Controller Configuration Reference
OpenZiti uses configuration files for controllers that are in the YAML format. All configuration files are also subject to a set of conventions such as environment variable substitution, identity sections, and addressing formats.
Sections
The controller configuration file has several top level configuration sections that group together related configuration settings.
ctrl
- define control channel listenerdb
- specifies database file locationedge
- configures edge specific functionalityevents
- allows configuration of event outputhealthChecks
- enables controller database health checks for transactionsidentity
- configures the certificates used for outbound client connections, server listening, and CA bundlesnetwork
- set network level cost valuesprofile
- enables profiling of controller memory and CPU statisticsraft
- allows configuring the controller in an HA clustertrace
- adds a peek handler to all controller messaging for debug purposesweb
- configures API presentation exposurev
- A special section to note the version of the configuration file, onlyv: 3
is currently supported
The standard OpenZiti experience minimally requires the following sections:
ctrl
db
orraft
identity
edge
web
v
Of those values, to start the controller only the ctrl
, db
or raft
, v
, and identity
sections are required. However, not including the edge
section will start the controller in "
fabric only" mode and will not support any edge functionality or concepts (identities, JWT
enrollment, 3rd Party CAs, policies, etc.). Not including the web
section will result in none of
the REST APIs (fabric management API, edge client API, edge management API, health check API) being
started. Without the edge and fabric management APIs running administration of the network will be
impossible. Without the edge client API running it will be impossible for Edge clients to connect to
services.
Example Minimum Controller Configuration:
v: 3
db: ctrl.db
identity:
cert: ctrl-client.cert.pem
server_cert: ctrl-server.cert.pem
key: ctrl.key.pem
ca: ca-chain.cert.pem
ctrl:
listener: tls:127.0.0.1:6262
edge:
enrollment:
signingCert:
cert: intermediate.cert.pem
key: intermediate.key.pem
web:
- name: all-apis-localhost
bindPoints:
- interface: 127.0.0.1:1280
address: 127.0.0.1:1280
apis:
- binding: fabric
- binding: edge-management
- binding: edge-client
ctrl
The ctrl
section configures how the controller will listen for incoming connections from routers.
This includes the protocol(s) used for router connections and how those connections are managed.
listener
- (required) is in the format of<protocol>:<interface>:<port>
format. The value set here must be resolvable by routers and correspond the routersctrl.endpoint
configuration value. See addressing.advertiseAddress
- (required when raft is enabled) - configures the address at which this controller should be reachable by other controllers in the clusteroptions
- a set of option which includes the below options and those defined in channel optionsnewListener
- (optional) an<protocol>:<interface>:<port>
address that is sent to routers to indicate a controller address migration. Should only be specified when the new listener address is reachable as clients will begin to use the new value on restart
peerHeartbeats
- (optional) set of options for configuring heartbeats to other controllers in the cluster. See heartbeats.routerHeartbeats
- (optional) set of options for configuring heartbeats to routers. See heartbeats.
Example w/o options:
ctrl:
listener: tls:127.0.0.1:6262
Example w/ options:
ctrl:
listener: tls:127.0.0.1:6262
options:
maxQueuedConnects: 1000
maxOutstandingConnects: 16
connectTimeoutMs: 1000
writeTimeout: 15s
db
The db
section is a single scalar value that defines the path to the database file that the
controller should use. OpenZiti uses a file backed in memory database. This path may be on the same
or different drive. This section is required.
Example:
db: /mnt/fast-drive/db/ctrl.db
edge
The edge
section instructs the controller to start the edge components. If the section is not
defined, all edge functionality will be disabled. This includes all features associated with
identities (e.g. identity enrollment), 3rd Party CAs, policies, edge router connections, posture
checks, and more. It is highly unlikely that this section should be omitted.
