Skip to content

Configuration Manual

  • listeners

    TypeStruct(listeners)

    listeners

    • tcp

      TypeMap($name->OneOf(Struct(mqtt_tcp_listener),String("marked_for_deletion")))
      Description

      TCP listeners.

      mqtt_tcp_listener

      • bind

        TypeString
        Default1883
        Description

        IP address and port for the listening socket.

      • acceptors

        TypeInteger(1..+inf)
        Default16
        Description

        The size of the listener's receiving pool.

      • max_connections

        TypeOneOf(String("infinity"),Integer(1..+inf))
        Defaultinfinity
        Description

        The maximum number of concurrent connections allowed by the listener.

      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t.
        Set to "" to disable the feature.

        Variables in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
      • zone

        TypeString
        Defaultdefault
        Description

        The configuration zone to which the listener belongs. Clients connected to this listener will inherit zone-settings created under this zone name.

        A zone can override the configs under below root names:

        • mqtt
        • force_shutdown
        • force_gc
        • flapping_detect
        • durable_sessions
      • enable_authn

        TypeEnum(true,false,quick_deny_anonymous)
        Defaulttrue
        Description

        Set true (default) to enable client authentication on this listener, the authentication process goes through the configured authentication chain. When set to false, any client (with or without username/password) is allowed to connect. When set to quick_deny_anonymous, it behaves like when set to true, but clients will be denied immediately without going through any authenticators if username is not provided. This is useful to fence off anonymous clients early.

      • max_conn_rate

        TypeString
        Defaultinfinity
        Description

        Used to limit the rate at which the current listener accepts connections.

        Once the limit is reached, EMQX will pause fetching connections from the Accept queue, thereby delaying or rejecting new connections.

        For example:

        • 1000/s: Only accepts 1000 connections per second.
        • 1000/10s: Only accepts 1000 connections every 10 seconds.
      • messages_rate

        TypeString
        Description

        Used to limit the number of messages a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        For example:

        • 500/s: Only 500 messages will be received per second, and the remaining messages will be delayed.
        • 500/10s: Only 500 messages will be received every 10 seconds and the remaining messages will be delayed.
      • bytes_rate

        TypeString
        Description

        Used to limit the number of bytes a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        The unit of the bytes could be: B, KB, MB, GB.

        For example:

        • 500KB/s: Only 500 kilobytes per second will be received, and the remaining bytes will be delayed.
        • 500MB/10s: Only 500 megabytes will be received every 10 seconds, and the remaining bytes will be delayed.
      • access_rules

        TypeArray(String)
        Default["allow all"]
        Description

        An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

        For example:

        [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

      • proxy_protocol

        TypeBoolean
        Defaultfalse
        Description

        Enable the Proxy Protocol V1/2 if the EMQX cluster is deployed behind HAProxy or Nginx.
        See: https://www.haproxy.com/blog/haproxy/proxy-protocol/

      • proxy_protocol_timeout

        TypeDuration
        Default"3s"
        Description

        If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header.

        EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

        For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • tcp_options

        TypeStruct(tcp_opts)

        tcp_opts

        • active_n
          TypeInteger(0..+inf)
          Default100
          Description

          Specify the {active, N} option for this Socket.
          See: https://erlang.org/doc/man/inet.html#setopts-2

        • backlog
          TypeInteger(1..+inf)
          Default1024
          Description

          TCP backlog defines the maximum length that the queue of pending connections can grow to.

        • send_timeout
          TypeDuration
          Default"15s"
          Description

          The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

          The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

          Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • send_timeout_close
          TypeBoolean
          Defaulttrue
          Description

          Close the connection if send timeout.

        • recbuf
          TypeBytesize
          Description

          The TCP receive buffer (OS kernel) for the connections.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • sndbuf
          TypeBytesize
          Description

          The TCP send buffer (OS kernel) for the connections.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • buffer
          TypeBytesize
          Default"4KB"
          Description

          The size of the user-space buffer used by the driver.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • high_watermark
          TypeBytesize
          Default"1MB"
          Description

          When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

          If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

          The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

          The socket will only be unbusy when the data in the internal buffer is below the low watermark.

          While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

        • nolinger
          TypeBoolean
          Defaultfalse
          Description

          When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

        • reuseaddr
          TypeBoolean
          Defaulttrue
          Description

          The SO_REUSEADDR flag for the connections.

        • keepalive
          TypeString
          Defaultnone
          Description

          Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

          • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
          • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
          • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
    • ssl

      TypeMap($name->OneOf(Struct(mqtt_ssl_listener),String("marked_for_deletion")))
      Description

      SSL listeners.

      mqtt_ssl_listener

      • bind

        TypeString
        Default8883
        Description

        IP address and port for the listening socket.

      • acceptors

        TypeInteger(1..+inf)
        Default16
        Description

        The size of the listener's receiving pool.

      • max_connections

        TypeOneOf(String("infinity"),Integer(1..+inf))
        Defaultinfinity
        Description

        The maximum number of concurrent connections allowed by the listener.

      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t.
        Set to "" to disable the feature.

        Variables in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
      • zone

        TypeString
        Defaultdefault
        Description

        The configuration zone to which the listener belongs. Clients connected to this listener will inherit zone-settings created under this zone name.

        A zone can override the configs under below root names:

        • mqtt
        • force_shutdown
        • force_gc
        • flapping_detect
        • durable_sessions
      • enable_authn

        TypeEnum(true,false,quick_deny_anonymous)
        Defaulttrue
        Description

        Set true (default) to enable client authentication on this listener, the authentication process goes through the configured authentication chain. When set to false, any client (with or without username/password) is allowed to connect. When set to quick_deny_anonymous, it behaves like when set to true, but clients will be denied immediately without going through any authenticators if username is not provided. This is useful to fence off anonymous clients early.

      • max_conn_rate

        TypeString
        Defaultinfinity
        Description

        Used to limit the rate at which the current listener accepts connections.

        Once the limit is reached, EMQX will pause fetching connections from the Accept queue, thereby delaying or rejecting new connections.

        For example:

        • 1000/s: Only accepts 1000 connections per second.
        • 1000/10s: Only accepts 1000 connections every 10 seconds.
      • messages_rate

        TypeString
        Description

        Used to limit the number of messages a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        For example:

        • 500/s: Only 500 messages will be received per second, and the remaining messages will be delayed.
        • 500/10s: Only 500 messages will be received every 10 seconds and the remaining messages will be delayed.
      • bytes_rate

        TypeString
        Description

        Used to limit the number of bytes a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        The unit of the bytes could be: B, KB, MB, GB.

        For example:

        • 500KB/s: Only 500 kilobytes per second will be received, and the remaining bytes will be delayed.
        • 500MB/10s: Only 500 megabytes will be received every 10 seconds, and the remaining bytes will be delayed.
      • access_rules

        TypeArray(String)
        Default["allow all"]
        Description

        An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

        For example:

        [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

      • proxy_protocol

        TypeBoolean
        Defaultfalse
        Description

        Enable the Proxy Protocol V1/2 if the EMQX cluster is deployed behind HAProxy or Nginx.
        See: https://www.haproxy.com/blog/haproxy/proxy-protocol/

      • proxy_protocol_timeout

        TypeDuration
        Default"3s"
        Description

        If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header.

        EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

        For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • tcp_options

        TypeStruct(tcp_opts)

        tcp_opts

        • active_n
          TypeInteger(0..+inf)
          Default100
          Description

          Specify the {active, N} option for this Socket.
          See: https://erlang.org/doc/man/inet.html#setopts-2

        • backlog
          TypeInteger(1..+inf)
          Default1024
          Description

          TCP backlog defines the maximum length that the queue of pending connections can grow to.

        • send_timeout
          TypeDuration
          Default"15s"
          Description

          The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

          The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

          Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • send_timeout_close
          TypeBoolean
          Defaulttrue
          Description

          Close the connection if send timeout.

        • recbuf
          TypeBytesize
          Description

          The TCP receive buffer (OS kernel) for the connections.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • sndbuf
          TypeBytesize
          Description

          The TCP send buffer (OS kernel) for the connections.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • buffer
          TypeBytesize
          Default"4KB"
          Description

          The size of the user-space buffer used by the driver.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • high_watermark
          TypeBytesize
          Default"1MB"
          Description

          When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

          If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

          The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

          The socket will only be unbusy when the data in the internal buffer is below the low watermark.

          While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

        • nolinger
          TypeBoolean
          Defaultfalse
          Description

          When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

        • reuseaddr
          TypeBoolean
          Defaulttrue
          Description

          The SO_REUSEADDR flag for the connections.

        • keepalive
          TypeString
          Defaultnone
          Description

          Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

          • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
          • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
          • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
      • ssl_options

        TypeStruct(listener_ssl_opts)

        listener_ssl_opts

        • cacertfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/cacert.pem"
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/cert.pem"
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/key.pem"
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • dhfile
          TypeString
          Description

          Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
          NOTE: The dhfile option is not supported by TLS 1.3.

        • fail_if_no_peer_cert
          TypeBoolean
          Defaultfalse
          Description

          This option is only effective if verify is set to verify_peer.

          If set to true, EMQX will reject the connection if the client fails to provide a certificate.

          If set to false, EMQX will accept clients which don't present a certificate.

        • honor_cipher_order
          TypeBoolean
          Defaulttrue
          Description

          An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

          The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

          It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

        • client_renegotiation
          TypeBoolean
          Defaulttrue
          Description

          In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • handshake_timeout
          TypeDuration
          Default"15s"
          Description

          Maximum time duration allowed for the handshake to complete
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • gc_after_handshake
          TypeBoolean
          Defaultfalse
          Description

          Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

        • ocsp
          TypeStruct(ocsp)

          ocsp

          • enable_ocsp_stapling
            TypeBoolean
            Defaultfalse
            Description

            Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

          • responder_url
            TypeString
            Description

            URL for the OCSP responder to check the server certificate against.

          • issuer_pem
            TypeString
            Description

            PEM-encoded certificate of the OCSP issuer for the server certificate.

          • refresh_interval
            TypeDuration
            Default"5m"
            Description

            The period to refresh the OCSP response for the server.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • refresh_http_timeout
            TypeDuration
            Default"15s"
            Description

            The timeout for the HTTP request when checking OCSP responses.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • enable_crl_check
          TypeBoolean
          Defaultfalse
          Description

          Whether to enable CRL verification for this listener.

    • ws

      TypeMap($name->OneOf(Struct(mqtt_ws_listener),String("marked_for_deletion")))
      Description

      HTTP websocket listeners.

      mqtt_ws_listener

      • bind

        TypeString
        Default8083
        Description

        IP address and port for the listening socket.

      • acceptors

        TypeInteger(1..+inf)
        Default16
        Description

        The size of the listener's receiving pool.

      • max_connections

        TypeOneOf(String("infinity"),Integer(1..+inf))
        Defaultinfinity
        Description

        The maximum number of concurrent connections allowed by the listener.

      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t.
        Set to "" to disable the feature.

        Variables in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
      • zone

        TypeString
        Defaultdefault
        Description

        The configuration zone to which the listener belongs. Clients connected to this listener will inherit zone-settings created under this zone name.

        A zone can override the configs under below root names:

        • mqtt
        • force_shutdown
        • force_gc
        • flapping_detect
        • durable_sessions
      • enable_authn

        TypeEnum(true,false,quick_deny_anonymous)
        Defaulttrue
        Description

        Set true (default) to enable client authentication on this listener, the authentication process goes through the configured authentication chain. When set to false, any client (with or without username/password) is allowed to connect. When set to quick_deny_anonymous, it behaves like when set to true, but clients will be denied immediately without going through any authenticators if username is not provided. This is useful to fence off anonymous clients early.

      • max_conn_rate

        TypeString
        Defaultinfinity
        Description

        Used to limit the rate at which the current listener accepts connections.

        Once the limit is reached, EMQX will pause fetching connections from the Accept queue, thereby delaying or rejecting new connections.

        For example:

        • 1000/s: Only accepts 1000 connections per second.
        • 1000/10s: Only accepts 1000 connections every 10 seconds.
      • messages_rate

        TypeString
        Description

        Used to limit the number of messages a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        For example:

        • 500/s: Only 500 messages will be received per second, and the remaining messages will be delayed.
        • 500/10s: Only 500 messages will be received every 10 seconds and the remaining messages will be delayed.
      • bytes_rate

        TypeString
        Description

        Used to limit the number of bytes a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        The unit of the bytes could be: B, KB, MB, GB.

        For example:

        • 500KB/s: Only 500 kilobytes per second will be received, and the remaining bytes will be delayed.
        • 500MB/10s: Only 500 megabytes will be received every 10 seconds, and the remaining bytes will be delayed.
      • access_rules

        TypeArray(String)
        Default["allow all"]
        Description

        An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

        For example:

        [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

      • proxy_protocol

        TypeBoolean
        Defaultfalse
        Description

        Enable the Proxy Protocol V1/2 if the EMQX cluster is deployed behind HAProxy or Nginx.
        See: https://www.haproxy.com/blog/haproxy/proxy-protocol/

      • proxy_protocol_timeout

        TypeDuration
        Default"3s"
        Description

        If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header.

        EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

        For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • tcp_options

        TypeStruct(tcp_opts)

        tcp_opts

        • active_n
          TypeInteger(0..+inf)
          Default100
          Description

          Specify the {active, N} option for this Socket.
          See: https://erlang.org/doc/man/inet.html#setopts-2

        • backlog
          TypeInteger(1..+inf)
          Default1024
          Description

          TCP backlog defines the maximum length that the queue of pending connections can grow to.

        • send_timeout
          TypeDuration
          Default"15s"
          Description

          The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

          The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

          Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • send_timeout_close
          TypeBoolean
          Defaulttrue
          Description

          Close the connection if send timeout.

        • recbuf
          TypeBytesize
          Description

          The TCP receive buffer (OS kernel) for the connections.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • sndbuf
          TypeBytesize
          Description

          The TCP send buffer (OS kernel) for the connections.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • buffer
          TypeBytesize
          Default"4KB"
          Description

          The size of the user-space buffer used by the driver.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • high_watermark
          TypeBytesize
          Default"1MB"
          Description

          When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

          If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

          The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

          The socket will only be unbusy when the data in the internal buffer is below the low watermark.

          While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

        • nolinger
          TypeBoolean
          Defaultfalse
          Description

          When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

        • reuseaddr
          TypeBoolean
          Defaulttrue
          Description

          The SO_REUSEADDR flag for the connections.

        • keepalive
          TypeString
          Defaultnone
          Description

          Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

          • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
          • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
          • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
      • websocket

        TypeStruct(ws_opts)

        ws_opts

        • mqtt_path
          TypeString
          Default"/mqtt"
          Description

          WebSocket's MQTT protocol path. By default, the full URL for the WebSocket client to connect is: ws://{host}:{port}/mqtt. Append /[...] to the end of the path to make EMQX accept any subpath. For example, specifying mqtt/[...] would allow clients to connect at paths like mqtt/org1 or mqtt/group2, etc.

          NOTE: An unmatched path will cause the client to be rejected immediately at the HTTP layer, meaning it will not be traceable at the MQTT layer.

        • mqtt_piggyback
          TypeEnum(single,multiple)
          Defaultmultiple
          Description

          Whether a WebSocket message is allowed to contain multiple MQTT packets.

        • compress
          TypeBoolean
          Defaultfalse
          Description

          If true, compress WebSocket messages using zlib.

          The configuration items under deflate_opts belong to the compression-related parameter configuration.

        • idle_timeout
          TypeDuration
          Default"7200s"
          Description

          The timeout for waiting for the WebSocket upgrade request. After the timeout, the connection will be closed.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_frame_size
          TypeOneOf(String("infinity"),Integer(1..+inf))
          Defaultinfinity
          Description

          The maximum length of a single MQTT packet.

        • fail_if_no_subprotocol
          TypeBoolean
          Defaulttrue
          Description

          If true, the server will return an error when the client does not carry the Sec-WebSocket-Protocol field.
          Note: WeChat applet needs to disable this verification.

        • supported_subprotocols
          TypeString
          Default"mqtt, mqtt-v3, mqtt-v3.1.1, mqtt-v5"
          Description

          Comma-separated list of supported subprotocols.

        • check_origin_enable
          TypeBoolean
          Defaultfalse
          Description

          If true, origin HTTP header will be validated against the list of allowed origins configured in check_origins parameter.

        • allow_origin_absence
          TypeBoolean
          Defaulttrue
          Description

          If false and check_origin_enable is true, the server will reject requests that don't have origin HTTP header.

        • check_origins
          TypeString
          Default"http://localhost:18083, http://127.0.0.1:18083"
          Description

          List of allowed origins.
          See check_origin_enable.

        • proxy_address_header
          TypeString
          Default"x-forwarded-for"
          Description

          The HTTP request header that carries the original client's IP address, EMQX will take the leftmost IP in the header as the original client's IP.

          This option is typically used when EMQX is deployed behind a WebSocket proxy.

        • proxy_port_header
          TypeString
          Default"x-forwarded-port"
          Description

          The HTTP request header that carries the original client's source port, EMQX will take the leftmost port in the header as the original client's source port.

          This option is typically used when EMQX is deployed behind a WebSocket proxy.

        • deflate_opts
          TypeStruct(deflate_opts)

          deflate_opts

          • level
            TypeEnum(none,default,best_compression,best_speed)
            Description

            Compression level.

          • mem_level
            TypeInteger(1..9)
            Default8
            Description

            Specifies the size of the compression state.
            Lower values decrease memory usage per connection.

          • strategy
            TypeEnum(default,filtered,huffman_only,rle)
            Defaultdefault
            Description

            Specifies the compression strategy.

          • server_context_takeover
            TypeEnum(takeover,no_takeover)
            Defaulttakeover
            Description

            Takeover means the compression state is retained between server messages.

          • client_context_takeover
            TypeEnum(takeover,no_takeover)
            Defaulttakeover
            Description

            Takeover means the compression state is retained between client messages.

          • server_max_window_bits
            TypeInteger(8..15)
            Default15
            Description

            Specifies the size of the compression context for the server.

          • client_max_window_bits
            TypeInteger(8..15)
            Default15
            Description

            Specifies the size of the compression context for the client.

        • validate_utf8
          TypeBoolean
          Defaulttrue
          Description

          Whether to verify that the payload of text and close frames is valid UTF-8. Disabling it can save resources and improve performance.

    • wss

      TypeMap($name->OneOf(Struct(mqtt_wss_listener),String("marked_for_deletion")))
      Description

      HTTPS websocket listeners.

      mqtt_wss_listener

      • bind

        TypeString
        Default8084
        Description

        IP address and port for the listening socket.

      • acceptors

        TypeInteger(1..+inf)
        Default16
        Description

        The size of the listener's receiving pool.

      • max_connections

        TypeOneOf(String("infinity"),Integer(1..+inf))
        Defaultinfinity
        Description

        The maximum number of concurrent connections allowed by the listener.

      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t.
        Set to "" to disable the feature.

        Variables in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
      • zone

        TypeString
        Defaultdefault
        Description

        The configuration zone to which the listener belongs. Clients connected to this listener will inherit zone-settings created under this zone name.

        A zone can override the configs under below root names:

        • mqtt
        • force_shutdown
        • force_gc
        • flapping_detect
        • durable_sessions
      • enable_authn

        TypeEnum(true,false,quick_deny_anonymous)
        Defaulttrue
        Description

        Set true (default) to enable client authentication on this listener, the authentication process goes through the configured authentication chain. When set to false, any client (with or without username/password) is allowed to connect. When set to quick_deny_anonymous, it behaves like when set to true, but clients will be denied immediately without going through any authenticators if username is not provided. This is useful to fence off anonymous clients early.

      • max_conn_rate

        TypeString
        Defaultinfinity
        Description

        Used to limit the rate at which the current listener accepts connections.

        Once the limit is reached, EMQX will pause fetching connections from the Accept queue, thereby delaying or rejecting new connections.

        For example:

        • 1000/s: Only accepts 1000 connections per second.
        • 1000/10s: Only accepts 1000 connections every 10 seconds.
      • messages_rate

        TypeString
        Description

        Used to limit the number of messages a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        For example:

        • 500/s: Only 500 messages will be received per second, and the remaining messages will be delayed.
        • 500/10s: Only 500 messages will be received every 10 seconds and the remaining messages will be delayed.
      • bytes_rate

        TypeString
        Description

        Used to limit the number of bytes a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        The unit of the bytes could be: B, KB, MB, GB.

        For example:

        • 500KB/s: Only 500 kilobytes per second will be received, and the remaining bytes will be delayed.
        • 500MB/10s: Only 500 megabytes will be received every 10 seconds, and the remaining bytes will be delayed.
      • access_rules

        TypeArray(String)
        Default["allow all"]
        Description

        An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

        For example:

        [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

      • proxy_protocol

        TypeBoolean
        Defaultfalse
        Description

        Enable the Proxy Protocol V1/2 if the EMQX cluster is deployed behind HAProxy or Nginx.
        See: https://www.haproxy.com/blog/haproxy/proxy-protocol/

      • proxy_protocol_timeout

        TypeDuration
        Default"3s"
        Description

        If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header.

        EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

        For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • tcp_options

        TypeStruct(tcp_opts)

        tcp_opts

        • active_n
          TypeInteger(0..+inf)
          Default100
          Description

          Specify the {active, N} option for this Socket.
          See: https://erlang.org/doc/man/inet.html#setopts-2

        • backlog
          TypeInteger(1..+inf)
          Default1024
          Description

          TCP backlog defines the maximum length that the queue of pending connections can grow to.

        • send_timeout
          TypeDuration
          Default"15s"
          Description

          The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

          The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

          Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • send_timeout_close
          TypeBoolean
          Defaulttrue
          Description

          Close the connection if send timeout.

        • recbuf
          TypeBytesize
          Description

          The TCP receive buffer (OS kernel) for the connections.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • sndbuf
          TypeBytesize
          Description

          The TCP send buffer (OS kernel) for the connections.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • buffer
          TypeBytesize
          Default"4KB"
          Description

          The size of the user-space buffer used by the driver.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • high_watermark
          TypeBytesize
          Default"1MB"
          Description

          When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

          If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

          The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

          The socket will only be unbusy when the data in the internal buffer is below the low watermark.

          While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

        • nolinger
          TypeBoolean
          Defaultfalse
          Description

          When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

        • reuseaddr
          TypeBoolean
          Defaulttrue
          Description

          The SO_REUSEADDR flag for the connections.

        • keepalive
          TypeString
          Defaultnone
          Description

          Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

          • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
          • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
          • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
      • ssl_options

        TypeStruct(listener_wss_opts)

        listener_wss_opts

        • cacertfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/cacert.pem"
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/cert.pem"
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/key.pem"
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • dhfile
          TypeString
          Description

          Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
          NOTE: The dhfile option is not supported by TLS 1.3.

        • fail_if_no_peer_cert
          TypeBoolean
          Defaultfalse
          Description

          This option is only effective if verify is set to verify_peer.

          If set to true, EMQX will reject the connection if the client fails to provide a certificate.

          If set to false, EMQX will accept clients which don't present a certificate.

        • honor_cipher_order
          TypeBoolean
          Defaulttrue
          Description

          An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

          The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

          It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

        • client_renegotiation
          TypeBoolean
          Defaulttrue
          Description

          In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • handshake_timeout
          TypeDuration
          Default"15s"
          Description

          Maximum time duration allowed for the handshake to complete
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • websocket

        TypeStruct(ws_opts)

        ws_opts

        • mqtt_path
          TypeString
          Default"/mqtt"
          Description

          WebSocket's MQTT protocol path. By default, the full URL for the WebSocket client to connect is: ws://{host}:{port}/mqtt. Append /[...] to the end of the path to make EMQX accept any subpath. For example, specifying mqtt/[...] would allow clients to connect at paths like mqtt/org1 or mqtt/group2, etc.

          NOTE: An unmatched path will cause the client to be rejected immediately at the HTTP layer, meaning it will not be traceable at the MQTT layer.

        • mqtt_piggyback
          TypeEnum(single,multiple)
          Defaultmultiple
          Description

          Whether a WebSocket message is allowed to contain multiple MQTT packets.

        • compress
          TypeBoolean
          Defaultfalse
          Description

          If true, compress WebSocket messages using zlib.

          The configuration items under deflate_opts belong to the compression-related parameter configuration.

        • idle_timeout
          TypeDuration
          Default"7200s"
          Description

          The timeout for waiting for the WebSocket upgrade request. After the timeout, the connection will be closed.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_frame_size
          TypeOneOf(String("infinity"),Integer(1..+inf))
          Defaultinfinity
          Description

          The maximum length of a single MQTT packet.

        • fail_if_no_subprotocol
          TypeBoolean
          Defaulttrue
          Description

          If true, the server will return an error when the client does not carry the Sec-WebSocket-Protocol field.
          Note: WeChat applet needs to disable this verification.

        • supported_subprotocols
          TypeString
          Default"mqtt, mqtt-v3, mqtt-v3.1.1, mqtt-v5"
          Description

          Comma-separated list of supported subprotocols.

        • check_origin_enable
          TypeBoolean
          Defaultfalse
          Description

          If true, origin HTTP header will be validated against the list of allowed origins configured in check_origins parameter.

        • allow_origin_absence
          TypeBoolean
          Defaulttrue
          Description

          If false and check_origin_enable is true, the server will reject requests that don't have origin HTTP header.

        • check_origins
          TypeString
          Default"http://localhost:18083, http://127.0.0.1:18083"
          Description

          List of allowed origins.
          See check_origin_enable.

        • proxy_address_header
          TypeString
          Default"x-forwarded-for"
          Description

          The HTTP request header that carries the original client's IP address, EMQX will take the leftmost IP in the header as the original client's IP.

          This option is typically used when EMQX is deployed behind a WebSocket proxy.

        • proxy_port_header
          TypeString
          Default"x-forwarded-port"
          Description

          The HTTP request header that carries the original client's source port, EMQX will take the leftmost port in the header as the original client's source port.

          This option is typically used when EMQX is deployed behind a WebSocket proxy.

        • deflate_opts
          TypeStruct(deflate_opts)

          deflate_opts

          • level
            TypeEnum(none,default,best_compression,best_speed)
            Description

            Compression level.

          • mem_level
            TypeInteger(1..9)
            Default8
            Description

            Specifies the size of the compression state.
            Lower values decrease memory usage per connection.

          • strategy
            TypeEnum(default,filtered,huffman_only,rle)
            Defaultdefault
            Description

            Specifies the compression strategy.

          • server_context_takeover
            TypeEnum(takeover,no_takeover)
            Defaulttakeover
            Description

            Takeover means the compression state is retained between server messages.

          • client_context_takeover
            TypeEnum(takeover,no_takeover)
            Defaulttakeover
            Description

            Takeover means the compression state is retained between client messages.

          • server_max_window_bits
            TypeInteger(8..15)
            Default15
            Description

            Specifies the size of the compression context for the server.

          • client_max_window_bits
            TypeInteger(8..15)
            Default15
            Description

            Specifies the size of the compression context for the client.

        • validate_utf8
          TypeBoolean
          Defaulttrue
          Description

          Whether to verify that the payload of text and close frames is valid UTF-8. Disabling it can save resources and improve performance.

    • quic

      TypeMap($name->OneOf(Struct(mqtt_quic_listener),String("marked_for_deletion")))
      Description

      QUIC listeners.

      mqtt_quic_listener

      • ciphers

        TypeArray(String)
        Default[TLS_AES_256_GCM_SHA384, TLS_AES_128_GCM_SHA256, TLS_CHACHA20_POLY1305_SHA256]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        NOTE: QUIC listener supports only 'tlsv1.3' ciphers

      • ssl_options

        TypeStruct(listener_quic_ssl_opts)
        Description

        TLS options for QUIC transport

        listener_quic_ssl_opts

        • cacertfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/cacert.pem"
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • certfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/cert.pem"
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Default"${EMQX_ETC_DIR}/certs/key.pem"
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • bind

        TypeString
        Default14567
        Description

        IP address and port for the listening socket.

      • acceptors

        TypeInteger(1..+inf)
        Default16
        Description

        The size of the listener's receiving pool.

      • max_connections

        TypeOneOf(String("infinity"),Integer(1..+inf))
        Defaultinfinity
        Description

        The maximum number of concurrent connections allowed by the listener.

      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t.
        Set to "" to disable the feature.

        Variables in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
      • zone

        TypeString
        Defaultdefault
        Description

        The configuration zone to which the listener belongs. Clients connected to this listener will inherit zone-settings created under this zone name.

        A zone can override the configs under below root names:

        • mqtt
        • force_shutdown
        • force_gc
        • flapping_detect
        • durable_sessions
      • enable_authn

        TypeEnum(true,false,quick_deny_anonymous)
        Defaulttrue
        Description

        Set true (default) to enable client authentication on this listener, the authentication process goes through the configured authentication chain. When set to false, any client (with or without username/password) is allowed to connect. When set to quick_deny_anonymous, it behaves like when set to true, but clients will be denied immediately without going through any authenticators if username is not provided. This is useful to fence off anonymous clients early.

      • max_conn_rate

        TypeString
        Defaultinfinity
        Description

        Used to limit the rate at which the current listener accepts connections.

        Once the limit is reached, EMQX will pause fetching connections from the Accept queue, thereby delaying or rejecting new connections.

        For example:

        • 1000/s: Only accepts 1000 connections per second.
        • 1000/10s: Only accepts 1000 connections every 10 seconds.
      • messages_rate

        TypeString
        Description

        Used to limit the number of messages a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        For example:

        • 500/s: Only 500 messages will be received per second, and the remaining messages will be delayed.
        • 500/10s: Only 500 messages will be received every 10 seconds and the remaining messages will be delayed.
      • bytes_rate

        TypeString
        Description

        Used to limit the number of bytes a single client can send to EMQX per second.

        Once the limit is reached, EMQX will pause reading data from the receive-buffer, thus slowing down or even temporarily hanging the sender.

        The unit of the bytes could be: B, KB, MB, GB.

        For example:

        • 500KB/s: Only 500 kilobytes per second will be received, and the remaining bytes will be delayed.
        • 500MB/10s: Only 500 megabytes will be received every 10 seconds, and the remaining bytes will be delayed.
  • mqtt

    TypeStruct(mqtt)
    Description

    Global MQTT configuration. The configs here work as default values which can be overridden in zone configs

    mqtt

    • idle_timeout

      TypeOneOf(String("infinity"),Duration)
      Default"15s"
      Description

      Configure the duration of time that a connection can remain idle (i.e., without any data transfer) before being:

      • Automatically disconnected if no CONNECT package is received from the client yet.
      • Put into hibernation mode to save resources if some CONNECT packages are already received. Note: Please set the parameter with caution as long idle time will lead to resource waste.
    • max_packet_size

      TypeBytesize
      Default"1MB"
      Description

      Maximum MQTT packet size allowed. Default: 1 MB, Maximum: 256 MB
      A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • max_clientid_len

      TypeInteger(23..65535)
      Default65535
      Description

      Maximum allowed length of MQTT Client ID.

    • max_topic_levels

      TypeInteger(1..65535)
      Default128
      Description

      Maximum topic levels allowed.

    • max_topic_alias

      TypeInteger(0..65535)
      Default65535
      Description

      Maximum topic alias, 0 means no topic alias supported.

    • retain_available

      TypeBoolean
      Defaulttrue
      Description

      Whether to enable support for MQTT retained message.

    • wildcard_subscription

      TypeBoolean
      Defaulttrue
      Description

      Whether to enable support for MQTT wildcard subscription.

    • shared_subscription

      TypeBoolean
      Defaulttrue
      Description

      Whether to enable support for MQTT shared subscription.

    • shared_subscription_strategy

      TypeEnum(random,round_robin,round_robin_per_group,sticky,local,hash_topic,hash_clientid)
      Defaultround_robin
      Description

      Dispatch strategy for shared subscription.

