Mitchell Hashimoto
9ec50a732f
Add new helm fields
2018-09-25 09:20:36 -05:00
Mitchell Hashimoto
824814be3f
website: document helm options
2018-09-23 17:29:18 -07:00
Mitchell Hashimoto
88d8d2bb9a
website: document consul-k8s
2018-09-23 17:15:54 -07:00
Mitchell Hashimoto
321cd016d4
website: docs for catalog sync
2018-09-23 17:12:14 -07:00
Alvaro Miranda Aguilera
57cfd89c54
fix typo on connect/index ( #4681 )
...
wtihin -> within
2018-09-17 12:06:47 +01:00
Mitchell Hashimoto
79c6258276
website: correct chart casing
2018-09-13 14:45:40 -07:00
Mitchell Hashimoto
113f568509
website: document k8s go-discover ( #4666 )
...
This adds documentation for the `k8s` go-discover provider that will be part of 1.2.3.
2018-09-13 10:12:27 -04:00
Mitchell Hashimoto
5943c79ed4
Initial Helm Chart/K8S Docs ( #4653 )
...
* website: initial Kubernetes section with Helm information
* website: extraConfig for clients
* website: add more helm fields
* website: document extraVolumes
* website: document Consul DNS
* website: fix typos and show example of downward API
2018-09-12 08:44:30 -07:00
Freddy
b66763eb33
Update snapshot agent docs to include s3-endpoint ( #4652 )
2018-09-11 16:32:31 +01:00
Matt Keeler
cc8327ed9a
Ensure that errors setting up the DNS servers get propagated back to the shell ( #4598 )
...
Fixes : #4578
Prior to this fix if there was an error binding to ports for the DNS servers the error would be swallowed by the gated log writer and never output. This fix propagates the DNS server errors back to the shell with a multierror.
2018-09-07 10:48:29 -04:00
Pierre Souchay
eddcf228ea
Implementation of Weights Data structures ( #4468 )
...
* Implementation of Weights Data structures
Adding this datastructure will allow us to resolve the
issues #1088 and #4198
This new structure defaults to values:
```
{ Passing: 1, Warning: 0 }
```
Which means, use weight of 0 for a Service in Warning State
while use Weight 1 for a Healthy Service.
Thus it remains compatible with previous Consul versions.
* Implemented weights for DNS SRV Records
* DNS properly support agents with weight support while server does not (backwards compatibility)
* Use Warning value of Weights of 1 by default
When using DNS interface with only_passing = false, all nodes
with non-Critical healthcheck used to have a weight value of 1.
While having weight.Warning = 0 as default value, this is probably
a bad idea as it breaks ascending compatibility.
Thus, we put a default value of 1 to be consistent with existing behaviour.
* Added documentation for new weight field in service description
* Better documentation about weights as suggested by @banks
* Return weight = 1 for unknown Check states as suggested by @banks
* Fixed typo (of -> or) in error message as requested by @mkeeler
* Fixed unstable unit test TestRetryJoin
* Fixed unstable tests
* Fixed wrong Fatalf format in `testrpc/wait.go`
* Added notes regarding DNS SRV lookup limitations regarding number of instances
* Documentation fixes and clarification regarding SRV records with weights as requested by @banks
* Rephrase docs
2018-09-07 15:30:47 +01:00
Geoffrey Grosenbach
72fac5b823
Adds XL machine spec and notes on large deployments ( #4622 )
...
* Adds XL machine spec and notes on large deployments
* Clarifies machine sizes
* Fixes internal links within the document
* Moves datacenter size guidelines to "Single Datacenter" section
2018-08-31 10:41:48 -05:00
Siva Prasad
ca35d04472
Adds a new command line flag -log-file for file based logging. ( #4581 )
...
* Added log-file flag to capture Consul logs in a user specified file
* Refactored code.
