-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Backport of Default "stats_flush_interval" to 1 minute for Consul Telemetry Collector into release/1.16.x #19702
Closed
hc-github-team-consul-core
wants to merge
776
commits into
release/1.16.x
from
backport/consul-collector-reduce-flush-intervals/likely-loved-hog
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
change needed for fix in consul-enterprise
* feat: add container tests for resource http api with acl enabled * refactor: clean up
…erver, and getting envoy bootstrap params (#19049) * NET-5590 - authorization: check for identity:write in CA certs, xds server, and getting envoy bootstrap params * gofmt file
Whenver a traffic permission exists for a given workload identity, turn on default deny. Previously, this was only working at the port level.
fix explicit destination integration test
* updated architecture topic * fixed type in arch diagram filenames * fixed path to img file * updated index page - still need to add links * moved arch and tech specs to reference folder * moved other ref topics to ref folder * set up the Deploy folder and TF install topics * merged secure conf into TF deploy instructions * moved bind addr and route conf to their own topics * moved arch and tech specs back to main folder * update migrate-existing-tasks content * merged manual deploy content; added serv conf ref * fixed links * added procedure for upgrading to dataplanes * fixed linked reported by checker * added updates to dataplanes overview page * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> Co-authored-by: Ganesh S <[email protected]> * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> Co-authored-by: Ganesh S <[email protected]> * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> Co-authored-by: Ganesh S <[email protected]> * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> Co-authored-by: Ganesh S <[email protected]> * updated links and added redirects * removed old architecture content --------- Co-authored-by: Jeff Boruszak <[email protected]> Co-authored-by: Ganesh S <[email protected]>
…ET-3463 (#18959) * Add InboundPeerTrustBundle maps to Terminating Gateway * Add notify and cancelation of watch for inbound peer trust bundles * Pass peer trust bundles to the RBAC creation function * Regenerate Golden Files * add changelog, also adds another spot that needed peeredTrustBundles * Add basic test for terminating gateway with peer trust bundle * Add intention to cluster peered golden test * rerun codegen * update changelog * really update the changelog --------- Co-authored-by: Melisa Griffin <[email protected]>
Make raft-wal default when v2 catalog experiment is on
Add traffic permissions integration tests.
This PR fixes an issue where upstreams did not correctly inherit the proper namespace / partition from the parent service when attempting to fetch the upstream protocol due to inconsistent normalization. Some of the merge-service-configuration logic would normalize to default, while some of the proxycfg logic would normalize to match the parent service. Due to this mismatch in logic, an incorrect service-defaults configuration entry would be fetched and have its protocol applied to the upstream.
* updated nav; renamed L7 traffic folder * Added locality-aware routing to traffic mgmt overview * Added route to local upstreams topic * Updated agent configuration reference * Added locality param to services conf ref * Added locality param to conf entries * mentioned traffic management in proxies overview * added locality-aware to failover overview * added docs for service rate limiting * updated service defaults conf entry * Apply suggestions from code review Co-authored-by: Chris S. Kim <[email protected]> * Apply suggestions from code review Co-authored-by: Jeff Boruszak <[email protected]> Co-authored-by: Chris S. Kim <[email protected]> * updated links and added redirects --------- Co-authored-by: Chris S. Kim <[email protected]> Co-authored-by: Jeff Boruszak <[email protected]>
* logs for debugging * Init * white spaces fix * added change log * Fix tests * fix typo * using queryoptionfilter to populate args.filter * tests * fix test * fix tests * fix tests * fix tests * fix tests * fix variable name * fix tests * fix tests * fix tests * Update .changelog/18322.txt Co-authored-by: Ganesh S <[email protected]> * fix change log * address nits * removed unused line * doing join only when filter has nodemeta * fix tests * fix tests * Update agent/consul/catalog_endpoint.go Co-authored-by: R.B. Boyer <[email protected]> * fix tests * removed unwanted code --------- Co-authored-by: Ganesh S <[email protected]> Co-authored-by: R.B. Boyer <[email protected]>
stop windows integration tests
8f220e2
to
59e62c8
Compare
34f9d28
to
c567889
Compare
github-team-consul-core-pr-approver
approved these changes
Nov 20, 2023
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Auto approved Consul Bot automated PR
Closing to manually create a backport in another PR |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
pr/dependencies
PR specifically updates dependencies of project
theme/acls
ACL and token generation
theme/api
Relating to the HTTP API interface
theme/certificates
Related to creating, distributing, and rotating certificates in Consul
theme/cli
Flags and documentation for the CLI interface
theme/config
Relating to Consul Agent configuration, including reloading
theme/connect
Anything related to Consul Connect, Service Mesh, Side Car Proxies
theme/consul-terraform-sync
Relating to Consul Terraform Sync and Network Infrastructure Automation
theme/contributing
Additions and enhancements to community contributing materials
theme/envoy/xds
Related to Envoy support
theme/health-checks
Health Check functionality
theme/internals
Serf, Raft, SWIM, Lifeguard, Anti-Entropy, locking topics
theme/telemetry
Anything related to telemetry or observability
theme/tls
Using TLS (Transport Layer Security) or mTLS (mutual TLS) to secure communication
theme/ui
Anything related to the UI
type/ci
Relating to continuous integration (CI) tooling for testing or releases
type/docs
Documentation needs to be created/updated/clarified
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Backport
This PR is auto-generated from #19663 to be assessed for backporting due to the inclusion of the label backport/1.16.
The below text is copied from the body of the original PR.
Description
Context
We want to reduce the number of metrics processed by the Consul Telemetry Collector.
By default, Envoy has a
stats_flush_interval
of 5 seconds (docs)Changes
stats_flush_interval
to 1 minute (60 seconds). However, we avoid doing this override in 2 cases:envoy_stats_flush_interval
, we don't want to override their use case.envoy_statsd_url
,envoy_dogstatsd_url
orenvoy_extra_stats_sinks_json
. In order to address all these cases, we can simply check for an emptyargs.StatsSinksJSON
after the stats sinks are built up and before the collector sink is setup.Testing & Reproduction steps
Setup
Makefile
command to copy bootstrap config inconsul-dataplane
by modifying the url to be my branch.consul-dataplane
Docker images that I deployed to my own docker.io.View helm value overrides
Scenario 1: No custom stats sink / no custom flush interval
4.🥳 After the above installation with the new consul-dataplane image and the collector deployed, we see the default
![Screenshot 2023-11-15 at 9 37 41 PM](https://private-user-images.githubusercontent.com/23405655/283502940-cfdd0570-14ce-4bde-a303-35e9d7b22510.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.G8GLjTiyVTY2pO65NPgM92DsEQ5retY02fYYPRDdUt8)
stats_flush_interval
is60s
.Scenario 2: Custom flush interval
10s
as expectedScenario 3: Custom sinks
Links
PR Checklist
Overview of commits