      • random: Randomly select a subscriber for dispatch;
      • round_robin: Clients in a shared subscription group will consume messages in turn, and the progress of the loop is recorded independently in each publisher, so two adjacent messages from different publishers may be consumed by the same client in the subscription group;
      • round_robin_per_group: Clients in a shared subscription group will consume messages in turn, and the progress of the loop is recorded independently in each node, so two adjacent messages from different nodes may be consumed by the same client in the subscription group;
      • local: Randomly select a subscriber on the current node, if there are no subscribers on the current node, then randomly select within the cluster;
      • sticky: Continuously dispatch messages to the initially selected subscriber until their session ends. The initial selection is made based on mqtt_shared_subscription_initial_sticky_pick;
      • hash_clientid: Hash the publisher's client ID to select a subscriber;
      • hash_topic: Hash the publishing topic to select a subscriber.
    • shared_subscription_initial_sticky_pick

      TypeEnum(random,local,hash_topic,hash_clientid)
      Defaultrandom
      Description

      The strategy to use for the initial subscriber pick when shared_subscription_strategy is sticky.

      • random: Randomly select the subscriber;
      • local: Randomly select a subscriber on the current node, if there are no subscribers on the current node, then randomly select within the cluster;
      • hash_clientid: Hash the publisher's client ID to select a subscriber;
      • hash_topic: Hash the publishing topic to select a subscriber.
    • exclusive_subscription

      TypeBoolean
      Defaultfalse
      Description

      Whether to enable support for MQTT exclusive subscription.

    • ignore_loop_deliver

      TypeBoolean
      Defaultfalse
      Description

      Whether the messages sent by the MQTT v3.1.1/v3.1.0 client will be looped back to the publisher itself, similar to No Local in MQTT 5.0.

    • strict_mode

      TypeBoolean
      Defaultfalse
      Description

      Whether to parse MQTT messages in strict mode. In strict mode, invalid utf8 strings in for example client ID, topic name, etc. will cause the client to be disconnected.

    • response_information

      TypeString
      Default""
      Description

      UTF-8 string, for creating the response topic, for example, if set to reqrsp/, the publisher/subscriber will communicate using the topic prefix reqrsp/. To disable this feature, input "" in the text box below. Only applicable to MQTT 5.0 clients.

    • server_keepalive

      TypeOneOf(Integer(1..+inf),String("disabled"))
      Defaultdisabled
      Description

      The keep alive duration required by EMQX. To use the setting from the client side, choose disabled from the drop-down list. Only applicable to MQTT 5.0 clients.

    • keepalive_multiplier

      TypeNumber
      Default1.5
      Description

      Keep-Alive Timeout = Keep-Alive interval × Keep-Alive Multiplier. The default value 1.5 is following the MQTT 5.0 specification. This multiplier is adjustable, providing system administrators flexibility for tailoring to their specific needs. For instance, if a client's 10-second Keep-Alive interval PINGREQ gets delayed by an extra 10 seconds, changing the multiplier to 2 lets EMQX tolerate this delay.

    • keepalive_check_interval

      TypeDuration
      Default"30s"
      Description

      The frequency of checking for incoming MQTT packets determines how often the server will check for new MQTT packets. If a certain amount of time passes without any packets being sent from the client, this time will be added up. Once the accumulated time exceeds keepalive-interval * keepalive-multiplier, the connection will be terminated. The default is set to 30 seconds, with a minimum value of 1 second and a maximum value of keepalive-interval / 2.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • retry_interval

      TypeOneOf(String("infinity"),Duration)
      Defaultinfinity
      Description

      Retry interval for QoS 1/2 message delivering.

    • use_username_as_clientid

      TypeBoolean
      Defaultfalse
      Description

      Whether to use Username as Client ID. This setting takes effect later than peer_cert_as_username and peer_cert_as_clientid.

    • peer_cert_as_username

      TypeEnum(disabled,cn,dn,crt,pem,md5)
      Defaultdisabled
      Description

      Use the CN, DN field in the peer certificate or the entire certificate content as Username. Only works for the TLS connection. Supported configurations are the following:

      • cn: CN field of the certificate
      • dn: DN field of the certificate
      • crt: Content of the DER or PEM certificate
      • pem: Convert DER certificate content to PEM format and use as Username
      • md5: MD5 value of the DER or PEM certificate
    • peer_cert_as_clientid

      TypeEnum(disabled,cn,dn,crt,pem,md5)
      Defaultdisabled
      Description

      Use the CN, DN field in the peer certificate or the entire certificate content as Client ID. Only works for the TLS connection. Supported configurations are the following:

      • cn: CN field of the certificate
      • dn: DN field of the certificate
      • crt: DER or PEM certificate
      • pem: Convert DER certificate content to PEM format and use as Client ID
      • md5: MD5 value of the DER or PEM certificate
    • client_attrs_init

      TypeArray(Struct(client_attrs_init))
      Default[]
      Description

      Specify how to initialize client attributes. Each client attribute can be initialized as client_attrs.{NAME}, where {NAME} is the name of the attribute specified in the config field set_as_attr. The initialized client attribute will be stored in the client_attrs property with the specified name, and can be used as a placeholder in a template for authentication and authorization. For example, use ${client_attrs.alias} to render an HTTP POST body when set_as_attr = alias, or render listener config moutpoint = devices/${client_attrs.alias}/ to initialize a per-client topic namespace.

      client_attrs_init

      • expression

        TypeString
        Description

        A one line expression to evaluate a set of predefined string functions (like in the rule engine SQL statements). The expression can be a function call with nested calls as its arguments, or direct variable reference. So far, it does not provide user-defined variable binding (like var a=1) or user-defined functions. As an example, to extract the prefix of client ID delimited by a dot: nth(1, tokens(clientid, '.')).

        The variables pre-bound variables are:

        • cn: Client's TLS certificate common name.
        • dn: Client's TLS certificate distinguished name (the subject).
        • clientid: MQTT Client ID.
        • username: MQTT Client's username.
        • user_property.{NAME}: User properties in the CONNECT packet.

        You can read more about variform expressions in EMQX docs.

      • set_as_attr

        TypeString
        Description

        The name of the client attribute extracted from the client data. The extracted attribute will be stored in the client_attrs property with this name.

    • clientid_override

      TypeOneOf(String("disabled"),String)
      Defaultdisabled
      Description

      A one line expression to evaluate a set of predefined string functions (like in the rule engine SQL statements). The expression can be a function call with nested calls as its arguments, or direct variable reference. So far, it does not provide user-defined variable binding (like var a=1) or user-defined functions. As an example, to extract the prefix of client ID delimited by a dot: nth(1, tokens(username, '.')).

      The variables pre-bound variables are:

      • cn: Client's TLS certificate common name.
      • dn: Client's TLS certificate distinguished name (the subject).
      • clientid: The original MQTT Client ID.
      • username: MQTT Client's username.
      • client_attrs.{NAME}: Client attributes initialized by per config client_attrs_init.

      You can read more about variform expressions in EMQX docs.

    • session_expiry_interval

      TypeDuration
      Default"2h"
      Description

      Specifies how long the session will expire after the connection is disconnected, only for non-MQTT 5.0 connections.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • message_expiry_interval

      TypeOneOf(Duration,String("infinity"))
      Defaultinfinity
      Description

      The expiry interval of MQTT messages. For MQTT 5.0 clients, this configuration will only take effect when the Message-Expiry-Interval property is not set in the message; otherwise, the value of the Message-Expiry-Interval property will be used. For MQTT versions older than 5.0, this configuration will always take effect. Please note that setting message_expiry_interval greater than session_expiry_interval is meaningless, as all messages will be cleared when the session expires.

    • max_awaiting_rel

      TypeOneOf(Integer(0..+inf),String("infinity"))
      Default100
      Description

      For each publisher session, the maximum number of outstanding QoS 2 messages pending on the client to send PUBREL. After reaching this limit, new QoS 2 PUBLISH requests will be rejected with 147(0x93) until either PUBREL is received or timed out.

    • max_qos_allowed

      TypeInteger(0..2)
      Default2
      Description

      Maximum QoS allowed.

    • mqueue_priorities

      TypeOneOf(String("disabled"),Map)
      Defaultdisabled
      Description

      Topic priority list. Prioritize messages in the message queue by topic. The priority range is [1, 255].

      The larger the value, the higher the priority. Messages with higher priority will be sent first.

      Topics not in this list will use the default priority (specified by mqueue_default_priority).

      By default, this list is empty, which means all topics have the same priority.

      Note: commas and equal signs are not supported in topic names.

      For example, if you want topic/1 to have a higher priority than topic/2, you can configure it like this:

      mqueue_priorities: {\"topic/1\": 10, \"topic/2\": 8}

    • mqueue_default_priority

      TypeEnum(highest,lowest)
      Defaultlowest
      Description

      Default topic priority, which will be used by topics not in Topic Priorities (mqueue_priorities).

    • mqueue_store_qos0

      TypeBoolean
      Defaulttrue
      Description

      Specifies whether to store QoS 0 messages in the message queue while the connection is down but the session remains.

    • max_mqueue_len

      TypeOneOf(Integer(0..+inf),String("infinity"))
      Default1000
      Description

      Maximum queue length. Enqueued messages when persistent client disconnected, or inflight window is full.

    • max_inflight

      TypeInteger(1..65535)
      Default32
      Description

      Maximum number of QoS 1 and QoS 2 messages that are allowed to be delivered simultaneously before completing the acknowledgment.

    • max_subscriptions

      TypeOneOf(Integer(1..inf),String("infinity"))
      Defaultinfinity
      Description

      Maximum number of subscriptions allowed per client.

    • upgrade_qos

      TypeBoolean
      Defaultfalse
      Description

      Force upgrade of QoS level according to subscription.

    • await_rel_timeout

      TypeDuration
      Default"300s"
      Description

      For client to broker QoS 2 message, the time limit for the broker to wait before the PUBREL message is received. The wait is aborted after timed out, meaning the packet ID is freed for new PUBLISH requests. Receiving a stale PUBREL causes a warning level log. Note, the message is delivered to subscribers before entering the wait for PUBREL.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

  • authentication

    TypeArray(OneOf(Struct(builtin_db),Struct(mysql),Struct(postgresql),Struct(mongo_single),Struct(mongo_rs),Struct(mongo_sharded),Struct(redis_single),Struct(redis_cluster),Struct(redis_sentinel),Struct(http_get),Struct(http_post),Struct(jwt_hmac),Struct(jwt_public_key),Struct(jwt_jwks),Struct(scram),Struct(ldap),Struct(ldap_deprecated),Struct(gcp_device),Struct(scram_restapi_get),Struct(scram_restapi_post),Struct(kerberos),Struct(cinfo)))
    Default[]
    Description

    Default authentication configs for all MQTT listeners.

    For per-listener overrides see authentication in listener configs

    This option can be configured with:

    • []: The default value, it allows *ALL* logins
    • one: For example {enable:true,backend:"built_in_database",mechanism="password_based"}
    • chain: An array of structs.

    When a chain is configured, the login credentials are checked against the backends per the configured order, until an 'allow' or 'deny' decision can be made.

    If there is no decision after a full chain exhaustion, the login is rejected.

    builtin_db

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt_rw),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash creation and verification.

      bcrypt_rw

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      • salt_rounds

        TypeInteger(5..10)
        Default10
        Description

        Work factor for BCRYPT password generation.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("built_in_database")
      Description

      Backend type.

    • user_id_type

      TypeEnum(clientid,username)
      Defaultusername
      Description

      Specify whether to use clientid or username for authentication.

    • bootstrap_file

      TypeString
      Default"${EMQX_ETC_DIR}/auth-built-in-db-bootstrap.csv"
      Description

      The bootstrap file imports users into the built-in database. It will not import a user ID that already exists in the database. The file content format is determined by bootstrap_type.

    • bootstrap_type

      TypeEnum(hash,plain)
      Defaultplain
      Description

      Specify which type of content the bootstrap file has.

      • plain:

        • Expected data fields: user_id, password, is_superuser
        • user_id: Can be Client ID or username, depending on built-in database authentication's user_id_type config.
        • password: User's plaintext password.
        • is_superuser: Boolean, user's administrative status.
      • hash:

        • Expected data fields: user_id,password_hash,salt,is_superuser
        • Definitions similar to plain type, with password_hash and salt added for security.

      The content can be either in CSV, or JSON format.

      Here is a CSV example: user_id,password_hash,salt,is_superuser\nmy_user,b6c743545a7817ae8c8f624371d5f5f0373234bb0ff36b8ffbf19bce0e06ab75,de1024f462fb83910fd13151bd4bd235,true

      And JSON content should be decoded into an array of objects, for example: [{"user_id": "my_user","password": "s3cr3tp@ssw0rd","is_superuser": true}].

      The hash string for password_hash depends on how password_hash_algorithm is configured for the built-in database authentication mechanism. For example, if it's configured as password_hash_algorithm {name = sha256, salt_position = suffix}, then the salt is appended to the password before hashed. Here is the equivalent Python expression: hashlib.sha256(password + salt).hexdigest().

    mysql

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("mysql")
      Description

      Backend type.

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash verification.

      bcrypt

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • query

      TypeString
      Description

      SQL used to query data for authentication, such as password hash.

    • query_timeout

      TypeDuration
      Default"5s"
      Description

      Timeout for the SQL query.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • server

      TypeString
      Description

      The IPv4 or IPv6 address or the hostname to connect to.
      A host entry has the following form: Host[:Port].
      The MySQL default port 3306 is used if [:Port] is not specified.

    • database

      TypeString
      Description

      Database name.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Defaultroot
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • auto_reconnect

      TypeBoolean
      Description

      Deprecated since v5.0.15.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    postgresql

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("postgresql")
      Description

      Backend type.

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash verification.

      bcrypt

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • query

      TypeString
      Description

      SQL used to query data for authentication, such as password hash.

    • server

      TypeString
      Description

      The IPv4 or IPv6 address or the hostname to connect to.
      A host entry has the following form: Host[:Port].
      The PostgreSQL default port 5432 is used if [:Port] is not specified.

    • disable_prepared_statements

      TypeBoolean
      Defaultfalse
      Description

      Disables the usage of prepared statements in the connections. Some endpoints, like PGBouncer or Supabase in Transaction mode, do not support session features such as prepared statements. For such connections, this option should be enabled.

    • database

      TypeString
      Description

      Database name.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • auto_reconnect

      TypeBoolean
      Description

      Deprecated since v5.0.15.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    mongo_single

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("mongodb")
      Description

      Backend type.

    • collection

      TypeString
      Description

      Collection used to store authentication data.

    • filter

      TypeMap
      Default{}
      Description

      Conditional expression that defines the filter condition in the query. Filter supports the following placeholders:

      • ${username}: Will be replaced at runtime with Username used by the client when connecting
      • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting
    • password_hash_field

      TypeString
      Defaultpassword_hash
      Description

      Document field that contains password hash.

    • salt_field

      TypeString
      Defaultsalt
      Description

      Document field that contains the password salt.

    • is_superuser_field

      TypeString
      Defaultis_superuser
      Description

      Document field that defines if the user has superuser privileges.

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash verification.

      bcrypt

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • mongo_type

      TypeString("single")
      Defaultsingle
      Description

      Standalone instance. Must be set to 'single' when MongoDB server is running in standalone mode.

    • server

      TypeString
      Description

      The IPv4 or IPv6 address or the hostname to connect to.
      A host entry has the following form: Host[:Port].
      The MongoDB default port 27017 is used if [:Port] is not specified.

    • w_mode

      TypeEnum(unsafe,safe)
      Defaultunsafe
      Description

      Write mode.

    • srv_record

      TypeBoolean
      Defaultfalse
      Description

      Use DNS SRV record.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • use_legacy_protocol

      TypeEnum(auto,true,false)
      Defaultauto
      Description

      Whether to use MongoDB's legacy protocol for communicating with the database. The default is to attempt to automatically determine if the newer protocol is supported.

    • auth_source

      TypeString
      Description

      Database name associated with the user's credentials.

    • database

      TypeString
      Description

      Database name.

    • topology

      TypeStruct(topology)

      topology

      • max_overflow

        TypeInteger(0..+inf)
        Default0
        Description

        The maximum number of additional workers that can be created when all workers in the pool are busy. This helps to manage temporary spikes in workload by allowing more concurrent connections to the MongoDB server.

      • overflow_ttl

        TypeDuration
        Description

        Period of time before workers that exceed the configured pool size ("overflow") to be terminated.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • overflow_check_period

        TypeDuration
        Description

        Period for checking if there are more workers than configured ("overflow").
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • local_threshold_ms

        TypeDuration
        Description

        The size of the latency window for selecting among multiple suitable MongoDB instances.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • connect_timeout_ms

        TypeDuration
        Description

        The duration to attempt a connection before timing out.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • socket_timeout_ms

        TypeDuration
        Description

        The duration to attempt to send or to receive on a socket before the attempt times out.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • server_selection_timeout_ms

        TypeDuration
        Description

        Specifies how long to block for server selection before throwing an exception.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • wait_queue_timeout_ms

        TypeDuration
        Description

        The maximum duration that a worker can wait for a connection to become available.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • heartbeat_frequency_ms

        TypeDuration
        Default"200s"
        Description

        Controls when the driver checks the state of the MongoDB deployment. Specify the interval between checks, counted from the end of the previous check until the beginning of the next one. If the number of connections is increased (which will happen, for example, if you increase the pool size), you may need to increase this period as well to avoid creating too many log entries in the MongoDB log file.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • min_heartbeat_frequency_ms

        TypeDuration
        Description

        Controls the minimum amount of time to wait between heartbeats.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    mongo_rs

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("mongodb")
      Description

      Backend type.

    • collection

      TypeString
      Description

      Collection used to store authentication data.

    • filter

      TypeMap
      Default{}
      Description

      Conditional expression that defines the filter condition in the query. Filter supports the following placeholders:

      • ${username}: Will be replaced at runtime with Username used by the client when connecting
      • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting
    • password_hash_field

      TypeString
      Defaultpassword_hash
      Description

      Document field that contains password hash.

    • salt_field

      TypeString
      Defaultsalt
      Description

      Document field that contains the password salt.

    • is_superuser_field

      TypeString
      Defaultis_superuser
      Description

      Document field that defines if the user has superuser privileges.

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash verification.

      bcrypt

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • mongo_type

      TypeString("rs")
      Defaultrs
      Description

      Replica set. Must be set to 'rs' when MongoDB server is running in 'replica set' mode.

    • servers

      TypeString
      Description

      A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The MongoDB default port 27017 is used if [:Port] is not specified.

    • w_mode

      TypeEnum(unsafe,safe)
      Defaultunsafe
      Description

      Write mode.

    • r_mode

      TypeEnum(master,slave_ok)
      Defaultmaster
      Description

      Read mode.

    • replica_set_name

      TypeString
      Description

      Name of the replica set.

    • srv_record

      TypeBoolean
      Defaultfalse
      Description

      Use DNS SRV record.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • use_legacy_protocol

      TypeEnum(auto,true,false)
      Defaultauto
      Description

      Whether to use MongoDB's legacy protocol for communicating with the database. The default is to attempt to automatically determine if the newer protocol is supported.

    • auth_source

      TypeString
      Description

      Database name associated with the user's credentials.

    • database

      TypeString
      Description

      Database name.

    • topology

      TypeStruct(topology)

      topology

      • max_overflow

        TypeInteger(0..+inf)
        Default0
        Description

        The maximum number of additional workers that can be created when all workers in the pool are busy. This helps to manage temporary spikes in workload by allowing more concurrent connections to the MongoDB server.

      • overflow_ttl

        TypeDuration
        Description

        Period of time before workers that exceed the configured pool size ("overflow") to be terminated.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • overflow_check_period

        TypeDuration
        Description

        Period for checking if there are more workers than configured ("overflow").
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • local_threshold_ms

        TypeDuration
        Description

        The size of the latency window for selecting among multiple suitable MongoDB instances.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • connect_timeout_ms

        TypeDuration
        Description

        The duration to attempt a connection before timing out.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • socket_timeout_ms

        TypeDuration
        Description

        The duration to attempt to send or to receive on a socket before the attempt times out.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • server_selection_timeout_ms

        TypeDuration
        Description

        Specifies how long to block for server selection before throwing an exception.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • wait_queue_timeout_ms

        TypeDuration
        Description

        The maximum duration that a worker can wait for a connection to become available.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • heartbeat_frequency_ms

        TypeDuration
        Default"200s"
        Description

        Controls when the driver checks the state of the MongoDB deployment. Specify the interval between checks, counted from the end of the previous check until the beginning of the next one. If the number of connections is increased (which will happen, for example, if you increase the pool size), you may need to increase this period as well to avoid creating too many log entries in the MongoDB log file.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • min_heartbeat_frequency_ms

        TypeDuration
        Description

        Controls the minimum amount of time to wait between heartbeats.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    mongo_sharded

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("mongodb")
      Description

      Backend type.

    • collection

      TypeString
      Description

      Collection used to store authentication data.

    • filter

      TypeMap
      Default{}
      Description

      Conditional expression that defines the filter condition in the query. Filter supports the following placeholders:

      • ${username}: Will be replaced at runtime with Username used by the client when connecting
      • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting
    • password_hash_field

      TypeString
      Defaultpassword_hash
      Description

      Document field that contains password hash.

    • salt_field

      TypeString
      Defaultsalt
      Description

      Document field that contains the password salt.

    • is_superuser_field

      TypeString
      Defaultis_superuser
      Description

      Document field that defines if the user has superuser privileges.

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash verification.

      bcrypt

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • mongo_type

      TypeString("sharded")
      Defaultsharded
      Description

      Sharded cluster. Must be set to 'sharded' when MongoDB server is running in 'sharded' mode.

    • servers

      TypeString
      Description

      A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The MongoDB default port 27017 is used if [:Port] is not specified.

    • w_mode

      TypeEnum(unsafe,safe)
      Defaultunsafe
      Description

      Write mode.

    • srv_record

      TypeBoolean
      Defaultfalse
      Description

      Use DNS SRV record.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • use_legacy_protocol

      TypeEnum(auto,true,false)
      Defaultauto
      Description

      Whether to use MongoDB's legacy protocol for communicating with the database. The default is to attempt to automatically determine if the newer protocol is supported.

    • auth_source

      TypeString
      Description

      Database name associated with the user's credentials.

    • database

      TypeString
      Description

      Database name.

    • topology

      TypeStruct(topology)

      topology

      • max_overflow

        TypeInteger(0..+inf)
        Default0
        Description

        The maximum number of additional workers that can be created when all workers in the pool are busy. This helps to manage temporary spikes in workload by allowing more concurrent connections to the MongoDB server.

      • overflow_ttl

        TypeDuration
        Description

        Period of time before workers that exceed the configured pool size ("overflow") to be terminated.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • overflow_check_period

        TypeDuration
        Description

        Period for checking if there are more workers than configured ("overflow").
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • local_threshold_ms

        TypeDuration
        Description

        The size of the latency window for selecting among multiple suitable MongoDB instances.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • connect_timeout_ms

        TypeDuration
        Description

        The duration to attempt a connection before timing out.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • socket_timeout_ms

        TypeDuration
        Description

        The duration to attempt to send or to receive on a socket before the attempt times out.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • server_selection_timeout_ms

        TypeDuration
        Description

        Specifies how long to block for server selection before throwing an exception.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • wait_queue_timeout_ms

        TypeDuration
        Description

        The maximum duration that a worker can wait for a connection to become available.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • heartbeat_frequency_ms

        TypeDuration
        Default"200s"
        Description

        Controls when the driver checks the state of the MongoDB deployment. Specify the interval between checks, counted from the end of the previous check until the beginning of the next one. If the number of connections is increased (which will happen, for example, if you increase the pool size), you may need to increase this period as well to avoid creating too many log entries in the MongoDB log file.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • min_heartbeat_frequency_ms

        TypeDuration
        Description

        Controls the minimum amount of time to wait between heartbeats.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    redis_single

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("redis")
      Description

      Backend type.

    • cmd

      TypeString
      Description

      The Redis Command used to query data for authentication such as password hash, currently only supports HGET and HMGET.

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash verification.

      bcrypt

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • server

      TypeString
      Description

      The IPv4 or IPv6 address or the hostname to connect to.
      A host entry has the following form: Host[:Port].
      The Redis default port 6379 is used if [:Port] is not specified.

    • redis_type

      TypeString("single")
      Defaultsingle
      Description

      Single mode. Must be set to 'single' when Redis server is running in single mode.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • database

      TypeInteger(0..+inf)
      Default0
      Description

      Redis database ID.

    • auto_reconnect

      TypeBoolean
      Description

      Deprecated since v5.0.15.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    redis_cluster

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("redis")
      Description

      Backend type.

    • cmd

      TypeString
      Description

      The Redis Command used to query data for authentication such as password hash, currently only supports HGET and HMGET.

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash verification.

      bcrypt

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • servers

      TypeString
      Description

      A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The Redis default port 6379 is used if [:Port] is not specified.

    • redis_type

      TypeString("cluster")
      Defaultcluster
      Description

      Cluster mode. Must be set to 'cluster' when Redis server is running in clustered mode.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • auto_reconnect

      TypeBoolean
      Description

      Deprecated since v5.0.15.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    redis_sentinel

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("redis")
      Description

      Backend type.

    • cmd

      TypeString
      Description

      The Redis Command used to query data for authentication such as password hash, currently only supports HGET and HMGET.

    • password_hash_algorithm

      TypeOneOf(Struct(bcrypt),Struct(pbkdf2),Struct(simple))
      Default{name = sha256, salt_position = prefix}
      Description

      Options for password hash verification.

      bcrypt

      • name

        TypeString("bcrypt")
        Description

        BCRYPT password hashing.

      pbkdf2

      • name

        TypeString("pbkdf2")
        Description

        PBKDF2 password hashing.

      • mac_fun

        TypeEnum(md4,md5,ripemd160,sha,sha224,sha256,sha384,sha512)
        Description

        Specifies mac_fun for PBKDF2 hashing algorithm.

      • iterations

        TypeInteger(1..+inf)
        Description

        Iteration count for PBKDF2 hashing algorithm.

      • dk_length

        TypeInteger(1..+inf)
        Description

        Derived length for PBKDF2 hashing algorithm. If not specified, calculated automatically based on mac_fun.

      simple

      • name

        TypeEnum(plain,md5,sha,sha256,sha512)
        Description

        Simple password hashing algorithm.

      • salt_position

        TypeEnum(disable,prefix,suffix)
        Defaultprefix
        Description

        Salt position for PLAIN, MD5, SHA, SHA256 and SHA512 algorithms.

    • servers

      TypeString
      Description

      A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The Redis default port 6379 is used if [:Port] is not specified.

    • redis_type

      TypeString("sentinel")
      Defaultsentinel
      Description

      Sentinel mode. Must be set to 'sentinel' when Redis server is running in sentinel mode.

    • sentinel

      TypeString
      Description

      The cluster name in Redis sentinel mode.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • database

      TypeInteger(0..+inf)
      Default0
      Description

      Redis database ID.

    • auto_reconnect

      TypeBoolean
      Description

      Deprecated since v5.0.15.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    http_get

    • method

      TypeString("get")
      Description

      HTTP request method.

    • headers

      TypeMap
      Default{accept = "application/json", cache-control = "no-cache", connection = "keep-alive", keep-alive = "timeout=30, max=1000"}
      Description

      List of HTTP headers (without content-type).

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("http")
      Description

      Backend type.

    • url

      TypeString
      Description

      URL of the HTTP server.

    • body

      TypeMap
      Description

      HTTP request body.

    • request_timeout

      TypeDuration
      Default"5s"
      Description

      HTTP request timeout.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • request

      TypeStruct(request)
      Description

      Configure HTTP request parameters.

      request

      • method

        TypeString
        Description

        HTTP method.

      • path

        TypeString
        Description

        URL path.
        A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • body

        TypeString
        Description

        HTTP request body.
        A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • headers

        TypeMap
        Description

        List of HTTP headers.

      • max_retries

        TypeInteger(0..+inf)
        Description

        Max retry times if error on sending request.

      • request_timeout

        TypeDuration
        Description

        HTTP request timeout.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      The pool size.

    • connect_timeout

      TypeDuration
      Default"15s"
      Description

      The timeout when connecting to the HTTP server.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • retry_interval

      TypeDuration
      Description

      Deprecated since 5.0.4.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • max_retries

      TypeInteger(0..+inf)
      Description

      Deprecated since 5.0.4.

    • enable_pipelining

      TypeInteger(1..+inf)
      Default100
      Description

      The maximum number of HTTP requests that can be sent before an HTTP response is received.

      Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

    http_post

    • method

      TypeString("post")
      Description

      HTTP request method.

    • headers

      TypeMap
      Default{accept = "application/json", cache-control = "no-cache", connection = "keep-alive", content-type = "application/json", keep-alive = "timeout=30, max=1000"}
      Description

      List of HTTP Headers.

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("http")
      Description

      Backend type.

    • url

      TypeString
      Description

      URL of the HTTP server.

    • body

      TypeMap
      Description

      HTTP request body.

    • request_timeout

      TypeDuration
      Default"5s"
      Description

      HTTP request timeout.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • request

      TypeStruct(request)
      Description

      Configure HTTP request parameters.

      request

      • method

        TypeString
        Description

        HTTP method.

      • path

        TypeString
        Description

        URL path.
        A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • body

        TypeString
        Description

        HTTP request body.
        A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • headers

        TypeMap
        Description

        List of HTTP headers.

      • max_retries

        TypeInteger(0..+inf)
        Description

        Max retry times if error on sending request.

      • request_timeout

        TypeDuration
        Description

        HTTP request timeout.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      The pool size.

    • connect_timeout

      TypeDuration
      Default"15s"
      Description

      The timeout when connecting to the HTTP server.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • retry_interval

      TypeDuration
      Description

      Deprecated since 5.0.4.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • max_retries

      TypeInteger(0..+inf)
      Description

      Deprecated since 5.0.4.

    • enable_pipelining

      TypeInteger(1..+inf)
      Default100
      Description

      The maximum number of HTTP requests that can be sent before an HTTP response is received.

      Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

    jwt_hmac

    • algorithm

      TypeEnum(hmac-based)
      Description

      JWT signing algorithm, Supports HMAC (configured as hmac-based) and RSA, ECDSA (configured as public-key).

    • secret

      TypeString
      Description

      The key to verify the JWT using HMAC algorithm.

    • secret_base64_encoded

      TypeBoolean
      Defaultfalse
      Description

      Whether secret is base64 encoded.

    • mechanism

      TypeString("jwt")
      Description

      Authentication mechanism.

    • acl_claim_name

      TypeString
      Defaultacl
      Description

      The JWT claim designated for accessing ACL (Access Control List) rules can be specified, such as using the acl claim. A typical decoded JWT with this claim might appear as: {"username": "user1", "acl": ...}.

      Supported ACL Rule Formats:

      • Object Format: Utilizes action types pub (publish), sub (subscribe), or all (both publish and subscribe). The value is a list of topic filters. Example: {"pub": ["topic1"], "sub": [], "all": ["${username}/#"]}. This example signifies that the token owner can publish to topic1 and perform both publish and subscribe actions on topics starting with their username. Note: In this format, if no topic matches, the action is denied, and the authorization process terminates.

      • Array Format (resembles File-Based ACL Rules): Example: [{"permission": "allow", "action": "all", "topic": "${username}/#"}]. Additionally, the pub or publish action rules can be extended with qos and retain field, and sub or subscribe action rules can be extended with a qos field. Note: Here, if no rule matches, the action is not immediately denied. The process continues to other configured authorization sources, and ultimately falls back to the default permission in config authorization.no_match.

      The ACL claim utilizes MQTT topic wildcard matching rules for publishing or subscribing. A special syntax for the 'subscribe' action allows the use of eq for an exact match. For instance, eq t/# permits or denies subscription to t/#, but not to t/1.

    • verify_claims

      TypeMap
      Default{}
      Description

      A list of custom claims to validate. The allowed formats are the following: A map where claim names are map keys and expected values are map values: { claim_name = "${username}", ...}.

      A list of maps with name (claim name) and value (expected claim value) keys: [{name = "claim_name", value = "${username}"}, ...].

