Commit Graph

18898 Commits

Author SHA1 Message Date
Luke Kysow 960c42854b
Remove terminal colouring from test output so it is (#14810)
more readable in CI.

```
Running primary verification step for case-ingress-gateway-multiple-services...
�[34;1mverify.bats
�[0m�[1G   ingress proxy admin is up on :20000�[K�[75G 1/12�[2G�[1G ✓ ingress proxy admin is up on :20000�[K
�[0m�[1G   s1 proxy admin is up on :19000�[K�[75G 2/12�[2G�[1G ✓ s1 proxy admin is up on :19000�[K
�[0m�[1G   s2 proxy admin is up on :19001�[K�[75G 3/12�[2G�[1G ✓ s2 proxy admin is up on :19001�[K
�[0m�[1G   s1 proxy listener should be up and have right cert�[K�[75G 4/12�[2G�[1G ✓ s1 proxy listener should be up and have right cert�[K
�[0m�[1G   s2 proxy listener should be up and have right cert�[K�[75G 5/12�[2G�[1G ✓ s2 proxy listener should be up and have right cert�[K
�[0m�[1G   ingress-gateway should have healthy endpoints for s1�[K�[75G 6/12�[2G�[31;1m�[1G ✗ ingress-gateway should have healthy endpoints for s1�[K
�[0m�[31;22m   (from function `assert_upstream_has_endpoints_in_status' in file /workdir/primary/bats/helpers.bash, line 385,
```

versus

```
Running primary verification step for case-ingress-gateway-multiple-services...
1..12
ok 1 ingress proxy admin is up on :20000
ok 2 s1 proxy admin is up on :19000
ok 3 s2 proxy admin is up on :19001
ok 4 s1 proxy listener should be up and have right cert
ok 5 s2 proxy listener should be up and have right cert
not ok 6 ingress-gateway should have healthy endpoints for s1
not ok 7 s1 proxy should have been configured with max_connections in services
ok 8 ingress-gateway should have healthy endpoints for s2
```
2022-10-04 08:35:19 -07:00
boruszak cf796ce330 More group fix attempts 2022-10-04 10:20:14 -05:00
boruszak b455e0d5c8 Tabs fix again 2022-10-04 10:00:53 -05:00
boruszak 631e7c1d7b Tab groups fix 2022-10-04 09:49:10 -05:00
trujillo-adam 6a7cda41a6
Apply suggestions from code review
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
2022-10-04 07:39:37 -07:00
boruszak 6d0f58ffe5 Minor fixes 2022-10-04 09:31:31 -05:00
boruszak 99639b1316 Installation instructions moved 2022-10-04 09:29:16 -05:00
Jeff Boruszak 9e7c83a129
Apply suggestions from code review
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-10-04 09:26:07 -05:00
boruszak aa4b44c27f Move Installation instructions 2022-10-04 09:07:37 -05:00
vanphan24 f5cb922dd0
first commit with overview page (#14827)
* Why Choose Consul

Co-authored-by: David Yu <dyu@hashicorp.com>
Co-authored-by: Jeff Boruszak <104028618+boruszak@users.noreply.github.com>
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2022-10-03 19:32:43 -07:00
Evan Culver 035e126fae
ci: Fix changelog-checker GHA workflow (#14842) 2022-10-03 16:49:24 -07:00
cskh 622804ad5b
fix flaky integration test (#14843) 2022-10-03 16:55:05 -04:00
boruszak 71b14a13fc PeerName changed to Peer - fix 2022-10-03 14:18:59 -05:00
boruszak 6eefbe0e9d Tutorial links 2022-10-03 14:08:57 -05:00
Jeff Boruszak 6b4d15f233
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 14:03:00 -05:00
Jeff Boruszak c1fedba08e
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 13:59:41 -05:00
Freddy d9fe3578ac
Merge pull request #14734 from hashicorp/NET-643-update-mesh-gateway-envoy-config-for-inbound-peering-control-plane-traffic 2022-10-03 12:54:11 -06:00
Jeff Boruszak 64dcb64d31
Update website/content/docs/connect/proxies/envoy.mdx 2022-10-03 13:54:08 -05:00
freddygv b15d41534f Update xds generation for peering over mesh gws
This commit adds the xDS resources needed for INBOUND traffic from peer
clusters:

- 1 filter chain for all inbound peering requests.
- 1 cluster for all inbound peering requests.
- 1 endpoint per voting server with the gRPC TLS port configured.

