Commit Graph

80 Commits

Author SHA1 Message Date
Michael Schurter 281abd1ac0
Merge pull request #10118 from hashicorp/docs-secmodel
docs: remove stray mention that namespaces are ent
2021-03-04 11:50:22 -08:00
Michael Schurter c660ea5dd1 docs: remove stray mention that namespaces are ent
namespaces are oss
2021-03-04 10:57:10 -08:00
Drew Bailey c06ed22be1
remove v1-v2 varlink references (#10110)
* remove v1-v2 varlink references

* Update website/content/docs/drivers/podman.mdx

Co-authored-by: Tim Gross <tgross@hashicorp.com>

* fix code snippet

Co-authored-by: Tim Gross <tgross@hashicorp.com>
2021-03-03 13:59:32 -05:00
Andrea Simonini 1fe9561ec8 Fixed typos 2021-03-01 08:16:00 -05:00
Huan Wang f133f4c7fe
update policy.mdx -- fixing strategy name 2021-02-26 21:32:00 -07:00
Luiz Aoqui f7abdf2ba1
Merge pull request #9908 from hashicorp/docs-autoscaler-node-drain-ignore-system-jobs
document Autoscaler `node_drain_ignore_system_jobs` configuration
2021-02-26 18:41:56 -05:00
Luiz Aoqui fd20ebbd11
Merge pull request #10062 from hashicorp/docs-autoscaler-sighup
docs: expand Autoscaler SIGHUP documentation
2021-02-26 18:31:24 -05:00
Luiz Aoqui 1bf3d2feb4
docs: add node_drain_ignore_system_jobs to Autoscaler GCP plugin 2021-02-26 18:30:45 -05:00
Luiz Aoqui 38c23e9577
docs: document Autoscaler node_drain_ignore_system_jobs configuration 2021-02-26 18:29:41 -05:00
James Rasell c3058b8b08
docs: add Nomad Autoscaler GPC MIG target plugin detail. (#10090)
Co-authored-by: Luiz Aoqui <luiz@hashicorp.com>
2021-02-26 17:21:09 +01:00
Andre Ilhicas f45fc6c899
consul/connect: enable setting local_bind_address in upstream 2021-02-26 11:37:31 +00:00
Drew Bailey 86d9e1ff90
Merge pull request #9955 from hashicorp/on-update-services
Service and Check on_update configuration option (readiness checks)
2021-02-24 10:11:05 -05:00
Luiz Aoqui 15b9a57c0d
docs: update link to the Nomad Autoscaler demos 2021-02-23 15:24:37 -05:00
Tim Gross b764f52ab9
deploymentwatcher: reset progress deadline on promotion (#10042)
In a deployment with two groups (ex. A and B), if group A's canary becomes
healthy before group B's, the deadline for the overall deployment will be set
to that of group A. When the deployment is promoted, if group A is done it
will not contribute to the next deadline cutoff. Group B's old deadline will
be used instead, which will be in the past and immediately trigger a
deployment progress failure. Reset the progress deadline when the job is
promotion to avoid this bug, and to better conform with implicit user
expectations around how the progress deadline should interact with promotions.
2021-02-22 16:44:03 -05:00
Luiz Aoqui 85c67ff666
Update website/content/docs/autoscaling/agent.mdx
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-22 16:37:03 -05:00
Chris Baker 9d93293ab4
Update website/content/docs/autoscaling/agent.mdx 2021-02-22 15:20:58 -06:00
Luiz Aoqui 84ad11df93
docs: expand Autoscaler SIGHUP documentation 2021-02-22 15:38:26 -05:00
Cathy Chang e117fc4f2b
docs: clarify log_rotate_max_files 2021-02-19 09:37:55 -05:00
Tim Gross a90586f3e5 docs: clarify type constraints for collections in locals
HCL2 locals don't have type constraints, and the map syntax is interpreted as
an object. So users may need to explictly convert to map for some functions.

The `convert` function documentation was missing the required type constructor
parameter for collections.
2021-02-17 14:45:05 -05:00
Tim Gross 83088ec781 docs: clarify that block labels can't be interpolated in HCL2
Block labels are not expressions so they can't be interpolated without hacks
like `dynamic` blocks. Clarify this so that we don't confuse users who
shouldn't need to dig into the subtle nuances between expressions and blocks.
2021-02-17 11:53:06 -05:00
Tim Gross 25d5fe61d5 docs: remove artifact destination interpolation warning 2021-02-17 09:52:27 -05:00
Charlie Voiselle d9c31741dc
Merge pull request #10020 from hashicorp/docs-update-install-brew
Updated Homebrew install instructions
2021-02-12 11:52:59 -05:00
Seth Hoenig eb8812dc3d docs: update ingress gateway runnable demo
Using the environment variable stopped working here a while back,
should be using the port label. Also upgrade to uuid-api:v5 which
supports linux/arm64.
2021-02-12 10:10:16 -06:00
Charlie Voiselle 7c6ffb9dcd
Updated Homebrew install instructions 2021-02-11 18:42:18 -05:00
Shantanu Gadgil 3fa71d2c66 The encryption key uses 32 bytes now
The encryption key uses 32 bytes now, not 16 bytes
2021-02-11 08:34:39 -05:00
Mark Lewis 56f1e7a324
Fix typo (#10008) 2021-02-10 14:43:11 -06:00
Karan Sharma 26199289fc fix: docs/job-specification change mounts to mount
Since [mounts](https://www.nomadproject.io/docs/drivers/docker#mounts) is deprecated,
switch to newer `mount` in `task.config` for `docker` driver.
2021-02-10 08:24:58 -05:00
Seth Hoenig 7d6e81e9e4
Merge pull request #9990 from hashicorp/f-nsiso-task
drivers/exec+java: Add task configuration to restore previous PID/IPC isolation behavior
2021-02-09 13:29:14 -06:00
Seth Hoenig 45e0e70a50 consul/connect: enable custom sidecars to use expose checks
This PR enables jobs configured with a custom sidecar_task to make
use of the `service.expose` feature for creating checks on services
in the service mesh. Before we would check that sidecar_task had not
been set (indicating that something other than envoy may be in use,
which would not support envoy's expose feature). However Consul has
not added support for anything other than envoy and probably never
will, so having the restriction in place seems like an unnecessary
hindrance. If Consul ever does support something other than Envoy,
they will likely find a way to provide the expose feature anyway.