      Values can use the following placeholders:

      • ${username}: Will be replaced at runtime with Username used by the client when connecting
      • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting

      Authentication will verify that the value of claims in the JWT (taken from the Password field) matches what is required in verify_claims.

    • disconnect_after_expire

      TypeBoolean
      Defaulttrue
      Description

      Disconnect the client after the token expires.

    • from

      TypeEnum(username,password)
      Defaultpassword
      Description

      Field to take JWT from.

    jwt_public_key

    • algorithm

      TypeEnum(public-key)
      Description

      JWT signing algorithm, Supports HMAC (configured as hmac-based) and RSA, ECDSA (configured as public-key).

    • public_key

      TypeString
      Description

      The public key used to verify the JWT.

    • mechanism

      TypeString("jwt")
      Description

      Authentication mechanism.

    • acl_claim_name

      TypeString
      Defaultacl
      Description

      The JWT claim designated for accessing ACL (Access Control List) rules can be specified, such as using the acl claim. A typical decoded JWT with this claim might appear as: {"username": "user1", "acl": ...}.

      Supported ACL Rule Formats:

      • Object Format: Utilizes action types pub (publish), sub (subscribe), or all (both publish and subscribe). The value is a list of topic filters. Example: {"pub": ["topic1"], "sub": [], "all": ["${username}/#"]}. This example signifies that the token owner can publish to topic1 and perform both publish and subscribe actions on topics starting with their username. Note: In this format, if no topic matches, the action is denied, and the authorization process terminates.

      • Array Format (resembles File-Based ACL Rules): Example: [{"permission": "allow", "action": "all", "topic": "${username}/#"}]. Additionally, the pub or publish action rules can be extended with qos and retain field, and sub or subscribe action rules can be extended with a qos field. Note: Here, if no rule matches, the action is not immediately denied. The process continues to other configured authorization sources, and ultimately falls back to the default permission in config authorization.no_match.

      The ACL claim utilizes MQTT topic wildcard matching rules for publishing or subscribing. A special syntax for the 'subscribe' action allows the use of eq for an exact match. For instance, eq t/# permits or denies subscription to t/#, but not to t/1.

    • verify_claims

      TypeMap
      Default{}
      Description

      A list of custom claims to validate. The allowed formats are the following: A map where claim names are map keys and expected values are map values: { claim_name = "${username}", ...}.

      A list of maps with name (claim name) and value (expected claim value) keys: [{name = "claim_name", value = "${username}"}, ...].

      Values can use the following placeholders:

      • ${username}: Will be replaced at runtime with Username used by the client when connecting
      • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting

      Authentication will verify that the value of claims in the JWT (taken from the Password field) matches what is required in verify_claims.

    • disconnect_after_expire

      TypeBoolean
      Defaulttrue
      Description

      Disconnect the client after the token expires.

    • from

      TypeEnum(username,password)
      Defaultpassword
      Description

      Field to take JWT from.

    jwt_jwks

    • use_jwks

      TypeEnum(true)
      Description

      Whether to use JWKS.

    • endpoint

      TypeString
      Description

      JWKS endpoint, it's a read-only endpoint that returns the server's public key set in the JWKS format.

    • headers

      TypeMap
      Default{Accept = "application/json"}
      Description

      List of HTTP headers to send with the JWKS request.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • refresh_interval

      TypeInteger
      Default300
      Description

      JWKS refresh interval.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL options.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • mechanism

      TypeString("jwt")
      Description

      Authentication mechanism.

    • acl_claim_name

      TypeString
      Defaultacl
      Description

      The JWT claim designated for accessing ACL (Access Control List) rules can be specified, such as using the acl claim. A typical decoded JWT with this claim might appear as: {"username": "user1", "acl": ...}.

      Supported ACL Rule Formats:

      • Object Format: Utilizes action types pub (publish), sub (subscribe), or all (both publish and subscribe). The value is a list of topic filters. Example: {"pub": ["topic1"], "sub": [], "all": ["${username}/#"]}. This example signifies that the token owner can publish to topic1 and perform both publish and subscribe actions on topics starting with their username. Note: In this format, if no topic matches, the action is denied, and the authorization process terminates.

      • Array Format (resembles File-Based ACL Rules): Example: [{"permission": "allow", "action": "all", "topic": "${username}/#"}]. Additionally, the pub or publish action rules can be extended with qos and retain field, and sub or subscribe action rules can be extended with a qos field. Note: Here, if no rule matches, the action is not immediately denied. The process continues to other configured authorization sources, and ultimately falls back to the default permission in config authorization.no_match.

      The ACL claim utilizes MQTT topic wildcard matching rules for publishing or subscribing. A special syntax for the 'subscribe' action allows the use of eq for an exact match. For instance, eq t/# permits or denies subscription to t/#, but not to t/1.

    • verify_claims

      TypeMap
      Default{}
      Description

      A list of custom claims to validate. The allowed formats are the following: A map where claim names are map keys and expected values are map values: { claim_name = "${username}", ...}.

      A list of maps with name (claim name) and value (expected claim value) keys: [{name = "claim_name", value = "${username}"}, ...].

      Values can use the following placeholders:

      • ${username}: Will be replaced at runtime with Username used by the client when connecting
      • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting

      Authentication will verify that the value of claims in the JWT (taken from the Password field) matches what is required in verify_claims.

    • disconnect_after_expire

      TypeBoolean
      Defaulttrue
      Description

      Disconnect the client after the token expires.

    • from

      TypeEnum(username,password)
      Defaultpassword
      Description

      Field to take JWT from.

    scram

    • mechanism

      TypeString("scram")
      Description

      Authentication mechanism.

    • backend

      TypeString("built_in_database")
      Description

      Backend type.

    • algorithm

      TypeEnum(sha256,sha512)
      Defaultsha256
      Description

      Hashing algorithm.

    • iteration_count

      TypeInteger(0..+inf)
      Default4096
      Description

      Iteration count.

    ldap

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("ldap")
      Description

      Backend type.

    • query_timeout

      TypeDuration
      Default"5s"
      Description

      Timeout for the LDAP query.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • server

      TypeString
      Description

      The IPv4 or IPv6 address or the hostname to connect to.
      A host entry has the following form: Host[:Port].
      The LDAP default port 389 is used if [:Port] is not specified.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • base_dn

      TypeString
      Description

      The name of the base object entry (or possibly the root) relative to which the Search is to be performed.

    • filter

      TypeString
      Default"(objectClass=mqttUser)"
      Description

      The filter that defines the conditions that must be fulfilled in order for the Search to match a given entry.
      The syntax of the filter follows RFC 4515 and also supports placeholders.

    • request_timeout

      TypeDuration
      Default"10s"
      Description

      Sets the maximum time in milliseconds that is used for each individual request.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • method

      TypeOneOf(Struct(hash_method),Struct(bind_method))
      Description

      Authentication method.

      hash_method

      • type

        TypeEnum(hash)
        Defaulthash
        Description

        Authentication method type.

      • password_attribute

        TypeString
        DefaultuserPassword
        Description

        Indicates which attribute is used to represent the user's password.

      • is_superuser_attribute

        TypeString
        DefaultisSuperuser
        Description

        Indicates which attribute is used to represent whether the user is a superuser.

      bind_method

      • type

        TypeEnum(bind)
        Defaultbind
        Description

        Authentication method type.

      • bind_password

        TypeString
        Default"${password}"
        Description

        The template for password to bind.

    ldap_deprecated

    • mechanism

      TypeString("password_based")
      Description

      Authentication mechanism.

    • backend

      TypeString("ldap")
      Description

      Backend type.

    • query_timeout

      TypeDuration
      Default"5s"
      Description

      Timeout for the LDAP query.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • server

      TypeString
      Description

      The IPv4 or IPv6 address or the hostname to connect to.
      A host entry has the following form: Host[:Port].
      The LDAP default port 389 is used if [:Port] is not specified.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      Size of the connection pool towards the bridge target service.

    • username

      TypeString
      Description

      The username associated with the bridge in the external database used for authentication or identification purposes.

    • password

      TypeSecret
      Description

      The password associated with the bridge, used for authentication with the external database.
      A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • base_dn

      TypeString
      Description

      The name of the base object entry (or possibly the root) relative to which the Search is to be performed.

    • filter

      TypeString
      Default"(objectClass=mqttUser)"
      Description

      The filter that defines the conditions that must be fulfilled in order for the Search to match a given entry.
      The syntax of the filter follows RFC 4515 and also supports placeholders.

    • request_timeout

      TypeDuration
      Default"10s"
      Description

      Sets the maximum time in milliseconds that is used for each individual request.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • password_attribute

      TypeString
      DefaultuserPassword
      Description

      Indicates which attribute is used to represent the user's password.

    • is_superuser_attribute

      TypeString
      DefaultisSuperuser
      Description

      Indicates which attribute is used to represent whether the user is a superuser.

    gcp_device

    • mechanism

      TypeString("gcp_device")
      Description

      Authentication mechanism.

    scram_restapi_get

    • method

      TypeString("get")
      Description

      HTTP request method.

    • headers

      TypeMap
      Default{accept = "application/json", cache-control = "no-cache", connection = "keep-alive", keep-alive = "timeout=30, max=1000"}
      Description

      List of HTTP headers (without content-type).

    • mechanism

      TypeString("scram")
      Description

      Authentication mechanism.

    • backend

      TypeString("http")
      Description

      Backend type.

    • algorithm

      TypeEnum(sha256,sha512)
      Defaultsha256
      Description

      Hashing algorithm.

    • iteration_count

      TypeInteger(0..+inf)
      Default4096
      Description

      Iteration count.

    • url

      TypeString
      Description

      URL of the HTTP server.

    • body

      TypeMap
      Description

      HTTP request body.

    • request_timeout

      TypeDuration
      Default"5s"
      Description

      HTTP request timeout.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • connect_timeout

      TypeDuration
      Default"15s"
      Description

      The timeout when connecting to the HTTP server.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • max_retries

      TypeInteger(0..+inf)
      Description

      Deprecated since 5.0.4.

    • retry_interval

      TypeDuration
      Description

      Deprecated since 5.0.4.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      The pool size.

    • enable_pipelining

      TypeInteger(1..+inf)
      Default100
      Description

      The maximum number of HTTP requests that can be sent before an HTTP response is received.

      Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

    • request

      TypeStruct(request)
      Description

      Configure HTTP request parameters.

      request

      • method

        TypeString
        Description

        HTTP method.

      • path

        TypeString
        Description

        URL path.
        A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • body

        TypeString
        Description

        HTTP request body.
        A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • headers

        TypeMap
        Description

        List of HTTP headers.

      • max_retries

        TypeInteger(0..+inf)
        Description

        Max retry times if error on sending request.

      • request_timeout

        TypeDuration
        Description

        HTTP request timeout.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    scram_restapi_post

    • method

      TypeString("post")
      Description

      HTTP request method.

    • headers

      TypeMap
      Default{accept = "application/json", cache-control = "no-cache", connection = "keep-alive", content-type = "application/json", keep-alive = "timeout=30, max=1000"}
      Description

      List of HTTP Headers.

    • mechanism

      TypeString("scram")
      Description

      Authentication mechanism.

    • backend

      TypeString("http")
      Description

      Backend type.

    • algorithm

      TypeEnum(sha256,sha512)
      Defaultsha256
      Description

      Hashing algorithm.

    • iteration_count

      TypeInteger(0..+inf)
      Default4096
      Description

      Iteration count.

    • url

      TypeString
      Description

      URL of the HTTP server.

    • body

      TypeMap
      Description

      HTTP request body.

    • request_timeout

      TypeDuration
      Default"5s"
      Description

      HTTP request timeout.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • connect_timeout

      TypeDuration
      Default"15s"
      Description

      The timeout when connecting to the HTTP server.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • max_retries

      TypeInteger(0..+inf)
      Description

      Deprecated since 5.0.4.

    • retry_interval

      TypeDuration
      Description

      Deprecated since 5.0.4.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • pool_size

      TypeInteger(1..+inf)
      Default8
      Description

      The pool size.

    • enable_pipelining

      TypeInteger(1..+inf)
      Default100
      Description

      The maximum number of HTTP requests that can be sent before an HTTP response is received.

      Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

    • request

      TypeStruct(request)
      Description

      Configure HTTP request parameters.

      request

      • method

        TypeString
        Description

        HTTP method.

      • path

        TypeString
        Description

        URL path.
        A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • body

        TypeString
        Description

        HTTP request body.
        A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • headers

        TypeMap
        Description

        List of HTTP headers.

      • max_retries

        TypeInteger(0..+inf)
        Description

        Max retry times if error on sending request.

      • request_timeout

        TypeDuration
        Description

        HTTP request timeout.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • ssl

      TypeStruct(ssl_client_opts)
      Default{enable = false}
      Description

      SSL connection settings.

      ssl_client_opts

      • cacertfile

        TypeString
        Description

        Trusted PEM format CA certificates bundle file.
        The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
        NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

      • cacerts

        TypeBoolean
        Description

        Deprecated since 5.1.4.

      • certfile

        TypeString
        Description

        PEM format certificates chain file.
        The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

      • keyfile

        TypeString
        Description

        PEM format private key file.

      • verify

        TypeEnum(verify_peer,verify_none)
        Defaultverify_none
        Description

        Enable or disable peer verification.

      • reuse_sessions

        TypeBoolean
        Defaulttrue
        Description

        Enable TLS session reuse.
        Has no effect when TLS version is configured (or negotiated) to 1.3

      • depth

        TypeInteger(0..+inf)
        Default10
        Description

        Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
        if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
        if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

      • password

        TypeSecret
        Description

        String containing the user's password. Only used if the private key file is password-protected.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • versions

        TypeArray(String)
        Default["tlsv1.3", "tlsv1.2"]
        Description

        All TLS/DTLS versions to be supported.
        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
        In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

      • ciphers

        TypeArray(String)
        Default[]
        Description

        This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
        Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

        The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

        NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

        NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
        If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
        PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

      • secure_renegotiate

        TypeBoolean
        Defaulttrue
        Description

        Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

        By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

        Has no effect when TLS version is configured (or negotiated) to 1.3.

      • log_level

        TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
        Defaultnotice
        Description

        The minimum level of logging allowed for SSL output.

        The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

      • hibernate_after

        TypeDuration
        Default"5s"
        Description

        Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

        The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • partial_chain

        TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
        Description

        Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

      • verify_peer_ext_key_usage

        TypeString
        Description

        Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

        Allowed values are

        • clientAuth
        • serverAuth
        • codeSigning
        • emailProtection
        • timeStamping
        • ocspSigning
        • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

        Comma-separated string is also supported for validating more than one key usages.

        For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable TLS.

      • server_name_indication

        TypeOneOf(String("disable"),String)
        Description

        Specify the host name to be used in TLS Server Name Indication extension.
        For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
        If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
        The host name is then also used in the host name verification of the peer certificate.
        The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    kerberos

    • mechanism

      TypeString("gssapi")
      Description

      Authentication mechanism.

    • backend

      TypeString("kerberos")
      Description

      Backend type.

    • principal

      TypeString
      Description

      Server Kerberos principal. For example mqtt/emqx-cluster-1.example.com@MY_REALM.EXAMPLE.COM. NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes.

    cinfo

    • mechanism

      TypeString("cinfo")
      Description

      Authentication mechanism.

    • checks

      TypeArray(Struct(cinfo_check))
      Description

      A list of checks to perform on the client information. If all checks are skipped, the default result ignore is returned. The ignore result means to defer the authentication to the next authenticator in the chain.

      cinfo_check

      • is_match

        TypeOneOf(String,Array(String))
        Description

        One Variform expression or an array of expressions to evaluate with a set of pre-bound variables derived from the client information. Supported variables:

        • username: the username of the client.
        • password: the password of the client.
        • clientid: the client ID of the client.
        • client_attrs.*: the client attributes of the client.
        • peerhost: the IP address of the client.
        • cert_subject: the subject of the TLS certificate.
        • cert_common_name: the issuer of the TLS certificate.
        • zone: the config zone associated with the listener from which the client is accepted. If the expression(s) all yields the string value 'true', then the associated result is returned from this authenticator. If any expression yields the other than 'true', then the current check is skipped.
      • result

        TypeEnum(allow,deny,ignore)
        Description

        The result to return if the match condition is true. Supported results:

        • ignore: defer the authentication to the next authenticator in the chain.
        • allow: allow the client to connect.
        • deny: deny the client to connect.
  • authorization

    TypeStruct(authorization)
    Description

    Authorization a.k.a. ACL.
    In EMQX, MQTT client access control is extremely flexible.
    An out-of-the-box set of authorization data sources are supported. For example,
    'file' source is to support concise and yet generic ACL rules in a file;
    'built_in_database' source can be used to store per-client customizable rule sets, natively in the EMQX node;
    'http' source to make EMQX call an external HTTP API to make the decision;
    'PostgreSQL' etc. to look up clients or rules from external databases

    authorization

    • no_match

      TypeEnum(allow,deny)
      Defaultallow
      Description

      Default access control action if the user or client matches no ACL rules, or if no such user or client is found by the configurable authorization sources such as built_in_database, an HTTP API, or a query against PostgreSQL. Find more details in 'authorization.sources' config.

    • deny_action

      TypeEnum(ignore,disconnect)
      Defaultignore
      Description

      The action when the authorization check rejects an operation.

    • cache

      TypeStruct(authz_cache)

      authz_cache

      • max_size

        TypeInteger(1..1048576)
        Default32
        Description

        Maximum number of cached items.

      • ttl

        TypeDuration
        Default"1m"
        Description

        Time to live for the cached data.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • excludes

        TypeArray(String)
        Default[]
        Description

        Exclude caching ACL check results for topics matching the given patterns.

    • sources

      TypeArray(OneOf(Struct(file),Struct(builtin_db),Struct(http_get),Struct(http_post),Struct(redis_single),Struct(redis_sentinel),Struct(redis_cluster),Struct(mysql),Struct(postgresql),Struct(mongo_single),Struct(mongo_rs),Struct(mongo_sharded),Struct(ldap)))
      Default[{enable = true, path = "${EMQX_ETC_DIR}/acl.conf", type = file}]
      Description

      Authorization data sources.
      An array of authorization (ACL) data providers. It is designed as an array, not a hash-map, so the sources can be ordered to form a chain of access controls.

      When authorizing a 'publish' or 'subscribe' action, the configured sources are checked in order. When checking an ACL source, in case the client (identified by username or client ID) is not found, it moves on to the next source. And it stops immediately once an 'allow' or 'deny' decision is returned.

      If the client is not found in any of the sources, the default action configured in 'authorization.no_match' is applied.

      NOTE: The source elements are identified by their 'type'. It is NOT allowed to configure two or more sources of the same type.

      file

      • type

        TypeString("file")
        Description

        Backend type.

      • path

        TypeString
        Description

        Path to the file which contains the ACL rules. If the file provisioned before starting EMQX node, it can be placed anywhere as long as EMQX has read access to it. That is, EMQX will treat it as read only.

        In case the rule-set is created or updated from EMQX Dashboard or HTTP API, a new file will be created and placed in authz subdirectory inside EMQX's data_dir, and the old file will not be used anymore.

      builtin_db

      • type

        TypeString("built_in_database")
        Description

        Backend type.

      • max_rules

        TypeInteger(1..+inf)
        Default100
        Description

        Maximum number of rules per client/user. Note that performance may decrease as number of rules increases.

      http_get

      • type

        TypeString("http")
        Description

        Backend type.

      • url

        TypeString
        Description

        URL of the auth server.

      • request_timeout

        TypeString
        Default"30s"
        Description

        HTTP request timeout.

      • body

        TypeMap($name->String)
        Description

        HTTP request body.

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the HTTP server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • max_retries

        TypeInteger(0..+inf)
        Description

        Deprecated since 5.0.4.

      • retry_interval

        TypeDuration
        Description

        Deprecated since 5.0.4.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • enable_pipelining

        TypeInteger(1..+inf)
        Default100
        Description

        The maximum number of HTTP requests that can be sent before an HTTP response is received.

        Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

      • request

        TypeStruct(request)
        Description

        Configure HTTP request parameters.

        request

        • method
          TypeString
          Description

          HTTP method.

        • path
          TypeString
          Description

          URL path.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • body
          TypeString
          Description

          HTTP request body.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • headers
          TypeMap
          Description

          List of HTTP headers.

        • max_retries
          TypeInteger(0..+inf)
          Description

          Max retry times if error on sending request.

        • request_timeout
          TypeDuration
          Description

          HTTP request timeout.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • method

        TypeString("get")
        Description

        HTTP method.

      • headers

        TypeMap
        Default{accept = "application/json", cache-control = "no-cache", connection = "keep-alive", keep-alive = "timeout=30, max=1000"}
        Description

        List of HTTP headers (without content-type).

      http_post

      • type

        TypeString("http")
        Description

        Backend type.

      • url

        TypeString
        Description

        URL of the auth server.

      • request_timeout

        TypeString
        Default"30s"
        Description

        HTTP request timeout.

      • body

        TypeMap($name->String)
        Description

        HTTP request body.

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the HTTP server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • max_retries

        TypeInteger(0..+inf)
        Description

        Deprecated since 5.0.4.

      • retry_interval

        TypeDuration
        Description

        Deprecated since 5.0.4.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • enable_pipelining

        TypeInteger(1..+inf)
        Default100
        Description

        The maximum number of HTTP requests that can be sent before an HTTP response is received.

        Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

      • request

        TypeStruct(request)
        Description

        Configure HTTP request parameters.

        request

        • method
          TypeString
          Description

          HTTP method.

        • path
          TypeString
          Description

          URL path.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • body
          TypeString
          Description

          HTTP request body.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • headers
          TypeMap
          Description

          List of HTTP headers.

        • max_retries
          TypeInteger(0..+inf)
          Description

          Max retry times if error on sending request.

        • request_timeout
          TypeDuration
          Description

          HTTP request timeout.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • method

        TypeString("post")
        Description

        HTTP method.

      • headers

        TypeMap
        Default{accept = "application/json", cache-control = "no-cache", connection = "keep-alive", content-type = "application/json", keep-alive = "timeout=30, max=1000"}
        Description

        List of HTTP Headers.

      redis_single

      • type

        TypeString("redis")
        Description

        Backend type.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The Redis default port 6379 is used if [:Port] is not specified.

      • redis_type

        TypeString("single")
        Defaultsingle
        Description

        Single mode. Must be set to 'single' when Redis server is running in single mode.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • database

        TypeInteger(0..+inf)
        Default0
        Description

        Redis database ID.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • cmd

        TypeString
        Description

        Database query used to retrieve authorization data.

      redis_sentinel

      • type

        TypeString("redis")
        Description

        Backend type.

      • servers

        TypeString
        Description

        A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The Redis default port 6379 is used if [:Port] is not specified.

      • redis_type

        TypeString("sentinel")
        Defaultsentinel
        Description

        Sentinel mode. Must be set to 'sentinel' when Redis server is running in sentinel mode.

      • sentinel

        TypeString
        Description

        The cluster name in Redis sentinel mode.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • database

        TypeInteger(0..+inf)
        Default0
        Description

        Redis database ID.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • cmd

        TypeString
        Description

        Database query used to retrieve authorization data.

      redis_cluster

      • type

        TypeString("redis")
        Description

        Backend type.

      • servers

        TypeString
        Description

        A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The Redis default port 6379 is used if [:Port] is not specified.

      • redis_type

        TypeString("cluster")
        Defaultcluster
        Description

        Cluster mode. Must be set to 'cluster' when Redis server is running in clustered mode.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • cmd

        TypeString
        Description

        Database query used to retrieve authorization data.

      mysql

      • type

        TypeString("mysql")
        Description

        Backend type.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The MySQL default port 3306 is used if [:Port] is not specified.

      • database

        TypeString
        Description

        Database name.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Defaultroot
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • prepare_statement

        TypeMap
        Description

        Key-value list of SQL prepared statements.

      • query

        TypeString
        Description

        Database query used to retrieve authorization data.

      postgresql

      • type

        TypeString("postgresql")
        Description

        Backend type.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The PostgreSQL default port 5432 is used if [:Port] is not specified.

      • disable_prepared_statements

        TypeBoolean
        Defaultfalse
        Description

        Disables the usage of prepared statements in the connections. Some endpoints, like PGBouncer or Supabase in Transaction mode, do not support session features such as prepared statements. For such connections, this option should be enabled.

      • database

        TypeString
        Description

        Database name.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • prepare_statement

        TypeMap
        Description

        Key-value list of SQL prepared statements.

      • query

        TypeString
        Description

        Database query used to retrieve authorization data.

      mongo_single

      • type

        TypeString("mongodb")
        Description

        Backend type.

      • collection

        TypeString
        Description

        MongoDB collection containing the authorization data.

      • filter

        TypeMap
        Default{}
        Description

        Conditional expression that defines the filter condition in the query. Filter supports the following placeholders

        • ${username}: Will be replaced at runtime with Username used by the client when connecting
        • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting
      • mongo_type

        TypeString("single")
        Defaultsingle
        Description

        Standalone instance. Must be set to 'single' when MongoDB server is running in standalone mode.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The MongoDB default port 27017 is used if [:Port] is not specified.

      • w_mode

        TypeEnum(unsafe,safe)
        Defaultunsafe
        Description

        Write mode.

      • srv_record

        TypeBoolean
        Defaultfalse
        Description

        Use DNS SRV record.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • use_legacy_protocol

        TypeEnum(auto,true,false)
        Defaultauto
        Description

        Whether to use MongoDB's legacy protocol for communicating with the database. The default is to attempt to automatically determine if the newer protocol is supported.

      • auth_source

        TypeString
        Description

        Database name associated with the user's credentials.

      • database

        TypeString
        Description

        Database name.

      • topology

        TypeStruct(topology)

        topology

        • max_overflow
          TypeInteger(0..+inf)
          Default0
          Description

          The maximum number of additional workers that can be created when all workers in the pool are busy. This helps to manage temporary spikes in workload by allowing more concurrent connections to the MongoDB server.

        • overflow_ttl
          TypeDuration
          Description

          Period of time before workers that exceed the configured pool size ("overflow") to be terminated.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • overflow_check_period
          TypeDuration
          Description

          Period for checking if there are more workers than configured ("overflow").
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • local_threshold_ms
          TypeDuration
          Description

          The size of the latency window for selecting among multiple suitable MongoDB instances.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • connect_timeout_ms
          TypeDuration
          Description

          The duration to attempt a connection before timing out.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • socket_timeout_ms
          TypeDuration
          Description

          The duration to attempt to send or to receive on a socket before the attempt times out.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • server_selection_timeout_ms
          TypeDuration
          Description

          Specifies how long to block for server selection before throwing an exception.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • wait_queue_timeout_ms
          TypeDuration
          Description

          The maximum duration that a worker can wait for a connection to become available.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • heartbeat_frequency_ms
          TypeDuration
          Default"200s"
          Description

          Controls when the driver checks the state of the MongoDB deployment. Specify the interval between checks, counted from the end of the previous check until the beginning of the next one. If the number of connections is increased (which will happen, for example, if you increase the pool size), you may need to increase this period as well to avoid creating too many log entries in the MongoDB log file.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • min_heartbeat_frequency_ms
          TypeDuration
          Description

          Controls the minimum amount of time to wait between heartbeats.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      mongo_rs

      • type

        TypeString("mongodb")
        Description

        Backend type.

      • collection

        TypeString
        Description

        MongoDB collection containing the authorization data.

      • filter

        TypeMap
        Default{}
        Description

        Conditional expression that defines the filter condition in the query. Filter supports the following placeholders

        • ${username}: Will be replaced at runtime with Username used by the client when connecting
        • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting
      • mongo_type

        TypeString("rs")
        Defaultrs
        Description

        Replica set. Must be set to 'rs' when MongoDB server is running in 'replica set' mode.

      • servers

        TypeString
        Description

        A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The MongoDB default port 27017 is used if [:Port] is not specified.

      • w_mode

        TypeEnum(unsafe,safe)
        Defaultunsafe
        Description

        Write mode.

      • r_mode

        TypeEnum(master,slave_ok)
        Defaultmaster
        Description

        Read mode.

      • replica_set_name

        TypeString
        Description

        Name of the replica set.

      • srv_record

        TypeBoolean
        Defaultfalse
        Description

        Use DNS SRV record.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • use_legacy_protocol

        TypeEnum(auto,true,false)
        Defaultauto
        Description

        Whether to use MongoDB's legacy protocol for communicating with the database. The default is to attempt to automatically determine if the newer protocol is supported.

      • auth_source

        TypeString
        Description

        Database name associated with the user's credentials.

      • database

        TypeString
        Description

        Database name.

      • topology

        TypeStruct(topology)

        topology

        • max_overflow
          TypeInteger(0..+inf)
          Default0
          Description

          The maximum number of additional workers that can be created when all workers in the pool are busy. This helps to manage temporary spikes in workload by allowing more concurrent connections to the MongoDB server.

        • overflow_ttl
          TypeDuration
          Description

          Period of time before workers that exceed the configured pool size ("overflow") to be terminated.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • overflow_check_period
          TypeDuration
          Description

          Period for checking if there are more workers than configured ("overflow").
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • local_threshold_ms
          TypeDuration
          Description

          The size of the latency window for selecting among multiple suitable MongoDB instances.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • connect_timeout_ms
          TypeDuration
          Description

          The duration to attempt a connection before timing out.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • socket_timeout_ms
          TypeDuration
          Description

          The duration to attempt to send or to receive on a socket before the attempt times out.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • server_selection_timeout_ms
          TypeDuration
          Description

          Specifies how long to block for server selection before throwing an exception.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • wait_queue_timeout_ms
          TypeDuration
          Description

          The maximum duration that a worker can wait for a connection to become available.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • heartbeat_frequency_ms
          TypeDuration
          Default"200s"
          Description

          Controls when the driver checks the state of the MongoDB deployment. Specify the interval between checks, counted from the end of the previous check until the beginning of the next one. If the number of connections is increased (which will happen, for example, if you increase the pool size), you may need to increase this period as well to avoid creating too many log entries in the MongoDB log file.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • min_heartbeat_frequency_ms
          TypeDuration
          Description

          Controls the minimum amount of time to wait between heartbeats.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      mongo_sharded

      • type

        TypeString("mongodb")
        Description

        Backend type.

      • collection

        TypeString
        Description

        MongoDB collection containing the authorization data.

      • filter

        TypeMap
        Default{}
        Description

        Conditional expression that defines the filter condition in the query. Filter supports the following placeholders

        • ${username}: Will be replaced at runtime with Username used by the client when connecting
        • ${clientid}: Will be replaced at runtime with Client ID used by the client when connecting
      • mongo_type

        TypeString("sharded")
        Defaultsharded
        Description

        Sharded cluster. Must be set to 'sharded' when MongoDB server is running in 'sharded' mode.

      • servers

        TypeString
        Description

        A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The MongoDB default port 27017 is used if [:Port] is not specified.

      • w_mode

        TypeEnum(unsafe,safe)
        Defaultunsafe
        Description

        Write mode.

      • srv_record

        TypeBoolean
        Defaultfalse
        Description

        Use DNS SRV record.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • use_legacy_protocol

        TypeEnum(auto,true,false)
        Defaultauto
        Description

        Whether to use MongoDB's legacy protocol for communicating with the database. The default is to attempt to automatically determine if the newer protocol is supported.

      • auth_source

        TypeString
        Description

        Database name associated with the user's credentials.

      • database

        TypeString
        Description

        Database name.

      • topology

        TypeStruct(topology)

        topology

        • max_overflow
          TypeInteger(0..+inf)
          Default0
          Description

          The maximum number of additional workers that can be created when all workers in the pool are busy. This helps to manage temporary spikes in workload by allowing more concurrent connections to the MongoDB server.

