Go to file
Kyle Havlovitz dc1112eaf8 Disallow the blanket wildcard prefix from being used as custom host 2020-05-08 20:24:18 -07:00
.circleci disable stable-website auto cherry-pick until replatform is merged into stable-website (#7726) 2020-04-28 17:01:51 -04:00
.github Adding redirect to discuss, moving question to old (#7732) 2020-05-01 13:02:15 -04:00
acl
agent Disallow the blanket wildcard prefix from being used as custom host 2020-05-08 20:24:18 -07:00
api Add TLS field to ingress API structs 2020-05-06 15:12:02 -05:00
bench
build-support
command Add TLS field to ingress API structs 2020-05-06 15:12:02 -05:00
connect
contributing
demo
ipaddr
lib Filter wildcard gateway services to match listener protocol 2020-05-06 15:06:13 -05:00
logging rpc: oss changes for network area connection pooling (#7735) 2020-04-30 22:12:17 +02:00
sdk sdk: extracting testutil.RequireErrorContains from various places it was duplicated (#7753) 2020-05-01 11:56:34 -05:00
sentinel
service_os
snapshot
terraform
test Set default protocol to http in TLS integration test 2020-05-08 20:23:23 -07:00
testrpc
tlsutil rpc: oss changes for network area connection pooling (#7735) 2020-04-30 22:12:17 +02:00
types
ui-v2 ui: Fix using 'ui-like' KVs when using an empty default nspace (#7734) 2020-04-30 09:28:20 +01:00
vendor vendor: revert golang.org/x/sys bump to avoid FreeBSD regression (#7780) 2020-05-05 09:26:17 +02:00
version
website acl: oss plumbing to support auth method namespace rules in enterprise (#7794) 2020-05-06 13:48:04 -05:00
.dockerignore
.gitattributes
.gitignore
.golangci.yml
.hashibot.hcl
CHANGELOG.md Remove duplicated entries in CHANGELOG.md 2020-05-06 08:56:41 -05:00
GNUmakefile
INTERNALS.md
LICENSE
NOTICE.md
README.md
Vagrantfile
codecov.yml
go.mod vendor: revert golang.org/x/sys bump to avoid FreeBSD regression (#7780) 2020-05-05 09:26:17 +02:00
go.sum vendor: revert golang.org/x/sys bump to avoid FreeBSD regression (#7780) 2020-05-05 09:26:17 +02:00
main.go
main_test.go

README.md

Consul CircleCI Discuss

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Service Segmentation/Service Mesh - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is available on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.