Siva
77fe08b7c9
Website: Added more telemetry metrics
2018-07-03 08:00:39 -04:00
Pierre Souchay
0f1735634d
Improve doc for async-cache
2018-07-01 23:50:30 +02:00
Pierre Souchay
1e7665c0d5
Updated documentation and adding more test case for async-cache
2018-07-01 23:50:30 +02:00
Siva
b874cac8bb
Website: Errata in -bind option for the agent
2018-06-29 16:43:12 -04:00
Julien Pivotto
b033cba815
Fix JSON in service configuration
2018-06-27 09:06:27 +02:00
Matt Keeler
afd32485f4
Fix layout issue with discovery_max_stale
...
It was indented when it shouldn't have been.
2018-06-26 15:09:14 -04:00
mkeeler
6813a99081
Merge remote-tracking branch 'connect/f-connect'
2018-06-25 19:42:51 +00:00
Kyle Havlovitz
c20bbf8760
connect/ca: hide the RotationPeriod config field since it isn't used yet
2018-06-25 12:26:18 -07:00
Kyle Havlovitz
8e028b7dc6
website: add Vault CA provider doc sections
2018-06-25 12:25:42 -07:00
Paul Banks
b562b9f66a
Add proxy telemetry to docs
2018-06-25 12:25:39 -07:00
Mitchell Hashimoto
7f83ae1faf
website: document proxy security settings
2018-06-25 12:25:11 -07:00
Kyle Havlovitz
860bf825a3
docs: add agent config options for connect/CA
2018-06-25 12:25:10 -07:00
Mitchell Hashimoto
9ebd27522b
website: fix typo
2018-06-25 12:24:15 -07:00
Mitchell Hashimoto
927b45bf91
agent/config: move ports to `ports` structure, update docs
2018-06-25 12:24:15 -07:00
Mitchell Hashimoto
097856c515
Starting Docs ( #46 )
...
* website: first stab at Connect docs
* website: lots more various stuff (bad commit messages)
* website: getting started page for Connect
* website: intentions
* website: intention APIs
* website: agent API docs
* website: document agent/catalog proxy kind service values
* website: /v1/catalog/connect/:service
* website: intention CLI docs
* website: custom proxy docs
* website: remove dedicated getting started guide
* website: add docs for CA API endpoints
* website: add docs for connect ca commands
* website: add proxy CLI docs
* website: clean up proxy command, add dev docs
* website: todo pages
* website: connect security
2018-06-25 12:24:05 -07:00
Jack Pearkes
1e5c55fb21
Merge pull request #4226 from petems/monitoring_doc
...
Adds Monitoring Guide
2018-06-21 13:34:11 -07:00
petems
804cd1a8f3
Adds extra thresholds and aggregates to Telemetry
...
* Thresholds and aggregates of metrics for monitoring in Consul
2018-06-21 20:45:13 +01:00
Matt Keeler
af910bda39
Merge pull request #4216 from hashicorp/rpc-limiting
...
Make RPC limits reloadable
2018-06-20 09:05:28 -04:00
Matt Keeler
0d4e8676d1
Merge pull request #4215 from hashicorp/feature/config-node-meta-dns-txt
...
Add configuration entry to control including TXT records for node meta in DNS responses
2018-06-20 08:53:04 -04:00
Matt Keeler
8216816e3f
Make filtering out TXT RRs only apply when they would end up in Additional section
...
ANY queries are no longer affected.
2018-06-19 10:08:16 -04:00
Omar Khawaja
8f66362770
update encryption doc and add guide for creating certificates ( #4238 )
...
* update encryption doc and add guide for creating certificates in consul with cfssl
* add details about CLI and disabling HTTP
* delete $ symbols and add guide elements
* add missing periods and steps heading
2018-06-18 15:25:35 -04:00
Guido Iaquinti
e85e63c18c
Client: add metric for failed RPC calls to server
2018-06-13 12:35:45 +01:00
Matt Keeler
08e26d10b8
Merge branch 'master' of github.com:hashicorp/consul into rpc-limiting
...
