
in the client receiving a `RESOURCE_EXHAUSTED` status code. It is the client's
responsibility to observe this response and reconnect to a different server.

Users of the gRPC client connection brokered by the
consul-server-connection-manager library will get this for free.

The rate at which Consul will drain sessions to rebalance load is scaled
dynamically based on the number of proxies in the catalog.
2022-09-09 15:02:01 +01:00
Jeff Apple a5f4573c76
Merge pull request #14534 from hashicorp/docs/capigw-tech-spec-update
Docs: add limitations to Tech Specs
2022-09-08 14:47:39 -07:00
Jeff Apple c12c0a8376
Update website/content/docs/api-gateway/tech-specs.mdx 2022-09-08 14:41:06 -07:00
Derek Menteer 03f2594d73
Merge pull request #14294 from hashicorp/derekm/split-grpc-ports
Add separate grpc tls port.
2022-09-08 16:27:38 -05:00
Nathan Coleman 193eeaee7a
Update website/content/docs/api-gateway/tech-specs.mdx 2022-09-08 15:56:28 -04:00
Jeff Apple c9251d2aaa
Update website/content/docs/api-gateway/tech-specs.mdx
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
2022-09-08 12:55:15 -07:00
Jeff Apple 0648e83bca
Update website/content/docs/api-gateway/tech-specs.mdx
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
2022-09-08 12:54:02 -07:00
Derek Menteer 8efe862b76 Merge branch 'main' of github.com:hashicorp/consul into derekm/split-grpc-ports 2022-09-08 14:53:08 -05:00
Jeff Apple ce4ec3e6b8
Update website/content/docs/api-gateway/tech-specs.mdx
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
2022-09-08 12:51:44 -07:00
Derek Menteer 75dec4c31d Remove rebuilding grpc server. 2022-09-08 13:45:44 -05:00
trujillo-adam 7c12ca1d2d
Merge pull request #14353 from hashicorp/nia/docs-0.7.0
Nia/docs 0.7.0
2022-09-08 11:44:04 -07:00
Jeff Apple ec508e492e
Docs: add limitations to Tech Specs 2022-09-08 11:38:27 -07:00
trujillo-adam 0df792005d fix to redirects file 2022-09-08 11:31:08 -07:00
Tu Nguyen 60452f068b Merge branch 'main' into nia/docs-0.7.0 2022-09-08 11:18:05 -07:00
Tu Nguyen 4a7ec94445 Merge branch 'nia/docs-0.7.0' of ssh://github.com/hashicorp/consul into nia/docs-0.7.0 2022-09-08 11:17:58 -07:00
Tu Nguyen 8dc33d601a Merge branch 'main' of ssh://github.com/hashicorp/consul 2022-09-08 11:17:46 -07:00
trujillo-adam 53aceea6f7 updated HA configuration ref 2022-09-08 11:16:34 -07:00
trujillo-adam 06c6023f25 Apply suggestions from code review
Co-authored-by: Michael Wilkerson <62034708+wilkermichael@users.noreply.github.com>
2022-09-08 11:16:34 -07:00
trujillo-adam ecc0a6e4b0 Apply suggestions from code review
Co-authored-by: Michael Wilkerson <62034708+wilkermichael@users.noreply.github.com>
2022-09-08 11:16:34 -07:00
trujillo-adam 808eeab7d8 fixed bad links in status/cluster endpoint ref 2022-09-08 11:16:34 -07:00
trujillo-adam aa7eddd41a applied AJs feedback and made a few additional improvements 2022-09-08 11:16:33 -07:00
trujillo-adam ca58bca433 udpated how to ID the leader in the usage docs 2022-09-08 11:16:33 -07:00
trujillo-adam d23c007cc4 added no-HA API status error message to EMs page 2022-09-08 11:16:33 -07:00
trujillo-adam 32645e3133 added cluster endpoint to status API docs 2022-09-08 11:16:33 -07:00
Tu Nguyen ed505b956b Apply suggestions from code review 2022-09-08 11:16:33 -07:00
trujillo-adam 950654f7f8 Update website/content/docs/nia/usage/run-ha.mdx 2022-09-08 11:16:33 -07:00
trujillo-adam 38727b41d1 redirects for CTS 0.7 2022-09-08 11:15:45 -07:00
trujillo-adam 1baca91665 final content tweaks for CTS 0.7 docs 2022-09-08 11:09:30 -07:00