app/vmagent: mention enable_http2 in changelog (#4403)

Follow-up after
72c3cd47eb

Signed-off-by: hagen1778 <roman@victoriametrics.com>
(cherry picked from commit 3305a6901c)
This commit is contained in:
Roman Khavronenko 2023-06-05 16:31:58 +02:00 committed by hagen1778
parent 6edf94c4b9
commit fb9b8f6b1b
No known key found for this signature in database
GPG key ID: 3BF75F3741CA9640
2 changed files with 3 additions and 1 deletions

View file

@ -24,6 +24,8 @@ The following tip changes can be tested by building VictoriaMetrics components f
## tip ## tip
* FEATURE: [vmagent](https://docs.victoriametrics.com/vmagent.html): Adds `enable_http2` on scrape configuration level. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/4283). Thanks to @Haleygo for [the pull request](https://github.com/VictoriaMetrics/VictoriaMetrics/pull/4295).
* FEATURE: [vmctl](https://docs.victoriametrics.com/vmctl.html): add verbose output for docker installations or when TTY isn't available. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/4081). * FEATURE: [vmctl](https://docs.victoriametrics.com/vmctl.html): add verbose output for docker installations or when TTY isn't available. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/4081).
* BUGFIX: add the following command-line flags, which can be used for limiting Graphite API calls: * BUGFIX: add the following command-line flags, which can be used for limiting Graphite API calls:
`--search.maxGraphiteTagKeys` for limiting the number of tag keys returned from Graphite `/tags`, `/tags/autoComplete/*`, `/tags/findSeries` API. `--search.maxGraphiteTagKeys` for limiting the number of tag keys returned from Graphite `/tags`, `/tags/autoComplete/*`, `/tags/findSeries` API.

View file

@ -168,12 +168,12 @@ func newClient(ctx context.Context, sw *ScrapeWork) *client {
logger.Errorf("failed to configure HTTP/2 transport: %s", err) logger.Errorf("failed to configure HTTP/2 transport: %s", err)
} }
} }
if sw.DenyRedirects { if sw.DenyRedirects {
sc.CheckRedirect = func(req *http.Request, via []*http.Request) error { sc.CheckRedirect = func(req *http.Request, via []*http.Request) error {
return http.ErrUseLastResponse return http.ErrUseLastResponse
} }
} }
return &client{ return &client{
hc: hc, hc: hc,
ctx: ctx, ctx: ctx,