Find a file
2020-02-10 09:27:12 -07:00
.circleci Merge pull request #7241 from hashicorp/ui-staging 2020-02-07 16:07:05 +00:00
.github Revert "Update question.md" (#7183) 2020-01-31 13:45:05 -06:00
acl Add managed service provider token (#7218) 2020-02-04 13:58:56 -07:00
agent feat: support sending body in HTTP checks (#6602) 2020-02-10 09:27:12 -07:00
api feat: support sending body in HTTP checks (#6602) 2020-02-10 09:27:12 -07:00
bench
build-support build: update to golang 1.12.16 (#7153) 2020-02-03 18:20:03 +01:00
command cli: fix typo in -namespace help text (#7225) 2020-02-05 14:43:25 -06:00
connect
contributing
demo
ipaddr
lib ACL enforcement for the agent/health/services endpoints (#7191) 2020-01-31 11:16:24 -05:00
logging agent: differentiate wan vs lan loggers in memberlist and serf (#7205) 2020-02-05 09:52:43 -06:00
sdk Testing updates to support namespaced testing of the agent/xds… (#7185) 2020-02-03 09:26:47 -05:00
sentinel
service_os
snapshot agent: ensure that we always use the same settings for msgpack (#7245) 2020-02-07 15:50:24 -06:00
terraform
test Expose Envoy's /stats for statsd agents (#7173) 2020-02-03 17:19:34 +00:00
testrpc
tlsutil
types
ui-v2 ui: oss don't ever POST/PUT Namespaces when writing data (#7238) 2020-02-07 15:50:50 +00:00
vendor memberlist: vendor v0.1.6 to pull in new state: stateLeft (#7184) 2020-02-03 11:02:13 +01:00
version Release v1.7.0-beta4 2020-01-31 21:38:38 +00:00
website feat: support sending body in HTTP checks (#6602) 2020-02-10 09:27:12 -07:00
.dockerignore
.gitattributes
.gitignore
.hashibot.hcl
CHANGELOG.md Update CHANGELOG.md 2020-02-07 11:22:51 -05:00
codecov.yml
GNUmakefile add 'make go-mod-tidy' to serially run tidy on all submodules in the correct order (#7179) 2020-02-03 10:12:26 -06:00
go.mod memberlist: vendor v0.1.6 to pull in new state: stateLeft (#7184) 2020-02-03 11:02:13 +01:00
go.sum memberlist: vendor v0.1.6 to pull in new state: stateLeft (#7184) 2020-02-03 11:02:13 +01:00
INTERNALS.md
LICENSE
main.go
main_test.go
NOTICE.md
README.md
Vagrantfile

Consul CircleCI Discuss

Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.

Consul provides several key features:

  • Service Discovery - Consul makes it simple for services to register themselves and to discover other services via a DNS or HTTP interface. External services such as SaaS providers can be registered as well.

  • Health Checking - Health Checking enables Consul to quickly alert operators about any issues in a cluster. The integration with service discovery prevents routing traffic to unhealthy hosts and enables service level circuit breakers.

  • Key/Value Storage - A flexible key/value store enables storing dynamic configuration, feature flagging, coordination, leader election and more. The simple HTTP API makes it easy to use anywhere.

  • Multi-Datacenter - Consul is built to be datacenter aware, and can support any number of regions without complex configuration.

  • Service Segmentation/Service Mesh - Consul Connect enables secure service-to-service communication with automatic TLS encryption and identity-based authorization. Applications can use sidecar proxies in a service mesh configuration to establish TLS connections for inbound and outbound connections without being aware of Connect at all.

Consul runs on Linux, Mac OS X, FreeBSD, Solaris, and Windows. A commercial version called Consul Enterprise is also available.

Please note: We take Consul's security and our users' trust very seriously. If you believe you have found a security issue in Consul, please responsibly disclose by contacting us at security@hashicorp.com.

Quick Start

A few quick start guides are available on the Consul website:

Documentation

Full, comprehensive documentation is viewable on the Consul website:

https://www.consul.io/docs

Contributing

Thank you for your interest in contributing! Please refer to CONTRIBUTING.md for guidance.