Fixes #9854
2021-02-09 10:49:37 -06:00
Seth Hoenig 8ee9835923 drivers/exec+java: Add task configuration to restore previous PID/IPC isolation behavior
This PR adds pid_mode and ipc_mode options to the exec and java task
driver config options. By default these will defer to the default_pid_mode
and default_ipc_mode agent plugin options created in #9969. Setting
these values to "host" mode disables isolation for the task. Doing so
is not recommended, but may be necessary to support legacy job configurations.

Closes #9970
2021-02-08 14:26:35 -06:00
Tim Gross b04a040aed
document that Nomad ENT cannot be downgraded to Nomad OSS 2021-02-08 14:09:45 -05:00
Drew Bailey b5585882e4
address pr comments 2021-02-08 13:43:05 -05:00
Seth Hoenig f5cc4c5d44
docs: clarify PID
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:57 -06:00
Seth Hoenig 419044ed08
docs: shorten IPC
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:42 -06:00
Seth Hoenig a911d4ca17
docs: clarify PID
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:31 -06:00
Seth Hoenig 6c101e601d
docs: shorten IPC
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:19 -06:00
Seth Hoenig 0134d2eab9
docs: capitalize posix
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:08 -06:00
Seth Hoenig cb81d38f2e
docs: capitalize posix
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:51:55 -06:00
Drew Bailey 8507d54e3b
e2e test for on_update service checks
check_restart not compatible with on_update=ignore

reword caveat
2021-02-08 08:32:40 -05:00
Drew Bailey 82f971f289
OnUpdate configuration for services and checks
Allow for readiness type checks by configuring nomad to ignore warnings
or errors reported by a service check. This allows the deployment to
progress and while Consul handles introducing the sercive into a
resource pool once the check passes.
2021-02-08 08:32:40 -05:00
Seth Hoenig 4bc6e5a215 drivers/exec+java: Add configuration to restore previous PID/IPC namespace behavior.
This PR adds default_pid_mode and default_ipc_mode options to the exec and java
task drivers. By default these will default to "private" mode, enabling PID and
IPC isolation for tasks. Setting them to "host" mode disables isolation. Doing
so is not recommended, but may be necessary to support legacy job configurations.

Closes #9969
2021-02-05 15:52:11 -06:00
Alex Chan 768c02eaff
Correct the spelling of heirarchical/hierarchical (#9980) 2021-02-05 09:23:30 -06:00
Alex Iribarren ee15c8e899 Replace &lsquo; and &apos; with ' 2021-02-05 08:36:38 -05:00
Xopherus 76799c9f07 Fix aws secret key name in autoscaler aws target
- aws secret key is named incorrectly in the target docs.
  It needs to match what is in the nomad-autoscaler repo
  (see link below), otherwise the autoscaler will default to AWS sdk
  behavior, which could end up using an IAM instance profile
  or other environment variables instead of what is passed into the
  autoscaler config file.

Ref: e60fb5268d/plugins/builtin/target/aws-asg/plugin/plugin.go (L27)
2021-02-03 16:56:12 -05:00
Tim Gross 9701d292ce docs: remove mbits examples from documentation 2021-02-02 10:10:44 -05:00
Chris Baker 682dd5045e vesion-specific upgrade guide for 1.0.3 and 0.12.10 2021-01-29 19:41:48 +00:00
Tim Gross cf052cfee5 docs: add metrics from raft leadership transitions 2021-01-27 11:50:11 -05:00
James Rasell 9c0c75b226
docs: clarify where variables can be placed with HCLv2. 2021-01-26 12:29:58 +01:00
Seth Hoenig 8b05efcf88 consul/connect: Add support for Connect terminating gateways
This PR implements Nomad built-in support for running Consul Connect
terminating gateways. Such a gateway can be used by services running
inside the service mesh to access "legacy" services running outside
the service mesh while still making use of Consul's service identity
based networking and ACL policies.

https://www.consul.io/docs/connect/gateways/terminating-gateway

These gateways are declared as part of a task group level service
definition within the connect stanza.

service {
  connect {
    gateway {
      proxy {
        // envoy proxy configuration
      }
      terminating {
        // terminating-gateway configuration entry
      }
    }
  }
}

Currently Envoy is the only supported gateway implementation in
Consul. The gateay task can be customized by configuring the
connect.sidecar_task block.

When the gateway.terminating field is set, Nomad will write/update
the Configuration Entry into Consul on job submission. Because CEs
are global in scope and there may be more than one Nomad cluster
communicating with Consul, there is an assumption that any terminating
gateway defined in Nomad for a particular service will be the same
among Nomad clusters.

Gateways require Consul 1.8.0+, checked by a node constraint.

Closes #9445
2021-01-25 10:36:04 -06:00
Steven Collins e9f91c1d56
Adds community USB plugin to documentation site 2021-01-25 10:15:36 -05:00