# Conflicts:
# agent/agent.go
# agent/consul/client.go
2018-06-11 16:11:36 -04:00
Matt Keeler
0f5798f028
Update docs about rpc limits being reloadable
2018-06-11 15:54:55 -04:00
Matt Keeler
6cc0422408
Add configuration entry to control including TXT records for node meta in DNS responses
...
If set to false, the only way to retrieve TXT records for node meta is to specifically query for TXT records.
2018-06-11 11:49:04 -04:00
Jack Pearkes
3bba8b9805
Merge pull request #4169 from rskrishnar/adds-a-link-to-agent-config-options
...
adds link to agent config options from basic.html
2018-06-01 09:25:58 -07:00
Jack Pearkes
cdc66a9a66
Merge pull request #4164 from hashicorp/raft-default-docs
...
website: add raft snapshot setting defaults
2018-06-01 09:06:00 -07:00
Nainterceptor
882f8cea06
Fix given + mandatory fields
2018-05-30 23:03:40 +02:00
RoopSai Krishna
e05c695382
adds link to agent config options from basic.html
2018-05-28 12:47:14 +05:30
Kyle Havlovitz
88311895d4
website: add raft snapshot setting defaults
2018-05-25 16:17:43 -07:00
Jack Pearkes
b38c1d3437
Merge pull request #4133 from rskrishnar/add-missing-telemetry
...
add missing metrics to telemetry documentation
2018-05-25 09:25:19 -07:00
RoopSai Krishna
d0f2db10d0
add missing metrics to telemetry documentation
2018-05-16 16:26:32 +05:30
Pierre Souchay
c5dfe7b97d
Error in documentation: `discovery_max_stale` is not in `dns_config`
...
Moved the entry at the top level instead of DNS
2018-05-15 14:59:15 +02:00
Jack Pearkes
f496b697ae
website: fix broken link
2018-05-11 12:22:55 -07:00
Preetha Appan
3ff5fd6ec5
More docs and removed SnapShotInterval from raft timing struct stanza
2018-05-11 10:43:24 -05:00
Preetha Appan
d721da7b67
Also make snapshot interval configurable
2018-05-11 10:43:24 -05:00
Preetha Appan
66f31cd25a
Make raft snapshot commit threshold configurable
2018-05-11 10:43:24 -05:00
Kyle Havlovitz
876d251b95
Merge pull request #4108 from hashicorp/vendor-go-discover
...
Update go-discover and add triton provider
2018-05-10 17:29:00 -07:00
Kyle Havlovitz
48560848fc
Move cloud auto-join docs to a separate page and add Triton
2018-05-10 17:15:41 -07:00
Jack Pearkes
291e8b83ae
Merge pull request #4097 from hashicorp/remove-deprecated
...
Remove deprecated check/service fields and metric names
2018-05-10 15:45:49 -07:00
Paul Banks
e6771260a0
Update config docs with places sockaddr is supported
2018-05-10 14:56:48 +01:00
Kyle Havlovitz
ba3971d2c1
Remove deprecated metric names
2018-05-08 16:23:15 -07:00
Kyle Havlovitz
b73323aa42
Remove the script field from checks in favor of args
2018-05-08 15:31:53 -07:00
Kyle Havlovitz
cc214d45b6
Remove support for EnableTagOverride in config files
2018-05-07 16:19:13 -07:00
Kyle Havlovitz
6461087c25
Remove support for CheckID field in service check definitions
2018-05-07 16:15:08 -07:00
Paul Banks
c8db140ff7
Merge pull request #4047 from pierresouchay/added_missing_meta_in_service_definition
...
[BUGFIX] Added Service Meta support in configuration files
2018-04-25 13:08:53 +01:00
Pierre Souchay
208566d541
Changed a bit doc
...
