Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hashicorp/consul-template
Template rendering, notifier, and supervisor for @HashiCorp Consul and Vault data.
https://github.com/hashicorp/consul-template
consul golang vault
Last synced: 5 days ago
JSON representation
Template rendering, notifier, and supervisor for @HashiCorp Consul and Vault data.
- Host: GitHub
- URL: https://github.com/hashicorp/consul-template
- Owner: hashicorp
- License: mpl-2.0
- Created: 2014-10-07T15:52:00.000Z (over 10 years ago)
- Default Branch: main
- Last Pushed: 2024-12-20T18:28:51.000Z (about 1 month ago)
- Last Synced: 2025-01-08T13:07:06.789Z (17 days ago)
- Topics: consul, golang, vault
- Language: Go
- Homepage: https://www.hashicorp.com/
- Size: 55.4 MB
- Stars: 4,770
- Watchers: 330
- Forks: 782
- Open Issues: 192
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: .github/CONTRIBUTING.md
- License: LICENSE
- Codeowners: .github/CODEOWNERS
Awesome Lists containing this project
- awesome - hashicorp/consul-template - Template rendering, notifier, and supervisor for @HashiCorp Consul and Vault data. (Go)
- awesome-repositories - hashicorp/consul-template - Template rendering, notifier, and supervisor for @HashiCorp Consul and Vault data. (Go)
- awesome-consul - consul-template: Generic template rendering and notifications with Consul
README
---
# Consul Template[![build](https://github.com/hashicorp/consul-template/actions/workflows/build.yml/badge.svg)](https://github.com/hashicorp/consul-template/actions/workflows/build.yml)
[![ci](https://github.com/hashicorp/consul-template/actions/workflows/ci.yml/badge.svg)](https://github.com/hashicorp/consul-template/actions/workflows/ci.yml)
[![Go Documentation](http://img.shields.io/badge/go-documentation-%2300acd7)](https://godoc.org/github.com/hashicorp/consul-template)This project provides a convenient way to populate values from [Consul][consul]
into the file system using the `consul-template` daemon.The daemon `consul-template` queries a [Consul][consul], [Vault][vault], or [Nomad][nomad]
cluster and updates any number of specified templates on the file system. As an
added bonus, it can optionally run arbitrary commands when the update process
completes. Please see the [examples folder][examples] for some scenarios where
this functionality might prove useful.---
**The documentation in this README corresponds to the main branch of Consul Template. It may contain unreleased features or different APIs than the most recently released version.**
**Please see the [Git tag](https://github.com/hashicorp/consul-template/releases) that corresponds to your version of Consul Template for the proper documentation.**
---
## Table of Contents
- [Community Support](#community-support)
- [Installation](#installation)
- [Quick Example](#quick-example)
- [Learn Guides](#learn-guides)
- [Configuration](docs/configuration.md)
- [Command Line Flags](docs/configuration.md#command-line-flags)
- [Configuration File](docs/configuration.md#configuration-file)
- [Reload Configuration and Templates](#reload-configuration-and-templates)
- [Templating Language](docs/templating-language.md)
- [API Functions](docs/templating-language.md#api-functions)
- [Scratch](docs/templating-language.md#scratch)
- [Helper Functions](docs/templating-language.md#helper-functions)
- [Math Functions](docs/templating-language.md#math-functions)
- [Observability](docs/observability.md)
- [Logging](docs/observability.md#logging)
- [Logging to file](docs/observability.md#logging-to-file)
- [Modes](docs/modes.md)
- [Once Mode](docs/modes.md#once-mode)
- [De-Duplication Mode](docs/modes.md#de-duplication-mode)
- [Exec Mode](docs/modes.md#exec-mode)
- [Plugins](docs/plugins.md)
- [Caveats](#caveats)
- [Docker Image Use](#docker-image-use)
- [Dots in Service Names](#dots-in-service-names)
- [Termination on Error](#termination-on-error)
- [Commands](#commands)
- [Environment](#environment)
- [Multiple Commands](#multiple-commands)
- [Multi-phase Execution](#multi-phase-execution)
- [Debugging](#debugging)
- [FAQ](#faq)
- [Contributing](#contributing)## Community Support
If you have questions about how consul-template works, its capabilities or
anything other than a bug or feature request (use github's issue tracker for
those), please see our community support resources.Community portal: https://discuss.hashicorp.com/tags/c/consul/29/consul-template
Other resources: https://www.consul.io/community.html
Additionally, for issues and pull requests, we'll be using the :+1: reactions
as a rough voting system to help gauge community priorities. So please add :+1:
to any issue or pull request you'd like to see worked on. Thanks.## Installation
1. Download a pre-compiled, released version from the [Consul Template releases page][releases].
1. Extract the binary using `unzip` or `tar`.
1. Move the binary into `$PATH`.
To compile from source, please see the instructions in the
[contributing section](#contributing).## Quick Example
This short example assumes Consul is installed locally.
