This project is mirrored from https://gitee.com/mirrors/nomad.git. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
  1. 27 Aug, 2021 1 commit
  2. 25 Aug, 2021 1 commit
  3. 11 Aug, 2021 2 commits
    • Blake Covarrubias's avatar
      docs: Remove note on ingress gateway hosts field needing a port number · 291bbd7b
      Blake Covarrubias authored
      Update the ingress gateway documentation to remove the note stating
      that a port must be specified for values in the `hosts` field when
      the ingress gateway is listening on a non-standard HTTP port.
      
      Specifying a port was required in Consul 1.8.0, but that requirement
      was removed in 1.8.1 with hashicorp/consul#8190 which made Consul
      include the port number when constructing the Envoy configuration.
      
      Related Consul docs PR: hashicorp/consul#10827
      291bbd7b
    • Tim Gross's avatar
      docs: note CNI requirement for bridge networking · d6a37a68
      Tim Gross authored
      Using `bridge` networking requires that you have CNI plugins installed
      on the client, but this isn't in the jobspec `network` docs which are
      the first place someone will look when trying to configure task
      networking.
      d6a37a68
  4. 03 Aug, 2021 1 commit
    • Seth Hoenig's avatar
      core: implement system batch scheduler · 61ee443e
      Seth Hoenig authored
      This PR implements a new "System Batch" scheduler type. Jobs can
      make use of this new scheduler by setting their type to 'sysbatch'.
      
      Like the name implies, sysbatch can be thought of as a hybrid between
      system and batch jobs - it is for running short lived jobs intended to
      run on every compatible node in the cluster.
      
      As with batch jobs, sysbatch jobs can also be periodic and/or parameterized
      dispatch jobs. A sysbatch job is considered complete when it has been run
      on all compatible nodes until reaching a terminal state (success or failed
      on retries).
      
      Feasibility and preemption are governed the same as with system jobs. In
      this PR, the update stanza is not yet supported. The update stanza is sill
      limited in functionality for the underlying system scheduler, and is
      not useful yet for sysbatch jobs. Further work in #4740 will improve
      support for the update stanza and deployments.
      
      Closes #2527
      61ee443e
  5. 28 Jun, 2021 2 commits
    • Tim Gross's avatar
      7edf0cc1
    • Boris Shomodjvarac's avatar
      docs: update csi_plugin example (#10821) · 2cd8f3ae
      Boris Shomodjvarac authored
      Current efs driver does not support telling it if its a `node` or a `controller`, and it will not print any error it will just ignore all other parameters then:(
      So this will result in endpoint being `/tmp/csi.sock` and not `/csi/csi.sock` which will in turn break nomad/csi integration.
      
      Also I changed the latest image tag to v1.3.2 to make sure anybody copy pasting this example is sure that it will work.
      
      Tested on nomad 1.1.2
      2cd8f3ae
  6. 22 Jun, 2021 1 commit
  7. 17 Jun, 2021 1 commit
  8. 04 Jun, 2021 2 commits
    • Seth Hoenig's avatar
      consul/connect: fix upstream mesh gateway default mode setting · 37b49ba5
      Seth Hoenig authored
      This PR fixes the API to _not_ set the default mesh gateway mode. Before,
      the mode would be set to "none" in Canonicalize, which is incorrect. We
      should pass through the empty string so that folks can make use of Consul
      service-defaults Config entries to configure the default mode.
      37b49ba5
    • Seth Hoenig's avatar
      consul/connect: add support for connect mesh gateways · 312161c5
      Seth Hoenig authored
      This PR implements first-class support for Nomad running Consul
      Connect Mesh Gateways. Mesh gateways enable services in the Connect
      mesh to make cross-DC connections via gateways, where each datacenter
      may not have full node interconnectivity.
      