* Refactored code. Added flags to rotate logs based on bytes and duration
* Added the flags for log file and log rotation on the webpage
* Fixed TestSantize from failing due to the addition of 3 flags
* Introduced changes : mutex, data-dir log writes, rotation logic
* Added test for logfile and updated the default log destination for docs
* Log name now uses UnixNano
* TestLogFile is now uses t.Parallel()
* Removed unnecessary int64Val function
* Updated docs to reflect default log name for log-file
* No longer writes to data-dir and adds .log if the filename has no extension
2018-08-29 16:56:58 -04:00
Freddy
fbe45513d8
Correct rpc telemetry docs ( #4602 )
2018-08-28 16:38:22 -04:00
Jack Pearkes
c1bf14be30
website: use 127.0.0.1 instead of consul.rocks ( #4523 )
...
By default, the Consul agent listens on the local interface
at port 8500 for API requests. This change makes the API examples
using `curl` copy-pasteable for this default configuration.
2018-08-28 09:07:15 -07:00
Rémi Jouannet
2767ae860b
Update monitoring-telegraf.html.md
2018-08-24 16:48:02 +02:00
jjshanks
657b8d27ac
Update intentions documentation to clarify ACL behavior ( #4546 )
...
* Update intentions documentation to clarify ACL behavior
* Incorprate @banks suggestions into docs
* Fix my own typos!
2018-08-20 20:03:53 +01:00
Miroslav Bagljas
3c23979afd
Fixes #4483 : Add support for Authorization: Bearer token Header ( #4502 )
...
Added Authorization Bearer token support as per RFC6750
* appended Authorization header token parsing after X-Consul-Token
* added test cases
* updated website documentation to mention Authorization header
* improve tests, improve Bearer parsing
2018-08-17 16:18:42 -04:00
sandstrom
14f19f75a6
Clarify port usage for agents ( #4510 )
2018-08-14 16:10:01 -07:00
Paul Banks
e34acd275f
Update intentions.html.md
2018-08-14 15:09:45 +01:00
Geoffrey Grosenbach
a03512496f
Consul Production Deployment Guide
...
Renames guide to "Production Deployment"
Adds link in sidebar menu.
Implements edits suggested by Consul engineering team.
2018-08-10 11:51:05 -07:00
Geoffrey Grosenbach
5d2855ecda
Remove all mention of Atlas, even in deprecated changelogs
2018-08-03 10:51:18 -07:00
Jack Pearkes
625bbb0137
Clarification for serf_wan documentation ( #4459 )
...
* updates docs for agent options
trying to add a little more clarity to suggestion that folks should use
port 8302 for both LAN and WAN comms
* website: clarify language for serf wan port behavior
2018-08-02 10:25:25 -07:00
Jeff Escalante
0f12370cfb
a couple more corrections
2018-07-27 19:39:44 -04:00
Jeff Escalante
30d27d8356
fix a couple html errors ( #4456 )
2018-07-26 16:30:24 -07:00
Christie Koehler
2710ae4159
docs: Update links to ttl health check endpoints. ( #4208 )
...
* docs: Update links to ttl health check endpoints.
* remove absolute URLs
2018-07-26 16:14:44 -07:00
Matt Keeler
0e0227792b
Gossip tuneables ( #4444 )
...
Expose a few gossip tuneables for both lan and wan interfaces
gossip_nodes
gossip_interval
probe_timeout
probe_interval
retransmit_mult
suspicion_mult
2018-07-26 11:39:49 -04:00
Paul Banks
8f9cc91d32
Document managed proxy logs ( #4447 )
...
* Document proxy logs
* Add extra note about terminating proxies
2018-07-26 13:56:28 +01:00
Paul Banks
8dd50d5b2d
Add config option to disable HTTP printable char path check ( #4442 )
2018-07-26 13:53:39 +01:00
Kyle Havlovitz
ed87949385
Merge pull request #4400 from hashicorp/leaf-cert-ttl
...
Add configurable leaf cert TTL to Connect CA
2018-07-25 17:53:25 -07:00
Siva Prasad
f4a1c381a5
Vendoring update for go-discover. ( #4412 )
...
