Siva
8cbfb0e5ed
Website: Added more telemetry metrics
2018-07-03 08:00:39 -04:00
Pierre Souchay
d8a6571683
Improve doc for async-cache
2018-07-01 23:50:30 +02:00
Pierre Souchay
6dfbbf1350
Updated documentation and adding more test case for async-cache
2018-07-01 23:50:30 +02:00
Siva
1522171e53
Website: Errata in -bind option for the agent
2018-06-29 16:43:12 -04:00
Julien Pivotto
db2c4b3447
Fix JSON in service configuration
2018-06-27 09:06:27 +02:00
Matt Keeler
685838ea0e
Fix layout issue with discovery_max_stale
...
It was indented when it shouldn't have been.
2018-06-26 15:09:14 -04:00
mkeeler
1da3c42867
Merge remote-tracking branch 'connect/f-connect'
2018-06-25 19:42:51 +00:00
Kyle Havlovitz
837f23441d
connect/ca: hide the RotationPeriod config field since it isn't used yet
2018-06-25 12:26:18 -07:00
Kyle Havlovitz
76aa137ffc
website: add Vault CA provider doc sections
2018-06-25 12:25:42 -07:00
Paul Banks
e3cbbf4eed
Add proxy telemetry to docs
2018-06-25 12:25:39 -07:00
Mitchell Hashimoto
4fa92e7d0c
website: document proxy security settings
2018-06-25 12:25:11 -07:00
Kyle Havlovitz
e401384194
docs: add agent config options for connect/CA
2018-06-25 12:25:10 -07:00
Mitchell Hashimoto
db72f1018c
website: fix typo
2018-06-25 12:24:15 -07:00
Mitchell Hashimoto
61c7e33a22
agent/config: move ports to ports
structure, update docs
2018-06-25 12:24:15 -07:00
Mitchell Hashimoto
8dbe0017bb
Starting Docs ( #46 )
...
* website: first stab at Connect docs
* website: lots more various stuff (bad commit messages)
* website: getting started page for Connect
* website: intentions
* website: intention APIs
* website: agent API docs
* website: document agent/catalog proxy kind service values
* website: /v1/catalog/connect/:service
* website: intention CLI docs
* website: custom proxy docs
* website: remove dedicated getting started guide
* website: add docs for CA API endpoints
* website: add docs for connect ca commands
* website: add proxy CLI docs
* website: clean up proxy command, add dev docs
* website: todo pages
* website: connect security
2018-06-25 12:24:05 -07:00
Jack Pearkes
e8adbdb59b
Merge pull request #4226 from petems/monitoring_doc
...
Adds Monitoring Guide
2018-06-21 13:34:11 -07:00
petems
e91d2d2bcb
Adds extra thresholds and aggregates to Telemetry
...
* Thresholds and aggregates of metrics for monitoring in Consul
2018-06-21 20:45:13 +01:00
Matt Keeler
6ccc4f39db
Merge pull request #4216 from hashicorp/rpc-limiting
...
Make RPC limits reloadable
2018-06-20 09:05:28 -04:00
Matt Keeler
426211fad6
Merge pull request #4215 from hashicorp/feature/config-node-meta-dns-txt
...
Add configuration entry to control including TXT records for node meta in DNS responses
2018-06-20 08:53:04 -04:00
Matt Keeler
b9d1e7042a
Make filtering out TXT RRs only apply when they would end up in Additional section
...
ANY queries are no longer affected.
2018-06-19 10:08:16 -04:00
Omar Khawaja
da12d8a88c
update encryption doc and add guide for creating certificates ( #4238 )
...
* update encryption doc and add guide for creating certificates in consul with cfssl
* add details about CLI and disabling HTTP
* delete $ symbols and add guide elements
* add missing periods and steps heading
2018-06-18 15:25:35 -04:00
Guido Iaquinti
edd6a69541
Client: add metric for failed RPC calls to server
2018-06-13 12:35:45 +01:00
Matt Keeler
c5d9c2362f
Merge branch 'master' of github.com:hashicorp/consul into rpc-limiting
...