The edge
section also has the following subsections:
api
- (required) defines API specific configurationenrollment
- (required) defines enrollment specific configuration
Example Minimum Edge:
edge:
enrollment:
signingCert:
cert: intermediate.cert.pem
key: intermediate.key.pem
Example Fully Defined:
edge:
api:
activityUpdateInterval: 90s
activityUpdateBatchSize: 250
sessionTimeout: 30m
address: 127.0.0.1:1280
enrollment:
signingCert:
cert: intermediate.cert.pem
key: intermediate.key.pem
edgeIdentity:
duration: 5m
edgeRouter:
duration: 5m
api
The api
section within the edge
section defines API specific functionality.
activityUpdateInterval
- (optional) the interval used to buffer API Session usage noticessessionTimeout
- (optional) The amount of time an edge API Session remains alive after the last REST API Request was processed or the last edge router connection for an API Session was closedaddress
- (required) the<host>:<port>
combination that should be used to externally resolve to the edge client API
For activityUpdateInterval
, Edge Routers report connected API Sessions periodically and the
controller tracks REST API requests. activityUpdateInterval
defines the interval those updates are
collated and buffered over. This is done to reduce the number of database writes required to persist
API Session activity data. During the interval period the controller will buffer updates and flush
at the end. Increasing this interval may increase the chance of unsaved updates on controller crash
or kill. Decreasing it will increase the frequency of database writes. The default should be
sufficient.
The address
setting is unique as it must match the address
in a bindPoint
for
the edge-client
API. This is to ensure that responses and data persisted outside the system can
reach the controller. An example of this is enrollment JWTs that contain the URL that is used to
complete enrollment via the edge client API.
enrollment
The enrollment
section under edge
defines values that pertain specifically to identity and
router enrollment. This includes the certificate and private key used to sign certificates as well
as enrolment JWT lifetimes.
The enrolment section has these subsection:
signingCert
- (required) defines the certificate and key used to sign identity and router certificatesedgeIdentity
- (optional) controls identity enrollment optionsedgeRouter
- (optional) controls router enrollment options
signingCert
An object defining the cert
and key
used to issue certificates to identities and routers.
cert
- (required) the x509 PEM formatted certificate of the CA that the controller will use to issue edge identity certificateskey
- (required) the x509 PEM formatted private key for the certificate defined incert
OpenZiti clients rely on the controller to provide a bundle of trusted certificates during
enrollment. The bundle is specified by the identity.ca
field and points to a file on the server
containing the bundle of trusted certificates. The signing certificate must be included in this
file.
edgeIdentity
The edgeIdentity
section controls the lifetime of identity enrollment JWTs. It has only one value:
duration
- (optional) the lifetime of identity enrollment JWTs
edgeRouter
The edgeRouter
section controls the lifetime of router enrollment JWTs. It has only one value:
duration
- (optional) the lifetime of router enrollment JWTs
events
The events
section allows for the definition of multiple event loggers with their own handler and
event subscriptions. Handlers define the type, format, and destination for events. Subscriptions
handle which events are routed to the handler. This allows different events to be output in
different manners or to different locations.
The events
section is an array of named objects. The name (jsonLogger
in the example below) is
used for configuration error output only. Each logger has a subscriptions
and handler
section.
The subscriptions
section is an array of objects with fields associated with the event type.
Specifying an event type will cause it to be output via the defined handler. If an event type is
omitted, it will not be output. The list of valid event types and their options is as follows:
edge.apiSessions
- (optional) edge API Session eventsinclude
- (optional) a string or array of strings that specify which API session events to include ("created" and/or " deleted")
edge.entityCounts
- (optional) edge entity counts (API Sessions, session entities, routers, etc.)interval
- (optional) the time interval to generate entity count events on (e.g. "5s", " 5000ms", "1h")
edge.sessions
- (optional) Session eventsinclude
- (optional) a string or array of strings that specify which Session events to include ("created" and/or "deleted")
fabric.circuits
- (optional) Fabric circuit eventsinclude
- (optional) a string or array of strings that specify which circuit events to include ("created", " pathUpdated", " deleted", "failed")
fabric.links
- - (optional) Fabric link eventsfabric.routers
- (optional) Fabric router eventsfabric.usage
- (optional) Fabric usage eventsversion
- (optional) a string representing the value of the usage event to use ("2' or "3")
metrics
- (optional) - System-wide metricssourceFilter
- (optional) a regular expression to match the source name value onmetricFilter
- (optional) a regular expression to match the metric name value on
services
- (optional) Service events
The properties in the handler
section depend on handler type
(one of file
, stdout
,
or amqp
):
- common properties for all handler types
format
- (required) the format of events for thetype
(json
orplain
)
- type
file
path
- (conditional) used the "file"type
, the path of the output file
- type
amqp
: note that queue and consumer options must matchurl
(required) the URL of the AMQP broker to connect toqueue
(required) the name of the queue to publish events todurable
(optional) whether the queue should be durable between broker runs (default: true)autoDelete
(optional) whether the queue should be deleted when there are no consumers ( default: false)exclusive
(optional) whether the queue should be exclusive to a single consumer (default: false)noWait
(optional) whether the controller should wait for the queue to confirm receipt of messages (default: false)
Example JSON File Logger:
events:
jsonLogger:
subscriptions:
- type: fabric.circuits
- type: fabric.links
- type: fabric.routers
- type: fabric.terminators
- type: metrics
sourceFilter: .*
metricFilter: .*
- type: edge.sessions
- type: edge.apiSessions
- type: fabric.usage
- type: services
- type: edge.entityCounts
interval: 5s
handler:
type: file
format: json
path: /tmp/ziti-events.log
Example amqp Logger:
events:
amqpLogger:
subscriptions:
- type: fabric.usage
interval: 5s
handler:
type: amqp
format: json
url: amqp://guest:guest@localhost:5672
queue: ziti-events
durable: true
autoDelete: false
exclusive: false
noWait: false
Example standard output logger for change events on all entity types.