* New Providers added and updated vendoring for go-discover
* Vendor.json formatted using make vendorfmt
* Docs/Agent/auto-join: Added documentation for the new providers introduced in this PR
* Updated the golang.org/x/sys/unix in the vendor directory
* Agent: TestGoDiscoverRegistration updated to reflect the addition of new providers
* Deleted terraform.tfstate from vendor.
* Deleted terraform.tfstate.backup
Deleted terraform state file artifacts from unknown runs.
* Updated x/sys/windows vendor for Windows binary compilation
2018-07-25 16:21:04 -07:00
Pierre Souchay
3959a91e43
Added explainations on how having a working configuration for Prometheus ( #4397 )
...
* Added explainations on how having a working configuration for Prometheus
Since Prometheus escapes by default query parameters, this paragraph explains
how having `format=prometheus` to be taken into account by prometheus.
* Rephrase Prometheus notes in documentation as requested by @pearkes
2018-07-25 16:17:38 -07:00
Sergey Shepelev
667ac22f71
website: typo in node meta additional section ( #4429 )
2018-07-25 13:32:36 -07:00
Paul Banks
5635227fa6
Allow config-file based Service Definitions for unmanaged proxies and Connect-natice apps. ( #4443 )
2018-07-25 19:55:41 +01:00
Paul Banks
d5e934f9ff
Ooops that was meant to be to a branch no master... EMORECOFFEE
...
Revert "Add config option to disable HTTP printable char path check"
This reverts commit eebe45a47b
.
2018-07-25 15:54:11 +01:00
Paul Banks
eebe45a47b
Add config option to disable HTTP printable char path check
2018-07-25 15:52:37 +01:00
Paul Banks
e954450dec
Merge pull request #4353 from azam/add-serf-lan-wan-port-args
...
Make RPC, Serf LAN, Serf WAN port configurable from CLI
2018-07-24 12:33:10 +01:00
Peter Souter
0888b435ee
Adds Monitoring with Telegraf guide ( #4227 )
...
* Installing Telegraf
* Configuring Telegraf
* Configuring Consul to send metrics to Telegraf
* Important metrics and aggregates
2018-07-23 16:46:43 -07:00
Kyle Havlovitz
ce10de036e
connect/ca: check LeafCertTTL when rotating expired roots
2018-07-20 16:04:04 -07:00
Mitchell Hashimoto
7fa6bb022f
Merge pull request #4320 from hashicorp/f-alias-check
...
Add "Alias" Check Type
2018-07-20 13:01:33 -05:00
azam
342bcb1c24
Make Serf LAN & WAN port configurable from CLI
...
Make RPC port accessible to CLI
Add tests and documentation for server-port, serf-lan-port, serf-wan-port CLI arguments
2018-07-21 02:17:21 +09:00
Paul Banks
bbbebfc8d7
Merge pull request #4352 from hashicorp/doc-dev-flag-generates-certs
...
Note that `-dev` generates certs for Connect.
2018-07-17 11:36:02 +01:00
Geoffrey Grosenbach
d44f35aa4e
Clarify Connect-related implications for `-dev` flag
2018-07-16 14:53:46 -07:00
Kyle Havlovitz
6465b13b7d
website: update docs for leaf cert TTL option
2018-07-16 13:33:42 -07:00
Paul Banks
4ec8c489c0
Merge pull request #4392 from hashicorp/connect-sdk-http
...
Implement missing HTTP host to ConsulResolver func for Connect SDK.
2018-07-16 13:54:53 +01:00
Paul Banks
fa29fee4b6
Typos
2018-07-13 23:09:34 +01:00
Paul Banks
dcd157ec7c
Add notes about hostname gotchas to Connect HTTPClient docs
2018-07-13 23:08:26 +01:00
MagnumOpus21
00b678e7f3
Docs: Removed text about proxies on Windows not starting up.
2018-07-13 14:47:42 -07:00
Paul Banks
b3dd5c1aad
Merge pull request #4263 from hashicorp/kv-get-docs
...