        • overflow_ttl
          TypeDuration
          Description

          Period of time before workers that exceed the configured pool size ("overflow") to be terminated.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • overflow_check_period
          TypeDuration
          Description

          Period for checking if there are more workers than configured ("overflow").
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • local_threshold_ms
          TypeDuration
          Description

          The size of the latency window for selecting among multiple suitable MongoDB instances.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • connect_timeout_ms
          TypeDuration
          Description

          The duration to attempt a connection before timing out.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • socket_timeout_ms
          TypeDuration
          Description

          The duration to attempt to send or to receive on a socket before the attempt times out.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • server_selection_timeout_ms
          TypeDuration
          Description

          Specifies how long to block for server selection before throwing an exception.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • wait_queue_timeout_ms
          TypeDuration
          Description

          The maximum duration that a worker can wait for a connection to become available.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • heartbeat_frequency_ms
          TypeDuration
          Default"200s"
          Description

          Controls when the driver checks the state of the MongoDB deployment. Specify the interval between checks, counted from the end of the previous check until the beginning of the next one. If the number of connections is increased (which will happen, for example, if you increase the pool size), you may need to increase this period as well to avoid creating too many log entries in the MongoDB log file.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • min_heartbeat_frequency_ms
          TypeDuration
          Description

          Controls the minimum amount of time to wait between heartbeats.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      ldap

      • type

        TypeString("ldap")
        Description

        Backend type.

      • publish_attribute

        TypeString
        DefaultmqttPublishTopic
        Description

        Indicates which attribute is used to represent the allowed topics list of the publish.

      • subscribe_attribute

        TypeString
        DefaultmqttSubscriptionTopic
        Description

        Indicates which attribute is used to represent the allowed topics list of the subscribe.

      • all_attribute

        TypeString
        DefaultmqttPubSubTopic
        Description

        Indicates which attribute is used to represent the both allowed topics list of publish and subscribe.

      • query_timeout

        TypeDuration
        Default"5s"
        Description

        Timeout for the LDAP query.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The LDAP default port 389 is used if [:Port] is not specified.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • base_dn

        TypeString
        Description

        The name of the base object entry (or possibly the root) relative to which the Search is to be performed.

      • filter

        TypeString
        Default"(objectClass=mqttUser)"
        Description

        The filter that defines the conditions that must be fulfilled in order for the Search to match a given entry.
        The syntax of the filter follows RFC 4515 and also supports placeholders.

      • request_timeout

        TypeDuration
        Default"10s"
        Description

        Sets the maximum time in milliseconds that is used for each individual request.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

  • node

    TypeStruct(node)

    node

    • name

      TypeString
      Default"emqx@127.0.0.1"
      Description

      Unique name of the EMQX node. It must follow %name%@FQDN or %name%@IPv4 format.

    • TypeString
      Description

      Secret cookie is a random string that should be the same on all nodes in the given EMQX cluster, but unique per EMQX cluster. It is used to prevent EMQX nodes that belong to different clusters from accidentally connecting to each other.

    • max_ports

      TypeInteger(1024..134217727)
      Default1048576
      Description

      Maximum number of simultaneously open files and sockets for this Erlang system. For more information, see: https://www.erlang.org/doc/man/erl.html

    • dist_buffer_size

      TypeInteger(1..2097151)
      Default8192
      Description

      Erlang's distribution buffer busy limit in kilobytes.

    • data_dir

      TypeString
      Description

      Path to the persistent data directory.
      Possible auto-created subdirectories are:

      • mnesia/<node_name>: EMQX's built-in database directory.
        For example, mnesia/emqx@127.0.0.1.
        There should be only one such subdirectory.
        Meaning, in case the node is to be renamed (to e.g. emqx@10.0.1.1),
        the old dir should be deleted first.
      • configs: Generated configs at boot time, and cluster/local override configs.
      • patches: Hot-patch beam files are to be placed here.
      • trace: Trace log files.

      NOTE: One data dir cannot be shared by two or more EMQX nodes.

    • global_gc_interval

      TypeOneOf(String("disabled"),Duration)
      Default"15m"
      Description

      Periodic garbage collection interval. Set to disabled to have it disabled.

    • role

      Aliasesdb_role
      TypeEnum(core,replicant)
      Defaultcore
      Description

      Select a node role.
      core nodes provide durability of the data, and take care of writes. It is recommended to place core nodes in different racks or different availability zones.
      replicant nodes are ephemeral worker nodes. Removing them from the cluster doesn't affect database redundancy
      It is recommended to have more replicant nodes than core nodes.
      Note: this parameter only takes effect when the backend is set to rlog.

  • cluster

    TypeStruct(cluster)

    cluster

    • name

      TypeString
      Defaultemqxcl
      Description

      Human-friendly name of the EMQX cluster.

    • discovery_strategy

      TypeEnum(manual,static,singleton,dns,etcd,k8s)
      Defaultmanual
      Description

      Service discovery method for the cluster nodes. Possible values are:

      • manual: Use emqx ctl cluster command to manage cluster.
      • static: Configure static nodes list by setting seeds in config file.
      • dns: Use DNS A record to discover peer nodes.
      • etcd: Use etcd to discover peer nodes.
      • k8s: Use Kubernetes API to discover peer pods.
    • autoclean

      TypeDuration
      Default"24h"
      Description

      Remove disconnected nodes from the cluster after this interval.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • autoheal

      TypeBoolean
      Defaulttrue
      Description

      If true, the node will try to heal network partitions automatically.

    • proto_dist

      TypeEnum(inet_tcp,inet6_tcp,inet_tls,inet6_tls)
      Defaultinet_tcp
      Description

      The Erlang distribution protocol for the cluster.

      • inet_tcp: IPv4 TCP
      • inet_tls: IPv4 TLS, works together with etc/ssl_dist.conf
      • inet6_tcp: IPv6 TCP
      • inet6_tls: IPv6 TLS, works together with etc/ssl_dist.conf
    • static

      TypeStruct(cluster_static)

      cluster_static

      • seeds

        TypeOneOf(String,Array(String))
        Default[]
        Description

        List EMQX node names in the static cluster. See node.name.

    • dns

      TypeStruct(cluster_dns)

      cluster_dns

      • name

        TypeString
        Defaultlocalhost
        Description

        The domain name from which to discover peer EMQX nodes' IP addresses. Applicable when cluster.discovery_strategy = dns

      • record_type

        TypeEnum(a,aaaa,srv)
        Defaulta
        Description

        DNS record type.

    • etcd

      TypeStruct(cluster_etcd)

      cluster_etcd

      • server

        TypeString
        Description

        List of endpoint URLs of the etcd cluster

      • prefix

        TypeString
        Defaultemqxcl
        Description

        Key prefix used for EMQX service discovery.

      • node_ttl

        TypeDuration
        Default"1m"
        Description

        Expiration time of the etcd key associated with the node. It is refreshed automatically, as long as the node is alive.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl_options

        Aliasesssl
        TypeStruct(ssl_client_opts)
        Description

        Options for the TLS connection to the etcd cluster.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • k8s

      TypeStruct(cluster_k8s)

      cluster_k8s

      • apiserver

        TypeString
        Default"https://kubernetes.default.svc:443"
        Description

        Kubernetes API endpoint URL.

      • service_name

        TypeString
        Defaultemqx
        Description

        EMQX broker service name.

      • address_type

        TypeEnum(ip,dns,hostname)
        Defaultip
        Description

        Address type used for connecting to the discovered nodes. Setting cluster.k8s.address_type to ip will make EMQX to discover IP addresses of peer nodes from Kubernetes API.

      • namespace

        TypeString
        Defaultdefault
        Description

        Kubernetes namespace.

      • suffix

        TypeString
        Default"pod.local"
        Description

        Node name suffix.
        Note: this parameter is only relevant when address_type is dns or hostname.

    • TypeArray(Struct(link))
      Default[]
      Description

      The list of the linked EMQX clusters.

      • TypeString
        Description

        Linked (remote) cluster name. Must be exactly equal to the value of cluster.name configured at the remote cluster. Must not be equal to the local cluster.name. All configured cluster link names must be unique.

      • TypeString
        Description

        MQTT host and port of the remote EMQX broker.

      • TypeString
        Description

        Optional Base MQTT client ID for connecting to the remote EMQX cluster. If omitted, local cluster.name is used. EMQX maintains several connections between linked clusters, so distinct suffixes are automatically appended to the base client ID.

      • TypeString
        Description

        Optional MQTT username for connecting to the remote EMQX cluster.

      • TypeSecret
        Description

        Optional MQTT username for connecting to the remote EMQX cluster.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL configuration for connecting to the remote EMQX cluster.

        • TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • TypeBoolean
          Description

          Deprecated since 5.1.4.

        • TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • TypeString
          Description

          PEM format private key file.

        • TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • TypeArray(String)
        Description

        MQTT topics to be forwarded by the linked remote EMQX broker to the local broker. Messages are only forwarded if the local EMQX broker has matching subscriber(s). Wildcards are supported. Setting empty topics list on one side of the link can be used to establish unidirectional links: the side with the empty topics won't receive remote messages, but it can forward relevant messages to its linked counterpart (according to the topics configured on that side of the link).

      • TypeInteger(1..+inf)
        Default8
        Description

        Size of the pool of MQTT clients that will publish messages to the linked EMQX broker.

      • TypeString
        Default"15s"
        Description

        MQTT Message retry interval. Delay for the link to retry sending the QoS1/QoS2 messages in case of ACK not received. Time interval is a string that contains a number followed by time unit:
        - ms for milliseconds,

        • s for seconds,
        • m for minutes,
        • h for hours;
          or combination of whereof: 1h5m0s
      • TypeInteger(0..+inf)
        Default32
        Description

        Max inflight (sent, but un-acked) messages of the MQTT protocol

      • TypeStruct(creation_opts)
        Default{}
        Description

        Resource options.

        • TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • TypeOneOf(String("infinity"),Duration)
          Description

          Deprecated since 5.1.0.

        • Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • TypeBoolean
          Description

          Deprecated since v5.0.14.

        • Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

  • log

    TypeStruct(log)
    Description

    EMQX provides support for two primary log handlers: file and console, with an additional audit handler specifically designed to always direct logs to files. The system's default log handling behavior can be configured via the environment variable EMQX_DEFAULT_LOG_HANDLER, which accepts the following settings:

    • file: Directs log output exclusively to files.
    • console: Channels log output solely to the console.

    It's noteworthy that EMQX_DEFAULT_LOG_HANDLER is set to file when EMQX is initiated via systemd's emqx.service file. In scenarios outside systemd initiation, console serves as the default log handler.

    log

    • console

      Aliasesconsole_handler
      TypeStruct(console_handler)

      console_handler

      • level

        TypeEnum(debug,info,notice,warning,error,critical,alert,emergency,all)
        Defaultwarning
        Description

        The log level for the current log handler. Defaults to warning.

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable this log handler.

      • formatter

        Aliasesformat
        TypeEnum(text,json)
        Defaulttext
        Description

        Choose log formatter. text for free text, and json for structured logging.

      • timestamp_format

        TypeEnum(auto,epoch,rfc3339)
        Defaultauto
        Description

        Pick a timestamp format:

        • auto: automatically choose the best format based on log formatter. epoch for JSON and rfc3339 for text.
        • epoch: Unix epoch time in microseconds.
        • rfc3339: RFC3339 format.
      • time_offset

        TypeString
        Defaultsystem
        Description

        The time offset to be used when formatting the timestamp. Can be one of:

        • system: the time offset used by the local system
        • utc: the UTC time offset
        • +-[hh]:[mm]: user specified time offset, such as "-02:00" or "+00:00" Defaults to: system. This config has no effect for when formatter is json as the timestamp in JSON is milliseconds since epoch.
      • payload_encode

        TypeEnum(hex,text,hidden)
        Defaulttext
        Description

        Determine the format of the payload format in the trace file.
        text: Text-based protocol or plain text protocol. It is recommended when payload is JSON encoded.
        hex: Binary hexadecimal encode. It is recommended when payload is a custom binary protocol.
        hidden: payload is obfuscated as ******

    • file

      Aliasesfile_handlers
      TypeOneOf(Struct(log_file_handler),Map($handler_name->Struct(log_file_handler)))
      Default{level = warning}
      Description

      File-based log handlers.

      log_file_handler

      • path

        Aliasesfile, to
        TypeString
        Default"${EMQX_LOG_DIR}/emqx.log"
        Description

        Name the log file.

      • rotation_count

        Aliasesrotation
        TypeInteger(1..128)
        Default10
        Description

        Maximum number of log files.

      • rotation_size

        Aliasesmax_size
        TypeOneOf(String("infinity"),Bytesize)
        Default"50MB"
        Description

        This parameter controls log file rotation. The value infinity means the log file will grow indefinitely, otherwise the log file will be rotated once it reaches rotation_size in bytes.

      • level

        TypeEnum(debug,info,notice,warning,error,critical,alert,emergency,all)
        Defaultwarning
        Description

        The log level for the current log handler. Defaults to warning.

      • formatter

        Aliasesformat
        TypeEnum(text,json)
        Defaulttext
        Description

        Choose log formatter. text for free text, and json for structured logging.

      • timestamp_format

        TypeEnum(auto,epoch,rfc3339)
        Defaultauto
        Description

        Pick a timestamp format:

        • auto: automatically choose the best format based on log formatter. epoch for JSON and rfc3339 for text.
        • epoch: Unix epoch time in microseconds.
        • rfc3339: RFC3339 format.
      • time_offset

        TypeString
        Defaultsystem
        Description

        The time offset to be used when formatting the timestamp. Can be one of:

        • system: the time offset used by the local system
        • utc: the UTC time offset
        • +-[hh]:[mm]: user specified time offset, such as "-02:00" or "+00:00" Defaults to: system. This config has no effect for when formatter is json as the timestamp in JSON is milliseconds since epoch.
      • payload_encode

        TypeEnum(hex,text,hidden)
        Defaulttext
        Description

        Determine the format of the payload format in the trace file.
        text: Text-based protocol or plain text protocol. It is recommended when payload is JSON encoded.
        hex: Binary hexadecimal encode. It is recommended when payload is a custom binary protocol.
        hidden: payload is obfuscated as ******

      log_file_handler

      • path

        Aliasesfile, to
        TypeString
        Default"${EMQX_LOG_DIR}/emqx.log"
        Description

        Name the log file.

      • rotation_count

        Aliasesrotation
        TypeInteger(1..128)
        Default10
        Description

        Maximum number of log files.

      • rotation_size

        Aliasesmax_size
        TypeOneOf(String("infinity"),Bytesize)
        Default"50MB"
        Description

        This parameter controls log file rotation. The value infinity means the log file will grow indefinitely, otherwise the log file will be rotated once it reaches rotation_size in bytes.

      • level

        TypeEnum(debug,info,notice,warning,error,critical,alert,emergency,all)
        Defaultwarning
        Description

        The log level for the current log handler. Defaults to warning.

      • formatter

        Aliasesformat
        TypeEnum(text,json)
        Defaulttext
        Description

        Choose log formatter. text for free text, and json for structured logging.

      • timestamp_format

        TypeEnum(auto,epoch,rfc3339)
        Defaultauto
        Description

        Pick a timestamp format:

        • auto: automatically choose the best format based on log formatter. epoch for JSON and rfc3339 for text.
        • epoch: Unix epoch time in microseconds.
        • rfc3339: RFC3339 format.
      • time_offset

        TypeString
        Defaultsystem
        Description

        The time offset to be used when formatting the timestamp. Can be one of:

        • system: the time offset used by the local system
        • utc: the UTC time offset
        • +-[hh]:[mm]: user specified time offset, such as "-02:00" or "+00:00" Defaults to: system. This config has no effect for when formatter is json as the timestamp in JSON is milliseconds since epoch.
      • payload_encode

        TypeEnum(hex,text,hidden)
        Defaulttext
        Description

        Determine the format of the payload format in the trace file.
        text: Text-based protocol or plain text protocol. It is recommended when payload is JSON encoded.
        hex: Binary hexadecimal encode. It is recommended when payload is a custom binary protocol.
        hidden: payload is obfuscated as ******

    • throttling

      TypeStruct(log_throttling)

      log_throttling

      • time_window

        TypeDuration(s)
        Default"1m"
        Description

        This configuration setting controls the logging behavior for throttled messages, including, but not limited to messages like 'authorization_permission_denied'. Within each defined time window, only one instance of a throttled message will be logged to prevent log flooding. At the conclusion of each time window, a summary log will be generated, detailing the occurrence of any throttled messages during that period. It's important to note that the shortest effective time window for this setting is 1 second (1s). Should a value lower than 1s be specified, it will automatically be adjusted to 1s.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • audit

      TypeStruct(log_audit_handler)
      Default{enable = false, level = info}
      Description

      Audit file-based log handler.

      log_audit_handler

      • path

        TypeString
        Default"${EMQX_LOG_DIR}/audit.log"
        Description

        Name the audit log file.

      • rotation_count

        TypeInteger(1..128)
        Default10
        Description

        Maximum number of log files.

      • rotation_size

        TypeOneOf(String("infinity"),Bytesize)
        Default"50MB"
        Description

        This parameter controls log file rotation. The value infinity means the log file will grow indefinitely, otherwise the log file will be rotated once it reaches rotation_size in bytes.

      • max_filter_size

        TypeInteger(10..30000)
        Default5000
        Description

        Store the latest N log entries in a database for allow /audit HTTP API to filter and retrieval of log data. The interval for purging redundant log records is maintained within a range of 10~20 seconds.

      • ignore_high_frequency_request

        TypeBoolean
        Defaulttrue
        Description

        Ignore high frequency requests to avoid flooding the audit log, such as publish/subscribe kick out http api requests are ignored.

      • timestamp_format

        TypeEnum(auto,epoch,rfc3339)
        Defaultauto
        Description

        Pick a timestamp format:

        • auto: automatically choose the best format based on log formatter. epoch for JSON and rfc3339 for text.
        • epoch: Unix epoch time in microseconds.
        • rfc3339: RFC3339 format.
      • time_offset

        TypeString
        Defaultsystem
        Description

        The time offset to be used when formatting the timestamp. Can be one of:

        • system: the time offset used by the local system
        • utc: the UTC time offset
        • +-[hh]:[mm]: user specified time offset, such as "-02:00" or "+00:00" Defaults to: system. This config has no effect for when formatter is json as the timestamp in JSON is milliseconds since epoch.
      • payload_encode

        TypeEnum(hex,text,hidden)
        Defaulttext
        Description

        Determine the format of the payload format in the trace file.
        text: Text-based protocol or plain text protocol. It is recommended when payload is JSON encoded.
        hex: Binary hexadecimal encode. It is recommended when payload is a custom binary protocol.
        hidden: payload is obfuscated as ******

  • rpc

    TypeStruct(rpc)

    rpc

    • mode

      TypeEnum(sync,async)
      Defaultasync
      Description

      In sync mode the sending side waits for the ack from the receiving side.

    • protocol

      Aliasesdriver
      TypeEnum(tcp,ssl)
      Defaulttcp
      Description

      Transport protocol used for inter-broker communication

    • async_batch_size

      TypeInteger
      Default256
      Description

      The maximum number of batch messages sent in asynchronous mode. Note that this configuration does not work in synchronous mode.

    • port_discovery

      TypeEnum(manual,stateless)
      Defaultstateless
      Description

      manual: discover ports by server_port.
      stateless: discover ports in a stateless manner, using the following algorithm. If node name is emqxN@127.0.0.1, where the N is an integer, then the listening port will be 5370 + N. NOTE: when port_discovery is manual, server_port configuration has no effect.

    • server_port

      Aliasestcp_server_port, ssl_server_port
      TypeInteger(1..+inf)
      Default5369
      Description

      Listening port used by RPC local service.
      Note that this config only takes effect when rpc.port_discovery is set to manual.

    • client_num

      Aliasestcp_client_num
      TypeInteger(1..256)
      Default10
      Description

      Set the maximum number of RPC communication channels initiated by this node to each remote node.

    • connect_timeout

      TypeDuration
      Default"5s"
      Description

      Timeout for establishing an RPC connection.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • certfile

      TypeString
      Description

      Path to TLS certificate file used to validate identity of the cluster nodes. Note that this config only takes effect when rpc.driver is set to ssl.

    • keyfile

      TypeString
      Description

      Path to the private key file for the rpc.certfile.
      Note: contents of this file are secret, so it's necessary to set permissions to 600.

    • cacertfile

      TypeString
      Description

      Path to certification authority TLS certificate file used to validate rpc.certfile.
      Note: certificates of all nodes in the cluster must be signed by the same CA.

    • send_timeout

      TypeDuration
      Default"5s"
      Description

      Timeout for sending the RPC request.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • authentication_timeout

      TypeDuration
      Default"5s"
      Description

      Timeout for the remote node authentication.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • call_receive_timeout

      TypeDuration
      Default"15s"
      Description

      Timeout for the reply to a synchronous RPC.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • socket_keepalive_idle

      TypeDuration(s)
      Default"15m"
      Description

      Corresponds to the TCP_KEEPIDLE socket option. The time (in seconds) the connection needs to remain idle before TCP starts sending keepalive probes.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • socket_keepalive_interval

      TypeDuration(s)
      Default"75s"
      Description

      Corresponds to the TCP_KEEPINTVL socket option. The time (in seconds) between individual keepalive probes.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • socket_keepalive_count

      TypeInteger
      Default9
      Description

      Corresponds to the TCP_KEEPCNT socket option. The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end.

    • socket_sndbuf

      TypeBytesize
      Default"1MB"
      Description

      TCP tuning parameters. TCP sending buffer size.
      A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • socket_recbuf

      TypeBytesize
      Default"1MB"
      Description

      TCP tuning parameters. TCP receiving buffer size.
      A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • socket_buffer

      TypeBytesize
      Default"1MB"
      Description

      TCP tuning parameters. Socket buffer size in user mode.
      A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • insecure_fallback

      TypeBoolean
      Defaulttrue
      Description

      Enable compatibility with old RPC authentication.

    • ciphers

      TypeArray(String)
      Default[]
      Description

      This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
      Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

      The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

      NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

      NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
      If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
      PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

    • tls_versions

      TypeArray(String)
      Default["tlsv1.3", "tlsv1.2"]
      Description

      All TLS/DTLS versions to be supported.
      NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
      In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

    • listen_address

      TypeString
      Default"0.0.0.0"
      Description

      Indicates the IP address for the RPC server to listen on. For example, use "0.0.0.0" for IPv4 or "::" for IPv6.

    • ipv6_only

      TypeBoolean
      Defaultfalse
      Description

      This setting is effective only when rpc.listen_address is assigned an IPv6 address. If set to true, the RPC client will exclusively use IPv6 for connections. Otherwise, the client might opt for IPv4, even if the server is on IPv6.

  • sys_topics

    TypeStruct(sys_topics)
    Description

    System topics configuration.

    sys_topics

    • sys_msg_interval

      TypeOneOf(String("disabled"),Duration)
      Default"1m"
      Description

      Time interval for publishing following system messages:

      • $SYS/brokers
      • $SYS/brokers/<node>/version
      • $SYS/brokers/<node>/sysdescr
      • $SYS/brokers/<node>/stats/<name>
      • $SYS/brokers/<node>/metrics/<name>
    • sys_heartbeat_interval

      TypeOneOf(String("disabled"),Duration)
      Default"30s"
      Description

      Time interval for publishing following heartbeat messages:

      • $SYS/brokers/<node>/uptime
      • $SYS/brokers/<node>/datetime
    • sys_event_messages

      TypeStruct(event_names)
      Description

      Client events messages.

      event_names

      • client_connected

        TypeBoolean
        Defaulttrue
        Description

        Enable to publish client connected event messages

      • client_disconnected

        TypeBoolean
        Defaulttrue
        Description

        Enable to publish client disconnected event messages.

      • client_subscribed

        TypeBoolean
        Defaultfalse
        Description

        Enable to publish event message that client subscribed a topic successfully.

      • client_unsubscribed

        TypeBoolean
        Defaultfalse
        Description

        Enable to publish event message that client unsubscribed a topic successfully.

  • force_shutdown

    TypeStruct(force_shutdown)

    force_shutdown

    • max_mailbox_size

      Aliasesmax_message_queue_len
      TypeInteger(0..inf)
      Default1000
      Description

      EMQX creates at least one lightweight process for each client connection.

      Each process has its own message queue (aka mailbox) to hold messages from other processes (e.g. MQTT messages) so that the process can read messages from the message queue (mailbox) at any time.

      If the system is busy or the process hangs due to a busy socket (see high_watermark), the message queue can accumulate many messages.

      To avoid excessive memory usage, EMQX will force a process to shut down when the length of its message queue exceeds max_mailbox_size.

    • max_heap_size

      TypeBytesize
      Default"32MB"
      Description

      The maximum heap size of the process. If the force_shutdown is enabled, processes that exceed this limit will automatically exit or be forcibly killed. Messages in the process message queue (mailbox) are also part of the heap. The shutdown of a process can be divided into the following two situations:

      • The process actively checks the current heap size during its own operation, and actively exits after finding that it exceeds the limit.
      • The underlying scheduling system checks the current heap size after performing garbage collection for the process, and forcibly kills the process after finding that it exceeds the limit.

      Note: The Error logs generated by the above two will be different. The log generated by the former is similar to ...errorContext: connection_shutdown, reason: #{max => 2097152, reason => proc_heap_too_large, value => 2787348}.., and the log generated by the latter is similar to ...Context: maximum heap size reached....
      A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

  • durable_storage

    TypeStruct(durable_storage)
    Description

    Configuration related to the EMQX durable storages.

    EMQX uses durable storages to offload various data, such as MQTT messages, to disc.

    durable_storage

    • messages

      TypeOneOf(Struct(builtin_raft),Struct(builtin_local))
      Default{backend = builtin_raft}
      Description

      Configuration related to the durable storage of MQTT messages.

      builtin_raft

      • backend

        TypeString("builtin_raft")
        Defaultbuiltin_raft
        Description

        Backend type.

      • replication_factor

        TypeInteger(1..+inf)
        Default3
        Description

        Number of identical replicas each shard should have. Increasing this number improves durability and availability at the expense of greater resource consumption. Quorum of replicas is needed to be healthy for the replication to work, hence an odd number of replicas is a good pick in general. Please note that it takes effect only during the initialization of the durable storage database. Changing this configuration parameter after the database has been already created won't take any effect.

      • n_sites

        TypeInteger(1..+inf)
        Default1
        Description

        Number of storage sites that need to share responsibility over the set of storage shards. In this context, sites are EMQX nodes with message durability enabled. Please note that it takes effect only during the initialization of the durable storage database. During this phase at least that many sites should come online to distribute shards between them, otherwise message storage will be unavailable until then. After the initialization is complete, sites may be offline, which will affect availability depending on the number of offline sites and replication factor.

      • data_dir

        TypeString
        Description

        File system directory where the database is located.

        By default, it is equal to node.data_dir.

      • n_shards

        TypeInteger(1..+inf)
        Default16
        Description

        The built-in durable storage partitions data into shards. This configuration parameter defines the number of shards. Please note that it takes effect only during the initialization of the durable storage database. Changing this configuration parameter after the database has been already created won't take any effect.

      • layout

        TypeOneOf(Struct(layout_builtin_wildcard_optimized_v2),Struct(layout_builtin_wildcard_optimized),Struct(layout_builtin_reference))
        Default{type = wildcard_optimized_v2}
        Description

        Storage layout is a method of arranging messages from various topics and clients on disc.

        Depending on the type of workload and the topic structure, different types of strategies for storing the data can be employed to maximize efficiency of reading messages from the durable storage.

        layout_builtin_wildcard_optimized_v2

        • type
          TypeString("wildcard_optimized_v2")
          Defaultwildcard_optimized_v2
          Description

          Wildcard-optimized layout type.

        layout_builtin_wildcard_optimized

        • type
          TypeString("wildcard_optimized")
          Defaultwildcard_optimized
          Description

          Wildcard-optimized layout type.

        layout_builtin_reference

        • type
          TypeString("reference")
          Defaultreference
          Description

          Reference layout type.

      builtin_local

      • backend

        TypeString("builtin_local")
        Defaultbuiltin_local
        Description

        Backend type.

      • data_dir

        TypeString
        Description

        File system directory where the database is located.

        By default, it is equal to node.data_dir.

      • n_shards

        TypeInteger(1..+inf)
        Default16
        Description

        The built-in durable storage partitions data into shards. This configuration parameter defines the number of shards. Please note that it takes effect only during the initialization of the durable storage database. Changing this configuration parameter after the database has been already created won't take any effect.

      • layout

        TypeOneOf(Struct(layout_builtin_wildcard_optimized_v2),Struct(layout_builtin_wildcard_optimized),Struct(layout_builtin_reference))
        Default{type = wildcard_optimized_v2}
        Description

        Storage layout is a method of arranging messages from various topics and clients on disc.

        Depending on the type of workload and the topic structure, different types of strategies for storing the data can be employed to maximize efficiency of reading messages from the durable storage.

        layout_builtin_wildcard_optimized_v2

        • type
          TypeString("wildcard_optimized_v2")
          Defaultwildcard_optimized_v2
          Description

          Wildcard-optimized layout type.

        layout_builtin_wildcard_optimized

        • type
          TypeString("wildcard_optimized")
          Defaultwildcard_optimized
          Description

          Wildcard-optimized layout type.

        layout_builtin_reference

        • type
          TypeString("reference")
          Defaultreference
          Description

          Reference layout type.

  • force_gc

    TypeStruct(force_gc)

    force_gc

    • count

      TypeInteger(0..inf)
      Default16000
      Description

      GC the process after this many received messages.

    • bytes

      TypeBytesize
      Default"16MB"
      Description

      GC the process after specified number of bytes have passed through.
      A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

  • sysmon

    TypeStruct(sysmon)

    sysmon

    • vm

      TypeStruct(sysmon_vm)

      sysmon_vm

      • process_check_interval

        TypeDuration
        Default"30s"
        Description

        The time interval for the periodic process count limit check, used together with process_high_watermark and process_low_watermark.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • process_high_watermark

        TypeString
        Default"80%"
        Description

        The threshold, as percentage of processes, for how many processes can simultaneously exist at the local node before the corresponding alarm is raised.

      • process_low_watermark

        TypeString
        Default"60%"
        Description

        The threshold, as percentage of processes, for how many processes can simultaneously exist at the local node before the corresponding alarm is cleared.

      • long_gc

        TypeOneOf(String("disabled"),Duration)
        Defaultdisabled
        Description

        When an Erlang process spends long time to perform garbage collection, a warning level long_gc log is emitted, and an MQTT message is published to the system topic $SYS/sysmon/long_gc.

      • long_schedule

        TypeOneOf(String("disabled"),Duration)
        Default"240ms"
        Description

        When the Erlang VM detect a task scheduled for too long, a warning level 'long_schedule' log is emitted, and an MQTT message is published to the system topic $SYS/sysmon/long_schedule.

      • large_heap

        TypeOneOf(String("disabled"),Bytesize)
        Default"32MB"
        Description

        When the heap memory occupied by a process exceeds the size specified by large_heap, the system will write a warning level large_heap log, and an MQTT message will be published to the system topic $SYS/sysmon/large_heap.

      • busy_dist_port

        TypeBoolean
        Defaulttrue
        Description

        When the RPC connection used to communicate with other nodes in the cluster is overloaded, there will be a busy_dist_port warning log, and an MQTT message is published to system topic $SYS/sysmon/busy_dist_port.

      • busy_port

        TypeBoolean
        Defaulttrue
        Description

        When a port (e.g. TCP socket) is overloaded, there will be a busy_port warning log, and an MQTT message is published to the system topic $SYS/sysmon/busy_port.

    • os

      TypeStruct(sysmon_os)

      sysmon_os

      • cpu_check_interval

        TypeDuration
        Default"60s"
        Description

        The time interval for the periodic CPU check. Disabled on Windows platform.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • cpu_high_watermark

        TypeString
        Default"80%"
        Description

        The threshold, as percentage of system CPU load, for how much system cpu can be used before the corresponding alarm is raised. Disabled on Windows platform

      • cpu_low_watermark

        TypeString
        Default"60%"
        Description

        The threshold, as percentage of system CPU load, for how much system cpu can be used before the corresponding alarm is cleared. Disabled on Windows platform

      • mem_check_interval

        TypeOneOf(String("disabled"),Duration)
        Default"60s"
        Description

        The time interval for the periodic memory check. Disabled on Windows platform.

