FlagName | |||||
---|---|---|---|---|---|
acracensor_config_file | |||||
acrastruct_injectedcell_enable | |||||
acrastruct_wholecell_enable | |||||
audit_log_enable | |||||
client_id | |||||
config_file | |||||
db_host | |||||
db_port | |||||
ds | |||||
dump_config | |||||
Connection string (http://x.x.x.x:yyyy)for loading encryptor config from HashiCorp Consul
consul_connection_api_string:
consul_kv_config_path: acra/encryptor_config
Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (https://golang.org/pkg/crypto/tls/#ClientAuthType). Default is -1 which means NotSpecified and will be used value from tls_auth.
consul_tls_client_auth: -1
Path to root certificate which will be used with system root certificates to validate peer's certificate. Uses --tls_ca value if not specified.
consul_tls_client_ca:
consul_tls_client_cert:
consul_tls_client_key:
consul_tls_client_sni:
consul_tls_crl_client_cache_size: 16
consul_tls_crl_client_cache_time: 0
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
consul_tls_crl_client_check_only_leaf_certificate: false
consul_tls_crl_client_from_cert: prefer
consul_tls_crl_client_url:
consul_tls_enable: false
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
consul_tls_ocsp_client_check_only_leaf_certificate: false
consul_tls_ocsp_client_from_cert: prefer
consul_tls_ocsp_client_required: denyUnknown
consul_tls_ocsp_client_url:
d: false
dump_config: false
encryptor_config_file:
encryptor_config_storage_type: filesystem
generate_markdown_args_table: false
http_api_enable: false
Enable HTTPS support for the API. Use together with the --http_api_enable. TLS configuration is the same as in the Acra Proxy. Starting from 0.96.0 the flag value will be true by default.
http_api_tls_transport_enable: false
incoming_connection_api_port: 9090
incoming_connection_api_string: tcp://0.0.0.0:9090/
incoming_connection_close_timeout: 10
incoming_connection_host: 0.0.0.0
incoming_connection_port: 9393
URL (tcp://host:port) which will be used to expose Prometheus metrics (/metrics address to pull metrics)
incoming_connection_prometheus_metrics_string:
incoming_connection_string: tcp://0.0.0.0:9393/
jaeger_agent_endpoint:
jaeger_basic_auth_password:
jaeger_basic_auth_username:
Jaeger endpoint (for example, http://localhost:14268/api/traces) that will be used to export trace data
jaeger_collector_endpoint:
keys_dir: .acrakeys
keystore_cache_on_start_enable: true
Maximum number of keys stored in in-memory LRU cache in encrypted form. 0 - no limits, -1 - turn off cache. Default is 1000
keystore_cache_size: 1000
Keystore encryptor strategy: <env_master_key|kms_encrypted_master_key|vault_master_key|kms_per_client
keystore_encryption_type: env_master_key
kms_credentials_path:
kms_type:
log_to_console: true
log_to_file:
logging_format: plaintext
mysql_enable: false
pgsql_escape_bytea: false
pgsql_hex_bytea: false
Turn on poison record detection, if server shutdown is disabled, AcraServer logs the poison record detection and returns decrypted data
poison_detect_enable: false
On detecting poison record: log about poison record detection, execute script, return decrypted data
poison_run_script_file:
poison_shutdown_enable: false
postgresql_enable: false
redis_db_keys: -1
redis_db_tokens: -1
redis_host_port:
redis_password:
Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (https://golang.org/pkg/crypto/tls/#ClientAuthType). Default is -1 which means NotSpecified and will be used value from tls_auth.
redis_tls_client_auth: -1
Path to root certificate which will be used with system root certificates to validate peer's certificate. Uses --tls_ca value if not specified.
redis_tls_client_ca:
redis_tls_client_cert:
redis_tls_client_key:
redis_tls_client_sni:
redis_tls_crl_client_cache_size: 16
redis_tls_crl_client_cache_time: 0
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
redis_tls_crl_client_check_only_leaf_certificate: false
redis_tls_crl_client_from_cert: prefer
redis_tls_crl_client_url:
redis_tls_enable: false
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
redis_tls_ocsp_client_check_only_leaf_certificate: false
redis_tls_ocsp_client_from_cert: prefer
redis_tls_ocsp_client_required: denyUnknown
redis_tls_ocsp_client_url:
sql_parse_on_error_exit_enable: false
Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (https://golang.org/pkg/crypto/tls/#ClientAuthType). Default is tls.RequireAndVerifyClientCert
tls_auth: 4
Path to root certificate which will be used with system root certificates to validate peer's certificate
tls_ca:
tls_cert:
Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (https://golang.org/pkg/crypto/tls/#ClientAuthType). Default is -1 which means NotSpecified and will be used value from tls_auth.
