Go to file
Jeff Escalante 7a43926fa4 upgrade to stylelint release 2020-05-21 14:50:45 -04:00
.circleci Make envoy integration tests a `go test` suite (#7842) 2020-05-19 14:00:00 -04:00
.github Adding redirect to discuss, moving question to old (#7732) 2020-05-01 13:02:15 -04:00
acl
agent Standardize support for Tagged and BindAddresses in Ingress Gateways (#7924) 2020-05-21 09:08:12 -05:00
api Add unconvert linter 2020-05-12 13:47:25 -04:00
bench
build-support ui: Upgrade to node 12 LTS (#7248) 2020-05-12 17:13:53 +00:00
command Standardize support for Tagged and BindAddresses in Ingress Gateways (#7924) 2020-05-21 09:08:12 -05:00
connect
contributing
demo
internal/go-sso Add unconvert linter 2020-05-12 13:47:25 -04:00
ipaddr
lib Filter wildcard gateway services to match listener protocol 2020-05-06 15:06:13 -05:00
logging Merge pull request #7469 from djmgit/log_dir 2020-05-12 14:26:52 -04:00
sdk sdk: extracting testutil.RequireErrorContains from various places it was duplicated (#7753) 2020-05-01 11:56:34 -05:00
sentinel
service_os
snapshot
terraform
test Make envoy integration tests a `go test` suite (#7842) 2020-05-19 14:00:00 -04:00
testrpc
tlsutil rpc: oss changes for network area connection pooling (#7735) 2020-04-30 22:12:17 +02:00
types
ui-v2 UI Release Merge (1.8-beta-2: ui-staging merge) (#7919) 2020-05-19 17:18:04 +01:00
vendor acl: add auth method for JWTs (#7846) 2020-05-11 20:59:29 -05:00
version
website upgrade to stylelint release 2020-05-21 14:50:45 -04:00
.dockerignore
.gitattributes
.gitignore
.golangci.yml Add unconvert linter 2020-05-12 13:47:25 -04:00
.hashibot.hcl
CHANGELOG.md Update CHANGELOG.md 2020-05-18 11:30:41 -05:00
GNUmakefile Make envoy integration tests a `go test` suite (#7842) 2020-05-19 14:00:00 -04:00
INTERNALS.md
LICENSE
NOTICE.md
README.md
Vagrantfile
codecov.yml ui: Test Coverage Reporting (#7027) 2020-05-12 17:13:50 +00:00
go.mod acl: add auth method for JWTs (#7846) 2020-05-11 20:59:29 -05:00
go.sum acl: add auth method for JWTs (#7846) 2020-05-11 20:59:29 -05:00
main.go
main_test.go

README.md

Consul CircleCI Discuss

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Service Segmentation/Service Mesh - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.