1. Start a Consul cluster in dev mode:
```shell
$ consul agent -dev
```1. Author a template `in.tpl` to query the kv store:
```liquid
{{ key "foo" }}
```1. Start Consul Template:
```shell
$ consul-template -template "in.tpl:out.txt" -once
```1. Write data to the key in Consul:
```shell
$ consul kv put foo bar
```1. Observe Consul Template has written the file `out.txt`:
```shell
$ cat out.txt
bar
```For more examples and use cases, please see the [examples folder][examples] in
this repository.## Learn Guides
In addition to these [examples][examples], HashiCorp has published guides and
official documentation to help walk through a few common use cases for Consul
Template.
* [Consul KV](https://learn.hashicorp.com/consul/developer-configuration/consul-template#use-case-consul-kv)
* [Consul Catalog](https://learn.hashicorp.com/consul/developer-configuration/consul-template#use-case-discover-all-services)
* [Vault Agent Templates](https://learn.hashicorp.com/vault/identity-access-management/agent-templates)
* [Vault Secrets](https://www.vaultproject.io/docs/agent/template#example-template)
* [Nomad Native Service Discovery](https://learn.hashicorp.com/tutorials/nomad/schedule-edge-services)## Configuration
Configuration documentation has been moved to [docs/configuration.md](docs/configuration.md).
## Reload Configuration and Templates
While there are multiple ways to run Consul Template, the most common pattern is
to run Consul Template as a system service. When Consul Template first starts,
it reads any configuration files and templates from disk and loads them into
memory. From that point forward, changes to the files on disk do not propagate
to running process without a reload.The reason for this behavior is simple and aligns with other tools like haproxy.
A user may want to perform pre-flight validation checks on the configuration or
templates before loading them into the process. Additionally, a user may want to
update configuration and templates simultaneously. Having Consul Template
automatically watch and reload those files on changes is both operationally
dangerous and against some of the paradigms of modern infrastructure. Instead,
Consul Template listens for the `SIGHUP` syscall to trigger a configuration
reload. If you update configuration or templates, simply send `HUP` to the
running Consul Template process and Consul Template will reload all the
configurations and templates from disk.## Templating Language
Templating Language documentation has been moved to
[docs/templating-language.md](docs/templating-language.md).## Caveats
### Docker Image Use
The Alpine Docker image is configured to support an external volume to render
shared templates to. If mounted you will need to make sure that the
consul-template user in the docker image has write permissions to the
directory. Also if you build your own image using these you need to be sure you
have the permissions correct.**The consul-template user in docker has a UID of 100 and a GID of 1000.**
This effects the in image directories /consul-template/config, used to add
configuration when using this as a parent image, and /consul-template/data,
exported as a VOLUME as a location to render shared results.Previously the image initially ran as root in order to ensure the permissions
allowed it. But this ran against docker best practices and security policies.If you build your own image based on ours you can override these values with
`--build-arg` parameters.### Dots in Service Names
Using dots `.` in service names will conflict with the use of dots for [TAG
delineation](https://github.com/hashicorp/consul-template#service) in the
template. Dots already [interfere with using
DNS](https://www.consul.io/docs/agent/services.html#service-and-tag-names-with-dns)
for service names, so we recommend avoiding dots wherever possible.### Termination on Error
By default Consul Template is highly fault-tolerant. If Consul is unreachable or
a template changes, Consul Template will happily continue running. The only
exception to this rule is if the optional `command` exits non-zero. In this
case, Consul Template will also exit non-zero. The reason for this decision is
so the user can easily configure something like Upstart or God to manage Consul
Template as a service.If you want Consul Template to continue watching for changes, even if the
optional command argument fails, you can append `|| true` to your command. Note
that `||` is a "shell-ism", not a built-in function. You will also need to run
your command under a shell:```shell
$ consul-template \
-template "in.ctmpl:out.file:/bin/bash -c 'service nginx restart || true'"
```In this example, even if the Nginx restart command returns non-zero, the overall
