2019-05-08 20:19:37 +00:00
|
|
|
---
|
2020-04-07 18:55:19 +00:00
|
|
|
layout: docs
|
|
|
|
page_title: Configuration Entry Definitions
|
2020-04-13 18:40:26 +00:00
|
|
|
sidebar_title: Configuration Entries
|
2020-04-07 18:55:19 +00:00
|
|
|
description: >-
|
|
|
|
Consul allows storing configuration entries centrally to be used as defaults
|
|
|
|
for configuring other aspects of Consul.
|
2019-05-08 20:19:37 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Configuration Entries
|
|
|
|
|
2019-06-14 05:52:50 +00:00
|
|
|
Configuration entries can be created to provide cluster-wide defaults for
|
|
|
|
various aspects of Consul. Every configuration entry has at least two fields:
|
|
|
|
`Kind` and `Name`. Those two fields are used to uniquely identify a
|
|
|
|
configuration entry. When put into configuration files, configuration entries
|
2019-07-09 02:11:19 +00:00
|
|
|
can be specified as HCL or JSON objects using either `snake_case` or `CamelCase`
|
|
|
|
for key names.
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
```hcl
|
|
|
|
Kind = "<supported kind>"
|
|
|
|
Name = "<name of entry>"
|
|
|
|
```
|
|
|
|
|
2019-07-09 02:11:19 +00:00
|
|
|
The supported `Kind` names for configuration entries are:
|
2019-05-08 20:19:37 +00:00
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
- [`service-router`](/docs/agent/config-entries/service-router) - defines
|
2020-04-06 20:27:35 +00:00
|
|
|
where to send layer 7 traffic based on the HTTP route
|
2019-05-08 20:19:37 +00:00
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
- [`service-splitter`](/docs/agent/config-entries/service-splitter) - defines
|
2020-04-06 20:27:35 +00:00
|
|
|
how to divide requests for a single HTTP route based on percentages
|
2019-05-08 20:19:37 +00:00
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
- [`service-resolver`](/docs/agent/config-entries/service-resolver) - matches
|
2020-04-06 20:27:35 +00:00
|
|
|
service instances with a specific Connect upstream discovery requests
|
2019-05-08 20:19:37 +00:00
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
- [`service-defaults`](/docs/agent/config-entries/service-defaults) - configures
|
2020-04-06 20:27:35 +00:00
|
|
|
defaults for all the instances of a given service
|
2019-05-08 20:19:37 +00:00
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
- [`proxy-defaults`](/docs/agent/config-entries/proxy-defaults) - controls
|
2020-04-06 20:27:35 +00:00
|
|
|
proxy configuration
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
## Managing Configuration Entries
|
|
|
|
|
2019-06-14 05:52:50 +00:00
|
|
|
Configuration entries should be managed with the Consul
|
2020-04-09 23:46:54 +00:00
|
|
|
[CLI](/docs/commands/config) or [API](/api/config). Additionally, as a
|
2019-06-14 05:52:50 +00:00
|
|
|
convenience for initial cluster bootstrapping, configuration entries can be
|
|
|
|
specified in all of the Consul servers's
|
2020-04-09 23:46:54 +00:00
|
|
|
[configuration files](/docs/agent/options#config_entries_bootstrap)
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
### Managing Configuration Entries with the CLI
|
|
|
|
|
|
|
|
#### Creating or Updating a Configuration Entry
|
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
The [`consul config write`](/docs/commands/config/write) command is used to
|
2019-06-14 05:52:50 +00:00
|
|
|
create and update configuration entries. This command will load either a JSON or
|
|
|
|
HCL file holding the configuration entry definition and then will push this
|
|
|
|
configuration to Consul.
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
Example HCL Configuration File - `proxy-defaults.hcl`:
|
|
|
|
|
|
|
|
```hcl
|
|
|
|
Kind = "proxy-defaults"
|
|
|
|
Name = "global"
|
|
|
|
Config {
|
|
|
|
local_connect_timeout_ms = 1000
|
|
|
|
handshake_timeout_ms = 10000
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Then to apply this configuration, run:
|
|
|
|
|
|
|
|
```bash
|
|
|
|
$ consul config write proxy-defaults.hcl
|
|
|
|
```
|
|
|
|
|
2019-06-14 05:52:50 +00:00
|
|
|
If you need to make changes to a configuration entry, simple edit that file and
|
|
|
|
then rerun the command. This command will not output anything unless there is an
|
|
|
|
error in applying the configuration entry. The `write` command also supports a
|
|
|
|
`-cas` option to enable performing a compare-and-swap operation to prevent
|
|
|
|
overwriting other unknown modifications.
