loki grpc_client
2023-12-13 14:28:45
The
grpc_client
block configures the gRPC client used to communicate between two Loki components. The supported CLI flags<prefix>
used to reference this configuration block are:
bigtable
boltdb.shipper.index-gateway-client.grpc
frontend.grpc-client-config
ingester.client
querier.frontend-client
query-scheduler.grpc-client-config
ruler.client
tsdb.ship
# gRPC client max receive message size (bytes). # CLI flag: -<prefix>.grpc-max-recv-msg-size [max_recv_msg_size: <int> | default = 104857600] # gRPC client max send message size (bytes). # CLI flag: -<prefix>.grpc-max-send-msg-size [max_send_msg_size: <int> | default = 104857600] # Use compression when sending messages. Supported values are: 'gzip', 'snappy' # and '' (disable compression) # CLI flag: -<prefix>.grpc-compression [grpc_compression: <string> | default = ""] # Rate limit for gRPC client; 0 means disabled. # CLI flag: -<prefix>.grpc-client-rate-limit [rate_limit: <float> | default = 0] # Rate limit burst for gRPC client. # CLI flag: -<prefix>.grpc-client-rate-limit-burst [rate_limit_burst: <int> | default = 0] # Enable backoff and retry when we hit rate limits. # CLI flag: -<prefix>.backoff-on-ratelimits [backoff_on_ratelimits: <boolean> | default = false] backoff_config: # Minimum delay when backing off. # CLI flag: -<prefix>.backoff-min-period [min_period: <duration> | default = 100ms] # Maximum delay when backing off. # CLI flag: -<prefix>.backoff-max-period [max_period: <duration> | default = 10s] # Number of times to backoff and retry before failing. # CLI flag: -<prefix>.backoff-retries [max_retries: <int> | default = 10] # Initial stream window size. Values less than the default are not supported and # are ignored. Setting this to a value other than the default disables the BDP # estimator. # CLI flag: -<prefix>.initial-stream-window-size [initial_stream_window_size: <int> | default = 63KiB1023B] # Initial connection window size. Values less than the default are not supported # and are ignored. Setting this to a value other than the default disables the # BDP estimator. # CLI flag: -<prefix>.initial-connection-window-size [initial_connection_window_size: <int> | default = 63KiB1023B] # Enable TLS in the gRPC client. This flag needs to be enabled when any other # TLS flag is set. If set to false, insecure connection to gRPC server will be # used. # CLI flag: -<prefix>.tls-enabled [tls_enabled: <boolean> | default = false] # Path to the client certificate, which will be used for authenticating with the # server. Also requires the key path to be configured. # CLI flag: -<prefix>.tls-cert-path [tls_cert_path: <string> | default = ""] # Path to the key for the client certificate. Also requires the client # certificate to be configured. # CLI flag: -<prefix>.tls-key-path [tls_key_path: <string> | default = ""] # Path to the CA certificates to validate server certificate against. If not # set, the host's root CA certificates are used. # CLI flag: -<prefix>.tls-ca-path [tls_ca_path: <string> | default = ""] # Override the expected name on the server certificate. # CLI flag: -<prefix>.tls-server-name [tls_server_name: <string> | default = ""] # Skip validating server certificate. # CLI flag: -<prefix>.tls-insecure-skip-verify [tls_insecure_skip_verify: <boolean> | default = false] # Override the default cipher suite list (separated by commas). Allowed values: # # Secure Ciphers: # - TLS_RSA_WITH_AES_128_CBC_SHA # - TLS_RSA_WITH_AES_256_CBC_SHA # - TLS_RSA_WITH_AES_128_GCM_SHA256 # - TLS_RSA_WITH_AES_256_GCM_SHA384 # - TLS_AES_128_GCM_SHA256 # - TLS_AES_256_GCM_SHA384 # - TLS_CHACHA20_POLY1305_SHA256 # - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA # - TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA # - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA # - TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA # - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 # - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 # - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 # - TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 # - TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 # - TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 # # Insecure Ciphers: # - TLS_RSA_WITH_RC4_128_SHA # - TLS_RSA_WITH_3DES_EDE_CBC_SHA # - TLS_RSA_WITH_AES_128_CBC_SHA256 # - TLS_ECDHE_ECDSA_WITH_RC4_128_SHA # - TLS_ECDHE_RSA_WITH_RC4_128_SHA # - TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA # - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 # - TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 # CLI flag: -<prefix>.tls-cipher-suites [tls_cipher_suites: <string> | default = ""] # Override the default minimum TLS version. Allowed values: VersionTLS10, # VersionTLS11, VersionTLS12, VersionTLS13 # CLI flag: -<prefix>.tls-min-version [tls_min_version: <string> | default = ""] # The maximum amount of time to establish a connection. A value of 0 means # default gRPC client connect timeout and backoff. # CLI flag: -<prefix>.connect-timeout [connect_timeout: <duration> | default = 5s] # Initial backoff delay after first connection failure. Only relevant if # ConnectTimeout > 0. # CLI flag: -<prefix>.connect-backoff-base-delay [connect_backoff_base_delay: <duration> | default = 1s] # Maximum backoff delay when establishing a connection. Only relevant if # ConnectTimeout > 0. # CLI flag: -<prefix>.connect-backoff-max-delay [connect_backoff_max_delay: <duration> | default = 5s]
per.index-gateway-client.grpc
文章来源:https://blog.csdn.net/henanchina/article/details/134970251
本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。 如若内容造成侵权/违法违规/事实不符,请联系我的编程经验分享网邮箱:veading@qq.com进行投诉反馈,一经查实,立即删除!
本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。 如若内容造成侵权/违法违规/事实不符,请联系我的编程经验分享网邮箱:veading@qq.com进行投诉反馈,一经查实,立即删除!