expose Block
Placement | job -> group -> service -> connect -> sidecar_service -> proxy -> expose |
The expose
block allows configuration of additional listeners for the default
Envoy sidecar proxy managed by Nomad for Consul Connect.
These listeners create a bypass of the Connect TLS and network namespace
isolation, enabling non-Connect enabled services to make requests to specific
HTTP paths through the sidecar proxy.
The expose
configuration is valid within the context of a proxy
block.
Additional information about Expose Path configurations for Envoy can be found
in Consul's Expose Paths Configuration Reference.
Service check configurations can use their expose parameter to automatically generate expose path configurations for HTTP and gRPC checks.
For uses other than Consul service checks, use the expose
configuration in the
proxy
block. The example below effectively demonstrates exposing the
/health
endpoint similar to the example above, but using the fully flexible
expose
configuration.
expose
Parameters
path
(Path: nil)
- A list of [Envoy Expose Path Configurations][expose_path] to expose through Envoy.
path
Parameters
path
(string: required)
- The HTTP or gRPC path to expose. The path must be prefixed with a slash.protocol
(string: required)
- Sets the protocol of the listener. Must behttp
orhttp2
. For gRPC usehttp2
.local_path_port
(int: required)
- The port the service is listening to for connections to the configuredpath
. Typically this will be the same as theservice.port
value, but could be different if for example the exposed path is intended to resolve to another task in the task group.listener_port
(Port: required)
- The name of the port to use for the exposed listener. The port should be configured to map inside the task's network namespace.
expose
Examples
The following example is configured to expose the /metrics
endpoint of the
Connect-enabled count-dashboard
service, using the HTTP
protocol.
count-dashboard
is expected to listen inside its namespace to port 9001
, and
external services will be able to reach its /metrics
endpoint by connecting to
the network interface of the node on the allocated
metrics
Port.
path
Examples
The following example is an expose configuration that exposes a /metrics
endpoint using the http2
protocol (typical for gRPC), and an HTTP /v2/health
endpoint.
Exposing Service Checks
A common use case for expose
is for exposing endpoints used in Consul service
check definitions. For these cases the expose parameter in the service check
block can be used to automatically generate the expose path configuration.
Configuring a port for use by the check is optional, as a dynamic port will be
automatically generated if not provided.