(Fighting with Travis)
2018-04-24 22:55:39 +02:00
Pierre Souchay
7e0d6f57e9
Improved documentation
2018-04-24 22:40:41 +02:00
Pierre Souchay
4c1ddbd0d5
Added documentation for meta
2018-04-24 21:56:35 +02:00
Paul Banks
4de68fcb4b
Merge pull request #4016 from pierresouchay/support_for_prometheus
...
Support for prometheus for metrics endpoint
2018-04-24 16:14:43 +01:00
Jack Pearkes
a8a056fd11
website: fix a broken link
2018-04-13 10:33:29 -07:00
Pierre Souchay
a680c8e91b
Clearer documentation and comments for enabling Prometheus support
2018-04-09 13:16:45 +02:00
Pierre Souchay
39bd2b78e6
Added documentation for telemetry{ prometheus_retention_time = duration }
2018-04-06 14:50:03 +02:00
Preetha
a67d27c756
Adds discovery_max_stale ( #4004 )
...
Adds a new option to allow service discovery endpoints to return stale results if configured at the agent level.
2018-03-30 10:14:44 -05:00
Jack Pearkes
e65f66ac07
website: document and warn users about disabling serf_wan port
...
See https://github.com/hashicorp/consul/pull/3984 for more.
This also fixes a link to a heading that existed twice in the document.
2018-03-29 08:19:21 -07:00
Jack Pearkes
c862148ea2
Merge pull request #3927 from hashicorp/docs-encrypt-key-note
...
Docs: Clarify encrypt key for WAN joined DCs
2018-03-22 14:16:02 -07:00
Josh Soref
94835a2715
Spelling ( #3958 )
...
* spelling: another
* spelling: autopilot
* spelling: beginning
* spelling: circonus
* spelling: default
* spelling: definition
* spelling: distance
* spelling: encountered
* spelling: enterprise
* spelling: expands
* spelling: exits
* spelling: formatting
* spelling: health
* spelling: hierarchy
* spelling: imposed
* spelling: independence
* spelling: inspect
* spelling: last
* spelling: latest
* spelling: client
* spelling: message
* spelling: minimum
* spelling: notify
* spelling: nonexistent
* spelling: operator
* spelling: payload
* spelling: preceded
* spelling: prepared
* spelling: programmatically
* spelling: required
* spelling: reconcile
* spelling: responses
* spelling: request
* spelling: response
* spelling: results
* spelling: retrieve
* spelling: service
* spelling: significantly
* spelling: specifies
* spelling: supported
* spelling: synchronization
* spelling: synchronous
* spelling: themselves
* spelling: unexpected
* spelling: validations
* spelling: value
2018-03-19 16:56:00 +00:00
Paul Banks
37c07b3cac
Use master
2018-03-19 16:50:52 +00:00
Devin Canterberry
961aea97fe
📝 Prefer brevity at the cost of some ambiguity
2018-03-15 10:25:27 -07:00
Devin Canterberry
84d650cc4a
📝 Clarify the list of supported TLS cipher suites
...
Previously, the documentation linked to Golang's source code, which
can drift from the list of cipher suites supported by Consul. Consul
has a hard-coded mapping of string values to Golang cipher suites, so
this is a more direct source of truth to help users understand which
string values are accepted in the `tls_cipher_suites` configuration
value.
2018-03-13 09:25:03 -07:00
Preetha
251cdb9c24
Some tweaks to the documentation for a_record_limit
2018-03-08 11:23:07 -06:00
Pierre Souchay
57310a6446
Updated documentation as requested by @preetapan
2018-03-08 18:02:40 +01:00
Paul Banks
c57451a414
Notes on ACL token storage and permissions
2018-03-02 16:22:12 +00:00
Paul Banks
e833b535a6
Notes on ACL token storage and permissions
2018-03-02 16:20:11 +00:00
Brian Shumate
6d92c28c5c
Clarify encrypt key for WAN joined DCs
2018-03-02 10:41:09 -05:00
Jack Pearkes
10f3eb623a
website: override automatic linking of list items for softlayer dc
...
