Find a file
R.B. Boyer 4626b65124
xds: allow for peered upstreams to use tagged addresses that are hostnames (#13422)
Mesh gateways can use hostnames in their tagged addresses (#7999). This is useful
if you were to expose a mesh gateway using a cloud networking load balancer appliance
that gives you a DNS name but no reliable static IPs.

Envoy cannot accept hostnames via EDS and those must be configured using CDS.
There was already logic when configuring gateways in other locations in the code, but
given the illusions in play for peering the downstream of a peered service wasn't aware
that it should be doing that.

Also:
- ensuring that we always try to use wan-like addresses to cross peer boundaries.
2022-06-10 16:11:40 -05:00
.changelog Add changelog note 2022-06-10 12:05:05 -07:00
.circleci ui: Disable licensing tab if the UI is running via HCP (#12771) 2022-06-09 18:15:52 +01:00
.github chore(ci): fix false positive metrics check 2022-06-09 17:49:16 -04:00
.release [CI-only] Support UBI images (#13232) 2022-05-26 09:49:47 -07:00
acl Add SourcePeer fields to relevant Intentions types (#13390) 2022-06-08 13:24:10 -04:00
agent xds: allow for peered upstreams to use tagged addresses that are hostnames (#13422) 2022-06-10 16:11:40 -05:00
api peering: rename initiate to establish in the context of the APIs (#13419) 2022-06-10 11:10:46 -05:00
bench
build-support UDP check for service stanza #12221 (#12722) 2022-06-06 15:13:19 -04:00
command [OSS] consul connect envoy command changes for agentless (#13361) 2022-06-06 09:23:08 -07:00
connect Fix race during proxy closing (#13283) 2022-05-27 16:52:03 -04:00
contributing
docs Add some docs on pprof usage (#12551) 2022-05-09 14:15:21 -06:00
grafana
internal internal: port RPC glue changes from Enterprise (#13034) 2022-05-11 15:03:07 -07:00
ipaddr
lib Configure upstream TLS context with peer root certs (#13321) 2022-06-01 15:53:52 -06:00
logging Add support for merge-central-config query param (#13001) 2022-05-25 13:20:17 -07:00
proto peering: rename initiate to establish in the context of the APIs (#13419) 2022-06-10 11:10:46 -05:00
proto-public Specify go_package explicitly 2022-05-24 10:22:53 -07:00
sdk add general runstep test helper instead of copying it all over the place (#13013) 2022-05-10 15:25:51 -05:00
sentinel
service_os
snapshot
test peering: rename initiate to establish in the context of the APIs (#13419) 2022-06-10 11:10:46 -05:00
testrpc peering: initial sync (#12842) 2022-04-21 17:34:40 -05:00
tlsutil Update go version to 1.18.1 2022-04-18 11:41:10 -04:00
types
ui ui: Disable licensing tab if the UI is running via HCP (#12771) 2022-06-09 18:15:52 +01:00
version update main to reflect 1.13.0-dev (#13192) 2022-05-25 09:06:36 -07:00
website Add dns node lookup support in partitions 2022-06-10 11:23:51 -07:00
.dockerignore
.gitattributes
.gitignore changelog: snapshot-agent acl token fix for CLI and ENV 2022-04-25 16:46:55 -04:00
.golangci.yml Fix proto lint errors after version bump 2022-05-24 18:44:54 -07:00
CHANGELOG.md Add latest changelog entries (#13363) 2022-06-06 11:52:13 -07:00
Dockerfile [CI-only] Support UBI images (#13232) 2022-05-26 09:49:47 -07:00
fixup_acl_move.sh
GNUmakefile Add isLeader metric to track if a server is a leader (#13304) 2022-06-03 13:07:37 -04:00
go.mod Update go-grpc/grpc to resolve conection memory leak 2022-06-08 11:29:29 +01:00
go.sum Update go-grpc/grpc to resolve conection memory leak 2022-06-08 11:29:29 +01:00
LICENSE
main.go Refactor some functions for better enterprise use (#13280) 2022-05-30 09:46:55 -04:00
NOTICE.md
README.md
Vagrantfile

Consul logo Consul

Docker Pulls Go Report Card

Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.

Consul provides several key features:

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Mesh/Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

Consul runs on Linux, macOS, FreeBSD, Solaris, and Windows and includes an optional browser based UI. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance. For contributions specifically to the browser based UI, please refer to the UI's README.md for guidance.