Go to file
Matt Keeler 78a6c5674d
Run make update-vendor and fixup various go.sum files
go mod tidy removes these lines because we have a replace directive
2020-02-11 09:20:49 -05:00
.circleci add envoy version 1.12.2 and 1.13.0 to the matrix (#7240) 2020-02-10 14:53:04 -05:00
.github Revert "Update question.md" (#7183) 2020-01-31 13:45:05 -06:00
acl Add managed service provider token (#7218) 2020-02-04 13:58:56 -07:00
agent Make the config entry and leaf cert cache types ns aware (#7256) 2020-02-10 19:26:01 -05:00
api Run make update-vendor and fixup various go.sum files 2020-02-11 09:20:49 -05:00
bench
build-support build: update to golang 1.12.16 (#7153) 2020-02-03 18:20:03 +01:00
command connect: add validations around intermediate cert ttl (#7213) 2020-02-11 00:05:49 +01:00
connect Allow users to configure either unstructured or JSON logging (#7130) 2020-01-28 17:50:41 -06:00
contributing Add contributing dir with Config file checklist (#7017) 2020-01-14 12:24:03 +00:00
demo
ipaddr Ensure Consul is IPv6 compliant (#5468) 2019-06-04 10:02:38 -04:00
lib ACL enforcement for the agent/health/services endpoints (#7191) 2020-01-31 11:16:24 -05:00
logging agent: differentiate wan vs lan loggers in memberlist and serf (#7205) 2020-02-05 09:52:43 -06:00
sdk Testing updates to support namespaced testing of the agent/xds… (#7185) 2020-02-03 09:26:47 -05:00
sentinel Allow users to configure either unstructured or JSON logging (#7130) 2020-01-28 17:50:41 -06:00
service_os
snapshot agent: ensure that we always use the same settings for msgpack (#7245) 2020-02-07 15:50:24 -06:00
terraform
test add envoy version 1.12.2 and 1.13.0 to the matrix (#7240) 2020-02-10 14:53:04 -05:00
testrpc connect: check if intermediate cert needs to be renewed. (#6835) 2020-01-17 23:27:13 +01:00
tlsutil Allow users to configure either unstructured or JSON logging (#7130) 2020-01-28 17:50:41 -06:00
types
ui-v2 ui: oss don't ever POST/PUT Namespaces when writing data (#7238) 2020-02-07 15:50:50 +00:00
vendor make the TestRPC_RPCMaxConnsPerClient test less flaky (#7255) 2020-02-10 15:13:53 -06:00
version Release v1.7.0-beta4 2020-01-31 21:38:38 +00:00
website Fix broken link to consul-aws guide on Learn 2020-02-10 12:25:54 -08:00
.dockerignore
.gitattributes
.gitignore .gitignore: cut IDE-specific entries, cleanup (#7083) 2020-01-17 11:06:33 -08:00
.hashibot.hcl hashibot: disable most of hashibot (#7139) 2020-01-27 13:57:00 +01:00
CHANGELOG.md changelog: move "calls" outside code backticks 2020-02-10 14:10:42 -08:00
GNUmakefile add 'make go-mod-tidy' to serially run tidy on all submodules in the correct order (#7179) 2020-02-03 10:12:26 -06:00
INTERNALS.md Add contributing dir with Config file checklist (#7017) 2020-01-14 12:24:03 +00:00
LICENSE
NOTICE.md
README.md Merge pull request #7102 from hashicorp/david-yu-patch-2 2020-01-22 08:57:10 -08:00
Vagrantfile
codecov.yml coverage: disable comment and project status, set informational mode (#6954) 2019-12-17 11:51:52 -05:00
go.mod Bump `api` and `sdk` module versions 2020-02-10 20:08:47 -05:00
go.sum Run make update-vendor and fixup various go.sum files 2020-02-11 09:20:49 -05:00
main.go
main_test.go

README.md

Consul CircleCI Discuss

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Segmentation/Service Mesh - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is viewable on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.