This avoids a conflict with #datacenter later on the page. We're mixing
histroic manually specified anchors with generated anchors (via
redcarpet / middleman-hashicorp) so we have to manually override the
automatic generation here.
I was tempted to rewrite the old manual anchors to use the automatic
generation, but there is no way to maintain backwards compatibility,
so will leave that for a time when it is appropriate for us to break
links (or redirect them, etc).
Fixes #3916
2018-02-27 10:53:12 -08:00
Kyle Havlovitz
f6ecaa4a1c
Add enterprise default config section
2018-02-05 13:33:59 -08:00
James Phillips
e748c63fff
Merge pull request #3855 from hashicorp/pr-3782-slackpad
...
Adds support for gRPC health checks.
2018-02-02 17:57:27 -08:00
James Phillips
49772f93bb
Adds documentation for gRPC health checks.
2018-02-02 17:53:49 -08:00
James Phillips
d93eb3659c
Updates configuration docs for Azure VMSS support.
2018-01-19 16:37:22 -08:00
James Cunningham
8dfe140501
fix dead telemetry prefix filter link
2018-01-05 15:19:33 -07:00
James Phillips
10ff52c21c
Merge pull request #3765 from diptanu/f-agent-telemetry
...
Added telemetry around Catalog APIs
2018-01-04 18:56:26 -08:00
Bastien Gérard
967a1de1ed
fix in documentation
2017-12-31 09:48:16 +01:00
Diptanu Choudhury
3858317ac9
Updated docs
2017-12-21 20:37:13 -08:00
Diptanu Choudhury
7f28391cbf
Added docs
2017-12-21 16:58:39 -08:00
Yoann Fouquet
715dd744ff
Update documentation for "serf_lan_bind" and "serf_wan_bind"
...
These was spotted in issue #3709 .
These two configuration elements were renamed "serf_lan" and "serf_wan" in commit 12216583a1
Update documentation to fit the new code.
Note that flags "-serf-lan-bind" and "-serf-wan-bind" were not renamed.
2017-12-12 13:55:19 +01:00
James Phillips
93f68555d0
Adds enable_agent_tls_for_checks configuration option which allows ( #3661 )
...
HTTP health checks for services requiring 2-way TLS to be checked
using the agent's credentials.
2017-11-07 18:22:09 -08:00
Frank Schröder
874e350b2f
config: add -config-format option ( #3626 )
...
* config: refactor ReadPath(s) methods without side-effects
Return the sources instead of modifying the state.
* config: clean data dir before every test
* config: add tests for config-file and config-dir
* config: add -config-format option
Starting with Consul 1.0 all config files must have a '.json' or '.hcl'
extension to make it unambigous how the data should be parsed. Some
automation tools generate temporary files by appending a random string
to the generated file which obfuscates the extension and prevents the
file type detection.
This patch adds a -config-format option which can be used to override
the auto-detection behavior by forcing all config files or all files
within a config directory independent of their extension to be
interpreted as of this format.
Fixes #3620
2017-10-31 17:30:01 -05:00
Frank Schröder
a052255f86
vendor: update go-discover ( #3634 )
...
* vendor: update go-discover
Pull in providers:
* Aliyun (Alibaba Cloud)
* Digital Ocean
* OpenStack (os)
* Scaleway
* doc: use ... instead of xxx
* doc: strip trailing whitespace
* doc: add docs for aliyun, digitalocean, os and scaleway
* agent: fix test
2017-10-31 17:03:54 -05:00
James Phillips
a11c277f75
Changes "ip" to "IP".
2017-10-23 12:34:43 +02:00
Frank Schroeder
81917ee675
Merge pull request #3600 from hashicorp/support-go-sockaddr-for-dns-recursors
...