      Consul docs with more information:
      https://www.consul.io/docs/connect/gateways/mesh-gateway
      
      The following group level service block can be used to establish
      a Connect mesh gateway.
      
      service {
        connect {
          gateway {
            mesh {
              // no configuration
            }
          }
        }
      }
      
      Services can make use of a mesh gateway by configuring so in their
      upstream blocks, e.g.
      
      service {
        connect {
          sidecar_service {
            proxy {
              upstreams {
                destination_name = "<service>"
                local_bind_port  = <port>
                datacenter       = "<datacenter>"
                mesh_gateway {
                  mode = "<mode>"
                }
              }
            }
          }
        }
      }
      
      Typical use of a mesh gateway is to create a bridge between datacenters.
      A mesh gateway should then be configured with a service port that is
      mapped from a host_network configured on a WAN interface in Nomad agent
      config, e.g.
      
      client {
        host_network "public" {
          interface = "eth1"
        }
      }
      
      Create a port mapping in the group.network block for use by the mesh
      gateway service from the public host_network, e.g.
      
      network {
        mode = "bridge"
        port "mesh_wan" {
          host_network = "public"
        }
      }
      
      Use this port label for the service.port of the mesh gateway, e.g.
      
      service {
        name = "mesh-gateway"
        port = "mesh_wan"
        connect {
          gateway {
            mesh {}
          }
        }
      }
      
      Currently Envoy is the only supported gateway implementation in Consul.
      By default Nomad client will run the latest official Envoy docker image
      supported by the local Consul agent. The Envoy task can be customized
      by setting `meta.connect.gateway_image` in agent config or by setting
      the `connect.sidecar_task` block.
      
      Gateways require Consul 1.8.0+, enforced by the Nomad scheduler.
      
      Closes #9446
      312161c5
  9. 03 Jun, 2021 1 commit
  10. 21 May, 2021 1 commit
  11. 17 May, 2021 1 commit
  12. 13 May, 2021 1 commit
  13. 10 May, 2021 1 commit
  14. 07 May, 2021 2 commits
  15. 05 May, 2021 1 commit
  16. 03 May, 2021 1 commit
  17. 30 Apr, 2021 1 commit
  18. 13 Apr, 2021 1 commit
  19. 09 Apr, 2021 1 commit
  20. 08 Apr, 2021 1 commit
  21. 07 Apr, 2021 1 commit
    • Tim Gross's avatar
      docs: update CSI create/register fields · 73c95a92
      Tim Gross authored
      Add new `access_mode`/`attachment_mode` fields. Make it more clear which set
      of fields belong to create vs register. Update the example spec that's
      generated by `volume init`.
      73c95a92
  22. 05 Apr, 2021 1 commit
  23. 31 Mar, 2021 1 commit
  24. 18 Mar, 2021 1 commit
    • Tim Gross's avatar
      CSI: unique volume per allocation · 7c756967
      Tim Gross authored
      Add a `PerAlloc` field to volume requests that directs the scheduler to test
      feasibility for volumes with a source ID that includes the allocation index
      suffix (ex. `[0]`), rather than the exact source ID.
      
      Read the `PerAlloc` field when making the volume claim at the client to
      determine if the allocation index suffix (ex. `[0]`) should be added to the
      volume source ID.
      7c756967
  25. 15 Mar, 2021 1 commit
  26. 12 Mar, 2021 1 commit
  27. 08 Mar, 2021 1 commit
  28. 26 Feb, 2021 1 commit
  29. 22 Feb, 2021 1 commit
    • Tim Gross's avatar
      deploymentwatcher: reset progress deadline on promotion (#10042) · 174c206b
      Tim Gross authored
      In a deployment with two groups (ex. A and B), if group A's canary becomes
      healthy before group B's, the deadline for the overall deployment will be set
      to that of group A. When the deployment is promoted, if group A is done it
      will not contribute to the next deadline cutoff. Group B's old deadline will
      be used instead, which will be in the past and immediately trigger a
      deployment progress failure. Reset the progress deadline when the job is
      promotion to avoid this bug, and to better conform with implicit user
      expectations around how the progress deadline should interact with promotions.
      174c206b
  30. 17 Feb, 2021 3 commits
  31. 12 Feb, 2021 1 commit
  32. 10 Feb, 2021 1 commit
  33. 09 Feb, 2021 1 commit
    • Seth Hoenig's avatar
      consul/connect: enable custom sidecars to use expose checks · af48777d
      Seth Hoenig authored
      This PR enables jobs configured with a custom sidecar_task to make
      use of the `service.expose` feature for creating checks on services
      in the service mesh. Before we would check that sidecar_task had not
      been set (indicating that something other than envoy may be in use,
      which would not support envoy's expose feature). However Consul has
      not added support for anything other than envoy and probably never
      will, so having the restriction in place seems like an unnecessary
      hindrance. If Consul ever does support something other than Envoy,
      they will likely find a way to provide the expose feature anyway.
      
      Fixes #9854
      af48777d
  34. 08 Feb, 2021 1 commit