      • sysmem_high_watermark

        TypeString
        Default"70%"
        Description

        The threshold, as percentage of system memory, for how much system memory can be allocated before the corresponding alarm is raised. Disabled on Windows platform

      • procmem_high_watermark

        TypeString
        Default"5%"
        Description

        The threshold, as percentage of system memory, for how much system memory can be allocated by one Erlang process before the corresponding alarm is raised. Disabled on Windows platform.

  • alarm

    TypeStruct(alarm)

    alarm

    • actions

      TypeArray(Enum(log,publish))
      Default[log, publish]
      Description

      The actions triggered when the alarm is activated.
      Currently, the following actions are supported: log and publish. log is to write the alarm to log (console or file). publish is to publish the alarm as an MQTT message to the system topics: $SYS/brokers/emqx@xx.xx.xx.x/alarms/activate and $SYS/brokers/emqx@xx.xx.xx.x/alarms/deactivate

    • size_limit

      TypeInteger(1..3000)
      Default1000
      Description

      The maximum number of historical alarms that can be stored.

      When the maximum number is reached, the oldest historical alarms will be deleted to store new historical alarms.

    • validity_period

      TypeDuration
      Default"24h"
      Description

      The validity period of historical alarms. Calculated from the time of activation of the historical alarm instead of the time of cancelation.

      If it exists longer than the validity period, the alarm will be deleted.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

  • flapping_detect

    TypeStruct(flapping_detect)

    flapping_detect

    • enable

      TypeBoolean
      Defaultfalse
      Description

      Enable flapping connection detection feature.

    • window_time

      TypeDuration
      Default"1m"
      Description

      The time window for flapping detection.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • max_count

      TypeInteger(0..+inf)
      Default15
      Description

      The maximum number of disconnects allowed for a MQTT Client in window_time

    • ban_time

      TypeDuration
      Default"5m"
      Description

      How long the flapping clientid will be banned.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

  • durable_sessions

    TypeStruct(durable_sessions)

    durable_sessions

    • enable

      TypeBoolean
      Defaultfalse
      Description

      Use durable storage for client sessions persistence. If enabled, sessions configured to outlive client connections, along with their corresponding messages, will be durably stored and survive broker downtime.

      :::warning Messages sent to the durable sessions are saved on disc. This inevitably limits the overall throughput of the system. :::

    • batch_size

      TypeInteger(1..+inf)
      Default100
      Description

      This value affects the flow control for the persistent sessions. Persistent session queries the durable message storage in batches. This value specifies size of the batch.

      Note: larger batches generally improve the throughput and overall performance of the system, but increase RAM usage per client.

    • idle_poll_interval

      TypeDuration
      Default"10s"
      Description

      Expiry interval for poll requests sent by durable sessions to the storage.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • heartbeat_interval

      TypeDuration
      Default"5000ms"
      Description

      Durable sessions back up their state on disc every heartbeat interval.

      Heartbeat interval is also taken into account during garbage collection of expired sessions. It is added to the session expiry time as a safety margin when precise time of session termination is not precisely known.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • session_gc_interval

      TypeDuration
      Default"10m"
      Description

      The interval at which session garbage collection is executed for persistent sessions.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • session_gc_batch_size

      TypeInteger(1..+inf)
      Default100
      Description

      The size of each batch of expired persistent sessions to be garbage collected per iteration.

    • message_retention_period

      TypeDuration
      Default"1d"
      Description

      Broker keeps messages sent to the durable sessions for this period of time.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

  • connectors

    TypeStruct(connectors)

    connectors

    • kafka_consumer

      TypeMap($name->Struct(config_connector))
      Description

      Kafka Consumer Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • bootstrap_hosts

        TypeString
        Description

        A comma separated list of Kafka host:port endpoints to bootstrap the client.

      • connect_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time for TCP connection establishment (including authentication time if enabled).
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • min_metadata_refresh_interval

        TypeDuration
        Default"3s"
        Description

        Minimum time interval the client has to wait before refreshing Kafka broker and topic metadata. Setting too small value may add extra load on Kafka.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • metadata_request_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time when fetching topic metadata.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • authentication

        TypeOneOf(String("none"),Struct(auth_username_password),Struct(auth_gssapi_kerberos))
        Defaultnone
        Description

        Authentication configs.

        auth_username_password

        • mechanism
          TypeEnum(plain,scram_sha_256,scram_sha_512)
          Description

          SASL authentication mechanism.

        • username
          TypeString
          Description

          SASL authentication username.

        • password
          TypeSecret
          Description

          SASL authentication password.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        auth_gssapi_kerberos

        • kerberos_principal
          TypeString
          Description

          SASL GSSAPI authentication Kerberos principal. For example kafka/node1.example.com@EXAMPLE.COM, NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes.

        • kerberos_keytab_file
          TypeString
          Description

          SASL GSSAPI authentication Kerberos keytab file path. NOTE: This file has to be placed in EMQX nodes, and the EMQX service runner user requires read permission.

      • socket_opts

        TypeStruct(socket_opts)
        Description

        Extra socket options.

        socket_opts

        • sndbuf
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket send buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • recbuf
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket receive buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          When set to 'true', TCP buffer is sent as soon as possible. Otherwise, the OS kernel may buffer small TCP packets for a while (40 ms by default).

        • tcp_keepalive
          TypeString
          Defaultnone
          Description

          Enable TCP keepalive. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

          • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
          • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
          • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: TCP keepalive probes are sent after the connection is idle for 240 seconds, and the probes are sent every 30 seconds until a response is received, if it misses 5 consecutive responses, the connection should be closed. Default: 'none'
      • health_check_topic

        TypeString
        Description

        Topic name used exclusively for more accurate connector health checks.

      • ssl

        TypeStruct(ssl_client_opts)

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("auto"),String("disable"),String)
          Defaultauto
          Description

          Server Name Indication (SNI) setting for TLS handshake.

          • auto: Allow the client to automatically determine the appropriate SNI.
          • disable: If you wish to prevent the client from sending the SNI.
          • Other string values will be sent as-is.
      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • kinesis

      TypeMap($name->Struct(config_connector))
      Description

      Kinesis Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • aws_access_key_id

        TypeString
        Description

        Access Key ID for connecting to Amazon Kinesis.

      • aws_secret_access_key

        TypeSecret
        Description

        AWS Secret Access Key for connecting to Amazon Kinesis.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • endpoint

        TypeString
        Description

        The url of Amazon Kinesis endpoint.

      • max_retries

        TypeInteger(0..+inf)
        Default2
        Description

        Max retry times if an error occurs when sending a request.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • rocketmq

      TypeMap($name->Struct(config_connector))
      Description

      RocketMQ Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • servers

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The RocketMQ default port 9876 is used if [:Port] is not specified.

      • namespace

        TypeString
        Description

        The namespace field MUST be set if you are using the RocketMQ service in aliyun cloud and also the namespace is enabled, or if you have configured a namespace in your RocketMQ server. For RocketMQ in aliyun cloud, the namespace is the instance ID.

      • access_key

        TypeString
        Default""
        Description

        RocketMQ server accessKey.

      • secret_key

        TypeSecret
        Default""
        Description

        RocketMQ server secretKey.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • security_token

        TypeSecret
        Default""
        Description

        RocketMQ Server Security Token
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • rabbitmq

      TypeMap($name->Struct(config_connector))
      Description

      RabbitMQ Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Defaultlocalhost
        Description

        The RabbitMQ server address that you want to connect to (for example, localhost).

      • port

        TypeInteger(1..65535)
        Default5672
        Description

        The RabbitMQ server address that you want to connect to (for example, localhost).

      • username

        TypeString
        Description

        The username used to authenticate with the RabbitMQ server.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The size of the connection pool.

      • timeout

        TypeDuration
        Default"5s"
        Description

        The timeout for waiting on the connection to be established.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • virtual_host

        TypeString
        Default"/"
        Description

        The virtual host to use when connecting to the RabbitMQ server.

      • heartbeat

        TypeDuration
        Default"30s"
        Description

        The interval for sending heartbeat messages to the RabbitMQ server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • mysql

      TypeMap($name->Struct(config_connector))
      Description

      MySQL Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The MySQL default port 3306 is used if [:Port] is not specified.

      • database

        TypeString
        Description

        Database name.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Defaultroot
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • dynamo

      TypeMap($name->Struct(config_connector))
      Description

      DynamoDB Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • url

        TypeString
        Description

        The url of DynamoDB endpoint.

      • region

        TypeString
        Description

        Region of AWS Dynamo

      • aws_access_key_id

        TypeString
        Description

        Access Key ID for connecting to DynamoDB.

      • aws_secret_access_key

        TypeSecret
        Description

        AWS Secret Access Key for connecting to DynamoDB.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • cassandra

      TypeMap($name->Struct(config_connector))
      Description

      Cassandra Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • servers

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port][,Host2:Port].
        The Cassandra default port 9042 is used if [:Port] is not specified.

      • keyspace

        TypeString
        Description

        Keyspace name to connect to.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • sqlserver

      TypeMap($name->Struct(config_connector))
      Description

      Microsoft SQL Server Connector Config

      config_connector

      • driver

        TypeString
        Default"ms-sql"
        Description

        SQL Server Driver Name

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The SQL Server default port 1433 is used if [:Port] is not specified.

      • database

        TypeString
        Description

        Database name.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Defaultsa
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • redis

      TypeMap($name->Struct(config_connector))
      Description

      Redis Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • parameters

        TypeOneOf(Struct(redis_single_connector),Struct(redis_sentinel_connector),Struct(redis_cluster_connector))
        Description

        Set of parameters specific for the given type of this Redis connector, redis_type can be one of single, cluster or sentinel.

        redis_single_connector

        • server
          TypeString
          Description

          The IPv4 or IPv6 address or the hostname to connect to.
          A host entry has the following form: Host[:Port].
          The Redis default port 6379 is used if [:Port] is not specified.

        • redis_type
          TypeString("single")
          Defaultsingle
          Description

          Single mode. Must be set to 'single' when Redis server is running in single mode.

        • pool_size
          TypeInteger(1..+inf)
          Default8
          Description

          Size of the connection pool towards the bridge target service.

        • username
          TypeString
          Description

          The username associated with the bridge in the external database used for authentication or identification purposes.

        • password
          TypeSecret
          Description

          The password associated with the bridge, used for authentication with the external database.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • database
          TypeInteger(0..+inf)
          Default0
          Description

          Redis database ID.

        • auto_reconnect
          TypeBoolean
          Description

          Deprecated since v5.0.15.

        redis_sentinel_connector

        • servers
          TypeString
          Description

          A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The Redis default port 6379 is used if [:Port] is not specified.

        • redis_type
          TypeString("sentinel")
          Defaultsentinel
          Description

          Sentinel mode. Must be set to 'sentinel' when Redis server is running in sentinel mode.

        • sentinel
          TypeString
          Description

          The cluster name in Redis sentinel mode.

        • pool_size
          TypeInteger(1..+inf)
          Default8
          Description

          Size of the connection pool towards the bridge target service.

        • username
          TypeString
          Description

          The username associated with the bridge in the external database used for authentication or identification purposes.

        • password
          TypeSecret
          Description

          The password associated with the bridge, used for authentication with the external database.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • database
          TypeInteger(0..+inf)
          Default0
          Description

          Redis database ID.

        • auto_reconnect
          TypeBoolean
          Description

          Deprecated since v5.0.15.

        redis_cluster_connector

        • servers
          TypeString
          Description

          A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The Redis default port 6379 is used if [:Port] is not specified.

        • redis_type
          TypeString("cluster")
          Defaultcluster
          Description

          Cluster mode. Must be set to 'cluster' when Redis server is running in clustered mode.

        • pool_size
          TypeInteger(1..+inf)
          Default8
          Description

          Size of the connection pool towards the bridge target service.

        • username
          TypeString
          Description

          The username associated with the bridge in the external database used for authentication or identification purposes.

        • password
          TypeSecret
          Description

          The password associated with the bridge, used for authentication with the external database.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • auto_reconnect
          TypeBoolean
          Description

          Deprecated since v5.0.15.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • azure_blob_storage

      TypeMap($name->Struct(config_connector))
      Description

      Azure Blob Storage Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • account_name

        TypeString
        Description

        Account name for Azure Blob Storage service.

      • account_key

        TypeSecret
        Description

        Account key for Azure Blob Storage service.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}
        Description

        Resource options.

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • hstreamdb

      TypeMap($name->Struct(config_connector))
      Description

      HStreamDB Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • url

        TypeString
        Default"http://127.0.0.1:6570"
        Description

        HStreamDB Server URL. This URL will be used as the gRPC HTTP server address.

      • grpc_timeout

        TypeDuration
        Default"30s"
        Description

        The timeout for HStreamDB gRPC requests.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • elasticsearch

      TypeMap($name->Struct(config))
      Description

      ElasticSearch Connector Config

      config

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the HTTP server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pool_type

        TypeEnum(random,hash)
        Defaultrandom
        Description

        The type of the pool. Can be one of random, hash.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • enable_pipelining

        TypeInteger(1..+inf)
        Default100
        Description

        The maximum number of HTTP requests that can be sent before an HTTP response is received.

        Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • server

        TypeString
        Default"127.0.0.1:9200"
        Description

        The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The Elasticsearch default port 9200 is used if [:Port] is not specified.

      • authentication

        TypeOneOf(Struct(auth_basic))
        Description

        Authentication configuration

        auth_basic

        • username
          TypeString
          Description

          The username as configured at the ElasticSearch REST interface

        • password
          TypeSecret
          Description

          The password as configured at the ElasticSearch REST interface
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • couchbase

      TypeMap($name->Struct(config_connector))
      Description

      Couchbase Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The Couchbase default query service port 8093 is used if [:Port] is not specified.

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the HTTP server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pipelining

        TypeInteger(1..+inf)
        Default100
        Description

        A positive integer. Whether to send HTTP requests continuously, when set to 1, it means that after each HTTP request is sent, you need to wait for the server to return and then continue to send the next request.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • username

        TypeString
        Description

        Username for Couchbase service.

      • password

        TypeSecret
        Description

        Password for Couchbase service.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}
        Description

        Resource options.

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • azure_event_hub_producer

      TypeMap($name->Struct(config_connector))
      Description

      Azure Event Hub Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • bootstrap_hosts

        TypeString
        Description

        A comma separated list of Azure Event Hubs Kafka host[:port] namespace endpoints to bootstrap the client. Default port number is 9093.

      • connect_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time for TCP connection establishment (including authentication time if enabled).
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • min_metadata_refresh_interval

        TypeDuration
        Default"3s"
        Description

        Minimum time interval the client has to wait before refreshing Azure Event Hubs Kafka broker and topic metadata. Setting too small value may add extra load on Azure Event Hubs.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • metadata_request_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time when fetching metadata from Azure Event Hubs.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • authentication

        TypeStruct(auth_username_password)
        Default{}
        Description

        Authentication configs.

        auth_username_password

        • password
          TypeSecret
          Description

          The Connection String for connecting to Azure Event Hubs. Should be the "connection string-primary key" of a Namespace shared access policy.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • socket_opts

        TypeStruct(socket_opts)
        Description

        Extra socket options.

        socket_opts

        • sndbuf
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket send buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • recbuf
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket receive buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          When set to 'true', TCP buffer is sent as soon as possible. Otherwise, the OS kernel may buffer small TCP packets for a while (40 ms by default).

        • tcp_keepalive
          TypeString
          Defaultnone
          Description

          Enable TCP keepalive. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

          • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
          • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
          • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: TCP keepalive probes are sent after the connection is idle for 240 seconds, and the probes are sent every 30 seconds until a response is received, if it misses 5 consecutive responses, the connection should be closed. Default: 'none'
      • health_check_topic

        TypeString
        Description

        Topic name used exclusively for more accurate connector health checks.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = true}

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeString("true")
          Defaulttrue
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("auto"),String("disable"),String)
          Defaultauto
          Description

          Server Name Indication (SNI) setting for TLS handshake.

          • auto: The client will use "servicebus.windows.net" as SNI.
          • disable: If you wish to prevent the client from sending the SNI.
          • Other string values it will be sent as-is.
      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • datalayers

      TypeMap($name->Struct(config_connector))
      Description

      Datalayers Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Default"127.0.0.1:8361"
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The Datalayers default port 8361 is used if [:Port] is not specified.

      • pool_size

        TypeInteger
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • parameters

        TypeOneOf(Struct(datalayers_influxdb_v1_parameters))
        Description

        Set of parameters specific for the given type of this Datalayers connector.

        datalayers_influxdb_v1_parameters

        • driver_type
          TypeEnum(influxdb_v1)
          Defaultinfluxdb_v1
          Description

          The Driver used to communicate with Datalayers service.

        • database
          TypeString
          Description

          Datalayers database.

        • username
          TypeString
          Description

          Datalayers username.

        • password
          TypeSecret
          Description

          Datalayers password.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • iotdb

      TypeMap($name->OneOf(Struct(config_restapi),Struct(config_thrift)))
      Description

      IoTDB Connector Config

      config_restapi

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the HTTP server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pool_type

        TypeEnum(random,hash)
        Defaultrandom
        Description

        The type of the pool. Can be one of random, hash.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • enable_pipelining

        TypeInteger(1..+inf)
        Default100
        Description

        The maximum number of HTTP requests that can be sent before an HTTP response is received.

        Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • driver

        TypeEnum(restapi)
        Defaultrestapi
        Description

        The drivers for IoTDB connector, can be:

        • rest
        • thrift
      • base_url

        TypeString
        Description

        The base URL of the external IoTDB service's REST interface.

      • iotdb_version

        TypeEnum(v1.3.x,v1.1.x,v1.0.x,v0.13.x)
        Default"v1.3.x"
        Description

        The version of the IoTDB system to connect to.

      • authentication

        TypeOneOf(Struct(authentication))
        Defaultauth_basic
        Description

        Authentication configuration

        authentication

        • username
          TypeString
          Description

          The username as configured at the IoTDB REST/Thrift interface

        • password
          TypeSecret
          Description

          The password as configured at the IoTDB/Thrift REST interface
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      config_thrift

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • driver

        TypeEnum(thrift)
        Defaultrestapi
        Description

        The drivers for IoTDB connector, can be:

        • rest
        • thrift
      • server

        TypeString
        Description

        The address of the IoTDB Thrift server (host:port)

      • protocol_version

        TypeEnum(protocol_v1,protocol_v2,protocol_v3)
        Defaultprotocol_v3
        Description

        The version of IoTDB Thrift protocol

      • zoneId

        TypeString
        Default"Asia/Shanghai"
        Description

        Timezone for IoTDB Thrift session

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size for the IoTDB Thrift connection pool

      • connect_timeout

        TypeDuration
        Default"10s"
        Description

        Timeout for connecting to the IoTDB Thrift server
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • recv_timeout

        TypeDuration
        Default"10s"
        Description

        Timeout for IoTDB Thrift server response
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • username

        TypeString
        Description

        The username as configured at the IoTDB REST/Thrift interface

      • password

        TypeSecret
        Description

        The password as configured at the IoTDB/Thrift REST interface
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • gcp_pubsub_consumer

      TypeMap($name->Struct(config_connector))
      Description

      GCP PubSub Consumer Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the HTTP server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • pipelining

        TypeInteger(1..+inf)
        Default100
        Description

        A positive integer. Whether to send HTTP requests continuously, when set to 1, it means that after each HTTP request is sent, you need to wait for the server to return and then continue to send the next request.

      • max_retries

        TypeInteger(0..+inf)
        Default2
        Description

        Max retry times if an error occurs when sending a request.

      • request_timeout

        TypeDuration
        Description

        Deprecated since e5.0.1.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • service_account_json

        TypeString
        Description

        JSON containing the GCP Service Account credentials to be used with PubSub. When a GCP Service Account is created (as described in https://developers.google.com/identity/protocols/oauth2/service-account#creatinganaccount), you have the option of downloading the credentials in JSON form. That's the file needed.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • greptimedb

      TypeMap($name->Struct(config_connector))
      Description

      GreptimeDB Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Default"127.0.0.1:4001"
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The GreptimeDB default port 8086 is used if [:Port] is not specified.

      • dbname

        TypeString
        Description

        GreptimeDB database.

      • username

        TypeString
        Description

        GreptimeDB username.

      • password

        TypeSecret
        Description

        GreptimeDB password.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • kafka_producer

      TypeMap($name->Struct(config_connector))
      Description

      Kafka Producer Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • bootstrap_hosts

        TypeString
        Description

        A comma separated list of Kafka host:port endpoints to bootstrap the client.

      • connect_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time for TCP connection establishment (including authentication time if enabled).
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • min_metadata_refresh_interval

        TypeDuration
        Default"3s"
        Description

        Minimum time interval the client has to wait before refreshing Kafka broker and topic metadata. Setting too small value may add extra load on Kafka.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • metadata_request_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time when fetching topic metadata.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • authentication

        TypeOneOf(String("none"),Struct(auth_username_password),Struct(auth_gssapi_kerberos))
        Defaultnone
        Description

        Authentication configs.

        auth_username_password

        • mechanism
          TypeEnum(plain,scram_sha_256,scram_sha_512)
          Description

          SASL authentication mechanism.

        • username
          TypeString
          Description

          SASL authentication username.

        • password
          TypeSecret
          Description

          SASL authentication password.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        auth_gssapi_kerberos

        • kerberos_principal
          TypeString
          Description

          SASL GSSAPI authentication Kerberos principal. For example kafka/node1.example.com@EXAMPLE.COM, NOTE: The realm in use has to be configured in /etc/krb5.conf in EMQX nodes.

        • kerberos_keytab_file
          TypeString
          Description

          SASL GSSAPI authentication Kerberos keytab file path. NOTE: This file has to be placed in EMQX nodes, and the EMQX service runner user requires read permission.

      • socket_opts

        TypeStruct(socket_opts)
        Description

        Extra socket options.

        socket_opts

        • sndbuf
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket send buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • recbuf
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket receive buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          When set to 'true', TCP buffer is sent as soon as possible. Otherwise, the OS kernel may buffer small TCP packets for a while (40 ms by default).

        • tcp_keepalive
          TypeString
          Defaultnone
          Description

          Enable TCP keepalive. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

          • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
          • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
          • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: TCP keepalive probes are sent after the connection is idle for 240 seconds, and the probes are sent every 30 seconds until a response is received, if it misses 5 consecutive responses, the connection should be closed. Default: 'none'
      • health_check_topic

        TypeString
        Description

        Topic name used exclusively for more accurate connector health checks.

      • ssl

        TypeStruct(ssl_client_opts)

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("auto"),String("disable"),String)
          Defaultauto
          Description

          Server Name Indication (SNI) setting for TLS handshake.

          • auto: Allow the client to automatically determine the appropriate SNI.
          • disable: If you wish to prevent the client from sending the SNI.
          • Other string values will be sent as-is.
      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • syskeeper_proxy

      TypeMap($name->Struct(config))
      Description

      Syskeeper Proxy Connector Config

      config

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • listen

        TypeString
        Description

        The listening address for this Syskeeper proxy server

      • acceptors

        TypeInteger(0..+inf)
        Default16
        Description

        The number of the acceptors

      • handshake_timeout

        TypeDuration
        Default"10s"
        Description

        The maximum to wait for the handshake when a connection is created
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • pulsar

      TypeMap($name->Struct(config_connector))
      Description

      Pulsar Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • servers

        TypeString
        Description

        A comma separated list of Pulsar URLs in the form scheme://host[:port] for the client to connect to. The supported schemes are pulsar:// (default) and pulsar+ssl://. The default port is 6650.

      • authentication

        TypeOneOf(String("none"),Struct(auth_basic),Struct(auth_token))
        Defaultnone
        Description

        Authentication configs.

        auth_basic

        • username
          TypeString
          Description

          Basic authentication username. The username part of the username:password authentication string.

        • password
          TypeSecret
          Description

          Basic authentication password. The password part of the username:password authentication string.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        auth_token

        • jwt
          TypeSecret
          Description

          JWT authentication token.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • connect_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time for TCP connection establishment (including authentication time if enabled).
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • gcp_pubsub_producer

      TypeMap($name->Struct(config_connector))
      Description

      GCP PubSub Producer Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the HTTP server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • pipelining

        TypeInteger(1..+inf)
        Default100
        Description

        A positive integer. Whether to send HTTP requests continuously, when set to 1, it means that after each HTTP request is sent, you need to wait for the server to return and then continue to send the next request.

      • max_retries

        TypeInteger(0..+inf)
        Default2
        Description

        Max retry times if an error occurs when sending a request.

      • request_timeout

        TypeDuration
        Description

        Deprecated since e5.0.1.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • service_account_json

        TypeString
        Description

        JSON containing the GCP Service Account credentials to be used with PubSub. When a GCP Service Account is created (as described in https://developers.google.com/identity/protocols/oauth2/service-account#creatinganaccount), you have the option of downloading the credentials in JSON form. That's the file needed.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • s3

      TypeMap($name->Struct(config_connector))
      Description

      S3 Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • access_key_id

        TypeString
        Description

        The access key ID of the S3 bucket.

      • secret_access_key

        TypeSecret
        Description

        The secret access key of the S3 bucket.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • host

        TypeString
        Description

        The host of the S3 endpoint.

      • port

        TypeInteger(1..+inf)
        Description

        The port of the S3 endpoint.

      • access_method

        TypeEnum(path,vhost)
        Defaultpath
        Description

        Method to be used to access the bucket through HTTP API.

      • transport_options

        TypeStruct(transport_options)
        Description

        Options for the HTTP transport layer used by the S3 client.

        transport_options

        • ipv6_probe
          TypeBoolean
          Defaultfalse
          Description

          Whether to probe for IPv6 support.

        • connect_timeout
          TypeDuration
          Default"15s"
          Description

          The timeout when connecting to the HTTP server.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • pool_size
          TypeInteger(1..+inf)
          Default8
          Description

          The pool size.

        • enable_pipelining
          TypeInteger(1..+inf)
          Description

          Deprecated since 5.8.2.

        • ssl
          TypeStruct(ssl_client_opts)
          Default{enable = false}
          Description

          SSL connection settings.

          ssl_client_opts

          • cacertfile
            TypeString
            Description

            Trusted PEM format CA certificates bundle file.
            The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
            NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

          • cacerts
            TypeBoolean
            Description

            Deprecated since 5.1.4.

          • certfile
            TypeString
            Description

            PEM format certificates chain file.
            The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

          • keyfile
            TypeString
            Description

            PEM format private key file.

          • verify
            TypeEnum(verify_peer,verify_none)
            Defaultverify_none
            Description

            Enable or disable peer verification.

          • reuse_sessions
            TypeBoolean
            Defaulttrue
            Description

            Enable TLS session reuse.
            Has no effect when TLS version is configured (or negotiated) to 1.3

          • depth
            TypeInteger(0..+inf)
            Default10
            Description

            Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
            if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
            if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

          • password
            TypeSecret
            Description

            String containing the user's password. Only used if the private key file is password-protected.
            A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

          • versions
            TypeArray(String)
            Default["tlsv1.3", "tlsv1.2"]
            Description

            All TLS/DTLS versions to be supported.
            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
            In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

          • ciphers
            TypeArray(String)
            Default[]
            Description

            This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
            Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

            The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

            NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
            If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
            PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

          • secure_renegotiate
            TypeBoolean
            Defaulttrue
            Description

            Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

            By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

            Has no effect when TLS version is configured (or negotiated) to 1.3.

          • log_level
            TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
            Defaultnotice
            Description

            The minimum level of logging allowed for SSL output.

            The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

          • hibernate_after
            TypeDuration
            Default"5s"
            Description

            Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

            The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • partial_chain
            TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
            Description

            Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

          • verify_peer_ext_key_usage
            TypeString
            Description

            Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

            Allowed values are

            • clientAuth
            • serverAuth
            • codeSigning
            • emailProtection
            • timeStamping
            • ocspSigning
            • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

            Comma-separated string is also supported for validating more than one key usages.

            For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

          • enable
            TypeBoolean
            Defaultfalse
            Description

            Enable TLS.

          • server_name_indication
            TypeOneOf(String("disable"),String)
            Description

            Specify the host name to be used in TLS Server Name Indication extension.
            For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
            If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
            The host name is then also used in the host name verification of the peer certificate.
            The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

        • headers
          TypeMap
          Description

          List of HTTP headers.

        • max_retries
          TypeInteger(0..+inf)
          Description

          Max retry times if error on sending request.

        • request_timeout
          TypeDuration
          Description

          HTTP request timeout.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • resource_opts

        TypeStruct(s3_connector_resource_opts)
        Default{}
        Description

        Resource options.

        s3_connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • mongodb

      TypeMap($name->Struct(config_connector))
      Description

      MongoDB Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • parameters

        TypeOneOf(Struct(connector_single),Struct(connector_sharded),Struct(connector_rs))
        Description

        Set of parameters specific for the given type of this MongoDB connector, mongo_type can be one of single (Standalone), sharded (Sharded) or rs (Replica Set).

        connector_single

        • mongo_type
          TypeString("single")
          Defaultsingle
          Description

          Standalone instance. Must be set to 'single' when MongoDB server is running in standalone mode.

        • server
          TypeString
          Description

          The IPv4 or IPv6 address or the hostname to connect to.
          A host entry has the following form: Host[:Port].
          The MongoDB default port 27017 is used if [:Port] is not specified.

        • w_mode
          TypeEnum(unsafe,safe)
          Defaultunsafe
          Description

          Write mode.

        connector_sharded

        • mongo_type
          TypeString("sharded")
          Defaultsharded
          Description

          Sharded cluster. Must be set to 'sharded' when MongoDB server is running in 'sharded' mode.

        • servers
          TypeString
          Description

          A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The MongoDB default port 27017 is used if [:Port] is not specified.

        • w_mode
          TypeEnum(unsafe,safe)
          Defaultunsafe
          Description

          Write mode.

        connector_rs

        • mongo_type
          TypeString("rs")
          Defaultrs
          Description

          Replica set. Must be set to 'rs' when MongoDB server is running in 'replica set' mode.

        • servers
          TypeString
          Description

          A Node list for Cluster to connect to. The nodes should be separated with commas, such as: Node[,Node]. For each Node should be: The IPv4 or IPv6 address or the hostname to connect to. A host entry has the following form: Host[:Port]. The MongoDB default port 27017 is used if [:Port] is not specified.

        • w_mode
          TypeEnum(unsafe,safe)
          Defaultunsafe
          Description

          Write mode.

        • r_mode
          TypeEnum(master,slave_ok)
          Defaultmaster
          Description

          Read mode.

        • replica_set_name
          TypeString
          Description

          Name of the replica set.

      • srv_record

        TypeBoolean
        Defaultfalse
        Description

        Use DNS SRV record.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • use_legacy_protocol

        TypeEnum(auto,true,false)
        Defaultauto
        Description

        Whether to use MongoDB's legacy protocol for communicating with the database. The default is to attempt to automatically determine if the newer protocol is supported.

      • auth_source

        TypeString
        Description

        Database name associated with the user's credentials.

      • database

        TypeString
        Description

        Database name.

      • topology

        TypeStruct(topology)

        topology

        • max_overflow
          TypeInteger(0..+inf)
          Default0
          Description

          The maximum number of additional workers that can be created when all workers in the pool are busy. This helps to manage temporary spikes in workload by allowing more concurrent connections to the MongoDB server.

