2019-07-09 02:11:19 +00:00
|
|
|
---
|
2020-04-07 18:55:19 +00:00
|
|
|
layout: docs
|
2020-04-06 20:27:35 +00:00
|
|
|
page_title: 'Configuration Entry Kind: Proxy Defaults'
|
2020-04-13 18:40:26 +00:00
|
|
|
sidebar_title: proxy-defaults
|
2020-04-07 18:55:19 +00:00
|
|
|
description: >-
|
|
|
|
The proxy-defaults config entry kind allows for configuring global config
|
|
|
|
defaults across all services for Connect proxy configuration. Currently, only
|
|
|
|
one global entry is supported.
|
2019-07-09 02:11:19 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Proxy Defaults
|
|
|
|
|
|
|
|
The `proxy-defaults` config entry kind allows for configuring global config
|
|
|
|
defaults across all services for Connect proxy configuration. Currently, only
|
|
|
|
one global entry is supported.
|
|
|
|
|
|
|
|
## Sample Config Entries
|
|
|
|
|
2020-03-09 20:51:21 +00:00
|
|
|
Set the default protocol for all sidecar proxies in the default namespace:
|
2019-07-09 02:11:19 +00:00
|
|
|
|
|
|
|
```hcl
|
2020-06-16 18:28:21 +00:00
|
|
|
Kind = "proxy-defaults"
|
|
|
|
Name = "global"
|
|
|
|
Namespace = "default"
|
|
|
|
Config {
|
2019-07-09 02:11:19 +00:00
|
|
|
protocol = "http"
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2020-03-09 20:51:21 +00:00
|
|
|
Set proxy-specific defaults :
|
2019-07-09 02:11:19 +00:00
|
|
|
|
|
|
|
```hcl
|
2020-06-16 18:28:21 +00:00
|
|
|
Kind = "proxy-defaults"
|
|
|
|
Name = "global"
|
|
|
|
Config {
|
2019-07-09 02:11:19 +00:00
|
|
|
local_connect_timeout_ms = 1000
|
2020-06-16 18:28:21 +00:00
|
|
|
handshake_timeout_ms = 10000
|
2019-07-09 02:11:19 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Available Fields
|
|
|
|
|
|
|
|
- `Kind` - Must be set to `proxy-defaults`
|
|
|
|
|
|
|
|
- `Name` - Must be set to `global`
|
|
|
|
|
2020-04-23 22:13:18 +00:00
|
|
|
- `Namespace` `(string: "default")` <EnterpriseAlert inline /> - Specifies the namespace the config entry will apply to.
|
2020-03-09 20:51:21 +00:00
|
|
|
|
2020-09-03 16:08:59 +00:00
|
|
|
- `Meta` `(map<string|string>: nil)` - Specifies arbitrary KV metadata pairs. Added in Consul 1.8.4.
|
2020-09-02 19:10:25 +00:00
|
|
|
|
2019-07-09 02:11:19 +00:00
|
|
|
- `Config` `(map[string]arbitrary)` - An arbitrary map of configuration values used by Connect proxies.
|
|
|
|
The available configurations depend on the Connect proxy you use. Any values
|
|
|
|
that your proxy allows can be configured globally here. To
|
|
|
|
explore these options please see the documentation for your chosen proxy.
|
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
- [Envoy](/docs/connect/proxies/envoy#bootstrap-configuration)
|
|
|
|
- [Consul's built-in proxy](/docs/connect/proxies/built-in)
|
2019-07-09 02:11:19 +00:00
|
|
|
|
2019-08-21 21:23:08 +00:00
|
|
|
- `MeshGateway` `(MeshGatewayConfig: <optional>)` - Controls the default
|
2020-05-28 19:19:17 +00:00
|
|
|
[mesh gateway configuration](/docs/connect/mesh-gateway#connect-proxy-configuration)
|
2019-08-21 21:23:08 +00:00
|
|
|
for all proxies. Added in v1.6.0.
|
2019-07-09 02:25:25 +00:00
|
|
|
|
|
|
|
- `Mode` `(string: "")` - One of `none`, `local`, or `remote`.
|
2020-04-06 20:27:35 +00:00
|
|
|
|
2019-09-26 02:55:52 +00:00
|
|
|
- `Expose` `(ExposeConfig: <optional>)` - Controls the default
|
2020-04-09 23:46:54 +00:00
|
|
|
[expose path configuration](/docs/connect/registration/service-registration#expose-paths-configuration-reference)
|
2019-09-26 02:55:52 +00:00
|
|
|
for Envoy. Added in v1.6.2.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
Exposing paths through Envoy enables a service to protect itself by only listening on localhost, while still allowing
|
|
|
|
non-Connect-enabled applications to contact an HTTP endpoint.
|
|
|
|
Some examples include: exposing a `/metrics` path for Prometheus or `/healthz` for kubelet liveness checks.
|
2020-03-09 20:51:21 +00:00
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
- `Checks` `(bool: false)` - If enabled, all HTTP and gRPC checks registered with the agent are exposed through Envoy.
|
|
|
|
Envoy will expose listeners for these checks and will only accept connections originating from localhost or Consul's
|
2020-04-09 23:46:54 +00:00
|
|
|
[advertise address](/docs/agent/options#advertise). The port for these listeners are dynamically allocated from
|
|
|
|
[expose_min_port](/docs/agent/options#expose_min_port) to [expose_max_port](/docs/agent/options#expose_max_port).
|
2020-04-06 20:27:35 +00:00
|
|
|
This flag is useful when a Consul client cannot reach registered services over localhost. One example is when running
|
2020-03-09 20:51:21 +00:00
|
|
|
Consul on Kubernetes, and Consul agents run in their own pods.
|
2020-04-06 20:27:35 +00:00
|
|
|
- `Paths` `array<Path>: []` - A list of paths to expose through Envoy.
|
|
|
|
- `Path` `(string: "")` - The HTTP path to expose. The path must be prefixed by a slash. ie: `/metrics`.
|
|
|
|
- `LocalPathPort` `(int: 0)` - The port where the local service is listening for connections to the path.
|
|
|
|
- `ListenerPort` `(int: 0)` - The port where the proxy will listen for connections. This port must be available
|
|
|
|
for the listener to be set up. If the port is not free then Envoy will not expose a listener for the path,
|
|
|
|
but the proxy registration will not fail.
|
|
|
|
- `Protocol` `(string: "http")` - Sets the protocol of the listener. One of `http` or `http2`. For gRPC use `http2`.
|
2019-07-09 02:25:25 +00:00
|
|
|
|
2019-07-09 02:11:19 +00:00
|
|
|
## ACLs
|
|
|
|
|
2020-10-14 15:23:05 +00:00
|
|
|
Configuration entries may be protected by [ACLs](/docs/security/acl).
|
2019-07-09 02:11:19 +00:00
|
|
|
|
|
|
|
Reading a `proxy-defaults` config entry requires no specific privileges.
|
|
|
|
|
|
|
|
Creating, updating, or deleting a `proxy-defaults` config entry requires
|
|
|
|
`operator:write`.
|