2019-02-26 13:50:07 +00:00
# Data Collection
Understanding How Traefik is Being Used
{: .subtitle }
## Configuration Example
2019-03-14 18:32:03 +00:00
Understanding how you use Traefik is very important to us: it helps us improve the solution in many different ways.
For this very reason, the sendAnonymousUsage option is mandatory: we want you to take time to consider whether or not you wish to share anonymous data with us so we can benefit from your experience and use cases.
!!! warning
2019-09-02 10:26:04 +00:00
Before the GA, leaving this option unset will not prevent Traefik from running but will generate an error log indicating that it enables data collection by default.
2019-02-26 13:50:07 +00:00
2019-07-22 07:58:04 +00:00
!!! example "Enabling Data Collection"
```toml tab="File (TOML)"
2019-07-01 09:30:05 +00:00
[global]
# Send anonymous usage data
sendAnonymousUsage = true
2019-02-26 13:50:07 +00:00
```
2019-07-22 07:58:04 +00:00
```yaml tab="File (YAML)"
global:
# Send anonymous usage data
sendAnonymousUsage: true
2019-02-26 13:50:07 +00:00
```
2019-07-22 07:58:04 +00:00
```bash tab="CLI"
# Send anonymous usage data
--global.sendAnonymousUsage
```
2019-02-26 13:50:07 +00:00
## Collected Data
This feature comes from the public proposal [here ](https://github.com/containous/traefik/issues/2369 ).
In order to help us learn more about how Traefik is being used and improve it, we collect anonymous usage statistics from running instances.
Those data help us prioritize our developments and focus on what's important for our users (for example, which provider is popular, and which is not).
### What's collected / when ?
Once a day (the first call begins 10 minutes after the start of Traefik), we collect:
- the Traefik version number
- a hash of the configuration
- an **anonymized version** of the static configuration (token, user name, password, URL, IP, domain, email, etc, are removed).
!!! note
We do not collect the dynamic configuration information (routers & services).
We do not collect these data to run advertising programs.
We do not sell these data to third-parties.
### Example of Collected Data
??? example "Original configuration"
```toml
2019-04-15 09:14:05 +00:00
[entryPoints]
2019-07-01 09:30:05 +00:00
[entryPoints.web]
address = ":80"
2019-02-26 13:50:07 +00:00
[api]
2019-07-01 09:30:05 +00:00
[providers.docker]
2019-02-26 13:50:07 +00:00
endpoint = "tcp://10.10.10.10:2375"
exposedByDefault = true
swarmMode = true
2019-07-01 09:30:05 +00:00
[providers.docker.TLS]
2019-02-26 13:50:07 +00:00
ca = "dockerCA"
cert = "dockerCert"
key = "dockerKey"
insecureSkipVerify = true
2019-07-01 09:30:05 +00:00
[providers.ecs]
2019-02-26 13:50:07 +00:00
domain = "foo.bar"
exposedByDefault = true
clusters = ["foo-bar"]
region = "us-west-2"
accessKeyID = "AccessKeyID"
secretAccessKey = "SecretAccessKey"
```
??? example "Resulting Obfuscated Configuration"
```toml
2019-04-15 09:14:05 +00:00
[entryPoints]
2019-07-01 09:30:05 +00:00
[entryPoints.web]
address = ":80"
2019-02-26 13:50:07 +00:00
[api]
2019-07-01 09:30:05 +00:00
[providers.docker]
2019-02-26 13:50:07 +00:00
endpoint = "xxxx"
domain = "xxxx"
exposedByDefault = true
swarmMode = true
2019-07-01 09:30:05 +00:00
[providers.docker.TLS]
2019-02-26 13:50:07 +00:00
ca = "xxxx"
cert = "xxxx"
key = "xxxx"
insecureSkipVerify = false
2019-07-01 09:30:05 +00:00
[providers.ecs]
2019-02-26 13:50:07 +00:00
domain = "xxxx"
exposedByDefault = true
clusters = []
region = "us-west-2"
accessKeyID = "xxxx"
secretAccessKey = "xxxx"
```
## The Code for Data Collection
2019-03-15 08:42:03 +00:00
If you want to dig into more details, here is the source code of the collecting system: [collector.go ](https://github.com/containous/traefik/blob/master/pkg/collector/collector.go )
2019-02-26 13:50:07 +00:00
By default we anonymize all configuration fields, except fields tagged with `export=true` .