2019-11-28 20:56:04 +00:00
# Traefik & Etcd
A Story of KV store & Containers
{: .subtitle }
2021-02-11 18:04:03 +00:00
Store your configuration in etcd and let Traefik do the rest!
2019-11-28 20:56:04 +00:00
## Routing Configuration
See the dedicated section in [routing ](../routing/providers/kv.md ).
## Provider Configuration
### `endpoints`
_Required, Default="127.0.0.1:2379"_
2021-02-11 18:04:03 +00:00
Defines how to access etcd.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
endpoints:
- "127.0.0.1:2379"
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd]
endpoints = ["127.0.0.1:2379"]
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.endpoints=127.0.0.1:2379
```
### `rootKey`
_Required, Default="traefik"_
2021-02-11 18:04:03 +00:00
Defines the root key of the configuration.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
rootKey: "traefik"
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd]
rootKey = "traefik"
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.rootkey=traefik
```
### `username`
_Optional, Default=""_
2021-02-11 18:04:03 +00:00
Defines a username with which to connect to etcd.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
# ...
2021-09-29 11:22:12 +00:00
username: "foo"
2019-11-28 20:56:04 +00:00
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd]
# ...
username = "foo"
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.username=foo
```
### `password`
_Optional, Default=""_
2021-02-11 18:04:03 +00:00
Defines a password with which to connect to etcd.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
# ...
password: "bar"
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd]
# ...
password = "bar"
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.password=foo
```
### `tls`
_Optional_
2021-12-02 14:42:06 +00:00
Defines the TLS configuration used for the secure connection to etcd.
2019-11-28 20:56:04 +00:00
2021-12-02 14:42:06 +00:00
#### `ca`
_Optional_
`ca` is the path to the certificate authority used for the secure connection to etcd,
it defaults to the system bundle.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
tls:
ca: path/to/ca.crt
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd.tls]
ca = "path/to/ca.crt"
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.tls.ca=path/to/ca.crt
```
2021-12-02 14:42:06 +00:00
#### `caOptional`
_Optional_
2019-11-28 20:56:04 +00:00
2021-12-02 14:42:06 +00:00
The value of `caOptional` defines which policy should be used for the secure connection with TLS Client Authentication to etcd.
2021-02-11 18:04:03 +00:00
!!! warning ""
2021-12-02 14:42:06 +00:00
If `ca` is undefined, this option will be ignored, and no client certificate will be requested during the handshake. Any provided certificate will thus never be verified.
2021-02-11 18:04:03 +00:00
When this option is set to `true` , a client certificate is requested during the handshake but is not required. If a certificate is sent, it is required to be valid.
2019-11-28 20:56:04 +00:00
2021-02-11 18:04:03 +00:00
When this option is set to `false` , a client certificate is requested during the handshake, and at least one valid certificate should be sent by the client.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
tls:
caOptional: true
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd.tls]
caOptional = true
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.tls.caOptional=true
```
2021-12-02 14:42:06 +00:00
#### `cert`
2019-11-28 20:56:04 +00:00
2021-12-02 14:42:06 +00:00
_Optional_
`cert` is the path to the public certificate used for the secure connection to etcd.
When using this option, setting the `key` option is required.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.tls.cert=path/to/foo.cert
--providers.etcd.tls.key=path/to/foo.key
```
2021-12-02 14:42:06 +00:00
#### `key`
2019-11-28 20:56:04 +00:00
2021-12-02 14:42:06 +00:00
_Optional_
`key` is the path to the private key used for the secure connection to etcd.
When using this option, setting the `cert` option is required.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.tls.cert=path/to/foo.cert
--providers.etcd.tls.key=path/to/foo.key
```
2021-12-02 14:42:06 +00:00
#### `insecureSkipVerify`
_Optional, Default=false_
2019-11-28 20:56:04 +00:00
2021-02-11 18:04:03 +00:00
If `insecureSkipVerify` is `true` , the TLS connection to etcd accepts any certificate presented by the server regardless of the hostnames it covers.
2019-11-28 20:56:04 +00:00
```yaml tab="File (YAML)"
providers:
etcd:
tls:
insecureSkipVerify: true
```
2021-06-18 22:08:08 +00:00
```toml tab="File (TOML)"
[providers.etcd.tls]
insecureSkipVerify = true
```
2019-11-28 20:56:04 +00:00
```bash tab="CLI"
--providers.etcd.tls.insecureSkipVerify=true
```