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
#### Reading a Configuration Entry
|
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
The [`consul config read`](/docs/commands/config/read) command is used to
|
2019-06-14 05:52:50 +00:00
|
|
|
read the current value of a configuration entry. The configuration entry will be
|
|
|
|
displayed in JSON form which is how its transmitted between the CLI client and
|
|
|
|
Consul's HTTP API.
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
```bash
|
|
|
|
$ consul config read -kind service-defaults -name web
|
|
|
|
{
|
|
|
|
"Kind": "service-defaults",
|
|
|
|
"Name": "web",
|
|
|
|
"Protocol": "http"
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
#### Listing Configuration Entries
|
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
The [`consul config list`](/docs/commands/config/list) command is used to
|
2019-06-14 05:52:50 +00:00
|
|
|
list out all the configuration entries for a given kind.
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
```bash
|
|
|
|
$ consul config list -kind service-defaults
|
|
|
|
web
|
|
|
|
api
|
|
|
|
db
|
|
|
|
```
|
|
|
|
|
|
|
|
#### Deleting Configuration Entries
|
|
|
|
|
2020-04-09 23:46:54 +00:00
|
|
|
The [`consul config delete`](/docs/commands/config/delete) command is used
|
2019-06-14 05:52:50 +00:00
|
|
|
to delete an entry by specifying both its `kind` and `name`.
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
```bash
|
|
|
|
$ consul config delete -kind service-defaults -name web
|
|
|
|
```
|
|
|
|
|
|
|
|
This command will not output anything when the deletion is successful.
|
|
|
|
|
2020-04-23 22:13:18 +00:00
|
|
|
#### Configuration Entry Management with Namespaces <EnterpriseAlert inline />
|
2020-02-07 20:01:04 +00:00
|
|
|
|
2020-04-23 22:13:18 +00:00
|
|
|
Configuration entry operations support passing a namespace in
|
2020-02-07 20:01:04 +00:00
|
|
|
order to isolate the entry to affect only operations within that namespace. This was
|
|
|
|
added in Consul 1.7.0.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
Example:
|
2020-02-07 20:01:04 +00:00
|
|
|
|
|
|
|
```bash
|
|
|
|
$ consul config write service-defaults.hcl -namespace foo
|
|
|
|
```
|
|
|
|
|
|
|
|
```bash
|
|
|
|
$ consul config list -kind service-defaults -namespace foo
|
|
|
|
web
|
|
|
|
api
|
|
|
|
```
|
|
|
|
|
2019-05-08 20:19:37 +00:00
|
|
|
### Bootstrapping From A Configuration File
|
|
|
|
|
2019-09-17 16:22:27 +00:00
|
|
|
Configuration entries can be bootstrapped by adding them [inline to each Consul
|
2020-04-09 23:46:54 +00:00
|
|
|
server's configuration file](/docs/agent/options#config_entries). When a
|
2019-09-17 16:22:27 +00:00
|
|
|
server gains leadership, it will attempt to initialize the configuration entries.
|
|
|
|
If a configuration entry does not already exist outside of the servers
|
|
|
|
configuration, then it will create it. If a configuration entry does exist, that
|
|
|
|
matches both `kind` and `name`, then the server will do nothing.
|
2019-05-08 20:19:37 +00:00
|
|
|
|
|
|
|
## Using Configuration Entries For Service Defaults
|
|
|
|
|
2019-06-14 05:52:50 +00:00
|
|
|
When the agent is
|
2020-04-09 23:46:54 +00:00
|
|
|
[configured](/docs/agent/options#enable_central_service_config) to enable
|
2019-06-14 05:52:50 +00:00
|
|
|
central service configurations, it will look for service configuration defaults
|
|
|
|
that match a registering service instance. If it finds any, the agent will merge
|
|
|
|
those defaults with the service instance configuration. This allows for things
|
|
|
|
like service protocol or proxy configuration to be defined globally and
|
|
|
|
inherited by any affected service registrations.
|