        • overflow_ttl
          TypeDuration
          Description

          Period of time before workers that exceed the configured pool size ("overflow") to be terminated.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • overflow_check_period
          TypeDuration
          Description

          Period for checking if there are more workers than configured ("overflow").
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • local_threshold_ms
          TypeDuration
          Description

          The size of the latency window for selecting among multiple suitable MongoDB instances.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • connect_timeout_ms
          TypeDuration
          Description

          The duration to attempt a connection before timing out.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • socket_timeout_ms
          TypeDuration
          Description

          The duration to attempt to send or to receive on a socket before the attempt times out.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • server_selection_timeout_ms
          TypeDuration
          Description

          Specifies how long to block for server selection before throwing an exception.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • wait_queue_timeout_ms
          TypeDuration
          Description

          The maximum duration that a worker can wait for a connection to become available.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • heartbeat_frequency_ms
          TypeDuration
          Default"200s"
          Description

          Controls when the driver checks the state of the MongoDB deployment. Specify the interval between checks, counted from the end of the previous check until the beginning of the next one. If the number of connections is increased (which will happen, for example, if you increase the pool size), you may need to increase this period as well to avoid creating too many log entries in the MongoDB log file.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • min_heartbeat_frequency_ms
          TypeDuration
          Description

          Controls the minimum amount of time to wait between heartbeats.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • syskeeper_forwarder

      TypeMap($name->Struct(config))
      Description

      Syskeeper Connector Config

      config

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Description

        The address of the Syskeeper proxy server

      • ack_mode

        TypeEnum(need_ack,no_ack)
        Defaultno_ack
        Description

        Specify whether the proxy server should reply with an acknowledgement for the message forwarding, can be:
        - need_ack
        - no_ack

      • ack_timeout

        TypeDuration
        Default"10s"
        Description

        The maximum time to wait for an acknowledgement from the proxy server
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pool_size

        TypeInteger(1..+inf)
        Default16
        Description

        Size of the connection pool towards the bridge target service.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • timescale

      TypeMap($name->Struct(config_connector))
      Description

      Timescale Connector Config

      config_connector

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The PostgreSQL default port 5432 is used if [:Port] is not specified.

      • disable_prepared_statements

        TypeBoolean
        Defaultfalse
        Description

        Disables the usage of prepared statements in the connections. Some endpoints, like PGBouncer or Supabase in Transaction mode, do not support session features such as prepared statements. For such connections, this option should be enabled.

      • database

        TypeString
        Description

        Database name.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}
        Description

        Resource options.

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • matrix

      TypeMap($name->Struct(config_connector))
      Description

      Matrix Connector Config

      config_connector

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The PostgreSQL default port 5432 is used if [:Port] is not specified.

      • disable_prepared_statements

        TypeBoolean
        Defaultfalse
        Description

        Disables the usage of prepared statements in the connections. Some endpoints, like PGBouncer or Supabase in Transaction mode, do not support session features such as prepared statements. For such connections, this option should be enabled.

      • database

        TypeString
        Description

        Database name.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}
        Description

        Resource options.

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • opents

      TypeMap($name->Struct(config_connector))
      Description

      OpenTSDB Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Description

        The URL of OpenTSDB endpoint.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • summary

        TypeBoolean
        Defaulttrue
        Description

        Whether to return summary information.

      • details

        TypeBoolean
        Defaultfalse
        Description

        Whether to return detailed information.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • oracle

      TypeMap($name->Struct(config_connector))
      Description

      Oracle Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The Oracle Database default port 1521 is used if [:Port] is not specified.

      • sid

        TypeString
        Description

        Sid for Oracle Database.

      • service_name

        TypeString
        Description

        Service Name for Oracle Database.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • pgsql

      TypeMap($name->Struct(config_connector))
      Description

      PostgreSQL Connector Config

      config_connector

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The PostgreSQL default port 5432 is used if [:Port] is not specified.

      • disable_prepared_statements

        TypeBoolean
        Defaultfalse
        Description

        Disables the usage of prepared statements in the connections. Some endpoints, like PGBouncer or Supabase in Transaction mode, do not support session features such as prepared statements. For such connections, this option should be enabled.

      • database

        TypeString
        Description

        Database name.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}
        Description

        Resource options.

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • tdengine

      TypeMap($name->Struct(config_connector))
      Description

      TDengine Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The TDengine default port 6041 is used if [:Port] is not specified.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Defaultroot
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • snowflake

      TypeMap($name->Struct(config_connector))
      Description

      Snowflake Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Description

        The address of Snowflake computing server to connect to.

      • account

        TypeString
        Description

        Account ID for Snowflake.

      • dsn

        TypeString
        Description

        Data Source Name (DSN) associated with the installed Snowflake ODBC driver.

      • proxy

        TypeOneOf(String("none"),Struct(proxy_config))
        Defaultnone
        Description

        Proxy configuration. Only plain HTTP proxies are currently supported (no HTTPS).

        proxy_config

        • host
          TypeString
          Description

          Proxy host address to connect to.

        • port
          TypeInteger(1..65535)
          Description

          Proxy port to use when connecting.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}
        Description

        Resource options.

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

    • http

      TypeMap($name->Struct(config_connector))
      Description

      HTTP Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • url

        TypeString
        Description

        The URL of the HTTP action.
        Template with variables is allowed in the path, but variables cannot be used in the scheme, host, or port part.
        For example, http://localhost:9901/${topic} is allowed, but http://${host}:9901/message or http://localhost:${port}/message is not allowed.

      • headers

        TypeMap
        Default{accept = "application/json", cache-control = "no-cache", connection = "keep-alive", content-type = "application/json", keep-alive = "timeout=5"}
        Description

        The headers of the HTTP request.
        Template with variables is allowed.

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the HTTP server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • retry_interval

        TypeDuration
        Description

        Deprecated since 5.0.4.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • pool_type

        TypeEnum(random,hash)
        Defaultrandom
        Description

        The type of the pool. Can be one of random, hash.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The pool size.

      • enable_pipelining

        TypeInteger(1..+inf)
        Default100
        Description

        The maximum number of HTTP requests that can be sent before an HTTP response is received.

        Setting this to 1 is equivalent to turning off HTTP pipelining, and the EMQX must receive a response to the previous HTTP request before sending the next HTTP request.

      • request

        TypeMap
        Description

        Deprecated since 5.3.2.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • clickhouse

      TypeMap($name->Struct(config_connector))
      Description

      ClickHouse Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • url

        TypeString
        Description

        The HTTP URL to the Clickhouse server that you want to connect to (for example http://myhostname:8123)

      • connect_timeout

        TypeDuration
        Default"15s"
        Description

        The timeout when connecting to the Clickhouse server.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • database

        TypeString
        Description

        Database name.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • username

        TypeString
        Description

        The username associated with the bridge in the external database used for authentication or identification purposes.

      • password

        TypeSecret
        Description

        The password associated with the bridge, used for authentication with the external database.
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • auto_reconnect

        TypeBoolean
        Description

        Deprecated since v5.0.15.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • influxdb

      TypeMap($name->Struct(config_connector))
      Description

      InfluxDB Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • server

        TypeString
        Default"127.0.0.1:8086"
        Description

        The IPv4 or IPv6 address or the hostname to connect to.
        A host entry has the following form: Host[:Port].
        The InfluxDB default port 8086 is used if [:Port] is not specified.

      • pool_size

        TypeInteger
        Default8
        Description

        Size of the connection pool towards the bridge target service.

      • parameters

        TypeOneOf(Struct(connector_influxdb_api_v1),Struct(connector_influxdb_api_v2))
        Description

        Set of parameters specific for the given type of this InfluxDB connector, influxdb_type can be one of influxdb_api_v1, influxdb_api_v1.

        connector_influxdb_api_v1

        • influxdb_type
          TypeString("influxdb_api_v1")
          Defaultinfluxdb_api_v1
          Description

          InfluxDB's protocol. Support InfluxDB v1.8 and before.

        • database
          TypeString
          Description

          InfluxDB database.

        • username
          TypeString
          Description

          InfluxDB username.

        • password
          TypeSecret
          Description

          InfluxDB password.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        connector_influxdb_api_v2

        • influxdb_type
          TypeString("influxdb_api_v2")
          Defaultinfluxdb_api_v2
          Description

          InfluxDB's protocol. Support InfluxDB v2.0 and after.

        • bucket
          TypeString
          Description

          InfluxDB bucket name.

        • org
          TypeString
          Description

          Organization name of InfluxDB.

        • token
          TypeSecret
          Description

          InfluxDB token.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • confluent_producer

      TypeMap($name->Struct(config_connector))
      Description

      Confluent Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • bootstrap_hosts

        TypeString
        Description

        A comma separated list of Confluent Kafka host[:port] namespace endpoints to bootstrap the client. Default port number is 9092.

      • connect_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time for TCP connection establishment (including authentication time if enabled).
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • min_metadata_refresh_interval

        TypeDuration
        Default"3s"
        Description

        Minimum time interval the client has to wait before refreshing Confluent Kafka broker and topic metadata. Setting too small value may add extra load on Confluent.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • metadata_request_timeout

        TypeDuration
        Default"5s"
        Description

        Maximum wait time when fetching metadata from Confluent.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • authentication

        TypeStruct(auth_username_password)
        Default{}
        Description

        Authentication configs.

        auth_username_password

        • username
          TypeString
          Description

          Confluent Key.

        • password
          TypeSecret
          Description

          The password associated with the bridge, used for authentication with the external database.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • socket_opts

        TypeStruct(socket_opts)
        Description

        Extra socket options.

        socket_opts

        • sndbuf
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket send buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • recbuf
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket receive buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          When set to 'true', TCP buffer is sent as soon as possible. Otherwise, the OS kernel may buffer small TCP packets for a while (40 ms by default).

        • tcp_keepalive
          TypeString
          Defaultnone
          Description

          Enable TCP keepalive. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

          • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
          • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
          • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: TCP keepalive probes are sent after the connection is idle for 240 seconds, and the probes are sent every 30 seconds until a response is received, if it misses 5 consecutive responses, the connection should be closed. Default: 'none'
      • health_check_topic

        TypeString
        Description

        Topic name used exclusively for more accurate connector health checks.

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = true}

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • server_name_indication
          TypeOneOf(String("auto"),String("disable"),String)
          Defaultauto
          Description

          Server Name Indication (SNI) setting for TLS handshake.

          • auto: The client will use "servicebus.windows.net" as SNI.
          • disable: If you wish to prevent the client from sending the SNI.
          • Other string values it will be sent as-is.
      • resource_opts

        TypeStruct(connector_resource_opts)
        Default{}
        Description

        Resource options.

        connector_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • mqtt

      TypeMap($name->Struct(config_connector))
      Description

      MQTT Connector Config

      config_connector

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        Size of the pool of MQTT clients that will publish messages to the remote broker.
        Each MQTT client will be assigned 'clientid' of the form '${clientid_prefix}:${bridge_name}:egress:${node}:${n}' where 'n' is the number of a client inside the pool.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}
        Description

        Resource options.

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • mode

        TypeEnum(cluster_shareload)
        Description

        Deprecated since v5.1.0 & e5.1.0.

      • server

        TypeString
        Description

        The host and port of the remote MQTT broker

      • clientid_prefix

        TypeString
        Description

        Optional prefix to prepend to the clientid used by egress bridges.

      • reconnect_interval

        TypeString
        Description

        Deprecated since v5.0.16.

      • proto_ver

        TypeEnum(v3,v4,v5)
        Defaultv4
        Description

        The MQTT protocol version

      • bridge_mode

        TypeBoolean
        Defaultfalse
        Description

        If enable bridge mode. NOTE: This setting is only for MQTT protocol version older than 5.0, and the remote MQTT broker MUST support this feature. If bridge_mode is set to true, the bridge will indicate to the remote broker that it is a bridge not an ordinary client. This means that loop detection will be more effective and that retained messages will be propagated correctly.

      • username

        TypeString
        Description

        The username of the MQTT protocol

      • password

        TypeSecret
        Description

        The password of the MQTT protocol
        A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

      • clean_start

        TypeBoolean
        Defaulttrue
        Description

        Whether to start a clean session when reconnecting a remote broker for ingress bridge

      • keepalive

        TypeString
        Default"160s"
        Description

        MQTT Keepalive. Time interval is a string that contains a number followed by time unit:
        - ms for milliseconds,

        • s for seconds,
        • m for minutes,
        • h for hours;
          or combination of whereof: 1h5m0s
      • retry_interval

        TypeString
        Default"15s"
        Description

        Message retry interval. Delay for the MQTT bridge to retry sending the QoS1/QoS2 messages in case of ACK not received. Time interval is a string that contains a number followed by time unit:
        - ms for milliseconds,

        • s for seconds,
        • m for minutes,
        • h for hours;
          or combination of whereof: 1h5m0s
      • max_inflight

        TypeInteger(0..+inf)
        Default32
        Description

        Max inflight (sent, but un-acked) messages of the MQTT protocol

      • ssl

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL connection settings.

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

  • actions

    TypeStruct(actions)

    actions

    • kinesis

      TypeMap($name->Struct(kinesis_action))
      Description

      Kinesis Action Config

      kinesis_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configuration.

        action_parameters

        • payload_template
          TypeString
          Default"${.}"
          Description

          The template for formatting the outgoing messages. If undefined, will send all the available context in JSON format.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • stream_name
          TypeString
          Description

          The Amazon Kinesis Stream to publish messages to.

        • partition_key
          TypeString
          Description

          The Amazon Kinesis Partition Key associated to published message. Placeholders in format of ${var} are supported.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..500)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • rocketmq

      TypeMap($name->Struct(rocketmq_action))
      Description

      RocketMQ Action Config

      rocketmq_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configuration.

        action_parameters

        • template
          TypeString
          Default""
          Description

          Template, the default value is empty. When this value is empty the whole message will be stored in the RocketMQ.
          The template can be any valid string with placeholders, example:
          - ${id}, ${username}, ${clientid}, ${timestamp}
          - {"id" : ${id}, "username" : ${username}}
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • strategy
          TypeOneOf(String("roundrobin"),String)
          Defaultroundrobin
          Description

          Producer key dispatch strategy, the default is roundrobin, also supports placeholders, such as: clientid, messageid, username.

        • topic
          TypeString
          DefaultTopicTest
          Description

          RocketMQ Topic
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • sync_timeout
          TypeDuration
          Default"3s"
          Description

          Timeout of RocketMQ driver synchronous call.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • refresh_interval
          TypeDuration
          Default"3s"
          Description

          RocketMQ Topic Route Refresh Interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • send_buffer
          TypeBytesize
          Default"1024KB"
          Description

          The socket send buffer size of the RocketMQ driver client.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • rabbitmq

      TypeMap($name->Struct(publisher_action))
      Description

      RabbitMQ Action Config

      publisher_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        The action config defines how this bridge send messages to the remote RabbitMQ broker

        action_parameters

        • wait_for_publish_confirmations
          TypeBoolean
          Defaulttrue
          Description

          A boolean value that indicates whether to wait for RabbitMQ to confirm message publication when using publisher confirms.

        • publish_confirmation_timeout
          TypeDuration
          Default"30s"
          Description

          The timeout for waiting on the connection to be established.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • exchange
          TypeString
          Description

          The name of the RabbitMQ exchange where the messages will be sent. Supports templates (e.g.: e-${payload.e}).
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • routing_key
          TypeString
          Description

          The routing key used to route messages to the correct queue in the RabbitMQ exchange. Supports templates (e.g.: k-${payload.r}).
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • delivery_mode
          TypeEnum(non_persistent,persistent)
          Defaultnon_persistent
          Description

          The delivery mode for messages published to RabbitMQ. Delivery mode non_persistent (1) is suitable for messages that don't require persistence across RabbitMQ restarts, whereas delivery mode persistent (2) is designed for messages that must survive RabbitMQ restarts.

        • payload_template
          TypeString
          Default""
          Description

          The template for formatting the payload of the message before sending it to RabbitMQ. Template placeholders, such as ${field1.sub_field}, will be substituted with the respective field's value. When left empty, the entire input message will be used as the payload, formatted as a JSON text. This behavior is equivalent to specifying ${.} as the payload template.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • mysql

      TypeMap($name->Struct(mysql_action))
      Description

      Action to interact with a MySQL connector

      mysql_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Additional parameters specific to this action type

        action_parameters

        • sql
          TypeString
          Default"insert into t_mqtt_msg(msgid, topic, qos, payload, arrived) values (${id}, ${topic}, ${qos}, ${payload}, FROM_UNIXTIME(${timestamp}/1000))"
          Description

          SQL Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • undefined_vars_as_null
          TypeBoolean
          Defaultfalse
          Description

          When writing to databases, treat undefined variables as NULL. When this option is enabled, if undefined variables (like ${var}) are used in templates, they will be replaced with "NULL" instead of the string "undefined". If this option is not enabled (default), the string "undefined" might be inserted. This option should always be true if possible; the default value false is only to ensure backward compatibility.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • dynamo

      TypeMap($name->Struct(dynamo_action))
      Description

      DynamoDB Action Config

      dynamo_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configuration.

        action_parameters

        • template
          TypeString
          Default""
          Description

          Template, the default value is empty. When this value is empty the whole message will be stored in the database.
          The template can be any valid JSON with placeholders and make sure all keys for table are here, example:
          {"id" : "${id}", "clientid" : "${clientid}", "data" : "${payload.data}"}
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • hash_key
          TypeString
          Description

          DynamoDB Hash Key

        • range_key
          TypeString
          Description

          DynamoDB Range Key

        • table
          TypeString
          Description

          DynamoDB Table.

        • undefined_vars_as_null
          TypeBoolean
          Defaultfalse
          Description

          When writing to databases, treat undefined variables as NULL. When this option is enabled, if undefined variables (like ${var}) are used in templates, they will be replaced with "NULL" instead of the string "undefined". If this option is not enabled (default), the string "undefined" might be inserted. This option should always be true if possible; the default value false is only to ensure backward compatibility.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • cassandra

      TypeMap($name->Struct(cassandra_action))
      Description

      Cassandra Action Config

      cassandra_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configs.

        action_parameters

        • cql
          TypeString
          Default"insert into mqtt_msg(msgid, topic, qos, payload, arrived) values (${id}, ${topic}, ${qos}, ${payload}, ${timestamp})"
          Description

          CQL Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • sqlserver

      TypeMap($name->Struct(sqlserver_action))
      Description

      Configuration for Microsoft SOL Server action.

      sqlserver_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configuration.

        action_parameters

        • sql
          TypeString
          Default"insert into t_mqtt_msg(msgid, topic, qos, payload) values ( ${id}, ${topic}, ${qos}, ${payload} )"
          Description

          SQL Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • undefined_vars_as_null
          TypeBoolean
          Defaultfalse
          Description

          When writing to databases, treat undefined variables as NULL. When this option is enabled, if undefined variables (like ${var}) are used in templates, they will be replaced with "NULL" instead of the string "undefined". If this option is not enabled (default), the string "undefined" might be inserted. This option should always be true if possible; the default value false is only to ensure backward compatibility.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • redis

      TypeMap($name->Struct(redis_action))
      Description

      Redis Action Config

      redis_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        The parameters of the action.

        action_parameters

        • command_template
          TypeArray(String)
          Description

          Redis command template used to export messages. Each list element stands for a command name or its argument. For example, to push payloads in a Redis list by key msgs, the elements should be the following: rpush, msgs, ${payload}.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          This parameter defines the upper limit of the batch count. Setting this value to 1 effectively disables batching, as it indicates that only one item will be processed per batch. Note on Redis Cluster Mode: In the context of Redis Cluster Mode, it is important to note that batching is not supported. Consequently, the batch_size is always set to 1, reflecting the mode inherent limitation in handling batch operations.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • azure_blob_storage

      TypeMap($name->Struct(azure_blob_storage))
      Description

      Azure Blob Storage Action Config

      azure_blob_storage

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeOneOf(Struct(aggreg_parameters),Struct(direct_parameters))
        Description

        Set of parameters for the action.

        aggreg_parameters

        • mode
          TypeString("aggregated")
          Description

          Enables time-based aggregation of incoming events and uploading them to the Azure Blob Storage service as a single object.

        • aggregation
          TypeStruct(aggregation)
          Description

          Set of parameters governing the aggregation process.

          aggregation

          • container
            TypeOneOf(Struct(container_csv))
            Default{type = csv}
            Description

            Settings governing the file format of an upload containing aggregated events.

            container_csv

            • type
              TypeString("csv")
              Description

              Records (events) will be aggregated and uploaded as a CSV file.

            • column_order
              TypeArray(String)
              Default[]
              Description

              Event fields that will be ordered first as columns in the resulting CSV file.
              Regardless of this setting, resulting CSV will contain all the fields of aggregated events, but all the columns not explicitly mentioned here will be ordered after the ones listed here in the lexicographical order.

          • time_interval
            TypeDuration(s)
            Default"1h"
            Description

            Amount of time events will be aggregated in a single object before uploading.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • max_records
            TypeInteger(1..+inf)
            Default1000000
            Description

            Number of records (events) allowed per each aggregated object. Each aggregated upload will contain no more than that number of events, but may contain less.
            If event rate is high enough, there obviously may be more than one aggregated upload during the same time interval. These uploads will have different, but consecutive sequence numbers, which will be a part of Azure Blob Storage blob name.

        • container
          TypeString
          Description

          The Azure Blob Storage container name. Does not support templates.

        • blob
          TypeString
          Description

          Template for the Azure Blob Storage blob name of an aggregated upload.
          Template may contain placeholders for the following variables:

          • ${action}: name of the action (required).
          • ${node}: name of the EMQX node conducting the upload (required).
          • ${datetime.{format}}: date and time when aggregation started, formatted according to the {format} string (required):
            • ${datetime.rfc3339utc}: RFC3339-formatted date and time in UTC,
            • ${datetime.rfc3339}: RFC3339-formatted date and time in local timezone,
            • ${datetime.unix}: Unix timestamp.
          • ${datetime_until.{format}}: date and time when aggregation ended, with the same formatting options.
          • ${sequence}: sequence number of the aggregated upload within the same time interval (required).
          All other placeholders are considered invalid. Note that placeholders marked as required will be added as a path suffix to the Azure Blob Storage blob name if they are missing from the template.
          A string for `${.path.to.var}` style value interpolation, where the leading dot is optional, and `${.}` represents all values as an object.

        direct_parameters

        • mode
          TypeString("direct")
          Description

          Enables uploading of events to the Azure Blob Storage service as separate objects.

        • container
          TypeString
          Description

          The name of the Azure Blob Storage container name.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • blob
          TypeString
          Description

          The name of the Azure Blob Storage blob name.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • content
          TypeString
          Default"${.}"
          Description

          Content of the Azure Blob Storage blob being uploaded. Supports templates.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default100
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"10ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • hstreamdb

      TypeMap($name->Struct(hstreamdb_action))
      Description

      HStreamDB Action Config

      hstreamdb_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configuration.

        action_parameters

        • stream
          TypeString
          Description

          HStreamDB Stream Name.

        • partition_key
          TypeString
          Description

          HStreamDB Partition Key. Placeholders supported.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • grpc_flush_timeout
          TypeDuration
          Default"10s"
          Description

          Time interval for flushing gRPC calls to the HStreamDB server.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • record_template
          TypeString
          Default"${payload}"
          Description

          The HStream Record template to be forwarded to the HStreamDB. Placeholders supported.
          NOTE: When you use raw record template (which means the data is not a valid JSON), you should use read or subscription in HStream to get the data.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • aggregation_pool_size
          TypeInteger(1..+inf)
          Default8
          Description

          The size of the record aggregation pool. A larger aggregation pool size can lead to enhanced parallelization but may also result in reduced efficiency due to smaller batch sizes.

        • max_batches
          TypeInteger(1..+inf)
          Default500
          Description

          Maximum number of unconfirmed batches in the flush queue.

        • writer_pool_size
          TypeInteger(1..+inf)
          Default8
          Description

          The size of the writer pool. A larger pool may increase parallelization and concurrent write operations, potentially boosting throughput. Trade-offs include greater memory consumption and possible resource contention.

        • batch_size
          TypeInteger(1..+inf)
          Default100
          Description

          Maximum number of insert data clauses that can be sent in a single request.

        • batch_interval
          TypeDuration
          Default"500ms"
          Description

          Maximum interval that is allowed between two successive (batch) request.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • elasticsearch

      TypeMap($action_name->Struct(action_config))
      Description

      Elasticsearch Bridge

      action_config

      • parameters

        TypeOneOf(Struct(action_create),Struct(action_delete),Struct(action_update))
        Description

        ElasticSearch action parameters

        action_create

        • action
          TypeString("create")
          Description

          create

        • index
          TypeString
          Description

          Name of index, or index alias to perform the action on. This parameter is required.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • id
          TypeString
          Description

          The document ID. If no ID is specified, a document ID is automatically generated.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • doc
          TypeString
          Description

          JSON document. If undefined, rule engine will use JSON format to serialize all visible inputs, such as clientid, topic, payload etc.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • routing
          TypeString
          Description

          Custom value used to route operations to a specific shard.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • require_alias
          TypeBoolean
          Description

          If true, the request’s actions must target an index alias. Defaults to false

        • overwrite
          TypeBoolean
          Defaulttrue
          Description

          Set to false If a document with the specified _id already exists(conflict), the operation will fail.

        • max_retries
          TypeInteger(0..+inf)
          Default2
          Description

          HTTP request max retry times if failed.

        action_delete

        • action
          TypeString("delete")
          Description

          delete

        • index
          TypeString
          Description

          Name of index, or index alias to perform the action on. This parameter is required.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • id
          TypeString
          Description

          The document ID. If no ID is specified, a document ID is automatically generated.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • routing
          TypeString
          Description

          Custom value used to route operations to a specific shard.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • max_retries
          TypeInteger(0..+inf)
          Default2
          Description

          HTTP request max retry times if failed.

        action_update

        • action
          TypeString("update")
          Description

          update

        • index
          TypeString
          Description

          Name of index, or index alias to perform the action on. This parameter is required.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • id
          TypeString
          Description

          The document ID. If no ID is specified, a document ID is automatically generated.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • doc
          TypeString
          Description

          JSON document. If undefined, rule engine will use JSON format to serialize all visible inputs, such as clientid, topic, payload etc.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • doc_as_upsert
          TypeBoolean
          Defaultfalse
          Description

          Instead of sending a partial doc plus an upsert doc, you can set doc_as_upsert to true to use the contents of doc as the upsert value.

        • routing
          TypeString
          Description

          Custom value used to route operations to a specific shard.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • require_alias
          TypeBoolean
          Description

          If true, the request’s actions must target an index alias. Defaults to false

        • max_retries
          TypeInteger(0..+inf)
          Default2
          Description

          HTTP request max retry times if failed.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • couchbase

      TypeMap($name->Struct(couchbase))
      Description

      Couchbase Action Config

      couchbase

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(parameters)
        Description

        Set of parameters for the action.

        parameters

        • sql
          TypeString
          Description

          SQL Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • max_retries
          TypeInteger(0..+inf)
          Default3
          Description

          Max retry times if error on sending request.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • azure_event_hub_producer

      TypeMap($name->Struct(actions))
      Description

      Azure Event Hub Actions Config

      actions

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in Azure Event Hubs.

      • parameters

        Aliaseskafka
        TypeStruct(producer_kafka_opts)
        Description

        Azure Event Hubs producer configs.

        producer_kafka_opts

        • topic
          TypeString
          Description

          Event Hubs name. Supports templates (e.g.: t-${payload.t}).
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • message
          TypeStruct(kafka_message)
          Description

          Template for rendering a message.

          kafka_message

          • key
            TypeString
            Default"${.clientid}"
            Description

            Template for rendering message key. If the template is rendered into a NULL value (i.e. there is no such data field in Rule Engine context) then NULL (but not empty string) is used.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • value
            TypeString
            Default"${.}"
            Description

            Template to render Azure Event Hubs message value. If the template is rendered into a NULL value (i.e. there is no such data field in Rule Engine context) then Azure Event Hubs' NULL (but not empty string) is used.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • max_linger_time
          TypeDuration
          Default"0ms"
          Description

          Maximum duration for a per-partition producer to wait for messages in order to collect a batch to buffer. The default value 0 means no wait. For non-memory buffer mode, it's advised to configure at least 5ms for less IOPS.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_linger_bytes
          TypeBytesize
          Default"10MB"
          Description

          Maximum number of bytes for a per-partition producer to wait for messages in order to collect a batch to buffer.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • max_batch_bytes
          TypeBytesize
          Default"896KB"
          Description

          Maximum bytes to collect in an Azure Event Hubs message batch.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • partition_strategy
          TypeEnum(random,key_dispatch)
          Defaultrandom
          Description

          Partition strategy is to tell the producer how to dispatch messages to partitions.

          random: Randomly pick a partition for each message. key_dispatch: Assigns messages to partitions based on a hash of the message key, ensuring consistent partition for messages with the same key.

        • required_acks
          TypeEnum(all_isr,leader_only)
          Defaultall_isr
          Description

          The acknowledgement criteria for the partition leader. It determines the level of confirmation required from partition replicas before sending an acknowledgement back to the producer.

          all_isr: Require all in-sync replicas to acknowledge. leader_only: Require only the partition-leader's acknowledgement. none: No need for Kafka to acknowledge at all.

        • kafka_headers
          TypeString
          Description

          Provide a placeholder for message headers
          e.g. ${pub_props}
          Note that the value of the placeholder must be either an object: {"foo": "bar"} or an array of key-value pairs: [{"key": "foo", "value": "bar"}]
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • kafka_ext_headers
          TypeArray(Struct(producer_kafka_ext_headers))
          Description

          Please provide more key-value pairs for Azure Event Hubs headers
          The key-value pairs here will be combined with the value of kafka_headers field before sending to Azure Event Hubs.

          producer_kafka_ext_headers

          • kafka_ext_header_key
            TypeString
            Description

            Key of the header. Placeholders in format of ${var} are supported.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • kafka_ext_header_value
            TypeString
            Description

            Value of the header. Placeholders in format of ${var} are supported.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • kafka_header_value_encode_mode
          TypeEnum(none,json)
          Defaultnone
          Description

          The encoding mode for headers.

          • none: Add only strings are added as header values
          • json: Encode header values as JSON string
        • partition_count_refresh_interval
          TypeDuration(s)
          Default"60s"
          Description

          The time interval for Azure Event Hubs producer to discover increased number of partitions. After the number of partitions is increased in Azure Event Hubs, EMQX will start taking the discovered partitions into account when dispatching messages per partition_strategy.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partitions_limit
          TypeOneOf(String("all_partitions"),Integer(1..+inf))
          Defaultall_partitions
          Description

          Limit the number of partitions to produce data for the given topic. The special value all_partitions is to utilize all partitions for the topic. Setting this to a value which is greater than the total number of partitions in has no effect.

        • max_inflight
          TypeInteger(1..+inf)
          Default10
          Description

          The maximum number of message batches that the producer can send to each partition before it must wait for an acknowledgement. Setting a higher number can enhance throughput. However, value above 1 may lead to potential message reordering risks.

        • buffer
          TypeStruct(producer_buffer)
          Description

          Configure producer message buffer.

          Tell Azure Event Hubs producer how to buffer messages when EMQX has more messages to send than Azure Event Hubs can keep up, or when Azure Event Hubs is down.

          producer_buffer

          • mode
            TypeEnum(memory,disk,hybrid)
            Defaultmemory
            Description

            Message buffer mode.

            memory: Buffer all messages in memory. The messages will be lost in case of EMQX node restart disk: Buffer all messages on disk. The messages on disk are able to survive EMQX node restart. hybrid: Buffer message in memory first, when up to certain limit (see segment_bytes config for more information), then start offloading messages to disk, Like memory mode, the messages will be lost in case of EMQX node restart.

          • per_partition_limit
            TypeBytesize
            Default"2GB"
            Description

            Number of bytes allowed to buffer for each partition. When this limit is exceeded, older messages will be discarded to make room for new messages to be buffered.
            A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

          • segment_bytes
            TypeBytesize
            Default"10MB"
            Description

            Applicable when buffer mode is set to disk or hybrid. This setting specifies the size of each buffer file stored on disk.
            A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

          • memory_overload_protection
            TypeBoolean
            Defaultfalse
            Description

            Applicable when buffer mode is set to memory EMQX will drop old buffered messages under high memory pressure. The high memory threshold is defined in config sysmon.os.sysmem_high_watermark. NOTE: This config only works on Linux.

