Commit Graph

18382 Commits

Author SHA1 Message Date
boruszak 0de4184b95 /docs/k8s 2022-09-14 17:26:14 -05:00
boruszak e339379291 /docs/k8s/upgrades 2022-09-14 17:21:47 -05:00
boruszak 2a70eef7c8 /docs/k8s/crds 2022-09-14 17:20:05 -05:00
Kevin Wang dc66e10e71
2022-09-06 13:04:17 -04:00
Tu Nguyen 110139a4df revert links to learn 2022-09-06 08:35:01 -07:00
HashiBot 205e866784
[Automated] Merged main into target: dev-portal 2022-09-01 08:02:17 -04:00
Luke Kysow 095764a482
Suppress "unbound variable" error. (#14424)
Without this change, you'd see this error:

```
./run-tests.sh: line 49: LAMBDA_TESTS_ENABLED: unbound variable
./run-tests.sh: line 49: LAMBDA_TESTS_ENABLED: unbound variable
```
2022-08-31 13:06:35 -07:00
malizz a80e0bcd00
validate args before deleting proxy defaults (#14290)
* validate args before deleting proxy defaults

* add changelog

* validate name when normalizing proxy defaults

* add test for proxyConfigEntry

* add comments
2022-08-31 13:03:38 -07:00
Tu Nguyen c94f8c26c2
Merge branch 'main' into dev-portal 2022-08-31 11:21:14 -07:00
Jared Kirschner 5d714edf01
Merge pull request #14426 from hashicorp/docs/fix-node-lookup-by-removing-tag
docs: node lookups don't support filtering on tag
2022-08-31 14:04:55 -04:00
Jared Kirschner a88ca9518d
docs: node lookups don't support filtering on tag 2022-08-31 13:58:23 -04:00
Tu Nguyen 6bac01e3f7
Merge pull request #14425 from hashicorp/update-get-started
Fix Get Started IA
2022-08-31 10:26:53 -07:00
Tu Nguyen 11a5fec447 Update get started section to include learn, rename overview -> install Consul 2022-08-31 10:25:29 -07:00
Chris S. Kim d037ccf3e8
Merge pull request #14420 from hashicorp/docs/fix-peering-guide
docs: Fix code example in cluster peering
2022-08-31 12:26:21 -04:00
Chris S. Kim e12a13d277 Fix code example 2022-08-31 12:11:15 -04:00
Bryce Kalow fc5be5d998 updates previews to render Developer 2022-08-31 10:25:12 -05:00
Thomas Kula 436bc8f3e3 Typo fix in service-splitter.mdx 2022-08-30 17:51:17 -07:00
David Yu 9e726e7691
docs: re-organize service and node lookups for Consul Enterprise (#14389)
* docs: re-organize service and node lookups for Consul Enterprise

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
2022-08-30 15:17:35 -07:00
Mike Morris 3c82d36a23
ci: update backport-assistant to pick merge commit (#14408) 2022-08-30 15:44:06 -04:00
Jeff Boruszak e56fd9a45a docs: Additional feedback from PR #12971
This commit incorporates additional feedback received related to
PR #12971.
2022-08-30 11:14:53 -07:00
Josh Roose 7345432c3b
events compiled to JSON sentence structure (#13717) 2022-08-30 09:53:18 -07:00
Freddy 110f248b3a
Merge pull request #14385 from hashicorp/snapshot-agent-path-addressing 2022-08-30 10:47:24 -06:00
Eric Haberkorn 3726a0ab7a
Finish up cluster peering failover (#14396) 2022-08-30 11:46:34 -04:00
Luke Kysow 70bb6a2abd
Run integration tests locally using amd64 (#14365)
Locally, always run integration tests using amd64, even if running
on an arm mac. This ensures the architecture locally always matches
the CI/CD environment.

