Commit Graph

114 Commits

Author SHA1 Message Date
James Rasell
dda9207b06 Update Consul check params from using health-check to check. 2018-03-20 16:03:58 +01:00
James Rasell
2439310951 Allow Nomads Consul health checks to be configurable.
This change allows the client HTTP and the server HTTP, Serf and
RPC health check names within Consul to be configurable with the
defaults as previous. The configuration can be done via either a
config file or using CLI flags.

Closes #3988
2018-03-19 19:37:56 +01:00
Josh Soref
871370c8d2 spelling: submitted 2018-03-11 18:59:27 +00:00
Josh Soref
ef6a98388a spelling: shutdown 2018-03-11 18:55:49 +00:00
Josh Soref
c24820e5ee spelling: each other 2018-03-11 17:56:50 +00:00
Josh Soref
00e0ac85f0 spelling: authoritative 2018-03-11 17:42:05 +00:00
Josh Soref
ed82e98880 spelling: artifact 2018-03-11 17:41:02 +00:00
Mahmood Ali
abfae77545 Add tags option to datadog telemetry
Expose an global tags option in telemetry config for dogstatsd, for
purposes of distinguishing between multiple nomad cluster metrics.
2018-02-06 12:08:37 -05:00
Chelsea Holland Komlo
517030157e swap raft layer tls wrapper 2018-01-19 17:00:15 -05:00
Chelsea Holland Komlo
0805c41196 fixing up raft reload tests
close second goroutine in raft-net
2018-01-17 10:29:15 -05:00
Chelsea Holland Komlo
bbc56860ac adding additional test assertions; differentiate reloading agent and http server 2018-01-16 07:34:39 -05:00
Chelsea Holland Komlo
11089b23ce reload raft transport layer
fix up linting
2018-01-08 14:52:28 -05:00
Chelsea Holland Komlo
c70702e802 call reload on agent, client, and server separately 2018-01-08 09:56:31 -05:00
Chelsea Holland Komlo
a4af400fd1 don't ignore error in http reloading
code review feedback
2018-01-08 09:21:06 -05:00
Chelsea Holland Komlo
359358d240 code review fixups 2018-01-08 09:21:06 -05:00
Chelsea Holland Komlo
d4754d541b fixups from code review
Revert "close raft long-lived connections"

This reverts commit 3ffda28206fcb3d63ad117fd1d27ae6f832b6625.

reload raft connections on changing tls
2018-01-08 09:21:06 -05:00
Chelsea Holland Komlo
7b749579a2 add ability to upgrade/downgrade nomad agents tls configurations via sighup 2018-01-08 09:21:06 -05:00
Kyle Havlovitz
de90db139a Added support for v2 raft APIs and -raft-protocol option 2017-12-12 10:17:16 -06:00
Alex Dadgar
f8807cee5d Merge pull request #3555 from PagerDuty/fix-loop-on-sigpipe
Do not emit logs on SIGPIPE since logging service could be unavailable
2017-12-04 14:11:05 -08:00
Alex Dadgar
74ec709629 Emit hostname as a label 2017-12-04 10:42:31 -08:00
Max Timchenko
46493d8670 Do not emit logs on SIGPIPE since logging service could be unavailable
This should fix https://github.com/hashicorp/nomad/issues/3554
2017-11-15 18:01:41 +02:00
Chelsea Komlo
fa9fd4422c Nomad agent reload TLS configuration on SIGHUP (#3479)
* Allow server TLS configuration to be reloaded via SIGHUP

