Commit Graph

3750 Commits

Author SHA1 Message Date
Chris Baker
8abb414810 Update website/content/docs/autoscaling/agent.mdx 2021-02-22 15:20:58 -06:00
Luiz Aoqui
5b5f94d9dc docs: expand Autoscaler SIGHUP documentation 2021-02-22 15:38:26 -05:00
Cathy Chang
a4d99a87f4 docs: clarify log_rotate_max_files 2021-02-19 09:37:55 -05:00
Tim Gross
a68abe340d docs: clarify type constraints for collections in locals
HCL2 locals don't have type constraints, and the map syntax is interpreted as
an object. So users may need to explictly convert to map for some functions.

The `convert` function documentation was missing the required type constructor
parameter for collections.
2021-02-17 14:45:05 -05:00
Tim Gross
1a1e280bd4 docs: clarify that block labels can't be interpolated in HCL2
Block labels are not expressions so they can't be interpolated without hacks
like `dynamic` blocks. Clarify this so that we don't confuse users who
shouldn't need to dig into the subtle nuances between expressions and blocks.
2021-02-17 11:53:06 -05:00
Tim Gross
db8ce30074 docs: remove artifact destination interpolation warning 2021-02-17 09:52:27 -05:00
Charlie Voiselle
def4d61617 Merge pull request #10020 from hashicorp/docs-update-install-brew
Updated Homebrew install instructions
2021-02-12 11:52:59 -05:00
Seth Hoenig
a2daa3c08a docs: update ingress gateway runnable demo
Using the environment variable stopped working here a while back,
should be using the port label. Also upgrade to uuid-api:v5 which
supports linux/arm64.
2021-02-12 10:10:16 -06:00
Charlie Voiselle
3232d5b0fe Updated Homebrew install instructions 2021-02-11 18:42:18 -05:00
Shantanu Gadgil
2a50f73ed2 The encryption key uses 32 bytes now
The encryption key uses 32 bytes now, not 16 bytes
2021-02-11 08:34:39 -05:00
Mark Lewis
d8a7c6f3f2 Fix typo (#10008) 2021-02-10 14:43:11 -06:00
Karan Sharma
06744e0f9d fix: docs/job-specification change mounts to mount
Since [mounts](https://www.nomadproject.io/docs/drivers/docker#mounts) is deprecated,
switch to newer `mount` in `task.config` for `docker` driver.
2021-02-10 08:24:58 -05:00
Seth Hoenig
c7b5ae65fd Merge pull request #9990 from hashicorp/f-nsiso-task
drivers/exec+java: Add task configuration to restore previous PID/IPC isolation behavior
2021-02-09 13:29:14 -06:00
Seth Hoenig
af48777ddd consul/connect: enable custom sidecars to use expose checks
This PR enables jobs configured with a custom sidecar_task to make
use of the `service.expose` feature for creating checks on services
in the service mesh. Before we would check that sidecar_task had not
been set (indicating that something other than envoy may be in use,
which would not support envoy's expose feature). However Consul has
not added support for anything other than envoy and probably never
will, so having the restriction in place seems like an unnecessary
hindrance. If Consul ever does support something other than Envoy,
they will likely find a way to provide the expose feature anyway.

Fixes #9854
2021-02-09 10:49:37 -06:00
Bryce Kalow
7366fa7623 website: update next and nextjs-scripts (#9957) 2021-02-08 16:53:32 -06:00
Seth Hoenig
836ee9e4a2 drivers/exec+java: Add task configuration to restore previous PID/IPC isolation behavior
This PR adds pid_mode and ipc_mode options to the exec and java task
driver config options. By default these will defer to the default_pid_mode
and default_ipc_mode agent plugin options created in #9969. Setting
these values to "host" mode disables isolation for the task. Doing so
is not recommended, but may be necessary to support legacy job configurations.

Closes #9970
2021-02-08 14:26:35 -06:00
Tim Gross
6006980870 document that Nomad ENT cannot be downgraded to Nomad OSS 2021-02-08 14:09:45 -05:00
Drew Bailey
24c0e3ccf5 address pr comments 2021-02-08 13:43:05 -05:00
Seth Hoenig
ce4b59c346 docs: clarify PID
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:57 -06:00
Seth Hoenig
ede2a635a0 docs: shorten IPC
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:42 -06:00
Seth Hoenig
0980482251 docs: clarify PID
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:31 -06:00
Seth Hoenig
134eebbd60 docs: shorten IPC
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:19 -06:00
Seth Hoenig
1364e33fed docs: capitalize posix
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:52:08 -06:00
Seth Hoenig
779c90db09 docs: capitalize posix
Co-authored-by: Chris Baker <1675087+cgbaker@users.noreply.github.com>
2021-02-08 10:51:55 -06:00
Drew Bailey
74e7bbb7d2 e2e test for on_update service checks
check_restart not compatible with on_update=ignore

reword caveat
2021-02-08 08:32:40 -05:00
Drew Bailey
5c30148334 OnUpdate configuration for services and checks
Allow for readiness type checks by configuring nomad to ignore warnings
or errors reported by a service check. This allows the deployment to
progress and while Consul handles introducing the sercive into a
resource pool once the check passes.
2021-02-08 08:32:40 -05:00
Seth Hoenig
b682371a22 drivers/exec+java: Add configuration to restore previous PID/IPC namespace behavior.
This PR adds default_pid_mode and default_ipc_mode options to the exec and java
task drivers. By default these will default to "private" mode, enabling PID and
IPC isolation for tasks. Setting them to "host" mode disables isolation. Doing
so is not recommended, but may be necessary to support legacy job configurations.

