A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://developer.hashicorp.com/consul/docs/reference/config-entry/proxy-defaults below:

Proxy defaults configuration entry reference | Consul

Proxy defaults configuration entry reference

This topic provides reference information for proxy defaults configuration entries. Refer to Service mesh proxy overview for information about using proxies in Consul.

Proxy defaults configuration entries set global passthrough Envoy settings for proxies in the service mesh, including sidecars and gateways. Proxy defaults configuration entries do not control features for peered clusters, transparent proxy, or TLS behavior. For information about configuring Consul settings that affect service mesh behavior, refer to the mesh configuration entry reference.

Consul only supports one global proxy defaults configuration entry at a time. If multiple configuration entries are defined in Consul Enterprise, Consul implements the configuration entry in the default partition.

The following list outlines field hierarchy, language-specific data types, and requirements in proxy defaults configuration entries. Click on a property name to view additional details, including default values.

When every field is defined, a proxy defaults configuration entry has the following form:

Kind      = "proxy-defaults"
Name      = "global"
Namespace = "default"
Meta {
  <arbitrary string key> = "<arbitrary string value>"
}
Config {
  <arbitrary string key> = <arbitrary value>
}
EnvoyExtensions = [
  {
    Name= "<name of the extension>"
    Required = "required"
    Arguments = "<arguments to pass to the extension>"
    ConsulVersion = "<Consul version required by the extension>"
    EnvoyVersion = "<Envoy version required by the extension>"
  }
]
Mode = "<name of proxy mode>"
TransparentProxy {
  OutboundListenerPort = <port the proxy should listen on for outbound traffic>
  DialedDirectly       = <true if proxy instances should be dialed directly>
}
MutualTLSMode = "<mutual TLS mode for all proxies>"
MeshGateway {
  Mode = "<name of mesh gateway configuration for all proxies>"
}
Expose {
  Checks = <true to expose all HTTP and gRPC checks through Envoy>

  Paths = [
    {
      Path          = "<the HTTP path to expose>"
      LocalPathPort = <port where the local service is listening for connections to the path>
      ListenerPort  = <port where the proxy will listen for connections>
      Protocol      = "<protocol of the listener>"
    }
  ]
}
PrioritizeByLocality = {
   Mode = "failover"
}
AccessLogs {
  Enabled              = < true | false >
  DisableListenerLogs  = < true | false , disables listener access logs for unrecognized traffic>
  Type                 = "< file | stdout | stdout, the destination for access logs >"
  Path                 = "< set the output path for 'file' based access logs >"
  JSONFormat           = "< json representation of access log format >"
  TextFormat           = "< text representation of access log format >"
}
apiVersion: consul.hashicorp.com/v1alpha1
kind: ProxyDefaults
metadata:
  name: global
  namespace: default
spec:
  meta:
    <arbitrary string key>: <arbitrary string value>
  config:
    <arbitrary string key>: <arbitrary value>
  EnvoyExtensions:
  - name: <name of the extension>
    required: required
    arguments: <arguments to pass to the extension>
    consulVersion: <Consul version required by the extension>
    envoyVersion: <Envoy version required by the extension>
  mode: <name of proxy mode>
  transparentProxy:
    outboundListenerPort: <port the proxy should listen on for outbound traffic>
    dialedDirectly: <true if proxy instances should be dialed directly>
  mutualTLSMode: <mutual TLS mode for all proxies>
  meshGateway:
    mode: <name of mesh gateway configuration for all proxies>
  expose:
    checks: <true to expose all HTTP and gRPC checks through Envoy>
    paths:
      - path: <the HTTP path to expose>
        localPathPort: <port where the local service is listening for connections to the path>
        listenerPort: <port where the proxy will listen for connections>
        protocol:= <protocol of the listener>
  accessLogs:
    enabled: < true | false >
    disableListenerLogs:  < true | false , disables listener access logs for unrecognized traffic>
    type: < file | stdout | stdout, the destination for access logs >
    path: < set the output path for 'file' based access logs >
    jsonFormat: < json representation of access log format >
    textFormat: < text representation of access log format >
{
  "Kind": "proxy-defaults",
  "Name": "global",
  "Namespace": "default",
  "Meta": {
    "<arbitrary string key>": "<arbitrary string value>"
  },
  "Config": {
    "<arbitrary string key>": <arbitrary value>
  },
  "EnvoyExtensions": [
    {
      "Name": "<name of the extension>",
      "Required": "required",
      "Arguments": "<arguments to pass to the extension>",
      "ConsulVersion": "<Consul version required by the extension>",
      "EnvoyVersion": "<Envoy version required by the extension>"
    }
  ],
  "Mode": "<name of proxy mode>",
  "TransparentProxy": {
    "OutboundListenerPort": <port the proxy should listen on for outbound traffic>,
    "DialedDirectly": <true if proxy instances should be dialed directly>
  },
  "MutualTLSMode": "<mutual TLS mode for all proxies>",
  "MeshGateway": {
    "Mode": = "<name of mesh gateway configuration for all proxies>"
  },
  "Expose": {
    "Checks": <true to expose all HTTP and gRPC checks through Envoy>,
    "Paths": [
      {
        "Path": "<the HTTP path to expose>",
        "LocalPathPort": <port where the local service is listening for connections to the path>,
        "ListenerPort": <port where the proxy will listen for connections>,
        "Protocol": "<protocol of the listener>"
      }
    ]
  },
  "AccessLogs": {
    "Enabled": < true | false >,
    "DisableListenerLogs": < true | false , disables listener access logs for unrecognized traffic>,
    "Type": "< file | stdout | stdout, the destination for access logs >",
    "Path": "< set the output path for 'file' based access logs >",
    "JSONFormat": "< json representation of access log format >",
    "TextFormat": "< text representation of access log format >"
  }
}

