Commit Graph

18898 Commits

Author SHA1 Message Date
Luke Kysow 12ac96c356
Remove terminal colouring from test output so it is (#14810)
more readable in CI.

```
Running primary verification step for case-ingress-gateway-multiple-services...
�[34;1mverify.bats
�[0m�[1G   ingress proxy admin is up on :20000�[K�[75G 1/12�[2G�[1G ✓ ingress proxy admin is up on :20000�[K
�[0m�[1G   s1 proxy admin is up on :19000�[K�[75G 2/12�[2G�[1G ✓ s1 proxy admin is up on :19000�[K
�[0m�[1G   s2 proxy admin is up on :19001�[K�[75G 3/12�[2G�[1G ✓ s2 proxy admin is up on :19001�[K
�[0m�[1G   s1 proxy listener should be up and have right cert�[K�[75G 4/12�[2G�[1G ✓ s1 proxy listener should be up and have right cert�[K
�[0m�[1G   s2 proxy listener should be up and have right cert�[K�[75G 5/12�[2G�[1G ✓ s2 proxy listener should be up and have right cert�[K
�[0m�[1G   ingress-gateway should have healthy endpoints for s1�[K�[75G 6/12�[2G�[31;1m�[1G ✗ ingress-gateway should have healthy endpoints for s1�[K
�[0m�[31;22m   (from function `assert_upstream_has_endpoints_in_status' in file /workdir/primary/bats/helpers.bash, line 385,
```

versus

```
Running primary verification step for case-ingress-gateway-multiple-services...
1..12
ok 1 ingress proxy admin is up on :20000
ok 2 s1 proxy admin is up on :19000
ok 3 s2 proxy admin is up on :19001
ok 4 s1 proxy listener should be up and have right cert
ok 5 s2 proxy listener should be up and have right cert
not ok 6 ingress-gateway should have healthy endpoints for s1
not ok 7 s1 proxy should have been configured with max_connections in services
ok 8 ingress-gateway should have healthy endpoints for s2
```
2022-10-04 08:35:19 -07:00
boruszak 8321c88480 More group fix attempts 2022-10-04 10:20:14 -05:00
boruszak 40f1070271 Tabs fix again 2022-10-04 10:00:53 -05:00
boruszak a4e9427883 Tab groups fix 2022-10-04 09:49:10 -05:00
trujillo-adam e3a8a35358
Apply suggestions from code review
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-10-04 07:39:37 -07:00
boruszak dc3da3882d Minor fixes 2022-10-04 09:31:31 -05:00
boruszak b07c78d9da Installation instructions moved 2022-10-04 09:29:16 -05:00
Jeff Boruszak edde48b3e4
Apply suggestions from code review
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-10-04 09:26:07 -05:00
boruszak 960555233f Move Installation instructions 2022-10-04 09:07:37 -05:00
vanphan24 cdc3a9d2fc
first commit with overview page (#14827)
* Why Choose Consul

Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-10-03 19:32:43 -07:00
Evan Culver a1250b49c8
ci: Fix changelog-checker GHA workflow (#14842) 2022-10-03 16:49:24 -07:00
cskh 1b587e7d13
fix flaky integration test (#14843) 2022-10-03 16:55:05 -04:00
boruszak 21e9341e1b PeerName changed to Peer - fix 2022-10-03 14:18:59 -05:00
boruszak 19a9a56580 Tutorial links 2022-10-03 14:08:57 -05:00
Jeff Boruszak d42f7214f7
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 14:03:00 -05:00
Jeff Boruszak c820ef645f
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 13:59:41 -05:00
Freddy 89141256c7
Merge pull request #14734 from hashicorp/NET-643-update-mesh-gateway-envoy-config-for-inbound-peering-control-plane-traffic 2022-10-03 12:54:11 -06:00
Jeff Boruszak 3fc915aca2
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 13:54:08 -05:00
freddygv 0d61aa5d37 Update xds generation for peering over mesh gws
This commit adds the xDS resources needed for INBOUND traffic from peer
clusters:

- 1 filter chain for all inbound peering requests.
- 1 cluster for all inbound peering requests.
- 1 endpoint per voting server with the gRPC TLS port configured.