Update kv docs detail for accuracy
2018-07-13 18:29:34 +01:00
Mitchell Hashimoto
6be4fa9118
website: fix some website typos
2018-07-12 21:18:00 -07:00
Mitchell Hashimoto
1027a01a10
website: document alias check
2018-07-12 21:14:36 -07:00
Paul Banks
43c7213fe9
Grammar
2018-07-12 14:36:52 +01:00
Paul Banks
8405b41f2b
Update proxy config docs and add test for ipv6
2018-07-12 13:07:48 +01:00
Matt Keeler
d19c7d8882
Merge pull request #4303 from pierresouchay/non_blocking_acl
...
Only send one single ACL cache refresh across network when TTL is over
2018-07-10 08:57:33 -04:00
Paul Banks
41c3a4ac8e
Merge pull request #4038 from pierresouchay/ACL_additional_info
...
Track calls blocked by ACLs using metrics
2018-07-09 20:21:21 +01:00
Paul Banks
c8b37f0a4c
Merge pull request #4351 from hashicorp/doc-config-dir-reads-hcl-files
...
Notes that both "hcl" and "json" files are loaded from the config-dir.
2018-07-09 14:43:55 +01:00
Paul Banks
0241cda645
Fix formatting issue in config docs.
...
The floating paragraph seems to need additional indentation to work correctly on the markdown parser middle man uses - GitHub got it right before in the preview but the website broke dumping the new config option inline.
2018-07-09 14:39:20 +01:00
Pierre Souchay
a937c7fa70
Added new ACL blocked Metrics to telemetry.html
2018-07-09 11:36:33 +02:00
Geoffrey Grosenbach
f132d0e1e1
Note that `-dev` generates certs for Connect.
...
Previous version of the documentation didn't mention this, which can
lead to confusion when experimenting with Connect. Many other features
of Consul work fine without `-dev` mode, but Connect needs certs in
order to proxy, which must be done with this flag or by generating certs
directly and passing them to Consul in configs.
2018-07-06 12:26:15 -07:00
Geoffrey Grosenbach
5eecbeb7ae
Notes that both "hcl" and "json" files are loaded from the config-dir.
...
The previous version only mentioned "json" but the behavior was to read
"hcl" files as well.
2018-07-06 12:22:18 -07:00
Siva Prasad
28ffc75f64
Merge pull request #4335 from MagnumOpus21/Telemetry
...
Website/Docs/Telemetry : Adds more telemetry metrics for memberlist and raft.
2018-07-05 11:11:57 -04:00
M S Vishwanath Bhat
45bb8bce70
Trivial spell correction in connect configuration doc
...
Signed-off-by: M S Vishwanath Bhat <msvbhat@gmail.com>
2018-07-04 17:07:24 +02:00
Siva Prasad
bc9c5927b7
Website/Docs/Telemetry : Errata
2018-07-03 18:18:57 -04:00
Siva
a1a62e3b91
Website/Docs/Telemetry: Added more raft and memberlist items.
2018-07-03 17:37:29 -04:00
Siva
5d8bf053e0
Website/Telemetry: Errata for snapshot.compact and reworded memberlist.health.score
2018-07-03 10:59:31 -04:00
Siva
7baae933e6
Merge branch 'master' of github.com:hashicorp/consul into Telemetry
2018-07-03 10:48:31 -04:00
Siva
9579ba4e12
Website: Added more telemetry details for raft and memberlist.
2018-07-03 10:27:01 -04:00
Paul Banks
7f35ca33f4
Remove the TODO latency measurement.
2018-07-03 14:54:44 +01:00
Siva
77fe08b7c9
Website: Added more telemetry metrics
2018-07-03 08:00:39 -04:00
Siva Prasad
37c34acf03
Merge pull request #4244 from MagnumOpus21/WinService
...
Added a new package service_os that can make Consul run as a service on Windows.