* dynamic tls reloading for nomad agents

* code cleanup and refactoring

* ensure keyloader is initialized, add comments

* allow downgrading from TLS

* initalize keyloader if necessary

* integration test for tls reload

* fix up test to assert success on reloaded TLS configuration

* failure in loading a new TLS config should remain at current

Reload only the config if agent is already using TLS

* reload agent configuration before specific server/client

lock keyloader before loading/caching a new certificate

* introduce a get-or-set method for keyloader

* fixups from code review

* fix up linting errors

* fixups from code review

* add lock for config updates; improve copy of tls config

* GetCertificate only reloads certificates dynamically for the server

* config updates/copies should be on agent

* improve http integration test

* simplify agent reloading storing a local copy of config

* reuse the same keyloader when reloading

* Test that server and client get reloaded but keep keyloader

* Keyloader exposes GetClientCertificate as well for outgoing connections

* Fix spelling

* correct changelog style
2017-11-14 17:53:23 -08:00
Alex Dadgar
90272052ef format 2017-11-10 12:47:59 -08:00
James Powis
6d3cc25097 [3503] adding consul-address flag to command.go 2017-11-04 18:05:20 -06:00
Alex Dadgar
53dbc4f127 remove atlas 2017-11-02 11:27:21 -07:00
Alex Dadgar
21c2ba33e5 403 instead of 500 for permission denied 2017-10-12 14:10:20 -07:00
Alex Dadgar
5d724d619d ACL command options 2017-10-12 13:51:39 -07:00
James Rasell
f98f403401 Update agent CLI to include Consul config option flags.
This update introduces command line flags for all Consul options
thus allowing users to both use a config file and CLI options to
configure Consul.

Website documentation has also been updated.

Closes #3304
2017-10-05 14:26:26 +01:00
Chelsea Holland Komlo
6cba6549a5 fix bug to return prometheus sink 2017-09-13 19:21:21 +00:00
Chelsea Holland Komlo
59a891cb27 enabling prometheus metrics should be a config option 2017-09-13 19:21:21 +00:00
Chelsea Holland Komlo
815b23fe06 add endpoint for prometheus 2017-09-13 19:21:21 +00:00
Chelsea Holland Komlo
4085560503 add http endpoint for in memory metrics
prevent against flaky test due to timing/initialization issues
2017-09-06 13:51:19 +00:00
Alex Dadgar
c26ecb7092 Add version package
This PR adds a version package and consolidates version strings into a
Version struct.
2017-08-16 15:44:21 -07:00
Alex Dadgar
25ada7bbab Don't print atlas 2017-07-19 20:25:06 -07:00
Alex Dadgar
8a371e0bd4 Fix predictor 2017-07-19 11:51:01 -07:00
Alex Dadgar
3127ce320c Agent command autocompletes to hcl/json files 2017-07-19 11:28:16 -07:00
Adam Stankiewicz
4d465091dd Remove unnecessary parameter from NewHTTPServer 2017-04-10 16:24:49 +02:00
Alex Dadgar
6ac999a5e5 Flush logs on err 2017-03-14 14:48:39 -07:00
Sean Chittenden
6fc901a8f3 Change the default display name from the Circonus Instance ID to
`Nomad`.

The display name is already scoped to target/host.
2017-02-24 14:59:11 -08:00
Alex Dadgar
258ed556ba Vault Client on Server handles SIGHUP
This PR allows the Vault client on the server to handle a SIGHUP. This
allows updating the Vault token and any other configuration without
downtime.
2017-02-01 14:24:10 -08:00
Alex Dadgar
9b11f269e3 Add command line flag for create-from-role 2017-01-27 14:11:34 -08:00
Jorge Marey
a39cebb744 Add option to set nodename instead of hostname on telemetry values 2016-12-21 09:53:29 +01:00
Alex Dadgar
96cbf337c1 Move parsing of vault token above validation such that it works in dev mode 2016-11-10 11:47:43 -08:00
Michael Schurter
fa67fb6a71 Merge pull request #1955 from hashicorp/b-fix-default-advertise
Choose safer default advertise address
2016-11-09 16:03:17 -08:00
matt maier
e607c6f329 Update Circonus integration expose Check Display Name and Check Tags
configuration options.
2016-11-09 15:12:30 -05:00
Michael Schurter
1304ba8b2d Addresses are just addresses - no ports
Store address+port in an unexported field for ease-of-use
2016-11-09 11:49:55 -08:00
Michael Schurter
5cc435ab3e Move config normalization into config.go to ease testing 2016-11-08 15:44:10 -08:00
Michael Schurter
581d6a5320 Handle missing ports in addresses 2016-11-08 13:44:41 -08:00
Michael Schurter
2c4b19f1a6 Refactor getAdvertise into a func 2016-11-08 13:06:56 -08:00
Michael Schurter
3dab50318e Failure to resolve advertise address isn't fatal 2016-11-08 11:17:22 -08:00