Go to file
Matt Keeler 63c344727c
Envoy CLI bind addresses (#6107)
* Ensure we MapWalk the proxy config in the NodeService and ServiceNode structs

This gets rid of some json encoder errors in the catalog endpoints

* Allow passing explicit bind addresses to envoy

* Move map walking to the ConnectProxyConfig struct

Any place where this struct gets JSON encoded will benefit as opposed to having to implement it everywhere.

* Fail when a non-empty address is provided and not bindable

* camel case

* Update command/connect/envoy/envoy.go

Co-Authored-By: Paul Banks <banks@banksco.de>
2019-07-12 12:57:31 -04:00
.circleci increase go test parallelism, resource_class and run tests on release branch (#2) 2019-07-01 16:28:30 -04:00
.github Update questions issue template directing q's to the forum (#5957) 2019-06-12 09:07:44 -05:00
acl Fix to prevent allowing recursive KV deletions when we shouldn’t 2019-05-22 20:13:30 +00:00
agent Envoy CLI bind addresses (#6107) 2019-07-12 12:57:31 -04:00
api Fix some tests that I broke when refactoring the ConfigSnapshot (#6051) 2019-07-01 19:47:58 -04:00
bench
build-support ui: modify content path (#5950) 2019-06-26 11:43:30 -05:00
command Envoy CLI bind addresses (#6107) 2019-07-12 12:57:31 -04:00
connect tls: auto_encrypt enables automatic RPC cert provisioning for consul clients (#5597) 2019-06-27 22:22:07 +02:00
demo
ipaddr Ensure Consul is IPv6 compliant (#5468) 2019-06-04 10:02:38 -04:00
lib Allow for both snake_case and CamelCase for config entries written with 'consul config write'. (#6044) 2019-06-28 11:35:35 -05:00
logger
sdk Centralized Config CLI (#5731) 2019-04-30 16:27:16 -07:00
sentinel Update to use a consulent build tag instead of just ent (#5759) 2019-05-01 11:11:27 -04:00
service_os
snapshot
terraform
test tests: further reduce envoy integration test flakiness (#6112) 2019-07-12 11:12:56 -05:00
testrpc
tlsutil tls: auto_encrypt enables automatic RPC cert provisioning for consul clients (#5597) 2019-06-27 22:22:07 +02:00
types
ui-v2 ui: Gateway Addresses (#6075) 2019-07-05 09:07:25 +01:00
vendor Fix vendoring to not include our own code. 2019-06-22 09:00:17 -04:00
version Putting source back into Dev Mode 2019-07-08 16:30:03 +02:00
website website: link to beta changelog 2019-07-09 13:43:29 +02:00
.dockerignore
.gitattributes
.gitignore Remove old UI, option to use it, and its build processes 2019-04-12 09:02:27 -06:00
.travis.yml add release branch to travis (#5981) 2019-06-18 10:13:11 -04:00
CHANGELOG.md Update CHANGELOG.md 2019-07-09 15:41:32 +02:00
GNUmakefile `make test-docker` (#6059) 2019-07-04 10:22:59 -04:00
INTERNALS.md
LICENSE
NOTICE.md
README.md
Vagrantfile
go.mod agent: transfer leadership when establishLeadership fails (#5247) 2019-06-19 14:50:48 +02:00
go.sum agent: transfer leadership when establishLeadership fails (#5247) 2019-06-19 14:50:48 +02:00
main.go
main_test.go

README.md

Consul Build Status Join the chat at https://gitter.im/hashicorp-consul/Lobby

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

An extensive quick start is viewable on the Consul website:

https://www.consul.io/intro/getting-started/install.html

Documentation

Full, comprehensive documentation is viewable on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.