function will still return an OK exit code; Consul Template will continue to run
as a service. Additionally, if you have complex logic for restarting your
service, you can intelligently choose when you want Consul Template to exit and
when you want it to continue to watch for changes. For these types of complex
scripts, we recommend using a custom sh or bash script instead of putting the
logic directly in the `consul-template` command or configuration file.### Commands
#### Environment
The current processes environment is used when executing commands with the following additional environment variables:
- `CONSUL_HTTP_ADDR`
- `CONSUL_HTTP_TOKEN`
- `CONSUL_HTTP_TOKEN_FILE`
- `CONSUL_HTTP_AUTH`
- `CONSUL_HTTP_SSL`
- `CONSUL_HTTP_SSL_VERIFY`
- `NOMAD_ADDR`
- `NOMAD_NAMESPACE`
- `NOMAD_TOKEN`These environment variables are exported with their current values when the
command executes. Other Consul tooling reads these environment variables,
providing smooth integration with other Consul tools (like `consul maint` or
`consul lock`). Additionally, exposing these environment variables gives power
users the ability to further customize their command script.#### Multiple Commands
The command configured for running on template rendering must take one of two
forms.The first is as a list of the command and arguments split at spaces. The
command can use an absolute path or be found on the execution environment's
PATH and must be the first item in the list. This form allows for single or
multi-word commands that can be executed directly with a system call. For
example...`command = ["echo", "hello"]`
`command = ["/opt/foo-package/bin/run-foo"]`
`command = ["foo"]`Note that if you give a single command without the list denoting square
brackets (`[]`) it is converted into a list with a single argument.This:
`command = "foo"`
is equivalent to:
`command = ["foo"]`The second form is as a single quoted command using system shell features. This
form **requires** a shell named `sh` be on the executable search path (eg. PATH
on \*nix). This is the standard on all \*nix systems and should work out of the
box on those systems. This won't work on, for example, Docker images with only
the executable and without a minimal system like Alpine. Using this form you
can join multiple commands with logical operators, `&&` and `||`, use pipelines
with `|`, conditionals, etc. Note that the shell `sh` is normally `/bin/sh` on
\*nix systems and is either a POSIX shell or a shell run in POSIX compatible
mode, so it is best to stick to POSIX shell syntax in this command. For
example..`command = "/opt/foo && /opt/bar"`
`command = "if /opt/foo ; then /opt/bar ; fi"`
Using this method you can run as many shell commands as you need with whatever
logic you need. Though it is suggested that if it gets too long you might want
to wrap it in a shell script, deploy and run that.#### Shell Commands and Exec Mode
Using the system shell based command has one additional caveat when used for
the Exec mode process (the managed, executed process to which it will propagate
signals). That is to get signals to work correctly means not only does anything
the shell runs need to handle signals, but the shell itself needs to handle
them. This needs to be managed by you as shells will exit upon receiving most
signals.A common example of this would be wanting the SIGHUP signal to trigger a reload
of the underlying process and to be ignored by the shell process. To get this
you have 2 options, you can use `trap` to ignore the signal or you can use
`exec` to replace the shell with another process.To use `trap` to ignore the signal, you call `trap` to catch the signal in the
shell with no action. For example if you had an underlying nginx process you
wanted to run with a shell command and have the shell ignore it you'd do..`command = "trap '' HUP; /usr/sbin/nginx -c /etc/nginx/nginx.conf"`
The `trap '' HUP;` bit is enough to get the shell to ignore the HUP signal. If
you left off the `trap` command nginx would reload but the shell command would
exit but leave the nginx still running, not unmanaged.Alternatively using `exec` will replace the shell's process with a sub-process,
keeping the same PID and process grouping (allowing the sub-process to be
managed). This is simpler, but a bit less flexible than `trap`, and looks
like..`command = "exec /usr/sbin/nginx -c /etc/nginx/nginx.conf"`
Where the nginx process would replace the enclosing shell process to be managed
by consul-template, receiving the Signals directly. Basically `exec` eliminates
the shell from the equation.See your shell's documentation on `trap` and/or `exec` for more details on this.