# Conflicts:
# agent/agent.go
# agent/consul/client.go
2018-06-11 16:11:36 -04:00
Matt Keeler
35ffa2276c
Update docs about rpc limits being reloadable
2018-06-11 15:54:55 -04:00
Matt Keeler
6604828009
Add configuration entry to control including TXT records for node meta in DNS responses
...
If set to false, the only way to retrieve TXT records for node meta is to specifically query for TXT records.
2018-06-11 11:49:04 -04:00
Jack Pearkes
78ef912427
Merge pull request #4169 from rskrishnar/adds-a-link-to-agent-config-options
...
adds link to agent config options from basic.html
2018-06-01 09:25:58 -07:00
Jack Pearkes
f9fec514a9
Merge pull request #4164 from hashicorp/raft-default-docs
...
website: add raft snapshot setting defaults
2018-06-01 09:06:00 -07:00
Nainterceptor
096c112d06
Fix given + mandatory fields
2018-05-30 23:03:40 +02:00
RoopSai Krishna
7f1c139639
adds link to agent config options from basic.html
2018-05-28 12:47:14 +05:30
Kyle Havlovitz
d3c4d2c495
website: add raft snapshot setting defaults
2018-05-25 16:17:43 -07:00
Jack Pearkes
701c00ca8f
Merge pull request #4133 from rskrishnar/add-missing-telemetry
...
add missing metrics to telemetry documentation
2018-05-25 09:25:19 -07:00
RoopSai Krishna
6054e0a268
add missing metrics to telemetry documentation
2018-05-16 16:26:32 +05:30
Pierre Souchay
77ed8004a7
Error in documentation: discovery_max_stale
is not in dns_config
...
Moved the entry at the top level instead of DNS
2018-05-15 14:59:15 +02:00
Jack Pearkes
36f4c760b3
website: fix broken link
2018-05-11 12:22:55 -07:00
Preetha Appan
5d3b267787
More docs and removed SnapShotInterval from raft timing struct stanza
2018-05-11 10:43:24 -05:00
Preetha Appan
e28c5fbb4e
Also make snapshot interval configurable
2018-05-11 10:43:24 -05:00
Preetha Appan
eb4bc79118
Make raft snapshot commit threshold configurable
2018-05-11 10:43:24 -05:00
Kyle Havlovitz
67167fd961
Merge pull request #4108 from hashicorp/vendor-go-discover
...
Update go-discover and add triton provider
2018-05-10 17:29:00 -07:00
Kyle Havlovitz
c04ff88537
Move cloud auto-join docs to a separate page and add Triton
2018-05-10 17:15:41 -07:00
Jack Pearkes
e611b1728a
Merge pull request #4097 from hashicorp/remove-deprecated
...
Remove deprecated check/service fields and metric names
2018-05-10 15:45:49 -07:00
Paul Banks
01358a6043
Update config docs with places sockaddr is supported
2018-05-10 14:56:48 +01:00
Kyle Havlovitz
60307ef328
Remove deprecated metric names
2018-05-08 16:23:15 -07:00
Kyle Havlovitz
a480434517
Remove the script field from checks in favor of args
2018-05-08 15:31:53 -07:00
Kyle Havlovitz
36c5e59465
Remove support for EnableTagOverride in config files
2018-05-07 16:19:13 -07:00
Kyle Havlovitz
fb3cd87c91
Remove support for CheckID field in service check definitions
2018-05-07 16:15:08 -07:00
Paul Banks
ea731031d5
Merge pull request #4047 from pierresouchay/added_missing_meta_in_service_definition
...
[BUGFIX] Added Service Meta support in configuration files
2018-04-25 13:08:53 +01:00
Pierre Souchay
e0ee7cd40f
Changed a bit doc
...