There is one filter chain and cluster because unlike with WAN
federation, peer clusters will not attempt to dial individual servers.
Peer clusters will only dial the local mesh gateway addresses.
2022-10-03 12:42:27 -06:00
Freddy 7ea726ed1f
Merge pull request #14694 from hashicorp/peering/mgw-addrs 2022-10-03 12:35:11 -06:00
Jeff Boruszak f81db7992d
Update website/content/docs/connect/dataplane/consul-dataplane.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-10-03 12:55:55 -05:00
boruszak 908ef42f41 Installation isntructions 2022-10-03 12:52:07 -05:00
freddygv 2c5caec97c Share mgw addrs in peering stream if needed
This commit adds handling so that the replication stream considers
whether the user intends to peer through mesh gateways.

The subscription will return server or mesh gateway addresses depending
on the mesh configuration setting. These watches can be updated at
runtime by modifying the mesh config entry.
2022-10-03 11:42:20 -06:00
freddygv 17463472b7 Return mesh gateway addrs if peering through mgw 2022-10-03 11:35:10 -06:00
Jeff Boruszak a637702413
Apply suggestions from code review 2022-10-03 11:38:43 -05:00
Jeff Boruszak fe82906dfb
Update website/content/docs/connect/cluster-peering/index.mdx 2022-10-03 11:36:48 -05:00
Luke Kysow e30f4c3a8a
Update tech-specs.mdx (#14840) 2022-10-03 09:21:42 -07:00
Jeff Boruszak 2dde03f0a3
Update website/content/docs/connect/dataplane/index.mdx
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 11:16:00 -05:00
boruszak 57bf426dec Removed external server constraint 2022-10-03 11:15:12 -05:00
boruszak 7fab79569c proxy default behavior constraint 2022-10-03 11:14:34 -05:00
Jeff Boruszak 60eef6a22d
Apply suggestions from code review
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:58:43 -05:00
Jeff Boruszak 319758864e
Update website/content/docs/connect/dataplane/index.mdx
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:51:24 -05:00
chappie f49332a151
Merge pull request #14811 from hashicorp/chappie/dns
Add DNS gRPC proxying support
2022-10-03 08:02:48 -07:00
trujillo-adam 52a28d51c5 applied feedback from review 2022-10-01 13:09:36 -07:00
Chris Chapman 1b24aafb23
Making suggested comments 2022-09-30 15:03:33 -07:00
Chris Chapman 399fafb679
Making suggested changes 2022-09-30 14:51:12 -07:00
boruszak 9e9e31be65 Dynamic routing clarifications 2022-09-30 15:32:43 -05:00
David Yu 1caafc1f5b
updated 0.49.x helm docs (#14824) 2022-09-30 12:17:16 -07:00
boruszak b5902ee459 service-resolver alignment 2022-09-30 14:00:55 -05:00
Jeff Boruszak 167b935bc4
Apply suggestions from code review
Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
2022-09-30 14:00:37 -05:00
Curt Bushko f00aa7b045
Add OpenShift CNI to list of install options for kubernetes (#14793) 2022-09-30 11:52:15 -07:00
Michael Klein 1832806fca
fix link back to hcp not showing up (#14812) 2022-09-30 20:32:02 +02:00
Chris Chapman 8e44a8c644
Update comment 2022-09-30 09:35:01 -07:00
David Yu dc3d2d00dc
docs: admin partition docs improvements (#14774)
* docs: Update admin partitions versions and add requirement for unique `global.name`

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-09-30 09:13:44 -07:00
DanStough 16fe27c9b8 chore: fix flakey scada provider test 2022-09-30 11:56:40 -04:00
nrichu-hcp 0884e08304
Merge pull request #14807 from hashicorp/docs/nick-release-notes
docs: Consul K8s 0.49.x release notes
2022-09-30 11:39:35 -04:00
nrichu-hcp a045c46aca
Update website/content/docs/release-notes/consul-k8s/v0_49_x.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-09-30 11:38:36 -04:00
nrichu-hcp c560999df5
Update website/content/docs/release-notes/consul-k8s/v0_49_x.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-09-30 11:38:29 -04:00
nrichu-hcp c850a1d028
Update website/content/docs/release-notes/consul-k8s/v0_49_x.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-09-30 11:38:20 -04:00
nrichu-hcp 913a5a9d24
Update website/content/docs/release-notes/consul-k8s/v0_49_x.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-09-30 11:38:10 -04:00