There is one filter chain and cluster because unlike with WAN
federation, peer clusters will not attempt to dial individual servers.
Peer clusters will only dial the local mesh gateway addresses.
2022-10-03 12:42:27 -06:00
Freddy 74b87d49d3
Merge pull request #14694 from hashicorp/peering/mgw-addrs 2022-10-03 12:35:11 -06:00
Jeff Boruszak dc61cc1914
Update website/content/docs/connect/dataplane/consul-dataplane.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-10-03 12:55:55 -05:00
boruszak f4731bf0df Installation isntructions 2022-10-03 12:52:07 -05:00
freddygv a8c4d6bc55 Share mgw addrs in peering stream if needed
This commit adds handling so that the replication stream considers
whether the user intends to peer through mesh gateways.

The subscription will return server or mesh gateway addresses depending
on the mesh configuration setting. These watches can be updated at
runtime by modifying the mesh config entry.
2022-10-03 11:42:20 -06:00
freddygv 4ff9d475b0 Return mesh gateway addrs if peering through mgw 2022-10-03 11:35:10 -06:00
Jeff Boruszak 12aa3cac4a
Apply suggestions from code review 2022-10-03 11:38:43 -05:00
Jeff Boruszak 69189e0381
Update website/content/docs/connect/cluster-peering/index.mdx 2022-10-03 11:36:48 -05:00
Luke Kysow de04344e47
Update tech-specs.mdx (#14840) 2022-10-03 09:21:42 -07:00
Jeff Boruszak d1d9fd0a5c
Update website/content/docs/connect/dataplane/index.mdx
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 11:16:00 -05:00
boruszak 80bbf8995b Removed external server constraint 2022-10-03 11:15:12 -05:00
boruszak d80601e96e proxy default behavior constraint 2022-10-03 11:14:34 -05:00
Jeff Boruszak eb9895422d
Apply suggestions from code review
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:58:43 -05:00
Jeff Boruszak b530c14032
Update website/content/docs/connect/dataplane/index.mdx
Co-authored-by: Riddhi Shah <riddhi@hashicorp.com>
2022-10-03 10:51:24 -05:00
chappie ad7295e5d9
Merge pull request #14811 from hashicorp/chappie/dns
Add DNS gRPC proxying support
2022-10-03 08:02:48 -07:00
trujillo-adam 70865aa0d6 applied feedback from review 2022-10-01 13:09:36 -07:00
Chris Chapman d7b5351b66
Making suggested comments 2022-09-30 15:03:33 -07:00
Chris Chapman 46bea72212
Making suggested changes 2022-09-30 14:51:12 -07:00
boruszak 80e3f15d47 Dynamic routing clarifications 2022-09-30 15:32:43 -05:00
David Yu a74d826b0e
updated 0.49.x helm docs (#14824) 2022-09-30 12:17:16 -07:00
boruszak 6866e89630 service-resolver alignment 2022-09-30 14:00:55 -05:00
Jeff Boruszak 443dc35c31
Apply suggestions from code review
Co-authored-by: Eric Haberkorn <erichaberkorn@gmail.com>
2022-09-30 14:00:37 -05:00
Curt Bushko 3faaa02a0c
Add OpenShift CNI to list of install options for kubernetes (#14793) 2022-09-30 11:52:15 -07:00
Michael Klein 0af2c3639e
fix link back to hcp not showing up (#14812) 2022-09-30 20:32:02 +02:00
Chris Chapman a05563b788
Update comment 2022-09-30 09:35:01 -07:00
David Yu eb5713ccbc
docs: admin partition docs improvements (#14774)
* docs: Update admin partitions versions and add requirement for unique `global.name`

Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
2022-09-30 09:13:44 -07:00
DanStough 7f8971d77f chore: fix flakey scada provider test 2022-09-30 11:56:40 -04:00
nrichu-hcp 47eb44fe35
Merge pull request #14807 from hashicorp/docs/nick-release-notes
docs: Consul K8s 0.49.x release notes
2022-09-30 11:39:35 -04:00
nrichu-hcp a9b8b1e48f
Update website/content/docs/release-notes/consul-k8s/v0_49_x.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-09-30 11:38:36 -04:00
nrichu-hcp f04cdeb991
Update website/content/docs/release-notes/consul-k8s/v0_49_x.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-09-30 11:38:29 -04:00
nrichu-hcp 1daf4dcaba
Update website/content/docs/release-notes/consul-k8s/v0_49_x.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-09-30 11:38:20 -04:00
nrichu-hcp d4f994a433
Update website/content/docs/release-notes/consul-k8s/v0_49_x.mdx
Co-authored-by: David Yu <dyu@hashicorp.com>
2022-09-30 11:38:10 -04:00