(Fighting with Travis)
2018-04-24 22:55:39 +02:00
Pierre Souchay
6be9b6ca60
Improved documentation
2018-04-24 22:40:41 +02:00
Pierre Souchay
11bf3e4c71
Added documentation for meta
2018-04-24 21:56:35 +02:00
Paul Banks
06e1a62653
Merge pull request #4016 from pierresouchay/support_for_prometheus
...
Support for prometheus for metrics endpoint
2018-04-24 16:14:43 +01:00
Jack Pearkes
890cf47acb
website: fix a broken link
2018-04-13 10:33:29 -07:00
Pierre Souchay
e342ced97b
Clearer documentation and comments for enabling Prometheus support
2018-04-09 13:16:45 +02:00
Pierre Souchay
2cccb8f36a
Added documentation for telemetry{ prometheus_retention_time = duration }
2018-04-06 14:50:03 +02:00
Preetha
8fbe3dfceb
Adds discovery_max_stale ( #4004 )
...
Adds a new option to allow service discovery endpoints to return stale results if configured at the agent level.
2018-03-30 10:14:44 -05:00
Jack Pearkes
307deb63f5
website: document and warn users about disabling serf_wan port
...
See https://github.com/hashicorp/consul/pull/3984 for more.
This also fixes a link to a heading that existed twice in the document.
2018-03-29 08:19:21 -07:00
Jack Pearkes
9a91b4eaef
Merge pull request #3927 from hashicorp/docs-encrypt-key-note
...
Docs: Clarify encrypt key for WAN joined DCs
2018-03-22 14:16:02 -07:00
Josh Soref
1dd8c378b9
Spelling ( #3958 )
...
* spelling: another
* spelling: autopilot
* spelling: beginning
* spelling: circonus
* spelling: default
* spelling: definition
* spelling: distance
* spelling: encountered
* spelling: enterprise
* spelling: expands
* spelling: exits
* spelling: formatting
* spelling: health
* spelling: hierarchy
* spelling: imposed
* spelling: independence
* spelling: inspect
* spelling: last
* spelling: latest
* spelling: client
* spelling: message
* spelling: minimum
* spelling: notify
* spelling: nonexistent
* spelling: operator
* spelling: payload
* spelling: preceded
* spelling: prepared
* spelling: programmatically
* spelling: required
* spelling: reconcile
* spelling: responses
* spelling: request
* spelling: response
* spelling: results
* spelling: retrieve
* spelling: service
* spelling: significantly
* spelling: specifies
* spelling: supported
* spelling: synchronization
* spelling: synchronous
* spelling: themselves
* spelling: unexpected
* spelling: validations
* spelling: value
2018-03-19 16:56:00 +00:00
Paul Banks
b86de4c2e3
Use master
2018-03-19 16:50:52 +00:00
Devin Canterberry
bd11f567c4
📝 Prefer brevity at the cost of some ambiguity
2018-03-15 10:25:27 -07:00
Devin Canterberry
089ceff264
📝 Clarify the list of supported TLS cipher suites
...
Previously, the documentation linked to Golang's source code, which
can drift from the list of cipher suites supported by Consul. Consul
has a hard-coded mapping of string values to Golang cipher suites, so
this is a more direct source of truth to help users understand which
string values are accepted in the `tls_cipher_suites` configuration
value.
2018-03-13 09:25:03 -07:00
Preetha
80bc8e1ff6
Some tweaks to the documentation for a_record_limit
2018-03-08 11:23:07 -06:00
Pierre Souchay
8545b998ff
Updated documentation as requested by @preetapan
2018-03-08 18:02:40 +01:00
Paul Banks
34fe6f17e2
Notes on ACL token storage and permissions
2018-03-02 16:22:12 +00:00
Paul Banks
37e7e6e7a1
Notes on ACL token storage and permissions
2018-03-02 16:20:11 +00:00
Brian Shumate
de25aa17ee
Clarify encrypt key for WAN joined DCs
2018-03-02 10:41:09 -05:00
Jack Pearkes
39ed02cf0c
website: override automatic linking of list items for softlayer dc
...