events:
stdoutLogger:
subscriptions:
- type: entityChange
include:
- apiSessionCertificates
- apiSessions
- authenticators
- authPolicies
- cas
- configs
- configTypes
- controllers
- edgeRouterPolicies
- enrollments
- eventualEvents
- externalJwtSigners
- identities
- identityTypes
- mfas
- postureChecks
- postureCheckTypes
- revocations
- routers
- serviceEdgeRouterPolicies
- servicePolicies
- services
- sessions
- terminators
handler:
type: stdout
format: json
healthChecks
The healthChecks
section configures how often health checking is performed. As of now, health
checks are limited to ensuring the internal database has not deadlocked by attempting to acquire a
locking transaction on some interval. Health check status is reported externally on
the health-checks
API.
boltCheck
- (optional) bbolt specific configurationinterval
- (optional, 30s) how often to try entering a bolt read transactiontimeout
- (optional, 15s) how long to wait for a transaction before timing outinitialDelay
- (optional, 15s) how long to wait on startup before performing the first check
healthChecks:
boltCheck:
interval: 30s
timeout: 15s
initialDelay: 15s
identity
The identity section includes the default server certificate and private key used for services
hosted by the controller, alternate server certificates and keys to support SNI on hosted services,
client certificate and private key when making connections, and the ca
bundle that the controller
will use when making connections and when bootstrapping identities and routers. See the conventions
that apply to all identity sections for field level detail.
network
The network
section sets network wide options.
createCircuitRetries
- (optional, 2) How many times the controller will attempt to create a given circuit before giving up. Since subsequent tries will generally try a different path if one exists, retries can succeed where previous attempts failedcycleSeconds
- (optional, 60) How often to run smart routing calculations, clean up failed links and (if legacy link management is enabled) to look for new links to establish. Note that the controller will also look for new links whenever routers connect or disconnectenableLegacyLinkMgmt
- (optional, true) Determines whether the controller will attempt to manage links for older routers which don't manage their own linksinitialLinkLatency
- (optional, 65s) The latency to use for new links, before the initial link latency is reported. It's recommended to use a higher value so that new traffic doesn't immediately use the new link, before the quality is know. If the link is the only option, a high latency won't prevent its useintervalAgeThreshold
- (optional, 80s) how old a batch of metrics must be before it's eligible to be emittedmetricsReportInterval
- (optional, 1m) the frequency at which controller metrics events are emittedminRouterCost
- (optional, 10) the minimum router costrouterConnectionChurnLimit
- (optional, 1m) how often a new connection from a router can take over for an existing connectionrouterMessaging
- (optional)maxWorkers
- (optional, 100) Max workers sending router state messages from the controller to routers. If the queue is full, the message will be retried laterqueueSize
- (optional, 100) Max queue size for router state messages being sent from the controller to the router. If the queue is full, the message will be retried later
routeTimeoutSeconds
- (optional, 10s) - how to long to wait before considering a circuit creation as timed outsmart
- (optional)minCostDelta
- (optional, 15) minimum change in cost between old circuit path and new circuit path before allowing the circuit to be rerouted. Helpful to prevent circuit flapping when there are paths with negligable differences in costrerouteCap
- (optional, 4) maximum number of circuits to reroute during any given cycle (seecycleSeconds
above)rerouteFraction
- (optional, 0.02) Maximum fraction of circuits to reroute during any given cycle (seecycleSeconds
above)
profile
The profile section allows for CPU (pprof) and memory (memprof) dumps to be created. CPU profiling is buffered by the application's runtime and output to the designated file. Memory profiling allows the interval memory profiling occurs at and is output. These settings are useful for debugging purposes only and should not be enabled in production environments without careful consideration.