This section provides details about the fields you can configure in the proxy defaults configuration entry.

Kind

Specifies the type of configuration entry to implement. Must be set to proxy-defaults.

Values Name

Specifies a name for the configuration entry that is used to identify the configuration entry. Must be set to global.

Values Namespace

Specifies the namespace that the proxy defaults apply to. You can only specify the default namespace.

Values Partition

Specifies the local admin partition that the proxy defaults apply to. Refer to admin partitions for more information.

Values Meta

Specifies a set of custom key-value pairs to add the Consul KV store.

Values Config

Specifies an arbitrary map of configuration values used by service mesh proxies. The available configurations depend on the mesh proxy you use. You can configure any global values that your proxy allows in this field. Refer to the following topics for additional information:

Values EnvoyExtensions

Specifies a list of extensions that modify Envoy proxy configurations. Refer to Envoy extensions for additional information.

Values

The following table describes how to configure values in the EnvoyExtensions map:

Parameter Description Data type Default Name Specifies the name of the extension. String None Required Specify true to require Consul to implement the extension.

Use this parameter to ensure that extensions required for secure communication are not unintentionally bypassed.

Consul returns an error when Required is set to true and the extension does not update Envoy resources.

String None Arguments Specifies the arguments to pass to the extension executable. Refer to the documentation for the extension you want to implement for additional information. Map None ConsulVersion Specifies the version of Consul that the extension is allowed to work with. Consul validates the version during xDS updates. If a different version is in use, Consul skips the extension and writes the event to the log.

The ConsulVersion and EnvoyVersion must both validate for Consul to implement the extension.

String None EnvoyVersion Specifies the version of Envoy that the extension is allowed to work with. Consul validates the version during xDS updates. If a different version is in use, Consul skips the extension and writes the event to the log.

The ConsulVersion and EnvoyVersion must both validate for Consul to implement the extension.

String None Mode

Specifies a mode for how proxies direct inbound and outbound traffic. You can specify one of the following values:

Values TransparentProxy

Contains configurations for proxies that are running in transparent proxy mode. This mode enables permissive mTLS for Consul so that you can use your Kubernetes cluster's DNS service instead of Consul DNS. Refer to Transparent proxy mode for additional information.

Values

The following table describes how to configure values in the TransparentProxy map:

Parameter Description Data type Default OutboundListenerPort Specifies the port that the proxy listens on for outbound traffic. Outbound application traffic must be captured and redirected to this port. Integer 15001 DialedDirectly Determines whether other proxies in transparent mode can directly dial this proxy instance's IP address. Proxies in transparent mode commonly dial upstreams at the virtual tagged address, which load balances across instances. Dialing individual instances can be helpful when sending requests to stateful services, such as database clusters with a leader. Boolean false MutualTLSMode

Controls the default mutual TLS (mTLS) mode for all proxies. You can only set mutual TLS mode for services in transparent proxy mode.

You can specify one of the following modes:

strict: The sidecar proxy requires mTLS for incoming traffic. permissive: The sidecar proxy accepts mTLS traffic on the sidecar proxy service port and accepts any traffic on the destination service port. We recommend only using permissive mode if necessary while onboarding services to the service mesh.