        • query_mode
          TypeEnum(async,sync)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • sync_query_timeout
          TypeDuration
          Default"5s"
          Description

          This parameter defines the timeout limit for synchronous queries. It applies only when the bridge query mode is configured to 'sync'.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

    • datalayers

      TypeMap($name->Struct(datalayers_action))
      Description

      Datalayers Action Config

      datalayers_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Additional parameters specific to this action type

        action_parameters

        • write_syntax
          TypeString
          Description

          Conf of InfluxDB line protocol to write data points. It is a text-based format that provides the measurement, tag set, field set, and timestamp of a data point, and placeholder supported. See also InfluxDB 1.8 Line Protocol
          TLDR:

          <measurement>[,<tag_key>=<tag_value>[,<tag_key>=<tag_value>]] <field_key>=<field_value>[,<field_key>=<field_value>] [<timestamp>]
          

          Please note that a placeholder for an integer value must be annotated with a suffix i. For example ${payload.int_value}i.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • precision
          TypeEnum(ns,us,ms,s)
          Defaultms
          Description

          Datalayers time precision.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • iotdb

      TypeMap($name->Struct(action_config))
      Description

      IoTDB Action Config

      action_config

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        IoTDB action parameters

        action_parameters

        • is_aligned
          TypeBoolean
          Defaultfalse
          Description

          Whether to align the timeseries

        • device_id
          TypeString
          Description

          The IoTDB device ID this data should be inserted for. If left empty, the MQTT message payload must contain a device_id field, or EMQX's rule-engine SQL must produce a device_id field.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • data
          TypeArray(Struct(action_parameters_data))
          Default[]
          Description

          IoTDB action parameter data

          action_parameters_data

          • timestamp
            TypeOneOf(Enum(now,now_ms,now_ns,now_us),String)
            Defaultnow
            Description

            Timestamp. Placeholders in format of ${var} is supported, the final value can be:

            • now: use the now_ms which is contained in the payload as timestamp
            • now_ms: same as above
            • now_us: use the now_us which is contained in the payload as timestamp
            • now_ns: use the now_ns which is contained in the payload as timestamp
            • any other: use the value directly as the timestamp
          • measurement
            TypeString
            Description

            Measurement. Placeholders in format of ${var} is supported
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • data_type
            TypeOneOf(Enum(text,boolean,int32,int64,float,double),String)
            Description

            Data Type, an enumerated or a string. For string placeholders in format of ${var} is supported, the final value can be:

            • TEXT
            • BOOLEAN
            • INT32
            • INT64
            • FLOAT
            • DOUBLE
          • value
            TypeString
            Description

            Value. Placeholders in format of ${var} is supported
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • max_retries
          TypeInteger(0..+inf)
          Default2
          Description

          HTTP request max retry times if failed.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • greptimedb

      TypeMap($name->Struct(greptimedb_action))
      Description

      GreptimeDB Action Config

      greptimedb_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Additional parameters specific to this action type

        action_parameters

        • write_syntax
          TypeString
          Description

          Conf of GreptimeDB gRPC protocol to write data points. Write syntax is a text-based format that provides the measurement, tag set, field set, and timestamp of a data point, and placeholder supported, which is the same as InfluxDB line protocol. See also InfluxDB 2.3 Line Protocol and GreptimeDB 1.8 Line Protocol
          TLDR:

          <measurement>[,<tag_key>=<tag_value>[,<tag_key>=<tag_value>]] <field_key>=<field_value>[,<field_key>=<field_value>] [<timestamp>]
          

          Please note that a placeholder for an integer value must be annotated with a suffix i. For example ${payload.int_value}i.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • precision
          TypeEnum(ns,us,ms,s)
          Defaultms
          Description

          GreptimeDB time precision.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • kafka_producer

      TypeMap($name->Struct(kafka_producer_action))
      Description

      Kafka Producer Action Config

      kafka_producer_action

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in Kafka.

      • parameters

        Aliaseskafka
        TypeStruct(producer_kafka_opts)
        Description

        Kafka producer configs.

        producer_kafka_opts

        • topic
          TypeString
          Description

          Kafka topic name. Supports templates (e.g.: t-${payload.t}).
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • message
          TypeStruct(kafka_message)
          Description

          Template for rendering a message.

          kafka_message

          • key
            TypeString
            Default"${.clientid}"
            Description

            Template for rendering message key. If the template is rendered into a NULL value (i.e. there is no such data field in Rule Engine context) then NULL (but not empty string) is used.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • value
            TypeString
            Default"${.}"
            Description

            Template for rendering Kafka message value. If the template is rendered into a NULL value (i.e. there is no such data field in Rule Engine context) then Kafka's NULL (but not empty string) is used.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • timestamp
            TypeString
            Default"${.timestamp}"
            Description

            Which timestamp to use. The timestamp is expected to be a millisecond precision Unix epoch which can be in string format, e.g. 1661326462115 or '1661326462115'. When the desired data field for this template is not found, or if the found data is not a valid integer, the current system timestamp will be used.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • max_linger_time
          TypeDuration
          Default"0ms"
          Description

          Maximum duration for a per-partition producer to wait for messages in order to collect a batch to buffer. The default value 0 means no wait. For non-memory buffer mode, it's advised to configure at least 5ms for less IOPS.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_linger_bytes
          TypeBytesize
          Default"10MB"
          Description

          Maximum number of bytes for a per-partition producer to wait for messages in order to collect a batch to buffer.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • max_batch_bytes
          TypeBytesize
          Default"896KB"
          Description

          Maximum bytes to collect in a Kafka message batch. Most of the Kafka brokers default to a limit of 1 MB batch size. EMQX's default value is less than 1 MB in order to compensate Kafka message encoding overheads (especially when each individual message is very small). When a single message is over the limit, it is still sent (as a single element batch).
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • compression
          TypeEnum(no_compression,snappy,gzip)
          Defaultno_compression
          Description

          Specify the method of compression.

        • partition_strategy
          TypeEnum(random,key_dispatch)
          Defaultrandom
          Description

          Partition strategy is to tell the producer how to dispatch messages to partitions.

          random: Randomly pick a partition for each message. key_dispatch: Assigns messages to partitions based on a hash of the message key, ensuring consistent partition for messages with the same key.

        • required_acks
          TypeEnum(all_isr,leader_only,none)
          Defaultall_isr
          Description

          The acknowledgement criteria for the partition leader. It determines the level of confirmation required from partition replicas before sending an acknowledgement back to the producer.

          all_isr: Require all in-sync replicas to acknowledge. leader_only: Require only the partition-leader's acknowledgement. none: No need for Kafka to acknowledge at all.

        • kafka_headers
          TypeString
          Description

          Provide a placeholder for message headers
          e.g. ${pub_props}
          Note that the value of the placeholder must be either an object: {"foo": "bar"} or an array of key-value pairs: [{"key": "foo", "value": "bar"}]
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • kafka_ext_headers
          TypeArray(Struct(producer_kafka_ext_headers))
          Description

          Provide more key-value pairs for message headers
          The key-value pairs here will be combined with the value of kafka_headers field before sending producing.

          producer_kafka_ext_headers

          • kafka_ext_header_key
            TypeString
            Description

            Key of the header. Placeholders in format of ${var} are supported.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • kafka_ext_header_value
            TypeString
            Description

            Value of the header. Placeholders in format of ${var} are supported.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • kafka_header_value_encode_mode
          TypeEnum(none,json)
          Defaultnone
          Description

          The encoding mode for headers.

          • none: Add only strings are added as header values
          • json: Encode header values as JSON string
        • partition_count_refresh_interval
          TypeDuration(s)
          Default"60s"
          Description

          The time interval for Kafka producer to discover increased number of partitions. After the number of partitions is increased in Kafka, EMQX will start taking the discovered partitions into account when dispatching messages per partition_strategy.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partitions_limit
          TypeOneOf(String("all_partitions"),Integer(1..+inf))
          Defaultall_partitions
          Description

          Limit the number of partitions to produce data for the given topic. The special value all_partitions is to utilize all partitions for the topic. Setting this to a value which is greater than the total number of partitions in has no effect.

        • max_inflight
          TypeInteger(1..+inf)
          Default10
          Description

          The maximum number of message batches that the producer can send to each partition before it must wait for an acknowledgement. Setting a higher number can enhance throughput. However, value above 1 may lead to potential message reordering risks.

        • buffer
          TypeStruct(producer_buffer)
          Description

          Configure producer message buffer.

          Tell Kafka producer how to buffer messages when EMQX has more messages to send than Kafka can keep up, or when Kafka is down.

          producer_buffer

          • mode
            TypeEnum(memory,disk,hybrid)
            Defaultmemory
            Description

            Message buffer mode.

            memory: Buffer all messages in memory. The messages will be lost in case of EMQX node restart disk: Buffer all messages on disk. The messages on disk are able to survive EMQX node restart. hybrid: Buffer message in memory first, when up to certain limit (see segment_bytes config for more information), then start offloading messages to disk, Like memory mode, the messages will be lost in case of EMQX node restart.

          • per_partition_limit
            TypeBytesize
            Default"2GB"
            Description

            Number of bytes allowed to buffer for each partition. When this limit is exceeded, older messages will be discarded to make room for new messages to be buffered.
            A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

          • segment_bytes
            TypeBytesize
            Default"10MB"
            Description

            Applicable when buffer mode is set to disk or hybrid. This setting specifies the size of each buffer file stored on disk.
            A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

          • memory_overload_protection
            TypeBoolean
            Defaultfalse
            Description

            Applicable when buffer mode is set to memory EMQX will drop old buffered messages under high memory pressure. The high memory threshold is defined in config sysmon.os.sysmem_high_watermark. NOTE: This config only works on Linux.

        • query_mode
          TypeEnum(async,sync)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • sync_query_timeout
          TypeDuration
          Default"5s"
          Description

          This parameter defines the timeout limit for synchronous queries. It applies only when the query mode is configured to 'sync'.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • pulsar

      TypeMap($name->Struct(publisher_action))
      Description

      Pulsar Action Config

      publisher_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configs.

        action_parameters

        • message
          TypeStruct(producer_pulsar_message)
          Description

          Template to render a Pulsar message.

          producer_pulsar_message

          • key
            TypeString
            Default"${.clientid}"
            Description

            Template to render Pulsar message key.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • value
            TypeString
            Default"${.}"
            Description

            Template to render Pulsar message value.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • sync_timeout
          TypeDuration
          Default"3s"
          Description

          Maximum wait time for receiving a receipt from Pulsar when publishing synchronously.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • pulsar_topic
          TypeString
          Description

          Pulsar topic name

        • batch_size
          TypeInteger(1..+inf)
          Default100
          Description

          Maximum number of individual requests to batch in a Pulsar message.

        • compression
          TypeEnum(no_compression,snappy,zlib)
          Defaultno_compression
          Description

          Compression method.

        • send_buffer
          TypeBytesize
          Default"1MB"
          Description

          Fine tune the socket send buffer. The default value is tuned for high throughput.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • retention_period
          TypeOneOf(String("infinity"),Duration)
          Defaultinfinity
          Description

          The amount of time messages will be buffered while there is no connection to the Pulsar broker. Longer times mean that more memory/disk will be used

        • max_batch_bytes
          TypeBytesize
          Default"900KB"
          Description

          Maximum bytes to collect in a Pulsar message batch. Most of the Pulsar brokers default to a limit of 5 MB batch size. EMQX's default value is less than 5 MB in order to compensate Pulsar message encoding overheads (especially when each individual message is very small). When a single message is over the limit, it is still sent (as a single element batch).
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • strategy
          TypeEnum(random,roundrobin,key_dispatch)
          Defaultrandom
          Description

          Partition strategy is to tell the producer how to dispatch messages to Pulsar partitions.

          random: Randomly pick a partition for each message. roundrobin: Pick each available producer in turn for each message. key_dispatch: Hash Pulsar message key of the first message in a batch to a partition number.

        • buffer
          TypeStruct(producer_buffer)
          Description

          Configure producer message buffer." Tell Pulsar producer how to buffer messages when EMQX has more messages to" send than Pulsar can keep up, or when Pulsar is down.

          producer_buffer

          • mode
            TypeEnum(memory,disk,hybrid)
            Defaultmemory
            Description

            Message buffer mode. memory: Buffer all messages in memory. The messages will be lost in case of EMQX node restart\ndisk: Buffer all messages on disk. The messages on disk are able to survive EMQX node restart. hybrid: Buffer message in memory first, when up to certain limit (see segment_bytes config for more information), then start offloading messages to disk, Like memory mode, the messages will be lost in case of EMQX node restart.

          • per_partition_limit
            TypeBytesize
            Default"2GB"
            Description

            Number of bytes allowed to buffer for each Pulsar partition. When this limit is exceeded, old messages will be dropped in a trade for credits for new messages to be buffered.
            A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

          • segment_bytes
            TypeBytesize
            Default"100MB"
            Description

            Applicable when buffer mode is set to disk or hybrid. This value is to specify the size of each on-disk buffer file.
            A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

          • memory_overload_protection
            TypeBoolean
            Defaultfalse
            Description

            Applicable when buffer mode is set to memory EMQX will drop old buffered messages under high memory pressure. The high memory threshold is defined in config sysmon.os.sysmem_high_watermark. NOTE: This config only works on Linux.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Description

          Deprecated since 5.8.1.

    • gcp_pubsub_producer

      TypeMap($name->Struct(producer_action))
      Description

      GCP PubSub Producer Action Config

      producer_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action configs.

        action_parameters

        • attributes_template
          TypeArray(Struct(key_value_pair))
          Default[]
          Description

          The template for formatting the outgoing message attributes. Undefined values will be rendered as empty string values. Empty keys are removed from the attribute map.

          key_value_pair

          • key
            TypeString
            Description

            Key
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • value
            TypeString
            Description

            Value
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • ordering_key_template
          TypeString
          Default""
          Description

          The template for formatting the outgoing message ordering key. Undefined values will be rendered as empty string values. This value will not be added to the message if it's empty.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • payload_template
          TypeString
          Default""
          Description

          The template for formatting the outgoing messages. If undefined, will send all the available context in JSON format.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • pubsub_topic
          TypeString
          Description

          The GCP PubSub topic to publish messages to.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • s3

      TypeMap($name->Struct(s3))
      Description

      S3 Upload Action Config

      s3

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeOneOf(Struct(s3_aggregated_upload_parameters),Struct(s3_direct_upload_parameters))
        Description

        Action that takes incoming events and uploads them to the S3 API compatible service.

        s3_aggregated_upload_parameters

        • mode
          TypeString("aggregated")
          Description

          Enables time-based aggregation of incoming events and uploading them to the S3 service as a single object.

        • container
          TypeOneOf(Struct(s3_aggregated_container_csv))
          Default{type = csv}
          Description

          Settings governing the file format of an upload containing aggregated events.

          s3_aggregated_container_csv

          • type
            TypeString("csv")
            Description

            Records (events) will be aggregated and uploaded as a CSV file.

          • column_order
            TypeArray(String)
            Default[]
            Description

            Event fields that will be ordered first as columns in the resulting CSV file.
            Regardless of this setting, resulting CSV will contain all the fields of aggregated events, but all the columns not explicitly mentioned here will be ordered after the ones listed here in the lexicographical order.

        • aggregation
          TypeStruct(s3_aggregation)
          Description

          Set of parameters governing the aggregation process.

          s3_aggregation

          • time_interval
            TypeDuration(s)
            Default"30m"
            Description

            Amount of time events will be aggregated in a single object before uploading.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • max_records
            TypeInteger(1..+inf)
            Default"100000"
            Description

            Number of records (events) allowed per each aggregated object. Each aggregated upload will contain no more than that number of events, but may contain less.
            If event rate is high enough, there obviously may be more than one aggregated upload during the same time interval. These uploads will have different, but consecutive sequence numbers, which will be a part of S3 object key.

        • bucket
          TypeString
          Description

          The name of the S3 bucket.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • key
          TypeString
          Description

          Template for the S3 object key of an aggregated upload.
          Template may contain placeholders for the following variables:

          • ${action}: name of the action (required).
          • ${node}: name of the EMQX node conducting the upload (required).
          • ${datetime.{format}}: date and time when aggregation started, formatted according to the {format} string (required):
            • ${datetime.rfc3339utc}: RFC3339-formatted date and time in UTC,
            • ${datetime.rfc3339}: RFC3339-formatted date and time in local timezone,
            • ${datetime.unix}: Unix timestamp.
          • ${datetime_until.{format}}: date and time when aggregation ended, with the same formatting options.
          • ${sequence}: sequence number of the aggregated upload within the same time interval (required).
          All other placeholders are considered invalid. Note that placeholders marked as required will be added as a path suffix to the S3 object key if they are missing from the template.
          A string for `${.path.to.var}` style value interpolation, where the leading dot is optional, and `${.}` represents all values as an object.
        • acl
          TypeEnum(private,public_read,public_read_write,authenticated_read,bucket_owner_read,bucket_owner_full_control)
          Description

          The ACL to use for the uploaded objects.

        • headers
          TypeMap
          Description

          HTTP headers to include in the S3 object upload request.
          Useful to specify content type, content encoding, etc. of the S3 object.

        • min_part_size
          TypeBytesize
          Default"5mb"
          Description

          The minimum part size for multipart uploads.
          Uploaded data will be accumulated in memory until this size is reached.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • max_part_size
          TypeBytesize
          Default"5gb"
          Description

          The maximum part size for multipart uploads.
          S3 uploader won't try to upload parts larger than this size.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        s3_direct_upload_parameters

        • bucket
          TypeString
          Description

          The name of the S3 bucket.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • key
          TypeString
          Description

          Key of the S3 object.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • acl
          TypeEnum(private,public_read,public_read_write,authenticated_read,bucket_owner_read,bucket_owner_full_control)
          Description

          The ACL to use for the uploaded objects.

        • headers
          TypeMap
          Description

          HTTP headers to include in the S3 object upload request.
          Useful to specify content type, content encoding, etc. of the S3 object.

        • mode
          TypeString("direct")
          Defaultdirect
          Description

          Enables uploading of events to the S3 service as separate objects.

        • content
          TypeString
          Default"${.}"
          Description

          Content of the S3 object being uploaded. Supports templates.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(s3_upload_resource_opts)
        Default{}
        Description

        Resource options.

        s3_upload_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default100
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"10ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • mongodb

      TypeMap($name->Struct(mongodb_action))
      Description

      MongoDB Action Config

      mongodb_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Additional parameters specific to this action type

        action_parameters

        • collection
          TypeString
          Defaultmqtt
          Description

          The collection where data will be stored into
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • payload_template
          TypeString
          Description

          The template for formatting the outgoing messages. If undefined, rule engine will use JSON format to serialize all visible inputs, such as clientid, topic, payload etc.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • syskeeper_forwarder

      TypeMap($name->Struct(config))
      Description

      Syskeeper Forwarder Action Config

      config

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(parameters)
        Description

        Syskeeper action parameters

        parameters

        • target_topic
          TypeString
          Default"${topic}"
          Description

          The topic for the forwarded message
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • target_qos
          TypeInteger(0..2)
          Description

          The QoS for the forwarded message. To preserve the original QoS of the forwarded message, the value can be omitted.

        • template
          TypeString
          Default"${payload}"
          Description

          Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(creation_opts)
        Default{}
        Description

        Resource options.

        creation_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • start_after_created
          TypeBoolean
          Defaulttrue
          Description

          Whether start the resource right after created.

        • start_timeout
          TypeDuration
          Default"5s"
          Description

          Time interval to wait for an auto-started resource to become healthy before responding resource creation requests.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • auto_restart_interval
          TypeOneOf(String("infinity"),Duration)
          Description

          Deprecated since 5.1.0.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Defaultinfinity
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • enable_queue
          TypeBoolean
          Description

          Deprecated since v5.0.14.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • timescale

      TypeMap($name->Struct(pgsql_action))
      Description

      Timescale Action Config

      pgsql_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Configuration Parameters Specific to the PostgreSQL Action

        action_parameters

        • sql
          TypeString
          Default"insert into t_mqtt_msg(msgid, topic, qos, payload, arrived) values (${id}, ${topic}, ${qos}, ${payload}, TO_TIMESTAMP((${timestamp} :: bigint)/1000))"
          Description

          SQL Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • matrix

      TypeMap($name->Struct(pgsql_action))
      Description

      Matrix Action Config

      pgsql_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Configuration Parameters Specific to the PostgreSQL Action

        action_parameters

        • sql
          TypeString
          Default"insert into t_mqtt_msg(msgid, topic, qos, payload, arrived) values (${id}, ${topic}, ${qos}, ${payload}, TO_TIMESTAMP((${timestamp} :: bigint)/1000))"
          Description

          SQL Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • opents

      TypeMap($name->Struct(action_config))
      Description

      OpenTSDB Action Config

      action_config

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        OpenTSDB action parameters

        action_parameters

        • data
          TypeArray(Struct(action_parameters_data))
          Default[]
          Description

          OpenTSDB action parameter data

          action_parameters_data

          • timestamp
            TypeString
            Description

            Timestamp. Placeholders in the format of ${var} are supported
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • metric
            TypeString
            Description

            Metric. Placeholders in the format of ${var} are supported
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • tags
            TypeOneOf(Map,String)
            Description

            Tags. Only supports with placeholder to extract tags from a variable or a tags map

          • value
            TypeOneOf(Integer,Float,String)
            Description

            Value. Placeholders in the format of ${var} are supported

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • oracle

      TypeMap($name->Struct(oracle_action))
      Description

      Oracle Action Config

      oracle_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configuration.

        action_parameters

        • sql
          TypeString
          Default"insert into t_mqtt_msgs(msgid, topic, qos, payload) values (${id}, ${topic}, ${qos}, ${payload})"
          Description

          SQL Template. The template string can contain placeholders for message metadata and payload field. The placeholders are inserted without any checking and special formatting, so it is important to ensure that the inserted values are formatted and escaped correctly.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • pgsql

      TypeMap($name->Struct(pgsql_action))
      Description

      PostgreSQL Action Config

      pgsql_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Configuration Parameters Specific to the PostgreSQL Action

        action_parameters

        • sql
          TypeString
          Default"insert into t_mqtt_msg(msgid, topic, qos, payload, arrived) values (${id}, ${topic}, ${qos}, ${payload}, TO_TIMESTAMP((${timestamp} :: bigint)/1000))"
          Description

          SQL Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • tdengine

      TypeMap($name->Struct(action_config))
      Description

      TDengine Action Config

      action_config

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        TDengine action parameters

        action_parameters

        • database
          TypeString
          Description

          Database name.

        • sql
          TypeString
          Default"insert into t_mqtt_msg(ts, msgid, mqtt_topic, qos, payload, arrived) values (${ts}, '${id}', '${topic}', ${qos}, '${payload}', ${timestamp})"
          Description

          SQL Template
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • undefined_vars_as_null
          TypeBoolean
          Defaultfalse
          Description

          When writing to databases, treat undefined variables as NULL. When this option is enabled, if undefined variables (like ${var}) are used in templates, they will be replaced with "NULL" instead of the string "undefined". If this option is not enabled (default), the string "undefined" might be inserted. This option should always be true if possible; the default value false is only to ensure backward compatibility.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • snowflake

      TypeMap($name->Struct(snowflake))
      Description

      Snowflake Action Config

      snowflake

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeOneOf(Struct(aggreg_parameters))
        Description

        Set of parameters for the action.

        aggreg_parameters

        • mode
          TypeString("aggregated")
          Description

          Enables time-based aggregation of incoming events and uploading them to the Snowflake as a single object. This aggregation is done independently by each node in the cluster.

        • aggregation
          TypeStruct(aggregation)
          Description

          Set of parameters governing the aggregation process.

          aggregation

          • container
            TypeOneOf(Struct(container_csv))
            Default{type = csv}
            Description

            Settings governing the file format of an upload containing aggregated events.

            container_csv

            • type
              TypeString("csv")
              Description

              Records (events) will be aggregated and uploaded as a CSV file.

            • column_order
              TypeArray(String)
              Default[]
              Description

              Event fields that will be ordered first as columns in the resulting CSV file.
              Regardless of this setting, resulting CSV will contain all the fields of aggregated events, but all the columns not explicitly mentioned here will be ordered after the ones listed here in the lexicographical order.

          • time_interval
            TypeDuration(s)
            Default"1h"
            Description

            Amount of time events will be aggregated in a single file on each node before uploading.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • max_records
            TypeInteger(1..+inf)
            Default1000000
            Description

            Number of records (events) allowed per each aggregated file. Each aggregated upload will contain no more than that number of events, but may contain less.
            If event rate is high enough, there obviously may be more than one aggregated upload during the same time interval. These uploads will have different, but consecutive sequence numbers, which will be a part of Snowflake staged file name.

        • private_key
          TypeSecret
          Description

          The private key configured for the Pipe User. This supports the input formats below:

          • Plain key: Enter the private key contents in PEM format directly as a string value.
          • File Path: Specify the path to a file that contains the private key. Ensure the path starts with file://. The file path must be the same on all nodes in the cluster.
            A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.
        • database
          TypeString
          Description

          Name of the Database that contains the Snowflake resources.

        • schema
          TypeString
          Description

          Name of the Schema that contains the Snowflake resources.

        • stage
          TypeString
          Description

          Name of the Stage that'll be used for loading data files into Snowflake.

        • pipe
          TypeString
          Description

          Name of the Pipe that'll be used to ingest data into the table.

        • pipe_user
          TypeString
          Description

          A username which has a role with permissions over the Pipe to be used. The minimum permissions are operate and monitor.

        • connect_timeout
          TypeDuration
          Default"15s"
          Description

          The timeout when connecting to the HTTP server.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • pipelining
          TypeInteger(1..+inf)
          Default100
          Description

          A positive integer. Whether to send HTTP requests continuously, when set to 1, it means that after each HTTP request is sent, you need to wait for the server to return and then continue to send the next request.

        • pool_size
          TypeInteger(1..+inf)
          Default8
          Description

          The pool size.

        • max_retries
          TypeInteger(0..+inf)
          Default3
          Description

          Max retry attempts if there's an error when sending an HTTP request.

        • proxy
          TypeOneOf(String("none"),Struct(proxy_config))
          Defaultnone
          Description

          Proxy configuration. Only plain HTTP proxies are currently supported (no HTTPS).

          proxy_config

          • host
            TypeString
            Description

            Proxy host address to connect to.

          • port
            TypeInteger(1..65535)
            Description

            Proxy port to use when connecting.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default100
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"10ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • http

      Aliaseswebhook
      TypeMap($name->Struct(http_action))
      Description

      HTTP Action Config

      http_action

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • parameters

        TypeStruct(parameters_opts)
        Description

        The parameters for HTTP action.

        parameters_opts

        • path
          TypeString
          Description

          The URL path for this Action.
          This path will be appended to the Connector's url configuration to form the full URL address. Template with variables is allowed in this option. For example, /room/{$room_no}
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • method
          TypeEnum(post,put,get,delete)
          Defaultpost
          Description

          The method of the HTTP request. All the available methods are: post, put, get, delete.
          Template with variables is allowed.

        • headers
          TypeMap
          Default{accept = "application/json", cache-control = "no-cache", connection = "keep-alive", content-type = "application/json", keep-alive = "timeout=5"}
          Description

          The headers of the HTTP request.
          Template with variables is allowed.

        • body
          TypeString
          Description

          The body of the HTTP request.
          If not provided, the body will be a JSON object of all the available fields.
          There, 'all the available fields' means the context of a MQTT message when this webhook is triggered by receiving a MQTT message (the local_topic is set), or the context of the event when this webhook is triggered by a rule (i.e. this webhook is used as an action of a rule).
          Template with variables is allowed.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • max_retries
          TypeInteger(0..+inf)
          Default2
          Description

          HTTP request max retry times if failed.

        • request_timeout
          TypeDuration
          Description

          Deprecated since v5.0.26.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • clickhouse

      TypeMap($name->Struct(clickhouse_action))
      Description

      ClickHouse Action Config

      clickhouse_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configs.

        action_parameters

        • sql
          TypeString
          Default"INSERT INTO messages(data, arrived) VALUES ('${payload}', ${timestamp})"
          Description

          The template string can contain ${field} placeholders for message metadata and payload field. Make sure that the inserted values are formatted and escaped correctly. Prepared Statement is not supported.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • undefined_vars_as_null
          TypeBoolean
          Defaultfalse
          Description

          When writing to databases, treat undefined variables as NULL. When this option is enabled, if undefined variables (like ${var}) are used in templates, they will be replaced with "NULL" instead of the string "undefined". If this option is not enabled (default), the string "undefined" might be inserted. This option should always be true if possible; the default value false is only to ensure backward compatibility.

        • batch_value_separator
          TypeString
          Default", "
          Description

          The default value ',' works for the VALUES format. You can also use other separator if other format is specified. See INSERT INTO Statement.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • influxdb

      TypeMap($name->Struct(influxdb_action))
      Description

      InfluxDB Action Config

      influxdb_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Additional parameters specific to this action type

        action_parameters

        • write_syntax
          TypeString
          Description

          Conf of InfluxDB line protocol to write data points. It is a text-based format that provides the measurement, tag set, field set, and timestamp of a data point, and placeholder supported. See also InfluxDB 2.3 Line Protocol and InfluxDB 1.8 Line Protocol
          TLDR:

          <measurement>[,<tag_key>=<tag_value>[,<tag_key>=<tag_value>]] <field_key>=<field_value>[,<field_key>=<field_value>] [<timestamp>]
          

          Please note that a placeholder for an integer value must be annotated with a suffix i. For example ${payload.int_value}i.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • precision
          TypeEnum(ns,us,ms,s)
          Defaultms
          Description

          InfluxDB time precision.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • batch_size
          TypeInteger(1..+inf)
          Default1
          Description

          Maximum batch count. If equal to 1, there's effectively no batching.

        • batch_time
          TypeDuration
          Default"0ms"
          Description

          Maximum waiting interval when accumulating a batch at a low message rates for more efficient resource usage.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • confluent_producer

      TypeMap($name->Struct(actions))
      Description

      Confluent Actions Config

      actions

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in Confluent.

      • parameters

        Aliaseskafka
        TypeStruct(producer_kafka_opts)
        Description

        Confluent producer configs.

        producer_kafka_opts

        • topic
          TypeString
          Description

          Kafka topic name. Supports templates (e.g.: t-${payload.t}).
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • message
          TypeStruct(kafka_message)
          Description

          Template for rendering a message.

          kafka_message

          • key
            TypeString
            Default"${.clientid}"
            Description

            Template for rendering message key. If the template is rendered into a NULL value (i.e. there is no such data field in Rule Engine context) then NULL (but not empty string) is used.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • value
            TypeString
            Default"${.}"
            Description

            Template to render Confluent message value. If the template is rendered into a NULL value (i.e. there is no such data field in Rule Engine context) then Confluent's NULL (but not empty string) is used.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • max_linger_time
          TypeDuration
          Default"0ms"
          Description

          Maximum duration for a per-partition producer to wait for messages in order to collect a batch to buffer. The default value 0 means no wait. For non-memory buffer mode, it's advised to configure at least 5ms for less IOPS.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_linger_bytes
          TypeBytesize
          Default"10MB"
          Description

          Maximum number of bytes for a per-partition producer to wait for messages in order to collect a batch to buffer.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • max_batch_bytes
          TypeBytesize
          Default"896KB"
          Description

          Maximum bytes to collect in a Confluent message batch. Most of the Kafka brokers default to a limit of 1 MB batch size. EMQX's default value is less than 1 MB in order to compensate Kafka message encoding overheads (especially when each individual message is very small). When a single message is over the limit, it is still sent (as a single element batch).
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • compression
          TypeEnum(no_compression,snappy,gzip)
          Defaultno_compression
          Description

          Specify the method of compression.

        • partition_strategy
          TypeEnum(random,key_dispatch)
          Defaultrandom
          Description

          Partition strategy is to tell the producer how to dispatch messages to partitions.

          random: Randomly pick a partition for each message. key_dispatch: Assigns messages to partitions based on a hash of the message key, ensuring consistent partition for messages with the same key.