In addition:
* Use consul:local for envoy integration and upgrade tests. Previously,
  consul:local was used for upgrade tests and consul-dev for integration
  tests. I didn't see a reason to use separate images as it's more
  confusing.
* By default, disable the requirement that aws credentials are set.
  These are only needed for the lambda tests and make it so you
  can't run any tests locally, even if you're not running the
  lambda tests. Now they'll only run if the LAMBDA_TESTS_ENABLED
  env var is set.
* Split out the building of the Docker image for integration
  tests into its own target from `dev-docker`. This allows us to always
  use an amd64 image without messing up the `dev-docker` target.
* Add support for passing GO_TEST_FLAGs to `test-envoy-integ` target.
* Add a wait_for_leader function because tests were failing locally
  without it.
2022-08-29 16:13:49 -07:00
Freddy 97d1db759f
Merge pull request #13496 from maxb/fix-kv_entries-metric 2022-08-29 15:35:11 -06:00
Freddy 829a2a8722
Merge pull request #14364 from hashicorp/peering/term-delete 2022-08-29 15:33:18 -06:00
Max Bowsher decc9231ee Merge branch 'main' into fix-kv_entries-metric 2022-08-29 22:22:10 +01:00
Chris S. Kim 5010fa5c03
Merge pull request #14371 from hashicorp/kisunji/peering-metrics-update
Adjust metrics reporting for peering tracker
2022-08-29 17:16:19 -04:00
Eric Haberkorn 77918d9dea
Fix a breaking change to the API package introduced in #13835 (#14378)
`QueryDatacenterOptions` was renamed to `QueryFailoverOptions` without creating
an alias. This adds `QueryDatacenterOptions` back as an alias to
`QueryFailoverOptions` and marks it is deprecated.
2022-08-29 16:59:27 -04:00
Austin Workman b6f2b6c94f Add support for S3 path based addressing 2022-08-29 14:46:02 -06:00
Chris S. Kim 74ddf040dd Add heartbeat timeout grace period when accounting for peering health 2022-08-29 16:32:26 -04:00
David Yu e6b63221eb
docs: Cluster peering with Transparent Proxy updates (#14369)
* Update Cluster Peering docs to show example with Transparent Proxy 
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-29 13:07:08 -07:00
David Yu daa30a03c3
docs: Update Consul K8s release notes (#14379) 2022-08-29 11:34:39 -07:00
freddygv d3955bd84c Add changelog entry 2022-08-29 12:31:13 -06:00
freddygv 310608fb19 Add validation to prevent switching dialing mode
This prevents unexpected changes to the output of ShouldDial, which
should never change unless a peering is deleted and recreated.
2022-08-29 12:31:13 -06:00
Eric Haberkorn 72f90754ae
Update max_ejection_percent on outlier detection for peered clusters to 100% (#14373)
We can't trust health checks on peered services when service resolvers,
splitters and routers are used.
2022-08-29 13:46:41 -04:00
DanStough d8cb7731dd chore: add multi-arch docker build for testing 2022-08-29 12:01:31 -04:00
Chris S. Kim def529edd3 Rename test 2022-08-29 10:34:50 -04:00
Chris S. Kim 93271f649c Fix test 2022-08-29 10:20:30 -04:00
Eric Haberkorn 1099665473
Update the structs and discovery chain for service resolver redirects to cluster peers. (#14366) 2022-08-29 09:51:32 -04:00
Tu Nguyen 45ea33b5d5
Merge pull request #14358 from hashicorp/replace-references-to-learn
Replace references to Learn
2022-08-28 19:42:08 -07:00
Tu Nguyen 4278fe8113 fix merge conflicts 2022-08-28 19:41:35 -07:00
Tu Nguyen 04d66e78c3 Merge branch 'dev-portal' into replace-references-to-learn 2022-08-28 19:34:45 -07:00
Tu Nguyen c7a6187a41
Merge pull request #14357 from hashicorp/replace-learn-links
Update Learn links in prep for DevDot
2022-08-28 19:34:06 -07:00
Tu Nguyen f06348c73e fix merge conflicts 2022-08-28 19:33:37 -07:00
Tu Nguyen 5e86650306
Merge pull request #14355 from hashicorp/consul-docs-ia-reshuffle 2022-08-28 14:31:23 -07:00
Chris S. Kim 4d97e2f936 Adjust metrics reporting for peering tracker 2022-08-26 17:34:17 -04:00
David Yu b1ba0a89bc
docs: Release notes for Consul 1.12, 1.13 and Consul K8s 0.47.0 (#14352)
* consul 1.12, consul 1.13, and consul-k8s release notes

Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-08-26 13:37:41 -07:00
freddygv 650e48624d Allow terminated peerings to be deleted
Peerings are terminated when a peer decides to delete the peering from
their end. Deleting a peering sends a termination message to the peer
and triggers them to mark the peering as terminated but does NOT delete
the peering itself. This is to prevent peerings from disappearing from
both sides just because one side deleted them.

Previously the Delete endpoint was skipping the deletion if the peering
was not marked as active. However, terminated peerings are also
inactive.

This PR makes some updates so that peerings marked as terminated can be
deleted by users.
2022-08-26 10:52:47 -06:00
Thomas Eckert e64a28516d
Merge pull request #14347 from hashicorp/update-terminating-gateway-docs
Update Kubernetes Terminating Gateway Docs
2022-08-26 12:52:09 -04:00