Go to file
Matt Keeler 0e0a4cef26
Add support for the Namespace HTTP API in the API Client (#6581)
2019-10-07 15:19:38 -04:00
.circleci ui: UI Release Merge (ui-staging merge) (#6527) 2019-09-30 14:47:49 +01:00
.github
acl
agent Prune Unhealthy Agents (#6571) 2019-10-04 16:10:02 -05:00
api Add support for the Namespace HTTP API in the API Client (#6581) 2019-10-07 15:19:38 -04:00
bench
build-support Use encoding/json instead of jsonpb even for protobuf types (#6572) 2019-10-02 15:32:15 -04:00
command Prune Unhealthy Agents (#6571) 2019-10-04 16:10:02 -05:00
connect connect: don't colon-hex-encode the AuthorityKeyId and SubjectKeyId fields in connect certs (#6492) 2019-09-23 12:52:35 -05:00
demo
ipaddr
lib connect: remove managed proxies (#6220) 2019-08-09 15:19:30 -04:00
logger
sdk Nil checks in the testWriter to prevent using a bad testing.TB (#6517) 2019-09-20 17:01:08 -04:00
sentinel
service_os
snapshot
terraform
test Expose HTTP-based paths through Connect proxy (#6446) 2019-09-25 20:55:52 -06:00
testrpc agent: updates to the agent token trigger anti-entropy full syncs (#6577) 2019-10-04 13:37:34 -05:00
tlsutil connect: don't colon-hex-encode the AuthorityKeyId and SubjectKeyId fields in connect certs (#6492) 2019-09-23 12:52:35 -05:00
types
ui-v2 ui: UI Release Merge (ui-staging merge) (#6527) 2019-09-30 14:47:49 +01:00
vendor Prune Unhealthy Agents (#6571) 2019-10-04 16:10:02 -05:00
version Release v1.6.1 2019-09-12 19:39:59 +00:00
website Prune Unhealthy Agents (#6571) 2019-10-04 16:10:02 -05:00
.dockerignore
.gitattributes
.gitignore connect: Support RSA keys in addition to ECDSA (#6055) 2019-07-30 17:47:39 -04:00
CHANGELOG.md Update CHANGELOG.md 2019-10-04 16:12:32 -05:00
GNUmakefile Use encoding/json instead of jsonpb even for protobuf types (#6572) 2019-10-02 15:32:15 -04:00
INTERNALS.md
LICENSE
NOTICE.md
README.md
Vagrantfile
go.mod Prune Unhealthy Agents (#6571) 2019-10-04 16:10:02 -05:00
go.sum Prune Unhealthy Agents (#6571) 2019-10-04 16:10:02 -05:00
main.go
main_test.go

README.md

Consul Build Status Join the chat at https://gitter.im/hashicorp-consul/Lobby

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

An extensive quick start is viewable on the Consul website:

https://www.consul.io/intro/getting-started/install.html

Documentation

Full, comprehensive documentation is viewable on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.