### Multi-phase Execution
Consul Template does an n-pass evaluation of templates, accumulating
dependencies on each pass. This is required due to nested dependencies, such as:```liquid
{{ range services }}
{{ range service .Name }}
{{ .Address }}
{{ end }}{{ end }}
```During the first pass, Consul Template does not know any of the services in
Consul, so it has to perform a query. When those results are returned, the
inner-loop is then evaluated with that result, potentially creating more queries
and watches.Because of this implementation, template functions need a default value that is
an acceptable parameter to a `range` function (or similar), but does not
actually execute the inner loop (which would cause a panic). This is important
to mention because complex templates **must** account for the "empty" case. For
example, the following **will not work**:```liquid
{{ with index (service "foo") 0 }}
# ...
{{ end }}
```This will raise an error like:
```text
: error calling index: index out of range: 0
```That is because, during the _first_ evaluation of the template, the `service`
key is returning an empty slice. You can account for this in your template like
so:```liquid
{{ with service "foo" }}
{{ with index . 0 }}
{{ .Node }}{{ end }}{{ end }}
```This will still add the dependency to the list of watches, but will not
evaluate the inner-if, avoiding the out-of-index error.## Debugging
Consul Template can print verbose debugging output. To set the log level for
Consul Template, use the `-log-level` flag:```shell
$ consul-template -log-level info ...
``````text
[INFO] (cli) received redis from Watcher
[INFO] (cli) invoking Runner
# ...
```You can also specify the level as debug:
```shell
$ consul-template -log-level debug ...
``````text
[DEBUG] (cli) creating Runner
[DEBUG] (cli) creating Consul API client
[DEBUG] (cli) creating Watcher
[DEBUG] (cli) looping for data
[DEBUG] (watcher) starting watch
[DEBUG] (watcher) all pollers have started, waiting for finish
[DEBUG] (redis) starting poll
[DEBUG] (service redis) querying Consul with &{...}
[DEBUG] (service redis) Consul returned 2 services
[DEBUG] (redis) writing data to channel
[DEBUG] (redis) starting poll
[INFO] (cli) received redis from Watcher
[INFO] (cli) invoking Runner
[DEBUG] (service redis) querying Consul with &{...}
# ...
```## FAQ
**Q: How is this different than confd?**
A: The answer is simple: Service Discovery as a first class citizen. You are also encouraged to read [this Pull Request](https://github.com/kelseyhightower/confd/pull/102) on the project for more background information. We think confd is a great project, but Consul Template fills a missing gap. Additionally, Consul Template has first class integration with [Vault][vault], making it easy to incorporate secret material like database credentials or API tokens into configuration files.**Q: How is this different than Puppet/Chef/Ansible/Salt?**
A: Configuration management tools are designed to be used in unison with Consul Template. Instead of rendering a stale configuration file, use your configuration management software to render a dynamic template that will be populated by [Consul][consul].**Q: How does compatibility with Consul look like?**
A: The following table shows the compatibility of Consul Template with Consul versions:
| | Consul v1.16 | Consul v1.17 | Consul v1.18 | Consul v1.16+ent | Consul v1.17+ent |
| ------------- | ------------- | ------------- | ------------- | ----------------- | ----------------- |
| CT v0.37 | ✅ | ✅ | ✅ | ✅ | ✅ |
| CT v0.36 | ✅ | ✅ | ✅ | N/A | N/A |
| CT v0.35 | ✅ | ✅ | ✅ | N/A | N/A |
| CT v0.34 | ✅ | ✅ | ✅ | N/A | N/A |N/A = ENT tests were not supported before this version
## Contributing
To build and install Consul-Template locally, you will need to [install Go][go].
Clone the repository:
```shell
$ git clone https://github.com/hashicorp/consul-template.git
```To compile the `consul-template` binary for your local machine:
```shell
$ make dev
```This will compile the `consul-template` binary into `bin/consul-template` as
well as your `$GOPATH` and run the test suite.If you want to run the tests, first install [consul](https://www.consul.io/docs/install/index.html), [nomad](https://learn.hashicorp.com/tutorials/nomad/get-started-install) and [vault](https://www.vaultproject.io/docs/install/) locally, then:
```shell
$ make test
```Or to run a specific test in the suite:
```shell
go test ./... -run SomeTestFunction_name
```[consul]: https://www.consul.io "Consul by HashiCorp"
[connect]: https://www.consul.io/docs/connect/ "Connect"
[examples]: (https://github.com/hashicorp/consul-template/tree/main/examples) "Consul Template Examples"
[releases]: https://releases.hashicorp.com/consul-template "Consul Template Releases"
[vault]: https://www.vaultproject.io "Vault by HashiCorp"
[go]: https://golang.org "Go programming language"
[nomad]: https://www.nomadproject.io "Nomad By HashiCorp"