Commit Graph

18383 Commits

Author SHA1 Message Date
boruszak f64f89540b /docs/k8s/operations 2022-09-14 17:29:21 -05:00
boruszak 62eda6c9eb /docs/k8s 2022-09-14 17:26:14 -05:00
boruszak 8100a5b67f /docs/k8s/upgrades 2022-09-14 17:21:47 -05:00
boruszak 41deca9acb /docs/k8s/crds 2022-09-14 17:20:05 -05:00
Kevin Wang 702c584c7f
2022-09-06 13:04:17 -04:00
Tu Nguyen 2ed84e5f89 revert links to learn 2022-09-06 08:35:01 -07:00
HashiBot f5be63a320
[Automated] Merged main into target: dev-portal 2022-09-01 08:02:17 -04:00
Luke Kysow 095934116e
Suppress "unbound variable" error. (#14424)
Without this change, you'd see this error:

```
./run-tests.sh: line 49: LAMBDA_TESTS_ENABLED: unbound variable
./run-tests.sh: line 49: LAMBDA_TESTS_ENABLED: unbound variable
```
2022-08-31 13:06:35 -07:00
malizz ad30192499
validate args before deleting proxy defaults (#14290)
* validate args before deleting proxy defaults

* add changelog

* validate name when normalizing proxy defaults

* add test for proxyConfigEntry

* add comments
2022-08-31 13:03:38 -07:00
Tu Nguyen 84d09cc2b9
Merge branch 'main' into dev-portal 2022-08-31 11:21:14 -07:00
Jared Kirschner 7ccf92c66b
Merge pull request #14426 from hashicorp/docs/fix-node-lookup-by-removing-tag
docs: node lookups don't support filtering on tag
2022-08-31 14:04:55 -04:00
Jared Kirschner 13aa1bcceb
docs: node lookups don't support filtering on tag 2022-08-31 13:58:23 -04:00
Tu Nguyen 42b57d6b9e
Merge pull request #14425 from hashicorp/update-get-started
Fix Get Started IA
2022-08-31 10:26:53 -07:00
Tu Nguyen bd765dfb57 Update get started section to include learn, rename overview -> install Consul 2022-08-31 10:25:29 -07:00
Chris S. Kim 0cea8aaa15
Merge pull request #14420 from hashicorp/docs/fix-peering-guide
docs: Fix code example in cluster peering
2022-08-31 12:26:21 -04:00
Chris S. Kim 851c280dfc Fix code example 2022-08-31 12:11:15 -04:00
Bryce Kalow ce039b7b58 updates previews to render Developer 2022-08-31 10:25:12 -05:00
Thomas Kula 58e44db5e2 Typo fix in service-splitter.mdx 2022-08-30 17:51:17 -07:00
David Yu 2d1352b02e
docs: re-organize service and node lookups for Consul Enterprise (#14389)
* docs: re-organize service and node lookups for Consul Enterprise

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-08-30 15:17:35 -07:00
Mike Morris ca75f6c936
ci: update backport-assistant to pick merge commit (#14408) 2022-08-30 15:44:06 -04:00
Jeff Boruszak 49453d4402 docs: Additional feedback from PR #12971
This commit incorporates additional feedback received related to
PR #12971.
2022-08-30 11:14:53 -07:00
Josh Roose 7bc220f34d
events compiled to JSON sentence structure (#13717) 2022-08-30 09:53:18 -07:00
Freddy f453ad692c
Merge pull request #14385 from hashicorp/snapshot-agent-path-addressing 2022-08-30 10:47:24 -06:00
Eric Haberkorn 06e7f3cadb
Finish up cluster peering failover (#14396) 2022-08-30 11:46:34 -04:00
Luke Kysow 63df49b440
Run integration tests locally using amd64 (#14365)
Locally, always run integration tests using amd64, even if running
on an arm mac. This ensures the architecture locally always matches
the CI/CD environment.

