# The etcd endpoints to connect to. # CLI flag: -<prefix>.etcd.endpoints [endpoints: <list of strings> | default = []] # The dial timeout for the etcd connection. # CLI flag: -<prefix>.etcd.dial-timeout [dial_timeout: <duration> | default = 10s] # The maximum number of retries to do for failed ops. # CLI flag: -<prefix>.etcd.max-retries [max_retries: <int> | default = 10] # Enable TLS. # CLI flag: -<prefix>.etcd.tls-enabled [tls_enabled: <boolean> | default = false] # Path to the client certificate, which will be used for authenticating with the # server. Also requires the key path to be configured. # CLI flag: -<prefix>.etcd.tls-cert-path [tls_cert_path: <string> | default = ""] # Path to the key for the client certificate. Also requires the client # certificate to be configured. # CLI flag: -<prefix>.etcd.tls-key-path [tls_key_path: <string> | default = ""] # Path to the CA certificates to validate server certificate against. If not # set, the host's root CA certificates are used. # CLI flag: -<prefix>.etcd.tls-ca-path [tls_ca_path: <string> | default = ""] # Override the expected name on the server certificate. # CLI flag: -<prefix>.etcd.tls-server-name [tls_server_name: <string> | default = ""] # Skip validating server certificate. # CLI flag: -<prefix>.etcd.tls-insecure-skip-verify [tls_insecure_skip_verify: <boolean> | default = false] # Override the default cipher suite list (separated by commas). Allowed values: # # Secure Ciphers: # - TLS_RSA_WITH_AES_128_CBC_SHA # - TLS_RSA_WITH_AES_256_CBC_SHA # - TLS_RSA_WITH_AES_128_GCM_SHA256 # - TLS_RSA_WITH_AES_256_GCM_SHA384 # - TLS_AES_128_GCM_SHA256 # - TLS_AES_256_GCM_SHA384 # - TLS_CHACHA20_POLY1305_SHA256 # - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA # - TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA # - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA # - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA # - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 # - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 # - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 # - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 # - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 # - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 # # Insecure Ciphers: # - TLS_RSA_WITH_RC4_128_SHA # - TLS_RSA_WITH_3DES_EDE_CBC_SHA # - TLS_RSA_WITH_AES_128_CBC_SHA256 # - TLS_ECDHE_ECDSA_WITH_RC4_128_SHA # - TLS_ECDHE_RSA_WITH_RC4_128_SHA # - TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA # - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 # - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 # CLI flag: -<prefix>.etcd.tls-cipher-suites [tls_cipher_suites: <string> | default = ""] # Override the default minimum TLS version. Allowed values: VersionTLS10, # VersionTLS11, VersionTLS12, VersionTLS13 # CLI flag: -<prefix>.etcd.tls-min-version [tls_min_version: <string> | default = ""] # Etcd username. # CLI flag: -<prefix>.etcd.username [username: <string> | default = ""] # Etcd password. # CLI flag: -<prefix>.etcd.password [password: <string> | default = ""]
Configuration for an ETCD v3 client. Only applies if the selected kvstore is
etcd
. The supported CLI flags<prefix>
used to reference this configuration block are:
common.storage.ring
compactor.ring
distributor.ring
index-gateway.ring
query-scheduler.ring
ruler.ring