Go to file
Paul Banks 42296292a4
Allow raft TrailingLogs to be configured. (#6186)
This fixes pathological cases where the write throughput and snapshot size are both so large that more than 10k log entries are written in the time it takes to restore the snapshot from disk. In this case followers that restart can never catch up with leader replication again and enter a loop of constantly downloading a full snapshot and restoring it only to find that snapshot is already out of date and the leader has truncated its logs so a new snapshot is sent etc.

In general if you need to adjust this, you are probably abusing Consul for purposes outside its design envelope and should reconsider your usage to reduce data size and/or write volume.
2019-07-23 15:19:57 +01:00
.circleci enable circleci go tests for forks and reorganize jobs (#6191) 2019-07-22 18:08:54 -04:00
.github Update questions issue template directing q's to the forum (#5957) 2019-06-12 09:07:44 -05:00
acl Fix to prevent allowing recursive KV deletions when we shouldn’t 2019-05-22 20:13:30 +00:00
agent Allow raft TrailingLogs to be configured. (#6186) 2019-07-23 15:19:57 +01:00
api More flaky test fixes (#6151) 2019-07-17 09:33:38 -06:00
bench
build-support ui: modify content path (#5950) 2019-06-26 11:43:30 -05:00
command Simplified code in various places (#6176) 2019-07-20 09:37:19 -04:00
connect Flaky test overhaul (#6100) 2019-07-12 09:52:26 -06:00
demo
ipaddr Ensure Consul is IPv6 compliant (#5468) 2019-06-04 10:02:38 -04:00
lib Simplified code in various places (#6176) 2019-07-20 09:37:19 -04:00
logger log rotation: limit count of rotated log files (#5831) 2019-07-19 15:36:34 -06:00
sdk Simplified code in various places (#6176) 2019-07-20 09:37:19 -04:00
sentinel Update to use a consulent build tag instead of just ent (#5759) 2019-05-01 11:11:27 -04:00
service_os
snapshot Move internal/ to sdk/ (#5568) 2019-03-27 08:54:56 -04:00
terraform terraform: remove modules in repo (#5085) 2019-04-04 16:31:43 -07:00
test tls: auto_encrypt enables automatic RPC cert provisioning for consul clients (#5597) 2019-06-27 22:22:07 +02:00
testrpc Move internal/ to sdk/ (#5568) 2019-03-27 08:54:56 -04:00
tlsutil tls: auto_encrypt enables automatic RPC cert provisioning for consul clients (#5597) 2019-06-27 22:22:07 +02:00
types
ui-v2 ui: Force upgrades lodash and lodash submodules: (#6137) 2019-07-15 14:48:51 +01:00
vendor Fix vendoring to not include our own code. 2019-06-22 09:00:17 -04:00
version Putting source back into Dev Mode 2019-06-27 23:27:07 +00:00
website Allow raft TrailingLogs to be configured. (#6186) 2019-07-23 15:19:57 +01:00
.dockerignore
.gitattributes
.gitignore Remove old UI, option to use it, and its build processes 2019-04-12 09:02:27 -06:00
.travis.yml add release branch to travis (#5981) 2019-06-18 10:13:11 -04:00
CHANGELOG.md update changelog 2019-07-17 14:08:17 -05:00
GNUmakefile Connect: allow configuring Envoy for L7 Observability (#5558) 2019-04-29 17:27:57 +01:00
INTERNALS.md
LICENSE
NOTICE.md
README.md Contribution guide (#4704) 2018-10-05 09:06:40 -07:00
Vagrantfile
go.mod agent: transfer leadership when establishLeadership fails (#5247) 2019-06-19 14:50:48 +02:00
go.sum agent: transfer leadership when establishLeadership fails (#5247) 2019-06-19 14:50:48 +02:00
main.go
main_test.go

README.md

Consul Build Status Join the chat at https://gitter.im/hashicorp-consul/Lobby

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

An extensive quick start is viewable on the Consul website:

https://www.consul.io/intro/getting-started/install.html

Documentation

Full, comprehensive documentation is viewable on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.