Values MeshGateway

Sets the default mesh gateway mode field for all proxies. You can specify the following string values for the mode field:

Values Expose

Specifies default configurations for exposing HTTP paths through Envoy. Exposing paths through Envoy enables services to protect themselves by only listening on localhost. Applications that are not Consul service mesh-enabled are still able to contact an HTTP endpoint.

Example use-cases include exposing the /metrics endpoint to a monitoring system, such as Prometheus, and exposing the /healthz endpoint to the kubelet for liveness checks. Refer to Expose Paths Configuration Reference for additional information.

Values Expose{}.Checks

Exposes all HTTP and gRPC checks registered with the agent when set to true. Envoy exposes listeners for the checks and only accepts connections originating from localhost or the Consul agent's advertise_addr. The ports for the listeners are dynamically allocated from the agent's expose_min_port and expose_max_port configurations.

We recommend enabling the Checks configuration when a Consul client cannot reach registered services over localhost.

Values Expose{}.Paths[]

Specifies a list of configuration maps that define paths to expose through Envoy when Expose.Checks is set to true.

Values

The following table describes the parameters for each map you can define in the list:

Parameter Description Data type Default Path Specifies the HTTP path to expose. You must prepend the path with a forward slash (/). String None LocalPathPort Specifies the port where the local service listens for connections to the path. Integer 0 ListenPort Specifies the port where the proxy listens for connections. The port must be available. If the port is unavailable, Envoy does not expose a listener for the path and the proxy registration still succeeds. Integer 0 Protocol Specifies the protocol of the listener. You can configure one of the following values:
  • http
  • http2: Use with gRPC traffic
  • String http PrioritizeByLocality

    Sets a mode for the service that allows instances to prioritize upstream targets that are in the same network region and zone. You can specify the following string values for the mode field:

    Values AccessLogs

    Specifies Envoy access logger configurations for all proxies in the service mesh, including gateways. This field also configures access logs on Envoy's administration interface.

    Values

    The following table describes the parameters you can define in the AccessLogs map:

    Parameter Description Data type Default Enabled Enables Envoy to emit access logs for all proxies in the service mesh. Boolean false DisabledListenerLogs Disables access logs for traffic rejected at the listener level. Rejected traffic includes connections that do not match any of Envoy's configured filters, such as Consul upstream services. Set this option to true if you do not want to log unknown requests that Envoy is not forwarding. Boolean false Type Specifies the destination for access logs. You can specify one of the following types:
  • stdout
  • stderr
  • file
  • String None Path Specifies the destination for writing access logs to file when Type is set to file. String None JSONFormat Specifies a JSON-formatted string that represents the format for each emitted access log. You can use Envoy command operators to customize the emitted data. You can also nest data. You cannot set this field and the TextFormat field concurrently. String Default log format TextFormat Specifies a text-formatted string that represents the format for each emitted access log. You can use Envoy command operators to customize the emitted data. You can also nest data. You cannot set this field and the JSONFormat field concurrently. String None apiVersion

    Specifies the version of the Consul API to use to apply the configuration entry. This must be set to consul.hashicorp.com/v1alpha1.

    Values kind

    Specifies the type of configuration entry to implement. Must be set to ProxyDefaults.

    Values metadata

    Map that contains the service name, namespace, and admin partition that the configuration entry applies to.

    Values metadata.name

    Specifies a name for the configuration entry that is used to identify the configuration entry. Must be set to global.

    Values metadata.namespace

    Specifies the namespace that the proxy defaults apply to. If you are on the community version, Consul ignores the namespace field. Refer to Kubernetes namespaces in Consul for additional information. If you are on Consul Enterprise, refer to Kubernetes namespaces in Consul Enterprise for additional information.

    Values spec

    Map that contains the details about the ProxyDefaults configuration entry. The apiVersion, kind``, and metadatafields are siblings of thespec` field. All other configurations are children.

    spec.config

    Specifies an arbitrary map of configuration values used by service mesh proxies. The available configurations depend on the mesh proxy you use. You can configure any global values that your proxy allows in this field. Refer to the following topics for additional information:

    Values spec.envoyExtensions

    Specifies a list of extensions that modify Envoy proxy configurations. Refer to Envoy extensions for additional information.

    Values

    The following table describes how to configure values in the EnvoyExtensions map:

    Parameter Description Data type Default name Specifies the name of the extension. String None required Specify true to require Consul to implement the extension.

