Go to file
Freddy 7d48383041
Avoid panic on concurrent writes to cached service config map (#10647)
If multiple instances of a service are co-located on the same node then
their proxies will all share a cache entry for their resolved service
configuration. This is because the cache key contains the name of the
watched service but does not take into account the ID of the watching
proxies.

This means that there will be multiple agent service manager watches
that can wake up on the same cache update. These watchers then
concurrently modify the value in the cache when merging the resolved
config into the local proxy definitions.

To avoid this concurrent map write we will only delete the key from
opaque config in the local proxy definition after the merge, rather
than from the cached value before the merge.
2021-07-20 10:09:29 -06:00
.changelog Avoid panic on concurrent writes to cached service config map (#10647) 2021-07-20 10:09:29 -06:00
.circleci Merge pull request #10515 from hashicorp/dnephin/fix-arm32-atomic-aligment 2021-06-30 16:40:20 -04:00
.github Update references to the main branch 2021-06-29 17:17:38 -04:00
acl
agent Avoid panic on concurrent writes to cached service config map (#10647) 2021-07-20 10:09:29 -06:00
api acls: Show `AuthMethodNamespace` when reading/listing ACL token meta (#10598) 2021-07-15 10:38:52 -07:00
bench
build-support Merge pull request #10353 from hashicorp/dnephin/prune-build-scripts-1 2021-07-16 14:27:00 -04:00
command acls: Show `AuthMethodNamespace` when reading/listing ACL token meta (#10598) 2021-07-15 10:38:52 -07:00
connect Merge pull request #10560 from jkirschner-hashicorp/change-sane-to-reasonable 2021-07-06 11:46:04 -04:00
contributing contrib: add first draft of agent configuration docs 2021-07-14 16:48:15 -04:00
demo
grafana add readme outlining how to edit and publish 2021-01-12 14:47:11 -08:00
internal state: add a regression test for state store schema 2021-01-15 18:49:55 -05:00
ipaddr
lib consul: fix data race in leader CA tests 2021-07-14 18:58:15 -04:00
logging improve monitor performance (#10368) 2021-06-15 12:05:52 -04:00
proto http: add an X-Consul-Query-Backend header to responses 2021-06-28 16:44:58 -04:00
sdk cli/sdk: Allow applying redirect-traffic rules in a provided Linux namespace (#10564) 2021-07-13 10:05:48 -06:00
sentinel
service_os
snapshot testing: skip slow tests with -short 2020-12-07 13:42:55 -05:00
terraform
test hcs-1936: Prepare for adding license auto-retrieval to auto-config in enterprise 2021-05-24 13:20:30 -04:00
testrpc
tlsutil rename GRPC->XDS where appropriate 2021-07-09 12:17:45 -04:00
types
ui ui: Add tests for topology metrics stats (#10600) 2021-07-20 11:09:15 -04:00
vendor Update serf 2021-07-14 18:58:16 -04:00
version Fix strings.Replace->strings.ReplaceAll 2021-05-27 16:57:10 -07:00
website website: Fix circular redirect with TLS on existing cluster 2021-07-20 08:41:43 -07:00
.dockerignore
.gitattributes
.gitignore website: remove netlify artifacts and port missing redirects over to new format (#9601) 2021-01-21 10:16:17 -05:00
.golangci.yml xds: remove deprecated usages of xDS (#9602) 2021-02-22 15:00:15 -06:00
CHANGELOG.md Merge pull request #10560 from jkirschner-hashicorp/change-sane-to-reasonable 2021-07-06 11:46:04 -04:00
GNUmakefile Merge pull request #10353 from hashicorp/dnephin/prune-build-scripts-1 2021-07-16 14:27:00 -04:00
INTERNALS.md
LICENSE
NOTICE.md
README.md Update references to the main branch 2021-06-29 17:17:38 -04:00
Vagrantfile
codecov.yml
go.mod Update serf 2021-07-14 18:58:16 -04:00
go.sum Update serf 2021-07-14 18:58:16 -04:00
main.go cmd: introduce a shim to expose Stdout/Stderr writers 2021-06-02 16:51:34 -04:00
main_test.go
package-lock.json

README.md

Consul CircleCI Discuss

Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.

Consul provides several key features:

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Mesh/Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.