tls_client_auth: -1
Path to root certificate which will be used with system root certificates to validate peer's certificate. Uses --tls_ca value if not specified.
tls_client_ca:
tls_client_cert:
Extract clientID from TLS certificate from application connection. Can't be used with --tls_client_auth=0 or --tls_auth=0
tls_client_id_from_cert: true
tls_client_key:
tls_crl_cache_size: 16
tls_crl_cache_time: 0
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
tls_crl_check_only_leaf_certificate: false
tls_crl_client_cache_size: 16
tls_crl_client_cache_time: 0
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
tls_crl_client_check_only_leaf_certificate: false
tls_crl_client_from_cert: prefer
tls_crl_client_url:
tls_crl_database_cache_size: 16
tls_crl_database_cache_time: 0
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
tls_crl_database_check_only_leaf_certificate: false
tls_crl_database_from_cert: prefer
tls_crl_database_url:
tls_crl_from_cert: prefer
tls_crl_url:
Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (https://golang.org/pkg/crypto/tls/#ClientAuthType). Default is -1 which means NotSpecified and will be used value from tls_auth.
tls_database_auth: -1
Path to root certificate which will be used with system root certificates to validate peer's certificate. Uses --tls_ca value if not specified.
tls_database_ca:
tls_database_cert:
tls_database_key:
tls_database_sni:
Decide which field of TLS certificate to use as ClientID (distinguished_name|serial_number). Default is distinguished_name.
tls_identifier_extractor_type: distinguished_name
tls_key:
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
tls_ocsp_check_only_leaf_certificate: false
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
tls_ocsp_client_check_only_leaf_certificate: false
tls_ocsp_client_from_cert: prefer
tls_ocsp_client_required: denyUnknown
tls_ocsp_client_url:
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
tls_ocsp_database_check_only_leaf_certificate: false
tls_ocsp_database_from_cert: prefer
tls_ocsp_database_required: denyUnknown
tls_ocsp_database_url:
tls_ocsp_from_cert: prefer
tls_ocsp_required: denyUnknown
tls_ocsp_url:
token_db:
tracing_jaeger_enable: false
tracing_log_enable: false
v: false
Connection string (http://x.x.x.x:yyyy) for loading ACRA_MASTER_KEY from HashiCorp Vault
vault_connection_api_string:
vault_secrets_path: secret/
Path to CA certificate for HashiCorp Vault certificate validation (deprecated since 0.94.0, use vault_tls_client_ca
)
vault_tls_ca_path:
Set authentication mode that will be used in TLS connection. Values in range 0-4 that set auth type (https://golang.org/pkg/crypto/tls/#ClientAuthType). Default is -1 which means NotSpecified and will be used value from tls_auth.
vault_tls_client_auth: -1
Path to root certificate which will be used with system root certificates to validate peer's certificate. Uses --tls_ca value if not specified.
vault_tls_client_ca:
vault_tls_client_cert:
vault_tls_client_key:
vault_tls_client_sni:
vault_tls_crl_client_cache_size: 16
vault_tls_crl_client_cache_time: 0
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using CRL
vault_tls_crl_client_check_only_leaf_certificate: false
vault_tls_crl_client_from_cert: prefer
vault_tls_crl_client_url:
Put 'true' to check only final/last certificate, or 'false' to check the whole certificate chain using OCSP
vault_tls_ocsp_client_check_only_leaf_certificate: false
vault_tls_ocsp_client_from_cert: prefer
vault_tls_ocsp_client_required: denyUnknown
vault_tls_ocsp_client_url:
vault_tls_transport_enable: false
CLI_SET | CLI_NOT_SET | CONFIG_SET | CONFIG_NOT_SET | |
---|---|---|---|---|
CLI_SET | 1 | 1 | 1 (FROM CLI) | 1 |
CLI_NOT_SET | 1 | 0 | 1 (FROM CONFIG) | 0 |
CONFIG_SET | 1 (FROM CLI) | 1 (FROM CONFIG) | 1 | 1 |
CONFIG_NOT_SET | 1 | 0 | 1 | 0 |