    Use this parameter to ensure that extensions required for secure communication are not unintentionally bypassed.

    Consul returns an error when Required is set to true and the extension does not update Envoy resources.

    String None arguments Specifies the arguments to pass to the extension executable. Refer to the documentation for the extension you want to implement for additional information. Map None consulVersion Specifies the version of Consul that the extension is allowed to work with. Consul validates the version during xDS updates. If a different version is in use, Consul skips the extension and writes the event to the log.

    The consulVersion and envoyVersion must both validate for Consul to implement the extension.

    String None envoyVersion Specifies the version of Envoy that the extension is allowed to work with. Consul validates the version during xDS updates. If a different version is in use, Consul skips the extension and writes the event to the log.

    The consulVersion and envoyVersion must both validate for Consul to implement the extension.

    String None spec.mode

    Specifies a mode for how proxies direct inbound and outbound traffic. You can specify one of the following values:

    Values spec.transparentProxy

    Contains configurations for proxies that are running in transparent proxy mode. This mode enables permissive mTLS for Consul so that you can use your Kubernetes cluster's DNS service instead of Consul DNS. Refer to Transparent proxy mode for additional information.

    Values

    The following table describes how to configure values in the TransparentProxy map:

    Parameter Description Data type Default outboundListenerPort Specifies the port that the proxy listens on for outbound traffic. Outbound application traffic must be captured and redirected to this port. Integer 15001 dialedDirectly Determines whether other proxies in transparent mode can directly dial this proxy instance's IP address. Proxies in transparent mode commonly dial upstreams at the virtual tagged address, which load balances across instances. Dialing individual instances can be helpful when sending requests to stateful services, such as database clusters with a leader. Boolean false spec.mutualTLSMode

    Controls the default mutual TLS (mTLS) mode for all proxies. You can only set mutual TLS mode for services in transparent proxy mode.

    You can specify one of the following modes:

    strict: The sidecar proxy requires mTLS for incoming traffic. permissive: The sidecar proxy accepts mTLS traffic on the sidecar proxy service port and accepts any traffic on the destination service port. We recommend only using permissive mode if necessary while onboarding services to the service mesh.

    Values spec.meshGateway

    Sets the default mesh gateway mode field for all proxies. You can specify the following string values for the mode field:

    Values spec.expose

    Specifies default configurations for exposing HTTP paths through Envoy. Exposing paths through Envoy enables services to protect themselves by only listening on localhost. Applications that are not Consul service mesh-enabled are still able to contact an HTTP endpoint.

    Example use-cases include exposing the /metrics endpoint to a monitoring system, such as Prometheus, and exposing the /healthz endpoint to the kubelet for liveness checks. Refer to Expose Paths Configuration Reference for additional information.

    Values spec.expose{}.checks

    Exposes all HTTP and gRPC checks registered with the agent when set to true. Envoy exposes listeners for the checks and only accepts connections originating from localhost or the Consul agent's advertise_addr. The ports for the listeners are dynamically allocated from the agent's expose_min_port and expose_max_port configurations.

    We recommend enabling the Checks configuration when a Consul client cannot reach registered services over localhost, such as when Consul agents run in their own pods in Kubernetes.

    Values spec.expose{}.paths[]

    Specifies a list of configuration maps that define paths to expose through Envoy when spec.expose.checks is set to true.

    Values

    The following table describes the parameters for each map you can define in the list:

    Parameter Description Data type Default path Specifies the HTTP path to expose. You must prepend the path with a forward slash (/). String None localPathPort Specifies the port where the local service listens for connections to the path. Integer 0 listenPort Specifies the port where the proxy listens for connections. The port must be available. If the port is unavailable, Envoy does not expose a listener for the path and the proxy registration still succeeds. Integer 0 protocol Specifies the protocol of the listener. You can configure one of the following values:
  • http
  • http2: Use with gRPC traffic
  • String http spec.prioritizeByLocality

    Sets a mode for the service that allows instances to prioritize upstream targets that are in the same network region and zone. You can specify the following string values for the mode field:

    Values spec.accessLogs

    Specifies Envoy access logger configurations for all proxies in the service mesh, including gateways. This field also configures access logs on Envoy's administration interface.

