Go to file
R.B. Boyer 95d08b8ea8 update changelog 2019-08-01 22:45:01 -05:00
.circleci Merge Consul OSS branch master at commit b3541c4f34d43ab92fe52256420759f17ea0ed73 2019-07-26 10:34:24 -05:00
.github
acl
agent connect: simplify the compiled discovery chain data structures (#6242) 2019-08-01 22:44:05 -05:00
api connect: allow L7 routers to match on http methods (#6164) 2019-07-23 20:56:39 -05:00
bench
build-support ui: modify content path (#5950) 2019-06-26 11:43:30 -05:00
command Update default gossip encryption key size to 32 bytes 2019-07-30 09:45:41 -06:00
connect connect: Support RSA keys in addition to ECDSA (#6055) 2019-07-30 17:47:39 -04:00
demo
ipaddr
lib resolve circleci config conflicts 2019-07-23 20:18:36 -04:00
logger log rotation: limit count of rotated log files (#5831) 2019-07-19 15:36:34 -06:00
sdk resolve circleci config conflicts 2019-07-23 20:18:36 -04:00
sentinel
service_os
snapshot
terraform
test connect: reconcile how upstream configuration works with discovery chains (#6225) 2019-08-01 22:03:34 -05:00
testrpc
tlsutil connect: Support RSA keys in addition to ECDSA (#6055) 2019-07-30 17:47:39 -04:00
types
ui-v2 Merge remote-tracking branch 'origin/master' into release/1-6 2019-07-15 10:02:34 -07:00
vendor Revert "connect: support AWS PCA as a CA provider" (#6251) 2019-07-31 09:08:10 -04:00
version Release v1.6.0-beta3 2019-07-26 23:15:20 +00:00
website Update default gossip encryption key size to 32 bytes 2019-07-30 09:45:41 -06:00
.dockerignore
.gitattributes
.gitignore connect: Support RSA keys in addition to ECDSA (#6055) 2019-07-30 17:47:39 -04:00
CHANGELOG.md update changelog 2019-08-01 22:45:01 -05:00
GNUmakefile Revert "connect: support AWS PCA as a CA provider" (#6251) 2019-07-31 09:08:10 -04:00
INTERNALS.md
LICENSE
NOTICE.md
README.md
Vagrantfile
go.mod Revert "connect: support AWS PCA as a CA provider" (#6251) 2019-07-31 09:08:10 -04:00
go.sum Revert "connect: support AWS PCA as a CA provider" (#6251) 2019-07-31 09:08:10 -04:00
main.go
main_test.go

README.md

Consul Build Status Join the chat at https://gitter.im/hashicorp-consul/Lobby

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

An extensive quick start is viewable on the Consul website:

https://www.consul.io/intro/getting-started/install.html

Documentation

Full, comprehensive documentation is viewable on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.