2018-07-02 12:01:22 -04:00
Pierre Souchay
0f1735634d
Improve doc for async-cache
2018-07-01 23:50:30 +02:00
Pierre Souchay
1e7665c0d5
Updated documentation and adding more test case for async-cache
2018-07-01 23:50:30 +02:00
Pierre Souchay
bfc83ce045
Updated ACL guide
2018-07-01 23:50:30 +02:00
Anubhav Mishra
4b5efe7464
website: make performance impact explicit for connect-native
...
I was going to the public feedback on Connect-Native app integration and came across [this](https://twitter.com/relistan/status/1012263110403555329 ) thread. Added a few statements in the Connect-Native app integration page.
2018-06-29 17:35:58 -07:00
Siva
b874cac8bb
Website: Errata in -bind option for the agent
2018-06-29 16:43:12 -04:00
Siva
e281a3f925
Changes made :
...
1. Website
Changed some of the wordings and reorganized the content of the website.
2. Code:
Removed sleep and exit lines from the code.
2018-06-28 21:18:14 -04:00
Julien Pivotto
b033cba815
Fix JSON in service configuration
2018-06-27 09:06:27 +02:00
Siva
7969d16e42
Added guide for Windows Service
2018-06-26 18:23:55 -04:00
Matt Keeler
afd32485f4
Fix layout issue with discovery_max_stale
...
It was indented when it shouldn't have been.
2018-06-26 15:09:14 -04:00
mkeeler
6813a99081
Merge remote-tracking branch 'connect/f-connect'
2018-06-25 19:42:51 +00:00
Jack Pearkes
adaaa37e4f
website: fix an assortment of broken links
2018-06-25 12:26:24 -07:00
Kyle Havlovitz
c11e1b51e4
website: correct a few last things in CA docs
2018-06-25 12:26:23 -07:00
Mitchell Hashimoto
93cd52024d
website: split out CA docs by provider type
2018-06-25 12:26:23 -07:00
John Cowen
1bb482bcbd
tenenacy > tenancy
2018-06-25 12:26:22 -07:00
Paul Banks
2a467003a0
Fix some doc typos.
2018-06-25 12:26:21 -07:00
Paul Banks
6117bdb9d5
Fix some formatting and a typo.
2018-06-25 12:26:21 -07:00
Paul Banks
f0059665bb
Add proxy config reference and Complete TODOs in production guide
2018-06-25 12:26:20 -07:00
Paul Banks
959f0c612c
Fix relative links
2018-06-25 12:26:20 -07:00
Paul Banks
20a6a40216
Link from getting started; note on incremental adoption
2018-06-25 12:26:20 -07:00
Paul Banks
ac0c5c2bfa
Connect production guide draft 1
2018-06-25 12:26:20 -07:00
Paul Banks
b757b5cc48
Initial draft of connect production guide
2018-06-25 12:26:20 -07:00
Kyle Havlovitz
c20bbf8760
connect/ca: hide the RotationPeriod config field since it isn't used yet
2018-06-25 12:26:18 -07:00
Jack Pearkes
b2f14647c2
website: clarify windows support
2018-06-25 12:26:18 -07:00
Jack Pearkes
315cc04536
website: fix a TODO in a page description
2018-06-25 12:26:11 -07:00
Jack Pearkes
36e1dd6ffd
website: note windows support
2018-06-25 12:26:10 -07:00
Kyle Havlovitz
0b5d7277f9
website: fix example config in vault CA docs
2018-06-25 12:26:09 -07:00
Mitchell Hashimoto
834137fe55
website: remove redundant "as well"
2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
7ad6f7b758
website: address pearkes feedback
2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
ec1322a95d
website: address feedback
2018-06-25 12:25:43 -07:00
Mitchell Hashimoto
68826b2b76
website: istio vs. and nomad platform guide
2018-06-25 12:25:43 -07:00
Kyle Havlovitz
b4ef7bb64d
connect/ca: leave blank root key/cert out of the default config (unnecessary)
2018-06-25 12:25:42 -07:00
Kyle Havlovitz
8e028b7dc6
website: add Vault CA provider doc sections
2018-06-25 12:25:42 -07:00