DNS recursors can be added through go-sockaddr templates. Entries
are deduplicated while the order is maintained.
Originally proposed by @taylorchu
See #2932
2017-10-23 10:45:36 +02:00
Frank Schroeder
0ca94055c4
Revert "doc: update docs for dns recursor go-sockaddr templates"
...
This reverts commit 6d4a57aedc
.
2017-10-23 10:08:35 +02:00
Frank Schroeder
42563dc73f
Revert "doc: address review comment"
...
This reverts commit 6ba9690e81
.
2017-10-23 10:08:35 +02:00
Frank Schroeder
703be5a219
Revert "Changes "ip" to "IP"."
...
This reverts commit dca5dcb68c
.
2017-10-23 10:08:35 +02:00
James Phillips
dca5dcb68c
Changes "ip" to "IP".
2017-10-23 08:01:25 +02:00
Frank Schroeder
6ba9690e81
doc: address review comment
2017-10-23 08:01:25 +02:00
Frank Schroeder
6d4a57aedc
doc: update docs for dns recursor go-sockaddr templates
2017-10-23 08:01:25 +02:00
James Phillips
3ab8b50133
Tweaks watch docs.
2017-10-21 20:09:37 -07:00
preetapan
bed69cefb2
Update watches.html.md
2017-10-21 20:59:47 -05:00
Preetha Appan
28a3901f10
Small grammar correction
2017-10-21 20:55:15 -05:00
Preetha Appan
cdb5f8c3c9
Improve HTTP handler documentation
2017-10-21 20:51:37 -05:00
Hadar Greinsmark
7e1a860978
Implement HTTP Watch handler ( #3413 )
...
Implement HTTP Watch handler
2017-10-21 20:39:09 -05:00
Frank Schroeder
8ad8331f7d
doc: address review comment
2017-10-20 20:06:33 +02:00
Frank Schroeder
2122f16a69
doc: update docs for dns recursor go-sockaddr templates
2017-10-20 15:51:49 +02:00
Johan Brandhorst
4ebdff30ef
Fixed indentation in Script + Interval
...
Remove newlines which were causing the text to not be rendered under the intended bullet point.
2017-10-20 14:02:31 +02:00
Jay
4d95a56b43
s/acesss/access ( #3593 )
...
Spell "access" correctly
2017-10-18 17:24:56 -07:00
Christopher "Chief" Najewicz
0b710b4a7a
Update docs for retry_join cloud discovery to include snippet around ( #3577 )
...
using HTTP_PROXY, HTTPS_PROXY and NO_PROXY env vars when needed
2017-10-17 16:05:44 -07:00
Kyle Havlovitz
4ab59af09e
Clarify the docs around script check timeout behavior
2017-10-11 14:55:55 -07:00
Kyle Havlovitz
106b8b0b33
Kill check processes after the timeout is reached ( #3567 )
...
* Kill check processes after the timeout is reached
Kill the subprocess spawned by a script check once the timeout is reached. Previously Consul just marked the check critical and left the subprocess around.
Fixes #3565 .
* Set err to non-nil when timeout occurs
* Fix check timeout test
* Kill entire process subtree on check timeout
* Add a docs note about windows subprocess termination
2017-10-11 11:57:39 -07:00
Frank Schröder
94f58199b1
agent: add option to discard health output ( #3562 )
...
* agent: add option to discard health output
In high volatile environments consul will have checks with "noisy"
output which changes every time even though the status does not change.
Since the output is stored in the raft log every health check update
unblocks a blocking call on health checks since the raft index has
changed even though the status of the health checks may not have changed
at all. By discarding the output of the health checks the users can
choose a different tradeoff. Less visibility on why a check failed in
exchange for a reduced change rate on the raft log.
* agent: discard output also when adding a check
* agent: add test for discard check output
* agent: update docs
* go vet
* Adds discard_check_output to reloadable config table.
* Updates the change log.
2017-10-10 17:04:52 -07:00