Closes #9969
2021-02-05 15:52:11 -06:00
Mike Wickett
0078854ed3 website: update community page to be consistent with other projects (#9863) 2021-02-05 13:54:59 -05:00
Alex Chan
744c4470b9 Correct the spelling of heirarchical/hierarchical (#9980) 2021-02-05 09:23:30 -06:00
Alex Iribarren
79e3c3a509 Replace &lsquo; and &apos; with ' 2021-02-05 08:36:38 -05:00
Xopherus
e45a1246cc Fix aws secret key name in autoscaler aws target
- aws secret key is named incorrectly in the target docs.
  It needs to match what is in the nomad-autoscaler repo
  (see link below), otherwise the autoscaler will default to AWS sdk
  behavior, which could end up using an IAM instance profile
  or other environment variables instead of what is passed into the
  autoscaler config file.

Ref: e60fb5268d/plugins/builtin/target/aws-asg/plugin/plugin.go (L27)
2021-02-03 16:56:12 -05:00
Tim Gross
fa05789a94 docs: remove mbits examples from documentation 2021-02-02 10:10:44 -05:00
Chris Baker
82011c24ce Merge pull request #9929 from hashicorp/changli0617-patch-1
Update alert-banner.js
2021-01-29 13:58:15 -06:00
Chris Baker
a197578eeb update latest version on website 2021-01-29 19:55:13 +00:00
Chris Baker
c6bbb92478 Update website/data/alert-banner.js 2021-01-29 13:53:17 -06:00
changli0617
5320ebe852 Update alert-banner.js 2021-01-29 11:47:24 -08:00
Chris Baker
352df9c222 vesion-specific upgrade guide for 1.0.3 and 0.12.10 2021-01-29 19:41:48 +00:00
Tim Gross
3b42d75225 docs: add metrics from raft leadership transitions 2021-01-27 11:50:11 -05:00
James Rasell
0d795bdac1 docs: clarify where variables can be placed with HCLv2. 2021-01-26 12:29:58 +01:00
Seth Hoenig
ceae8ad1cf consul/connect: Add support for Connect terminating gateways
This PR implements Nomad built-in support for running Consul Connect
terminating gateways. Such a gateway can be used by services running
inside the service mesh to access "legacy" services running outside
the service mesh while still making use of Consul's service identity
based networking and ACL policies.

https://www.consul.io/docs/connect/gateways/terminating-gateway

These gateways are declared as part of a task group level service
definition within the connect stanza.

service {
  connect {
    gateway {
      proxy {
        // envoy proxy configuration
      }
      terminating {
        // terminating-gateway configuration entry
      }
    }
  }
}

Currently Envoy is the only supported gateway implementation in
Consul. The gateay task can be customized by configuring the
connect.sidecar_task block.

When the gateway.terminating field is set, Nomad will write/update
the Configuration Entry into Consul on job submission. Because CEs
are global in scope and there may be more than one Nomad cluster
communicating with Consul, there is an assumption that any terminating
gateway defined in Nomad for a particular service will be the same
among Nomad clusters.

Gateways require Consul 1.8.0+, checked by a node constraint.

Closes #9445
2021-01-25 10:36:04 -06:00
Steven Collins
ae91c836f5 Adds community USB plugin to documentation site 2021-01-25 10:15:36 -05:00
zzhai
1f71e9dae4 Update syntax.mdx
"one label"
should be the singular form.
2021-01-25 08:42:59 -05:00
Jeff Escalante
251b07099c update dependencies, removed unused dependency (#9878) 2021-01-22 21:24:26 -05:00
Tim Gross
a5b926c09e docs: check_restart is now supported for group services 2021-01-22 10:55:40 -05:00
Mahmood Ali
dccc573ca1 docs: remove timestamp hcl2 function (#9867)
timestamp isn't actually implemented
2021-01-21 10:29:50 -05:00
Marcus Naughton
59271739b9 Update server_join.mdx
Fixed Markdown for GCP example.
2021-01-19 16:47:12 -05:00
Drew Bailey
4fd633e010 remove invalid duplicate (#9850) 2021-01-19 11:03:06 -05:00
Shishir Mahajan
289a7e8917 Update FSIsolation from none to image. 2021-01-15 08:01:04 -05:00
Drew Bailey
57cdad28c5 bump upgrade guide version (#9822)
* bump upgrade guide version

* drop 1.0.3 until there are upgrade specifics
2021-01-14 16:18:54 -05:00
Drew Bailey
893777a8fd bump website version (#9820) 2021-01-14 15:12:39 -05:00