Paul Banks
b562b9f66a
Add proxy telemetry to docs
2018-06-25 12:25:39 -07:00
Mitchell Hashimoto
79778635e8
website: clarify that modifying intentions will not kill the conn
2018-06-25 12:25:37 -07:00
Mitchell Hashimoto
7a1031fdc5
website: clearly note beta for Connect
2018-06-25 12:25:37 -07:00
Thomas Kula
89e045ecbc
website: Fix link in connect intentions doc
2018-06-25 12:25:13 -07:00
Thomas Kula
3056cc2825
website: Typo fix in connect intentions doc
2018-06-25 12:25:13 -07:00
Mitchell Hashimoto
e02a5fc2cc
website: fix spacing issue
2018-06-25 12:25:12 -07:00
Mitchell Hashimoto
f92a89b310
website: fix proxies to work via copy/paste
2018-06-25 12:25:11 -07:00
Mitchell Hashimoto
7f83ae1faf
website: document proxy security settings
2018-06-25 12:25:11 -07:00
Mitchell Hashimoto
4b7ca952d6
website: example typo
2018-06-25 12:25:10 -07:00
Mitchell Hashimoto
c809840c90
website: clarify custom proxy integration and custom managed proxies
2018-06-25 12:25:10 -07:00
Paul Banks
12a46cd996
Fix "fail open" wording
...
"fail open" implies that we just allow anything if an agent gets partitioned which is not the right meaning!
2018-06-25 12:25:10 -07:00
Kyle Havlovitz
5d005df8c6
docs: add Connect CA overview
2018-06-25 12:25:10 -07:00
Kyle Havlovitz
860bf825a3
docs: add agent config options for connect/CA
2018-06-25 12:25:10 -07:00
Mitchell Hashimoto
070c91cb23
website: update security model
2018-06-25 12:24:18 -07:00
Mitchell Hashimoto
d1e48b4790
website: clarify namespaces, conflict
2018-06-25 12:24:17 -07:00
Mitchell Hashimoto
fb0a58e682
website: clarify tiebreaker behavior
2018-06-25 12:24:16 -07:00
Mitchell Hashimoto
f6685177f0
website: document the precedence table
2018-06-25 12:24:16 -07:00
Mitchell Hashimoto
1f5398e17c
website: document multi-DC, caching, clarify prepared queries and
...
multi-DC
2018-06-25 12:24:15 -07:00
Mitchell Hashimoto
9ebd27522b
website: fix typo
2018-06-25 12:24:15 -07:00
Mitchell Hashimoto
927b45bf91
agent/config: move ports to `ports` structure, update docs
2018-06-25 12:24:15 -07:00
Mitchell Hashimoto
6ea59241d1
website: address feedback
2018-06-25 12:24:14 -07:00
Mitchell Hashimoto
03131398c4
website: Go native integration with Connect
2018-06-25 12:24:13 -07:00
Mitchell Hashimoto
f522249e6b
website: connect native overview
2018-06-25 12:24:13 -07:00
Mitchell Hashimoto
c95ea2f205
website: remove sergmentation from sidebar
...
we'll move east-west to a "use case" section, didnt' feel right in the
reference docs.
2018-06-25 12:24:06 -07:00
Mitchell Hashimoto
2ffbec0b6b
website: how it works
2018-06-25 12:24:06 -07:00
Mitchell Hashimoto
097856c515
Starting Docs ( #46 )
...
* website: first stab at Connect docs
* website: lots more various stuff (bad commit messages)
* website: getting started page for Connect
* website: intentions
* website: intention APIs
* website: agent API docs
* website: document agent/catalog proxy kind service values
* website: /v1/catalog/connect/:service
* website: intention CLI docs
* website: custom proxy docs
* website: remove dedicated getting started guide
* website: add docs for CA API endpoints
* website: add docs for connect ca commands
* website: add proxy CLI docs
* website: clean up proxy command, add dev docs
* website: todo pages
* website: connect security
2018-06-25 12:24:05 -07:00
Jack Pearkes
1e5c55fb21
Merge pull request #4226 from petems/monitoring_doc
...