cpu
- (optional)path
- (required) the path to output the pprof data
memory
- (optional)path
- (required) the path to output the memprof dataintervalMs
(optional, 15s) the frequency to output memprof data
profile:
cpu:
path: /home/user1/tmp/ctrl.cpu.pprof
memory:
path: ctrl.memprof
intervalMs: 150000
raft
The raft section enables running multiple controllers in a cluster.
bootstrapMembers
- (optional) Only used when bootstrapping the cluster. List of initial clusters members. Should only be set on one of the controllers in the cluster.commandHandler
- (optional)maxQueueSize
- (optional, 1000) max size of the queue for processing incoming raft log entries
commitTimeout
- (optional, 50ms) how long the leader should wait without receiving an Apply before sending an AppendEntry message to followers to ensure that log entries are committed in a reasonable time frame.dataDir
- (required) directory in which to store the bolt DB, the raft journal and snapshotselectionTimeout
- (optional, 1s) how long candidates will wait without communications from the leader before starting a leader electionheartbeatTimeout
- (optional, 1s) How long for followers will wait without communications from- the leader before starting a leader election.
leaderLeaseTimeout
- (optional, 500ms) How long a leader will keep leadership before stepping down, when it's unable to reach a quorum of nodes in the clusterlogLevel
- (optional, DEBUG) The minimum level of raft log messages to emitlogFile
- (optional) If not specified, raft log messages will be emitted along with all other ziti log messages. If specified, raft log messages will be emitted to the given log file.minClusterSize
- (optional, 1) Only used when bootstrapping the cluster. The minimum number of nodes before attempting to form a raft clustermaxAppendEntries
- (optional, 64) - Maximum number of log append entries to send at any given timesnapshotInterval
- (optional, 2m) - How often to check to see if a new snapshot needs to be made. Checks will happen betweensnapshotInterval
and 2 xsnapshotInterval
. This is a cluster wide value and should be consistent across nodes in the cluster. Otherwise the value from the most recently started controller will win.snapshotThreshold
- (optional, 8192) - Minimum number of new long entries before a new snapshot will be created. This is a cluster wide value and should be consistent across nodes in the cluster. Otherwise the value from the most recently started controller will win.trailingLogs
- (optional, 10240) - How many logs to leave in place after a snapshot. These can be used to bring other nodes up to date that are only slightly behind, without having to send the full snapshot. This is a cluster wide value and should be consistent across nodes in the cluster. Otherwise the value from the most recently started controller will win.
raft:
bootstrapMembers:
- tls:127.0.0.1:6262
- tls:127.0.0.1:6363
- tls:127.0.0.1:6464
commandHandler:
maxQueueSize: 1000
commitTimeout: 50ms
dataDir: ./data
electionTimeout: 1s
heartbeatTimeout: 1s
leaderLeaseTimeout: 500ms
logLevel: INFO
logFile: ./raft.log
minClusterSize: 3
maxAppendEntries: 64
snapshotInterval: 2m
snapshotThreshold: 8192
trailingLogs: 10240
trace
The trace
section instructs the controller to output incoming and outgoing messaging it receives.
This setting is useful for debugging purposes only and should not be enabled in production
environments without careful consideration.
path
- (required) the file to output decoded messages to
trace:
path: /var/opt/open.ziti.ctrl.trace
web
The web
section follows the conventions of XWeb. The controller has the
following APIs defined:
health-checks
- provides a health check API that allows remote parties to verify the health of the controllerfabric
- the fabric management API which allows remote administration of a networkedge-management
- the edge management API which allows remote administration of a network's edge components ( identities, policies, authentication, etc.)edge-client
- the edge client API which allows clients to authenticate and request connections to services
Each API may have their own options, but currently do not.
v
The v
section is used to detect if the version file is supported by the OpenZiti binary read it.
The current and only supported value is "3".
v: 3