Go to file
R.B. Boyer eb8ed27500 api: go mod tidy 2019-05-08 13:26:07 -05:00
.circleci Connect: allow configuring Envoy for L7 Observability (#5558) 2019-04-29 17:27:57 +01:00
.github
acl Handle rules translation when coming from the JSON compat HCL (#5662) 2019-04-15 14:34:36 -04:00
agent Fixes race condition in Agent Cache (#5796) 2019-05-07 11:15:49 +01:00
api api: go mod tidy 2019-05-08 13:26:07 -05:00
bench
build-support ui: fix 'make ui' again (#5751) 2019-04-30 12:23:24 -05:00
command Do not trigger update check when in dev mode 2019-05-07 09:15:34 -06:00
connect Move the watch package into the api module (#5664) 2019-04-26 12:33:01 -04:00
demo
ipaddr
lib Allow MapWalk to handle []interface{} elements that are []uint8 (#5800) 2019-05-07 11:40:48 -04:00
logger
sdk Centralized Config CLI (#5731) 2019-04-30 16:27:16 -07:00
sentinel Update to use a consulent build tag instead of just ent (#5759) 2019-05-01 11:11:27 -04:00
service_os
snapshot
terraform
test remove container after docker run exits (#5798) 2019-05-07 10:13:07 -04:00
testrpc
tlsutil
types
ui-v2 ui: Previously we were passing through 'fake' events, revert to real.. (#5810) 2019-05-08 17:12:16 +01:00
vendor Fix up the MapWalk function so that it properly handles nested map[interface{}]interface{} (#5774) 2019-05-02 14:43:54 -04:00
version Add integration test for central config; fix central config WIP (#5752) 2019-05-01 16:39:31 -07:00
website [docs] WIP ports page (#5693) 2019-05-08 11:09:12 -05:00
.dockerignore
.gitattributes
.gitignore
.travis.yml remove reference to deleted branch 2019-04-26 15:39:57 -05:00
CHANGELOG.md Update CHANGELOG.md 2019-05-08 10:38:17 -07:00
GNUmakefile Connect: allow configuring Envoy for L7 Observability (#5558) 2019-04-29 17:27:57 +01:00
INTERNALS.md
LICENSE
NOTICE.md
README.md
Vagrantfile
go.mod bump hashicorp/yamux (#5776) 2019-05-02 15:11:39 -04:00
go.sum bump hashicorp/yamux (#5776) 2019-05-02 15:11:39 -04:00
main.go
main_test.go

README.md

Consul Build Status Join the chat at https://gitter.im/hashicorp-consul/Lobby

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Segmentation - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

An extensive quick start is viewable on the Consul website:

https://www.consul.io/intro/getting-started/install.html

Documentation

Full, comprehensive documentation is viewable on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.