This avoids a conflict with #datacenter later on the page. We're mixing
histroic manually specified anchors with generated anchors (via
redcarpet / middleman-hashicorp) so we have to manually override the
automatic generation here.
I was tempted to rewrite the old manual anchors to use the automatic
generation, but there is no way to maintain backwards compatibility,
so will leave that for a time when it is appropriate for us to break
links (or redirect them, etc).
Fixes #3916
2018-02-27 10:53:12 -08:00
Kyle Havlovitz
46745eb89b
Add enterprise default config section
2018-02-05 13:33:59 -08:00
James Phillips
0aa05cc5f0
Merge pull request #3855 from hashicorp/pr-3782-slackpad
...
Adds support for gRPC health checks.
2018-02-02 17:57:27 -08:00
James Phillips
73b729d22b
Adds documentation for gRPC health checks.
2018-02-02 17:53:49 -08:00
James Phillips
be14fa217c
Updates configuration docs for Azure VMSS support.
2018-01-19 16:37:22 -08:00
James Cunningham
ef99a7e4f6
fix dead telemetry prefix filter link
2018-01-05 15:19:33 -07:00
James Phillips
d694980ce3
Merge pull request #3765 from diptanu/f-agent-telemetry
...
Added telemetry around Catalog APIs
2018-01-04 18:56:26 -08:00
Bastien Gérard
71f5a145f7
fix in documentation
2017-12-31 09:48:16 +01:00
Diptanu Choudhury
fbf8441cbc
Updated docs
2017-12-21 20:37:13 -08:00
Diptanu Choudhury
66a4e2b4ba
Added docs
2017-12-21 16:58:39 -08:00
Yoann Fouquet
b7ca510142
Update documentation for "serf_lan_bind" and "serf_wan_bind"
...
These was spotted in issue #3709 .
These two configuration elements were renamed "serf_lan" and "serf_wan" in commit 12216583a1
Update documentation to fit the new code.
Note that flags "-serf-lan-bind" and "-serf-wan-bind" were not renamed.
2017-12-12 13:55:19 +01:00
James Phillips
532cafe0af
Adds enable_agent_tls_for_checks configuration option which allows ( #3661 )
...
HTTP health checks for services requiring 2-way TLS to be checked
using the agent's credentials.
2017-11-07 18:22:09 -08:00
Frank Schröder
3cb1cd3723
config: add -config-format option ( #3626 )
...
* config: refactor ReadPath(s) methods without side-effects
Return the sources instead of modifying the state.
* config: clean data dir before every test
* config: add tests for config-file and config-dir
* config: add -config-format option
Starting with Consul 1.0 all config files must have a '.json' or '.hcl'
extension to make it unambigous how the data should be parsed. Some
automation tools generate temporary files by appending a random string
to the generated file which obfuscates the extension and prevents the
file type detection.
This patch adds a -config-format option which can be used to override
the auto-detection behavior by forcing all config files or all files
within a config directory independent of their extension to be
interpreted as of this format.
Fixes #3620
2017-10-31 17:30:01 -05:00
Frank Schröder
56561523cf
vendor: update go-discover ( #3634 )
...
* vendor: update go-discover
Pull in providers:
* Aliyun (Alibaba Cloud)
* Digital Ocean
* OpenStack (os)
* Scaleway
* doc: use ... instead of xxx
* doc: strip trailing whitespace
* doc: add docs for aliyun, digitalocean, os and scaleway
* agent: fix test
2017-10-31 17:03:54 -05:00
James Phillips
3b170cf258
Changes "ip" to "IP".
2017-10-23 12:34:43 +02:00
Frank Schroeder
6517d7720a
Merge pull request #3600 from hashicorp/support-go-sockaddr-for-dns-recursors
...
DNS recursors can be added through go-sockaddr templates. Entries
are deduplicated while the order is maintained.