Adds Monitoring Guide
2018-06-21 13:34:11 -07:00
petems
804cd1a8f3
Adds extra thresholds and aggregates to Telemetry
...
* Thresholds and aggregates of metrics for monitoring in Consul
2018-06-21 20:45:13 +01:00
Hannah Oppenheimer
5481c7236e
Update kv docs detail for accuracy
2018-06-21 13:21:26 -05:00
Matt Keeler
585f0e8113
Merge pull request #4150 from hashicorp/topfunky-patch-1
...
Minor clarification of server nodes
2018-06-20 10:55:45 -04:00
Matt Keeler
af910bda39
Merge pull request #4216 from hashicorp/rpc-limiting
...
Make RPC limits reloadable
2018-06-20 09:05:28 -04:00
Matt Keeler
0d4e8676d1
Merge pull request #4215 from hashicorp/feature/config-node-meta-dns-txt
...
Add configuration entry to control including TXT records for node meta in DNS responses
2018-06-20 08:53:04 -04:00
Matt Keeler
8216816e3f
Make filtering out TXT RRs only apply when they would end up in Additional section
...
ANY queries are no longer affected.
2018-06-19 10:08:16 -04:00
Omar Khawaja
8f66362770
update encryption doc and add guide for creating certificates ( #4238 )
...
* update encryption doc and add guide for creating certificates in consul with cfssl
* add details about CLI and disabling HTTP
* delete $ symbols and add guide elements
* add missing periods and steps heading
2018-06-18 15:25:35 -04:00
Guido Iaquinti
e85e63c18c
Client: add metric for failed RPC calls to server
2018-06-13 12:35:45 +01:00
Matt Keeler
08e26d10b8
Merge branch 'master' of github.com:hashicorp/consul into rpc-limiting
...
# Conflicts:
# agent/agent.go
# agent/consul/client.go
2018-06-11 16:11:36 -04:00
Matt Keeler
0f5798f028
Update docs about rpc limits being reloadable
2018-06-11 15:54:55 -04:00
Matt Keeler
6cc0422408
Add configuration entry to control including TXT records for node meta in DNS responses
...
If set to false, the only way to retrieve TXT records for node meta is to specifically query for TXT records.
2018-06-11 11:49:04 -04:00
Matt Keeler
5286b3843d
Put systemd-resolved in backticks
2018-06-05 10:38:42 -04:00
Matt Keeler
316f0ea729
Mention that PTR queries get sent to all resolvers
2018-06-04 13:56:34 -04:00
Matt Keeler
1db6ab6f39
Update DNS forwarding docs to include how to use with systemd-resolved
2018-06-04 13:43:47 -04:00
Jack Pearkes
3bba8b9805
Merge pull request #4169 from rskrishnar/adds-a-link-to-agent-config-options
...
adds link to agent config options from basic.html
2018-06-01 09:25:58 -07:00
Matt Keeler
2dbfa6cd53
Merge pull request #4154 from hashicorp/licensing-docs
...
Add licensing documentation.
2018-06-01 12:20:47 -04:00
Jack Pearkes
cdc66a9a66
Merge pull request #4164 from hashicorp/raft-default-docs
...
website: add raft snapshot setting defaults
2018-06-01 09:06:00 -07:00
Matt Keeler
f3f07967c5
Update docs to describe the 30 minute temp license
2018-05-31 13:58:28 -04:00
Nainterceptor
882f8cea06
Fix given + mandatory fields
2018-05-30 23:03:40 +02:00
RoopSai Krishna
e05c695382
adds link to agent config options from basic.html
2018-05-28 12:47:14 +05:30
Kyle Havlovitz
88311895d4
website: add raft snapshot setting defaults
2018-05-25 16:17:43 -07:00