Freddy
829a2a8722
Merge pull request #14364 from hashicorp/peering/term-delete
2022-08-29 15:33:18 -06:00
Max Bowsher
decc9231ee
Merge branch 'main' into fix-kv_entries-metric
2022-08-29 22:22:10 +01:00
Chris S. Kim
5010fa5c03
Merge pull request #14371 from hashicorp/kisunji/peering-metrics-update
...
Adjust metrics reporting for peering tracker
2022-08-29 17:16:19 -04:00
Eric Haberkorn
77918d9dea
Fix a breaking change to the API package introduced in #13835 ( #14378 )
...
`QueryDatacenterOptions` was renamed to `QueryFailoverOptions` without creating
an alias. This adds `QueryDatacenterOptions` back as an alias to
`QueryFailoverOptions` and marks it is deprecated.
2022-08-29 16:59:27 -04:00
Austin Workman
b6f2b6c94f
Add support for S3 path based addressing
2022-08-29 14:46:02 -06:00
Chris S. Kim
74ddf040dd
Add heartbeat timeout grace period when accounting for peering health
2022-08-29 16:32:26 -04:00
David Yu
e6b63221eb
docs: Cluster peering with Transparent Proxy updates ( #14369 )
...
* Update Cluster Peering docs to show example with Transparent Proxy
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-29 13:07:08 -07:00
Derek Menteer
ce99ccd390
Add documentation and changelog entry.
2022-08-29 13:43:49 -05:00
Derek Menteer
0ceec9017b
Expose grpc_tls
via serf for cluster peering.
2022-08-29 13:43:49 -05:00
Derek Menteer
1255a8a20d
Add separate grpc_tls port.
...
To ease the transition for users, the original gRPC
port can still operate in a deprecated mode as either
plain-text or TLS mode. This behavior should be removed
in a future release whenever we no longer support this.
The resulting behavior from this commit is:
`ports.grpc > 0 && ports.grpc_tls > 0` spawns both plain-text and tls ports.
`ports.grpc > 0 && grpc.tls == undefined` spawns a single plain-text port.
`ports.grpc > 0 && grpc.tls != undefined` spawns a single tls port (backwards compat mode).
2022-08-29 13:43:43 -05:00
David Yu
daa30a03c3
docs: Update Consul K8s release notes ( #14379 )
2022-08-29 11:34:39 -07:00
freddygv
d3955bd84c
Add changelog entry
2022-08-29 12:31:13 -06:00
freddygv
310608fb19
Add validation to prevent switching dialing mode
...
This prevents unexpected changes to the output of ShouldDial, which
should never change unless a peering is deleted and recreated.
2022-08-29 12:31:13 -06:00
Eric Haberkorn
72f90754ae
Update max_ejection_percent on outlier detection for peered clusters to 100% ( #14373 )
...
We can't trust health checks on peered services when service resolvers,
splitters and routers are used.
2022-08-29 13:46:41 -04:00
DanStough
d8cb7731dd
chore: add multi-arch docker build for testing
2022-08-29 12:01:31 -04:00
Chris S. Kim
def529edd3
Rename test
2022-08-29 10:34:50 -04:00
Chris S. Kim
93271f649c
Fix test
2022-08-29 10:20:30 -04:00
Eric Haberkorn
1099665473
Update the structs and discovery chain for service resolver redirects to cluster peers. ( #14366 )
2022-08-29 09:51:32 -04:00
Chris S. Kim
4d97e2f936
Adjust metrics reporting for peering tracker
2022-08-26 17:34:17 -04:00
David Yu
b1ba0a89bc
docs: Release notes for Consul 1.12, 1.13 and Consul K8s 0.47.0 ( #14352 )
...
* consul 1.12, consul 1.13, and consul-k8s release notes
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-08-26 13:37:41 -07:00
freddygv
650e48624d
Allow terminated peerings to be deleted
...
Peerings are terminated when a peer decides to delete the peering from
their end. Deleting a peering sends a termination message to the peer
and triggers them to mark the peering as terminated but does NOT delete
the peering itself. This is to prevent peerings from disappearing from
both sides just because one side deleted them.
Previously the Delete endpoint was skipping the deletion if the peering
was not marked as active. However, terminated peerings are also
inactive.
This PR makes some updates so that peerings marked as terminated can be
deleted by users.
2022-08-26 10:52:47 -06:00
Thomas Eckert
e64a28516d
Merge pull request #14347 from hashicorp/update-terminating-gateway-docs
...
Update Kubernetes Terminating Gateway Docs
2022-08-26 12:52:09 -04:00
smamindla57
eb0c5bb9a1
Updated consul monitoring with Newrelic APM ( #14360 )
...