    Values

    The following table describes the parameters you can define in the accessLogs map:

    Parameter Description Data type Default enabled Enables Envoy to emit access logs for all proxies in the service mesh. Boolean false disabledListenerLogs Disables access logs for traffic rejected at the listener level. Rejected traffic includes connections that do not match any of Envoy's configured filters, such as Consul upstream services. Set this option to true if you do not want to log unknown requests that Envoy is not forwarding. Boolean false type Specifies the destination for access logs. You can specify one of the following types:
  • stdout
  • stderr
  • file
  • String None path Specifies the destination for writing access logs to file when type is set to file. String None jsonFormat Specifies a JSON-formatted string that represents the format for each emitted access log. You can use Envoy command operators to customize the emitted data. You can also nest data. You cannot set this field and the textFormat field concurrently. String Default log format textFormat Specifies a text-formatted string that represents the format for each emitted access log. You can use Envoy command operators to customize the emitted data. You can also nest data. You cannot set this field and the jsonFormat field concurrently. String None

    The following examples demonstrate common patterns for configuring proxy defaults configuration entries.

    Default protocol

    The following example sets the default protocol for all proxies to http.

    Community edition
    Kind      = "proxy-defaults"
    Name      = "global"
    Config {
      protocol = "http"
    }
    
    Consul Enterprise

    When using multiple namespaces with Consul Enterprise, the only configuration entry that affects proxy defaults is the one in the default namespace. This configuration applies to proxies in all namespaces.

    Kind      = "proxy-defaults"
    Name      = "global"
    Namespace = "default" # Can only be set to "default".
    Config {
      protocol = "http"
    }
    
    Community edition
    apiVersion: consul.hashicorp.com/v1alpha1
    kind: ProxyDefaults
    metadata:
      name: global
    spec:
      config:
        protocol: http
    
    Consul Enterprise

    When using multiple namespaces with Consul Enterprise, the only configuration entry that affects proxy defaults is the one in the default namespace. This configuration applies to proxies in all namespaces.

    apiVersion: consul.hashicorp.com/v1alpha1
    kind: ProxyDefaults
    metadata:
      name: global
      namespace: default
    spec:
      config:
        protocol: http
    
    Community edition
    {
      "Kind": "proxy-defaults",
      "Name": "global",
      "Config": {
        "protocol": "http"
      }
    }
    
    Consul Enterprise

    When using multiple namespaces with Consul Enterprise, the only configuration entry that affects proxy defaults is the one in the default namespace. This configuration applies to proxies in all namespaces.

    {
      "Kind": "proxy-defaults",
      "Name": "global",
      "Namespace": "default",
      "Config": {
        "protocol": "http"
      }
    }
    
    Prometheus

    The following example configures all proxies to expose Prometheus metrics.

    Kind      = "proxy-defaults"
    Name      = "global"
    Config {
      envoy_prometheus_bind_addr = "0.0.0.0:9102"
    }
    
    apiVersion: consul.hashicorp.com/v1alpha1
    kind: ProxyDefaults
    metadata:
      name: global
    spec:
      config:
        envoy_prometheus_bind_addr: '0.0.0.0:9102'
    
    {
      "Kind": "proxy-defaults",
      "Name": "global",
      "Config": {
        "envoy_prometheus_bind_addr": "0.0.0.0:9102"
      }
    }
    
    Access Logs

    The following example enables access logs for all proxies. Refer to access logs for more detailed examples.

    Kind      = "proxy-defaults"
    Name      = "global"
    AccessLogs {
      Enabled = true
    }
    
    apiVersion: consul.hashicorp.com/v1alpha1
    kind: ProxyDefaults
    metadata:
      name: global
    spec:
      accessLogs:
        enabled: true
    
    {
      "Kind": "proxy-defaults",
      "Name": "global",
      "AccessLogs": {
        "Enabled": true
      }
    }
    
    Proxy-specific defaults

    The following example configures custom default values for all proxies.

    Kind      = "proxy-defaults"
    Name      = "global"
    Config {
      local_connect_timeout_ms = 1000
      handshake_timeout_ms     = 10000
    }
    
    apiVersion: consul.hashicorp.com/v1alpha1
    kind: ProxyDefaults
    metadata:
      name: global
    spec:
      config:
        local_connect_timeout_ms: 1000
        handshake_timeout_ms: 10000
    
    {
      "Kind": "proxy-defaults",
      "Name": "global",
      "Config": {
        "local_connect_timeout_ms": 1000,
        "handshake_timeout_ms": 10000
      }
    }
    

    RetroSearch is an open source project built by @garambo | Open a GitHub Issue

    Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

    HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4