In addition:
* Use consul:local for envoy integration and upgrade tests. Previously,
  consul:local was used for upgrade tests and consul-dev for integration
  tests. I didn't see a reason to use separate images as it's more
  confusing.
* By default, disable the requirement that aws credentials are set.
  These are only needed for the lambda tests and make it so you
  can't run any tests locally, even if you're not running the
  lambda tests. Now they'll only run if the LAMBDA_TESTS_ENABLED
  env var is set.
* Split out the building of the Docker image for integration
  tests into its own target from `dev-docker`. This allows us to always
  use an amd64 image without messing up the `dev-docker` target.
* Add support for passing GO_TEST_FLAGs to `test-envoy-integ` target.
* Add a wait_for_leader function because tests were failing locally
  without it.
2022-08-29 16:13:49 -07:00
Freddy f27a9effca
Merge pull request #13496 from maxb/fix-kv_entries-metric 2022-08-29 15:35:11 -06:00
Freddy 69d99aa8c0
Merge pull request #14364 from hashicorp/peering/term-delete 2022-08-29 15:33:18 -06:00
Max Bowsher 3aefc4123f Merge branch 'main' into fix-kv_entries-metric 2022-08-29 22:22:10 +01:00
Chris S. Kim 7b267f5c01
Merge pull request #14371 from hashicorp/kisunji/peering-metrics-update
Adjust metrics reporting for peering tracker
2022-08-29 17:16:19 -04:00
Eric Haberkorn 13f8839924
Fix a breaking change to the API package introduced in #13835 (#14378)
`QueryDatacenterOptions` was renamed to `QueryFailoverOptions` without creating
an alias. This adds `QueryDatacenterOptions` back as an alias to
`QueryFailoverOptions` and marks it is deprecated.
2022-08-29 16:59:27 -04:00
Austin Workman bb26fd603f Add support for S3 path based addressing 2022-08-29 14:46:02 -06:00
Chris S. Kim e4a154c88e Add heartbeat timeout grace period when accounting for peering health 2022-08-29 16:32:26 -04:00
David Yu f5139f0c17
docs: Cluster peering with Transparent Proxy updates (#14369)
* Update Cluster Peering docs to show example with Transparent Proxy 
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-29 13:07:08 -07:00
David Yu 91be64887e
docs: Update Consul K8s release notes (#14379) 2022-08-29 11:34:39 -07:00
freddygv 850dc52f4f Add changelog entry 2022-08-29 12:31:13 -06:00
freddygv f790d84c04 Add validation to prevent switching dialing mode
This prevents unexpected changes to the output of ShouldDial, which
should never change unless a peering is deleted and recreated.
2022-08-29 12:31:13 -06:00
Eric Haberkorn 13992d5dc8
Update max_ejection_percent on outlier detection for peered clusters to 100% (#14373)
We can't trust health checks on peered services when service resolvers,
splitters and routers are used.
2022-08-29 13:46:41 -04:00
DanStough 680ff580a3 chore: add multi-arch docker build for testing 2022-08-29 12:01:31 -04:00
Chris S. Kim a58e943502 Rename test 2022-08-29 10:34:50 -04:00
Chris S. Kim 78bf8437d8 Fix test 2022-08-29 10:20:30 -04:00
Eric Haberkorn 2a370d456b
Update the structs and discovery chain for service resolver redirects to cluster peers. (#14366) 2022-08-29 09:51:32 -04:00
Tu Nguyen 9f489102ac
Merge pull request #14358 from hashicorp/replace-references-to-learn
Replace references to Learn
2022-08-28 19:42:08 -07:00
Tu Nguyen e895935be1 fix merge conflicts 2022-08-28 19:41:35 -07:00
Tu Nguyen 17898407ef Merge branch 'dev-portal' into replace-references-to-learn 2022-08-28 19:34:45 -07:00
Tu Nguyen 6ca0680f95
Merge pull request #14357 from hashicorp/replace-learn-links
Update Learn links in prep for DevDot
2022-08-28 19:34:06 -07:00
Tu Nguyen cb3cdfc8cc fix merge conflicts 2022-08-28 19:33:37 -07:00
Tu Nguyen ec1286af10
Merge pull request #14355 from hashicorp/consul-docs-ia-reshuffle 2022-08-28 14:31:23 -07:00
Chris S. Kim b1025f2dd9 Adjust metrics reporting for peering tracker 2022-08-26 17:34:17 -04:00
David Yu 5d1b26e973
docs: Release notes for Consul 1.12, 1.13 and Consul K8s 0.47.0 (#14352)
* consul 1.12, consul 1.13, and consul-k8s release notes

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-08-26 13:37:41 -07:00
freddygv 19f25fc3a5 Allow terminated peerings to be deleted
Peerings are terminated when a peer decides to delete the peering from
their end. Deleting a peering sends a termination message to the peer
and triggers them to mark the peering as terminated but does NOT delete
the peering itself. This is to prevent peerings from disappearing from
both sides just because one side deleted them.

Previously the Delete endpoint was skipping the deletion if the peering
was not marked as active. However, terminated peerings are also
inactive.

This PR makes some updates so that peerings marked as terminated can be
deleted by users.
2022-08-26 10:52:47 -06:00