* added newrelic consul quickstart link
* adding HCP Consul
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-08-26 09:13:46 -07:00
Chris S. Kim
70cf9a610b
Merge pull request #11742 from dekimsey/catalog-service-list-filter
...
Add support for filtering the 'List Services' API
2022-08-26 11:35:20 -04:00
Chris S. Kim
87962b9713
Merge branch 'main' into catalog-service-list-filter
2022-08-26 11:16:06 -04:00
Chris S. Kim
e2fe8b8d65
Fix tests for enterprise
2022-08-26 11:14:02 -04:00
Chris S. Kim
6ddcc04613
Replace ring buffer with async version ( #14314 )
...
We need to watch for changes to peerings and update the server addresses which get served by the ring buffer.
Also, if there is an active connection for a peer, we are getting up-to-date server addresses from the replication stream and can safely ignore the token's addresses which may be stale.
2022-08-26 10:27:13 -04:00
alex
30ff2e9a35
peering: add peer health metric ( #14004 )
...
Signed-off-by: acpana <8968914+acpana@users.noreply.github.com>
2022-08-25 16:32:59 -07:00
Dao Thanh Tung
fead3c537b
Fix Consul KV CLI 'GET' flags 'keys' and 'recurse' to be set together ( #13493 )
...
allow flags -recurse and -keys to be run at the same time in consul kv get CLI
2022-08-25 18:21:49 -04:00
Jared Kirschner
21bc0add9a
Merge pull request #13932 from hashicorp/docs/crossref-maint-mode-from-health-checks
...
docs: improve health check related docs
2022-08-25 16:56:30 -04:00
Jared Kirschner
20f291fa06
docs: improve health check related docs
...
Includes:
- Improved scannability and organization of checks overview
- Checks overview includes more guidance on
- How to register a health check
- The options available for a health check definition
- Contextual cross-references to maintenance mode
2022-08-25 13:47:22 -07:00
Thomas Eckert
70a1cbd8ea
Capitalize Helm
2022-08-25 14:44:45 -04:00
Thomas Eckert
5064fbc254
Add links to requirements
2022-08-25 14:44:33 -04:00
Thomas Eckert
ed4a430b3e
Use tabs for destinations
2022-08-25 14:40:18 -04:00
Thomas Eckert
77c9995a8e
Lil' more cleanup
2022-08-25 14:04:33 -04:00
Thomas Eckert
6d9872388b
Clean up copy in ACL role update
2022-08-25 14:03:43 -04:00
Thomas Eckert
e990b03d5c
Normalize table with nobrs
2022-08-25 13:56:13 -04:00
Thomas Eckert
a2a7b56292
Format traffic behaviors table
2022-08-25 13:37:52 -04:00
Thomas Eckert
65dce3476f
Clean up copy for registration
2022-08-25 13:27:43 -04:00
Thomas Eckert
884dda25c2
Use tabs for with and without TLS
2022-08-25 13:02:55 -04:00
Thomas Eckert
ac129339f8
Instruct users to use the CLI
2022-08-25 12:49:54 -04:00
Thomas Eckert
4d40d02c73
Remove warning about 1.9
2022-08-25 12:45:57 -04:00
Chris S. Kim
181063cd23
Exit loop when context is cancelled
2022-08-25 11:48:25 -04:00
Evan Culver
8e6b6a49a2
docs: Update Envoy support matrix to match the code ( #14338 )
2022-08-24 17:04:26 -07:00
cskh
41aea65214
Fix: the inboundconnection limit filter should be placed in front of http co… ( #14325 )
...
* fix: the inboundconnection limit should be placed in front of http connection manager
Co-authored-by: Freddy <freddygv@users.noreply.github.com>
2022-08-24 14:13:10 -04:00
Derek Menteer
8f27a077cb
Add 14269 changelog entry.
2022-08-24 12:51:13 -05:00
skpratt
919da33331
no-op: refactor usagemetrics tests for clarity and DRY cases ( #14313 )
2022-08-24 12:00:09 -05:00
Pablo Ruiz García
1f293e5244
Added new auto_encrypt.grpc_server_tls config option to control AutoTLS enabling of GRPC Server's TLS usage
...
Fix for #14253
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-08-24 12:31:38 -04:00
DanStough
ca228aad8d
doc: tproxy destination fixes
2022-08-24 11:31:05 -04:00
Tyler Wendlandt
cdc6fd89d3
ui: Replace file-mask with file-text icon usage on policy list ( #14275 )
2022-08-24 06:44:01 -06:00