Go to file
Derek Menteer 19f9de2224
Backport of Add grpc keepalive configuration into release/1.16.x (#19339) (#19346)
Add grpc keepalive configuration. (#19339)

Prior to the introduction of this configuration, grpc keepalive messages were
sent after 2 hours of inactivity on the stream. This posed issues in various
scenarios where the server-side xds connection balancing was unaware that envoy
instances were uncleanly killed / force-closed, since the connections would
only be cleaned up after ~5 minutes of TCP timeouts occurred. Setting this
config to a 30 second interval with a 20 second timeout ensures that at most,
it should take up to 50 seconds for a dead xds connection to be closed.
2023-10-24 08:52:05 -05:00
.changelog Backport of Add grpc keepalive configuration into release/1.16.x (#19339) (#19346) 2023-10-24 08:52:05 -05:00
.github Backport of skip envoy version check in ci into release/1.16.x (#19316) 2023-10-20 11:47:23 -07:00
.release [BACKPORT] 1.16.x manual backport of OSS->CE branch (#18549) 2023-08-23 11:53:44 -05:00
acl [BACKPORT] 1.16.x manual backport of OSS->CE branch (#18549) 2023-08-23 11:53:44 -05:00
agent Backport of Add grpc keepalive configuration into release/1.16.x (#19339) (#19346) 2023-10-24 08:52:05 -05:00
api Backport of fix: allow snake case keys for ip based rate limit config entry into release/1.16.x (#19292) 2023-10-19 16:28:53 +00:00
bench
build-support Backport of [NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17.0 into release/1.16.x (#19234) 2023-10-17 00:12:24 +00:00
command NET-4519 Collecting journald logs in "consul debug" bundle (#18797) (#18884) 2023-09-19 17:37:11 +05:30
connect Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00
contributing Move contributing to docs 2021-08-30 16:17:09 -04:00
docs [BACKPORT] 1.16.x manual backport of OSS->CE branch (#18549) 2023-08-23 11:53:44 -05:00
envoyextensions release/1.16.x - Update supported Envoy versions (#19273) 2023-10-19 14:45:33 -07:00
grafana
internal [BACKPORT] 1.16.x manual backport of OSS->CE branch (#18549) 2023-08-23 11:53:44 -05:00
ipaddr Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00
lib [BACKPORT] 1.16.x manual backport of OSS->CE branch (#18549) 2023-08-23 11:53:44 -05:00
logging Backport of Net 3181 consul gh issue 15709 allow log file naming like nomad - fix bug into release/1.16.x (#18642) 2023-09-04 17:09:59 +05:30
proto Revert "Backport of NET-5530 Support response header modifiers on http-route config entry into release/1.16.x" (#18770) 2023-09-12 19:58:24 +00:00
proto-public Backport of [NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17.0 into release/1.16.x (#19234) 2023-10-17 00:12:24 +00:00
sdk Backport of [NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17.0 into release/1.16.x (#19234) 2023-10-17 00:12:24 +00:00
sentinel [BACKPORT] 1.16.x manual backport of OSS->CE branch (#18549) 2023-08-23 11:53:44 -05:00
service_os Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00
snapshot snapshot: some improvments to the snapshot process (#17236) 2023-05-09 15:28:52 -04:00
test Backport of [NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17.0 into release/1.16.x (#19234) 2023-10-17 00:12:24 +00:00
testrpc Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00
tlsutil update tests for fips (#17592) 2023-06-07 10:57:56 -05:00
tools/internal-grpc-proxy Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00
troubleshoot Backport of [NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17.0 into release/1.16.x (#19234) 2023-10-17 00:12:24 +00:00
types Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00
ui Backport of feat: copy edits for built-in policy alert into release/1.16.x (#18751) 2023-09-11 21:30:14 +00:00
version Add changelog and put back replace statements (#18914) 2023-09-20 15:53:23 +00:00
website Backport of Add grpc keepalive configuration into release/1.16.x (#19339) (#19346) 2023-10-24 08:52:05 -05:00
.copywrite.hcl Remove UI brand-loader copyright headers as they do not render appropriately (#16835) 2023-03-31 11:29:19 -04:00
.dockerignore
.gitattributes
.gitignore Various bits of cleanup detected when using Go Workspaces (#17462) 2023-06-05 16:08:39 -04:00
.golangci.yml [BACKPORT] 1.16.x manual backport of OSS->CE branch (#18549) 2023-08-23 11:53:44 -05:00
CHANGELOG.md Add changelog and put back replace statements (#18914) 2023-09-20 15:53:23 +00:00
Dockerfile Backport of Bump Alpine to 3.18 into release/1.16.x (#17725) 2023-06-14 01:17:02 +00:00
GNUmakefile Show latest config in /v1/agent/self (#18716) 2023-09-12 09:38:17 -04:00
LICENSE [COMPLIANCE] Update MPL-2.0 LICENSE (#14964) 2022-11-09 12:24:14 -06:00
NOTICE.md
README.md manual backport of #18301 (#18497) 2023-08-17 02:22:48 +00:00
buf.work.yaml Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00
fixup_acl_move.sh Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00
go.mod Backport of [NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17.0 into release/1.16.x (#19234) 2023-10-17 00:12:24 +00:00
go.sum Backport of [NET-5944] security: Update Go version to 1.20.10 and `x/net` to 0.17.0 into release/1.16.x (#19234) 2023-10-17 00:12:24 +00:00
main.go Copyright headers for missing files/folders (#16708) 2023-03-28 18:48:58 -04:00

README.md

Consul logo Consul

License: BUSL-1.1 Docker Pulls Go Report Card

Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.

Consul provides several key features:

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Mesh - Consul Service Mesh enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections with Transparent Proxy.

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Dynamic App Configuration - An HTTP API that allows users to store indexed objects, like configuration parameters and application metadata, within Consul.

Consul runs on Linux, macOS, FreeBSD, Solaris, and Windows and includes an optional browser based UI. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website: https://consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance. For contributions specifically to the browser based UI, please refer to the UI's README.md for guidance.