Originally proposed by @taylorchu
See #2932
2017-10-23 10:45:36 +02:00
Frank Schroeder
ffb497c107
Revert "doc: update docs for dns recursor go-sockaddr templates"
...
This reverts commit 6d4a57aedc55a4664537033c0c69edea20fd919b.
2017-10-23 10:08:35 +02:00
Frank Schroeder
816d4b762f
Revert "doc: address review comment"
...
This reverts commit 6ba9690e812089ba3dbda43f17e6b862201d16a8.
2017-10-23 10:08:35 +02:00
Frank Schroeder
fca7ba5494
Revert "Changes "ip" to "IP"."
...
This reverts commit dca5dcb68c573373536bdb4891d000eac0ece95b.
2017-10-23 10:08:35 +02:00
James Phillips
7a002aa047
Changes "ip" to "IP".
2017-10-23 08:01:25 +02:00
Frank Schroeder
6cbae33076
doc: address review comment
2017-10-23 08:01:25 +02:00
Frank Schroeder
19cc7db779
doc: update docs for dns recursor go-sockaddr templates
2017-10-23 08:01:25 +02:00
James Phillips
89f47d82fc
Tweaks watch docs.
2017-10-21 20:09:37 -07:00
preetapan
68d8cd16b7
Update watches.html.md
2017-10-21 20:59:47 -05:00
Preetha Appan
ec77b0700a
Small grammar correction
2017-10-21 20:55:15 -05:00
Preetha Appan
2c2e032eec
Improve HTTP handler documentation
2017-10-21 20:51:37 -05:00
Hadar Greinsmark
0c5f5e2821
Implement HTTP Watch handler ( #3413 )
...
Implement HTTP Watch handler
2017-10-21 20:39:09 -05:00
Frank Schroeder
efba4aae22
doc: address review comment
2017-10-20 20:06:33 +02:00
Frank Schroeder
41b4d3b2e2
doc: update docs for dns recursor go-sockaddr templates
2017-10-20 15:51:49 +02:00
Johan Brandhorst
3e0fd5ec2d
Fixed indentation in Script + Interval
...
Remove newlines which were causing the text to not be rendered under the intended bullet point.
2017-10-20 14:02:31 +02:00
Jay
dc903a4fb0
s/acesss/access ( #3593 )
...
Spell "access" correctly
2017-10-18 17:24:56 -07:00
Christopher "Chief" Najewicz
bcbf2b0ed5
Update docs for retry_join cloud discovery to include snippet around ( #3577 )
...
using HTTP_PROXY, HTTPS_PROXY and NO_PROXY env vars when needed
2017-10-17 16:05:44 -07:00
Kyle Havlovitz
d2b9ab2b4f
Clarify the docs around script check timeout behavior
2017-10-11 14:55:55 -07:00
Kyle Havlovitz
eea2bd2753
Kill check processes after the timeout is reached ( #3567 )
...
* Kill check processes after the timeout is reached
Kill the subprocess spawned by a script check once the timeout is reached. Previously Consul just marked the check critical and left the subprocess around.
Fixes #3565 .
* Set err to non-nil when timeout occurs
* Fix check timeout test
* Kill entire process subtree on check timeout
* Add a docs note about windows subprocess termination
2017-10-11 11:57:39 -07:00
Frank Schröder
9b2e3c2091
agent: add option to discard health output ( #3562 )
...
* agent: add option to discard health output
In high volatile environments consul will have checks with "noisy"
output which changes every time even though the status does not change.
Since the output is stored in the raft log every health check update
unblocks a blocking call on health checks since the raft index has
changed even though the status of the health checks may not have changed
at all. By discarding the output of the health checks the users can
choose a different tradeoff. Less visibility on why a check failed in
exchange for a reduced change rate on the raft log.
* agent: discard output also when adding a check
* agent: add test for discard check output
* agent: update docs
* go vet
* Adds discard_check_output to reloadable config table.
* Updates the change log.
2017-10-10 17:04:52 -07:00