        • required_acks
          TypeEnum(all_isr,leader_only,none)
          Defaultall_isr
          Description

          The acknowledgement criteria for the partition leader. It determines the level of confirmation required from partition replicas before sending an acknowledgement back to the producer.

          all_isr: Require all in-sync replicas to acknowledge. leader_only: Require only the partition-leader's acknowledgement. none: No need for Kafka to acknowledge at all.

        • kafka_headers
          TypeString
          Description

          Provide a placeholder for message headers
          e.g. ${pub_props}
          Note that the value of the placeholder must be either an object: {"foo": "bar"} or an array of key-value pairs: [{"key": "foo", "value": "bar"}]
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • kafka_ext_headers
          TypeArray(Struct(producer_kafka_ext_headers))
          Description

          Please provide more key-value pairs for Confluent headers
          The key-value pairs here will be combined with the value of kafka_headers field before sending to Confluent.

          producer_kafka_ext_headers

          • kafka_ext_header_key
            TypeString
            Description

            Key of the header. Placeholders in format of ${var} are supported.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

          • kafka_ext_header_value
            TypeString
            Description

            Value of the header. Placeholders in format of ${var} are supported.
            A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • kafka_header_value_encode_mode
          TypeEnum(none,json)
          Defaultnone
          Description

          The encoding mode for headers.

          • none: Add only strings are added as header values
          • json: Encode header values as JSON string
        • partition_count_refresh_interval
          TypeDuration(s)
          Default"60s"
          Description

          The time interval for Confluent producer to discover increased number of partitions. After the number of partitions is increased in Confluent, EMQX will start taking the discovered partitions into account when dispatching messages per partition_strategy.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partitions_limit
          TypeOneOf(String("all_partitions"),Integer(1..+inf))
          Defaultall_partitions
          Description

          Limit the number of partitions to produce data for the given topic. The special value all_partitions is to utilize all partitions for the topic. Setting this to a value which is greater than the total number of partitions in has no effect.

        • max_inflight
          TypeInteger(1..+inf)
          Default10
          Description

          The maximum number of message batches that the producer can send to each partition before it must wait for an acknowledgement. Setting a higher number can enhance throughput. However, value above 1 may lead to potential message reordering risks.

        • buffer
          TypeStruct(producer_buffer)
          Description

          Configure producer message buffer.

          Tell Confluent producer how to buffer messages when EMQX has more messages to send than Confluent can keep up, or when Confluent is down.

          producer_buffer

          • mode
            TypeEnum(memory,disk,hybrid)
            Defaultmemory
            Description

            Message buffer mode.

            memory: Buffer all messages in memory. The messages will be lost in case of EMQX node restart disk: Buffer all messages on disk. The messages on disk are able to survive EMQX node restart. hybrid: Buffer message in memory first, when up to certain limit (see segment_bytes config for more information), then start offloading messages to disk, Like memory mode, the messages will be lost in case of EMQX node restart.

          • per_partition_limit
            TypeBytesize
            Default"2GB"
            Description

            Number of bytes allowed to buffer for each partition. When this limit is exceeded, older messages will be discarded to make room for new messages to be buffered.
            A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

          • segment_bytes
            TypeBytesize
            Default"10MB"
            Description

            Applicable when buffer mode is set to disk or hybrid. This setting specifies the size of each buffer file stored on disk.
            A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

          • memory_overload_protection
            TypeBoolean
            Defaultfalse
            Description

            Applicable when buffer mode is set to memory EMQX will drop old buffered messages under high memory pressure. The high memory threshold is defined in config sysmon.os.sysmem_high_watermark. NOTE: This config only works on Linux.

        • query_mode
          TypeEnum(async,sync)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • sync_query_timeout
          TypeDuration
          Default"5s"
          Description

          This parameter defines the timeout limit for synchronous queries. It applies only when the action query mode is configured to 'sync'.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • resource_opts

        TypeStruct(resource_opts)
        Default{}

        resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

    • mqtt

      TypeMap($name->Struct(mqtt_publisher_action))
      Description

      MQTT Publisher Action Config

      mqtt_publisher_action

      • local_topic

        TypeString
        Description

        MQTT topic or topic filter as data source (action input). If rule action is used as data source, this config should be left empty, otherwise messages will be duplicated in the remote system.

      • parameters

        TypeStruct(action_parameters)
        Description

        Action specific configs.

        action_parameters

        • topic
          TypeString
          Description

          Forward to which topic of the remote broker.
          Template with variables is allowed.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

        • qos
          TypeOneOf(Integer(0..2),String)
          Default1
          Description

          The QoS of the MQTT message to be sent.
          Template with variables is allowed.

        • retain
          TypeOneOf(Boolean,String)
          Defaultfalse
          Description

          The 'retain' flag of the MQTT message to be sent.
          Template with variables is allowed.

        • payload
          TypeString
          Description

          The payload of the MQTT message to be sent.
          Template with variables is allowed.
          A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(action_resource_opts)
        Default{}
        Description

        Resource options.

        action_resource_opts

        • worker_pool_size
          TypeInteger(1..1024)
          Default16
          Description

          The number of buffer workers. Only applicable for egress type bridges. For bridges only have ingress direction data flow, it can be set to 0 otherwise must be greater than 0.

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • query_mode
          TypeEnum(sync,async)
          Defaultasync
          Description

          Query mode. Optional 'sync/async', default 'async'.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

        • inflight_window
          Aliasesasync_inflight_window
          TypeInteger(1..+inf)
          Default100
          Description

          Query inflight window. When query_mode is set to async, this config has to be set to 1 if messages from the same MQTT client have to be strictly ordered.

        • max_buffer_bytes
          Aliasesmax_queue_bytes
          TypeBytesize
          Default"256MB"
          Description

          Maximum number of bytes to buffer for each buffer worker.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

  • sources

    TypeStruct(sources)

    sources

    • kafka_consumer

      TypeMap($name->Struct(consumer_source))
      Description

      Kafka Consumer Source Config

      consumer_source

      • parameters

        TypeStruct(source_parameters)
        Description

        Source configs.

        source_parameters

        • topic
          TypeString
          Description

          Kafka topic to consume from.

        • group_id
          TypeString
          Description

          Consumer group identifier to be used for this source. If omitted, one based off the source name will be automatically generated.

        • max_wait_time
          TypeDuration
          Default"1s"
          Description

          Maximum amount of time that is waited for the Kafka broker to send a fetch response.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • max_batch_bytes
          TypeBytesize
          Default"896KB"
          Description

          Set how many bytes to pull from Kafka in each fetch request. Messages are fetched in batches by the consumer, and if the first record batch in the first non-empty partition of the fetch is larger than this value, the record batch will still be returned to ensure that the consumer can make progress. As such, this is not an absolute maximum. Set 1 for minimal latency.
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • offset_reset_policy
          TypeEnum(latest,earliest)
          Defaultlatest
          Description

          Defines from which offset a consumer should start fetching when there is no commit history or when the commit history becomes invalid.

        • offset_commit_interval_seconds
          TypeDuration(s)
          Default"5s"
          Description

          Defines the time interval between two offset commit requests sent for each consumer group.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • key_encoding_mode
          TypeEnum(none,base64)
          Defaultnone
          Description

          Defines how the key from the Kafka message is encoded before being forwarded via MQTT. none Uses the key from the Kafka message unchanged. Note: in this case, the key must be a valid UTF-8 string. base64 Uses base-64 encoding on the received key.

        • value_encoding_mode
          TypeEnum(none,base64)
          Defaultnone
          Description

          Defines how the value from the Kafka message is encoded before being forwarded via MQTT. none Uses the value from the Kafka message unchanged. Note: in this case, the value must be a valid UTF-8 string. base64 Uses base-64 encoding on the received value.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(source_resource_opts)
        Default{}
        Description

        Resource options.

        source_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • rabbitmq

      TypeMap($name->Struct(subscriber_source))
      Description

      MQTT Subscriber Source Config

      subscriber_source

      • parameters

        TypeStruct(source_parameters)
        Description

        The source config defines how this bridge receive messages from the remote RabbitMQ broker

        source_parameters

        • queue
          TypeString
          Description

          The queue name of the RabbitMQ broker.

        • wait_for_publish_confirmations
          TypeBoolean
          Defaulttrue
          Description

          A boolean value that indicates whether to wait for RabbitMQ to confirm message publication when using publisher confirms.

        • no_ack
          TypeBoolean
          Defaulttrue
          Description

          Whether to use no_ack mode when consuming messages from the RabbitMQ broker.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(source_resource_opts)
        Default{}
        Description

        Resource options.

        source_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • gcp_pubsub_consumer

      TypeMap($name->Struct(consumer_source))
      Description

      GCP PubSub Consumer Source Config

      consumer_source

      • parameters

        TypeStruct(source_parameters)
        Description

        Source configs.

        source_parameters

        • topic
          TypeString
          Description

          The GCP PubSub topic to publish messages to.

        • pull_max_messages
          TypeInteger(1..+inf)
          Default100
          Description

          The maximum number of messages to retrieve from GCP PubSub in a single pull request. The actual number may be less than the specified value.

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(source_resource_opts)
        Default{}
        Description

        Resource options.

        source_resource_opts

        • health_check_interval
          TypeDuration
          Default"30s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • request_ttl
          Aliasesrequest_timeout
          TypeOneOf(Duration,String("infinity"))
          Default"45s"
          Description

          Starting from the moment when the request enters the buffer, if the request remains in the buffer for the specified time or is sent but does not receive a response or acknowledgement in time, the request is considered expired.

    • mqtt

      TypeMap($name->Struct(mqtt_subscriber_source))
      Description

      MQTT Subscriber Source Config

      mqtt_subscriber_source

      • parameters

        TypeStruct(ingress_parameters)

        ingress_parameters

        • topic
          TypeString
          Description

          Receive messages from which topic of the remote broker

        • qos
          TypeInteger(0..2)
          Default1
          Description

          The QoS level to be used when subscribing to the remote broker

      • connector

        TypeString
        Description

        Name of the connector specified by the action, used for external resource selection.

      • tags

        TypeArray(String)
        Description

        Tags to annotate this config entry.

      • description

        TypeString
        Default""
        Description

        Descriptive text.

      • resource_opts

        TypeStruct(source_resource_opts)
        Default{}
        Description

        Resource options.

        source_resource_opts

        • health_check_interval
          TypeDuration
          Default"15s"
          Description

          Health check interval.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

  • retainer

    TypeStruct(retainer)

    retainer

    • msg_expiry_interval

      TypeDuration
      Default"0s"
      Description

      Expired retained messages will not be delivered again, and a setting of 0 means that retained messages will never expire.

      However, if the Message-Expiry-Interval property is specified in the MQTT message, the value of that property prevails.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • msg_expiry_interval_override

      TypeOneOf(String("disabled"),Duration)
      Defaultdisabled
      Description

      If set, this value will take precedence over any Message-Expiry-Interval property specified in retained MQTT messages, allowing messages to expire earlier if necessary. This override only applies to the garbage collection process: it does not affect the expiry time of messages being written nor that of already written messages while iterating over them. Therefore, messages that are candidate for garbage collection when overridden may still be visible when subscribing to retained topics.

    • allow_never_expire

      TypeBoolean
      Defaulttrue
      Description

      If true, retained messages set to never expire (i.e., whose Message-Expiry-Interval = 0) are not affected by the expiry time override. This configuration only takes effect when msg_expiry_interval_override is set.

    • msg_clear_interval

      TypeDuration
      Default"0s"
      Description

      The time interval for checking and clearing expired retained messages. This can prevent expired retained messages from being stored for a long time.

      If msg_clear_interval is set to 0, that is, expired retained messages are not actively checked regularly, EMQX will only check and delete expired retained messages when preparing for delivery.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • max_payload_size

      TypeBytesize
      Default"1MB"
      Description

      The maximum size of retained messages allowed to be stored. EMQX will refuse to store retained messages larger than this size and output an Error log with the keyword 'retain_failed_for_payload_size_exceeded_limit'.

      0 means unlimited retained message size.
      A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

    • stop_publish_clear_msg

      TypeBoolean
      Defaultfalse
      Description

      When the retained flag of the PUBLISH message is set and Payload is empty, whether to continue to publish the message. See: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.html#_Toc398718038

    • delivery_rate

      Aliasesdeliver_rate
      TypeString
      Default"1000/s"
      Description

      The maximum rate of delivering retained messages

    • backend

      TypeStruct(mnesia_config)
      Description

      Settings for the database storing the retained messages.

      mnesia_config

      • type

        TypeString("built_in_database")
        Defaultbuilt_in_database
        Description

        Backend type.

      • storage_type

        TypeEnum(ram,disc)
        Defaultram
        Description

        Specifies whether the messages are stored in RAM or persisted on disc.

      • max_retained_messages

        TypeInteger(0..+inf)
        Default0
        Description

        Maximum number of retained messages. 0 means no limit.

      • index_specs

        TypeArray(Integer)
        Default[[1, 2, 3], [1, 3], [2, 3], [3]]
        Description

        Retainer index specifications: list of arrays of positive ascending integers. Each array specifies an index. Numbers in an index specification are 1-based word positions in topics. Words from specified positions will be used for indexing.
        For example, it is good to have [2, 4] index to optimize +/X/+/Y/... topic wildcard subscriptions.

  • delayed

    TypeStruct(delayed)

    delayed

    • max_delayed_messages

      TypeInteger
      Default0
      Description

      Maximum number of delayed messages (0 is no limit).

  • plugins

    TypeStruct(plugins)

    plugins

    • states

      TypeArray(Struct(state))
      Default[]
      Description

      An array of plugins in the desired states.
      The plugins are started in the defined order

      state

      • name_vsn

        TypeString
        Description

        The {name}-{version} of the plugin.
        It should match the plugin application name-version as plugin release package name
        For example: my_plugin-0.1.0.

    • install_dir

      TypeString
      Defaultplugins
      Description

      The installation directory for the external plugins. The plugin beam files and configuration files should reside in the subdirectory named as emqx_foo_bar-0.1.0.
      NOTE: For security reasons, this directory should NOT be writable by anyone except emqx (or any user which runs EMQX).

    • check_interval

      TypeDuration
      Description

      Deprecated since 5.0.24.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

  • dashboard

    TypeStruct(dashboard)

    dashboard

    • listeners

      TypeStruct(listeners)
      Description

      HTTP(s) listeners are identified by their protocol type and are used to serve dashboard UI and restful HTTP API. Listeners must have a unique combination of port number and IP address. For example, an HTTP listener can listen on all configured IP addresses on a given port for a machine by specifying the IP address 0.0.0.0. Alternatively, the HTTP listener can specify a unique IP address for each listener, but use the same port.

      listeners

      • http

        TypeStruct(http)
        Description

        TCP listeners

        http

        • bind
          TypeString
          Default0
          Description

          Bind the listener to a specified address and port number, for example 127.0.0.1:18083. If configured with just the port number (e.g. 18083) it's equivalent to binding to all addresses 0.0.0.0. The listener is disabled if bind is 0.

        • num_acceptors
          TypeInteger
          Default2
          Description

          Socket acceptor pool size for TCP protocols. Default is the number of schedulers online

        • max_connections
          TypeInteger
          Default512
          Description

          The maximum number of concurrent connections allowed by the listener.

        • backlog
          TypeInteger
          Default1024
          Description

          Defines the maximum length that the queue of pending connections can grow to.

        • send_timeout
          TypeDuration
          Default"10s"
          Description

          Send timeout for the socket.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • inet6
          TypeBoolean
          Defaultfalse
          Description

          Enable IPv6 support, default is false, which means IPv4 only.

        • ipv6_v6only
          TypeBoolean
          Defaultfalse
          Description

          Disable IPv4-to-IPv6 mapping for the listener. The configuration is only valid when the inet6 is true.

        • proxy_header
          TypeBoolean
          Defaultfalse
          Description

          Enable support for HAProxy header. Be aware once enabled regular HTTP requests can't be handled anymore.

      • https

        TypeStruct(https)
        Description

        SSL listeners

        https

        • bind
          TypeString
          Default0
          Description

          Bind the listener to a specified address and port number, for example 127.0.0.1:18083. If configured with just the port number (e.g. 18083) it's equivalent to binding to all addresses 0.0.0.0. The listener is disabled if bind is 0.

        • ssl_options
          TypeStruct(ssl_options)
          Description

          SSL/TLS options for the dashboard listener.

          ssl_options

          • cacertfile
            TypeString
            Default"${EMQX_ETC_DIR}/certs/cacert.pem"
            Description

            Trusted PEM format CA certificates bundle file.
            The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
            NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

          • cacerts
            TypeBoolean
            Description

            Deprecated since 5.1.4.

          • certfile
            TypeString
            Default"${EMQX_ETC_DIR}/certs/cert.pem"
            Description

            PEM format certificates chain file.
            The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

          • keyfile
            TypeString
            Default"${EMQX_ETC_DIR}/certs/key.pem"
            Description

            PEM format private key file.

          • verify
            TypeEnum(verify_peer,verify_none)
            Defaultverify_none
            Description

            Enable or disable peer verification.

          • reuse_sessions
            TypeBoolean
            Defaulttrue
            Description

            Enable TLS session reuse.
            Has no effect when TLS version is configured (or negotiated) to 1.3

          • depth
            TypeInteger(0..+inf)
            Default10
            Description

            Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
            if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
            if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

          • password
            TypeSecret
            Description

            String containing the user's password. Only used if the private key file is password-protected.
            A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

          • versions
            TypeArray(String)
            Default["tlsv1.3", "tlsv1.2"]
            Description

            All TLS/DTLS versions to be supported.
            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
            In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

          • ciphers
            TypeArray(String)
            Default[]
            Description

            This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
            Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

            The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

            NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
            If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
            PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

          • secure_renegotiate
            TypeBoolean
            Defaulttrue
            Description

            Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

            By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

            Has no effect when TLS version is configured (or negotiated) to 1.3.

          • log_level
            TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
            Defaultnotice
            Description

            The minimum level of logging allowed for SSL output.

            The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

          • hibernate_after
            TypeDuration
            Default"5s"
            Description

            Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

            The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • partial_chain
            TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
            Description

            Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

          • verify_peer_ext_key_usage
            TypeString
            Description

            Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

            Allowed values are

            • clientAuth
            • serverAuth
            • codeSigning
            • emailProtection
            • timeStamping
            • ocspSigning
            • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

            Comma-separated string is also supported for validating more than one key usages.

            For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

          • dhfile
            TypeString
            Description

            Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
            NOTE: The dhfile option is not supported by TLS 1.3.

          • fail_if_no_peer_cert
            TypeBoolean
            Defaultfalse
            Description

            This option is only effective if verify is set to verify_peer.

            If set to true, EMQX will reject the connection if the client fails to provide a certificate.

            If set to false, EMQX will accept clients which don't present a certificate.

          • honor_cipher_order
            TypeBoolean
            Defaulttrue
            Description

            An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

            The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

            It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

          • client_renegotiation
            TypeBoolean
            Defaulttrue
            Description

            In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
            Has no effect when TLS version is configured (or negotiated) to 1.3

          • handshake_timeout
            TypeDuration
            Default"15s"
            Description

            Maximum time duration allowed for the handshake to complete
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • num_acceptors
          TypeInteger
          Default2
          Description

          Socket acceptor pool size for TCP protocols. Default is the number of schedulers online

        • max_connections
          TypeInteger
          Default512
          Description

          The maximum number of concurrent connections allowed by the listener.

        • backlog
          TypeInteger
          Default1024
          Description

          Defines the maximum length that the queue of pending connections can grow to.

        • send_timeout
          TypeDuration
          Default"10s"
          Description

          Send timeout for the socket.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • inet6
          TypeBoolean
          Defaultfalse
          Description

          Enable IPv6 support, default is false, which means IPv4 only.

        • ipv6_v6only
          TypeBoolean
          Defaultfalse
          Description

          Disable IPv4-to-IPv6 mapping for the listener. The configuration is only valid when the inet6 is true.

        • proxy_header
          TypeBoolean
          Defaultfalse
          Description

          Enable support for HAProxy header. Be aware once enabled regular HTTP requests can't be handled anymore.

    • default_password

      TypeString
      Defaultpublic
      Description

      The password used to initialize a database record for admin user. NOTE: Changing the default password after it has been initialized (boot up for the fist time) has no effect. Once initialized, the default password public must be changed from dashboard or CLI as soon as possible.

    • token_expired_time

      TypeDuration
      Default"60m"
      Description

      JWT token expiration time. Default is 60 minutes
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • cors

      TypeBoolean
      Defaultfalse
      Description

      Support Cross-Origin Resource Sharing (CORS). Allows a server to indicate any origins (domain, scheme, or port) other than its own from which a browser should permit loading resources.

    • swagger_support

      TypeBoolean
      Defaulttrue
      Description

      Enable or disable support for swagger API documentation.

    • sso

      TypeStruct(sso)

      sso

      • ldap

        TypeStruct(ldap)

        ldap

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Whether to enable this backend.

        • backend
          TypeEnum(ldap)
          Description

          Backend type.

        • query_timeout
          TypeDuration
          Default"5s"
          Description

          Timeout for the LDAP query.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • server
          TypeString
          Description

          The IPv4 or IPv6 address or the hostname to connect to.
          A host entry has the following form: Host[:Port].
          The LDAP default port 389 is used if [:Port] is not specified.

        • pool_size
          TypeInteger(1..+inf)
          Default8
          Description

          Size of the connection pool towards the bridge target service.

        • username
          TypeString
          Description

          The username associated with the bridge in the external database used for authentication or identification purposes.

        • password
          TypeSecret
          Description

          The password associated with the bridge, used for authentication with the external database.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • base_dn
          TypeString
          Description

          The name of the base object entry (or possibly the root) relative to which the Search is to be performed.

        • filter
          TypeString
          Default"(& (objectClass=person) (uid=${username}))"
          Description

          The filter for matching users in LDAP is by default (&(objectClass=person)(uid=${username})). For Active Directory, it should be set to (&(objectClass=user)(sAMAccountName=${username})) by default. Please refer to LDAP Filters for more details.

        • request_timeout
          TypeDuration
          Default"10s"
          Description

          Sets the maximum time in milliseconds that is used for each individual request.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • ssl
          TypeStruct(ssl)
          Default{enable = false}
          Description

          SSL connection settings.

          ssl

          • cacertfile
            TypeString
            Description

            Trusted PEM format CA certificates bundle file.
            The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
            NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

          • cacerts
            TypeBoolean
            Description

            Deprecated since 5.1.4.

          • certfile
            TypeString
            Description

            PEM format certificates chain file.
            The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

          • keyfile
            TypeString
            Description

            PEM format private key file.

          • verify
            TypeEnum(verify_peer,verify_none)
            Defaultverify_none
            Description

            Enable or disable peer verification.

          • reuse_sessions
            TypeBoolean
            Defaulttrue
            Description

            Enable TLS session reuse.
            Has no effect when TLS version is configured (or negotiated) to 1.3

          • depth
            TypeInteger(0..+inf)
            Default10
            Description

            Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
            if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
            if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

          • password
            TypeSecret
            Description

            String containing the user's password. Only used if the private key file is password-protected.
            A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

          • versions
            TypeArray(String)
            Default["tlsv1.3", "tlsv1.2"]
            Description

            All TLS/DTLS versions to be supported.
            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
            In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

          • ciphers
            TypeArray(String)
            Default[]
            Description

            This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
            Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

            The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

            NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
            If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
            PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

          • secure_renegotiate
            TypeBoolean
            Defaulttrue
            Description

            Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

            By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

            Has no effect when TLS version is configured (or negotiated) to 1.3.

          • log_level
            TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
            Defaultnotice
            Description

            The minimum level of logging allowed for SSL output.

            The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

          • hibernate_after
            TypeDuration
            Default"5s"
            Description

            Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

            The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • partial_chain
            TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
            Description

            Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

          • verify_peer_ext_key_usage
            TypeString
            Description

            Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

            Allowed values are

            • clientAuth
            • serverAuth
            • codeSigning
            • emailProtection
            • timeStamping
            • ocspSigning
            • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

            Comma-separated string is also supported for validating more than one key usages.

            For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

          • enable
            TypeBoolean
            Defaultfalse
            Description

            Enable TLS.

          • server_name_indication
            TypeOneOf(String("disable"),String)
            Description

            Specify the host name to be used in TLS Server Name Indication extension.
            For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
            If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
            The host name is then also used in the host name verification of the peer certificate.
            The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • oidc

        TypeStruct(oidc)

        oidc

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Whether to enable this backend.

        • backend
          TypeEnum(oidc)
          Description

          Backend type.

        • issuer
          TypeString
          Description

          The URL of the OIDC issuer.

        • clientid
          TypeString
          Description

          The clientId for this backend.

        • secret
          TypeSecret
          Description

          The client secret.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • scopes
          TypeArray(String)
          Default[openid]
          Description

          The scopes, its default value is ["openid"].

        • name_var
          TypeString
          Default"${sub}"
          Description

          A template to map OIDC user information to a Dashboard name, its default value is ${sub}.

        • dashboard_addr
          TypeString
          Default"http://127.0.0.1:18083"
          Description

          The address of the EMQX Dashboard.

        • session_expiry
          TypeDuration(s)
          Default"30s"
          Description

          The valid time span for an OIDC state, the default is 30s, if the code response returned by the authorization server exceeds this time span, it will be treated as invalid.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • require_pkce
          TypeBoolean
          Defaultfalse
          Description

          Whether to require PKCE when getting the token.

        • preferred_auth_methods
          TypeArray(Enum(private_key_jwt,client_secret_jwt,client_secret_post,client_secret_basic,none))
          Default[client_secret_post, client_secret_basic, none]
          Description

          Set the valid authentication methods and their priority.

        • provider
          TypeEnum(okta,generic)
          Defaultgeneric
          Description

          The OIDC provider.

        • fallback_methods
          TypeArray(String)
          Default[RS256]
          Description

          Some providers do not provide all the method items in the provider configuration, set this value as a fallback for those items.

        • client_jwks
          TypeOneOf(String("none"),Struct(client_file_jwks))
          Defaultnone
          Description

          Set JWK or JWKS here to enable the private_key_jwt authorization or the DPoP extension.

          client_file_jwks

          • type
            TypeEnum(file)
            Description

            The JWKS source type.

          • file
            TypeString
            Description

            The content of the JWKS.

      • saml

        TypeStruct(saml)

        saml

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Whether to enable this backend.

        • backend
          TypeEnum(saml)
          Description

          Backend type.

        • dashboard_addr
          TypeString
          Default"https://127.0.0.1:18083"
          Description

          The address of the EMQX Dashboard.

        • idp_metadata_url
          TypeString
          Default"https://idp.example.com"
          Description

          The URL of the IdP metadata.

        • sp_sign_request
          TypeBoolean
          Defaultfalse
          Description

          Whether to sign the SAML request.

        • sp_public_key
          TypeString
          Default"Pub Key"
          Description

          The public key of the SP.

        • sp_private_key
          TypeString
          Description

          The private key of the SP.

  • gateway

    TypeStruct(gateway)

    gateway

    • coap

      TypeStruct(coap)

      coap

      • heartbeat

        TypeDuration(s)
        Default"30s"
        Description

        The gateway server required minimum heartbeat interval. When connection mode is enabled, this parameter is used to set the minimum heartbeat interval for the connection to be alive
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • connection_required

        TypeBoolean
        Defaultfalse
        Description

        Enable or disable connection mode. Connection mode is a feature of non-standard protocols. When connection mode is enabled, it is necessary to maintain the creation, authentication and alive of connection resources

      • notify_type

        TypeEnum(non,con,qos)
        Defaultqos
        Description

        The Notification Message will be delivered to the CoAP client if a new message received on an observed topic. The type of delivered coap message can be set to:

        • non: Non-confirmable;
        • con: Confirmable;
        • qos: Mapping from QoS type of received message, QoS0 -> non, QoS1,2 -> con
      • subscribe_qos

        TypeEnum(qos0,qos1,qos2,coap)
        Defaultcoap
        Description

        The Default QoS Level indicator for subscribe request. This option specifies the QoS level for the CoAP Client when establishing a subscription membership, if the subscribe request is not carried qos option. The indicator can be set to:

        • qos0, qos1, qos2: Fixed default QoS level
        • coap: Dynamic QoS level by the message type of subscribe request
          • qos0: If the subscribe request is non-confirmable
          • qos1: If the subscribe request is confirmable
      • publish_qos

        TypeEnum(qos0,qos1,qos2,coap)
        Defaultcoap
        Description

        The Default QoS Level indicator for publish request. This option specifies the QoS level for the CoAP Client when publishing a message to EMQX PUB/SUB system, if the publish request is not carried qos option. The indicator can be set to:

        • qos0, qos1, qos2: Fixed default QoS level
        • coap: Dynamic QoS level by the message type of publish request
          • qos0: If the publish request is non-confirmable
          • qos1: If the publish request is confirmable
      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
        • ${endpoint_name}: endpoint name
      • listeners

        TypeStruct(udp_listeners)

        udp_listeners

        • udp
          TypeMap($name->Struct(udp_listener))
          Description

          A map from listener names to listener settings.

          udp_listener

          • health_check
            TypeStruct(udp_health_check)
            Description

            Some Cloud platform use a request-reply mechanism to check whether a UDP port is healthy, here can configure this pair.

            udp_health_check

            • request
              TypeString
              Description

              The content of the request.

            • reply
              TypeString
              Description

              The content to reply.

          • udp_options
            TypeStruct(udp_opts)

            udp_opts

            • active_n
              TypeInteger
              Default100
              Description

              Specify the {active, N} option for the socket. See: https://erlang.org/doc/man/inet.html#setopts-2

            • recbuf
              TypeBytesize
              Description

              Size of the kernel-space receive buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              Size of the kernel-space send buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Description

              Size of the user-space buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              Allow local reuse of port numbers.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

        • dtls
          TypeMap($name->Struct(dtls_listener))
          Description

          A map from listener names to listener settings.

          dtls_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • health_check
            TypeStruct(udp_health_check)
            Description

            Some Cloud platform use a request-reply mechanism to check whether a UDP port is healthy, here can configure this pair.

            udp_health_check

            • request
              TypeString
              Description

              The content of the request.

            • reply
              TypeString
              Description

              The content to reply.

          • udp_options
            TypeStruct(udp_opts)

            udp_opts

            • active_n
              TypeInteger
              Default100
              Description

              Specify the {active, N} option for the socket. See: https://erlang.org/doc/man/inet.html#setopts-2

            • recbuf
              TypeBytesize
              Description

              Size of the kernel-space receive buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              Size of the kernel-space send buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Description

              Size of the user-space buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              Allow local reuse of port numbers.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • dtls_options
            TypeStruct(dtls_opts)
            Description

            DTLS socket options

            dtls_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["dtlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • gc_after_handshake
              TypeBoolean
              Defaultfalse
              Description

              Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

            • ocsp
              TypeStruct(ocsp)

              ocsp

              • enable_ocsp_stapling
                TypeBoolean
                Defaultfalse
                Description

                Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

              • responder_url
                TypeString
                Description

                URL for the OCSP responder to check the server certificate against.

              • issuer_pem
                TypeString
                Description

                PEM-encoded certificate of the OCSP issuer for the server certificate.

              • refresh_interval
                TypeDuration
                Default"5m"
                Description

                The period to refresh the OCSP response for the server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • refresh_http_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout for the HTTP request when checking OCSP responses.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • enable_crl_check
              TypeBoolean
              Defaultfalse
              Description

              Whether to enable CRL verification for this listener.

      • enable_stats

        TypeBoolean
        Defaulttrue
        Description

        Whether to enable client process statistic

      • idle_timeout

        TypeDuration
        Default"30s"
        Description

        The idle time of the client connection process. It has two purposes:

        1. A newly created client process that does not receive any client requests after that time will be closed directly.
        2. A running client process that does not receive any client requests after this time will go into hibernation to save resources.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • clientinfo_override

        TypeStruct(clientinfo_override)
        Description

        ClientInfo override.

        clientinfo_override

        • username
          TypeString
          Description

          Template for overriding username.

        • password
          TypeString
          Description

          Template for overriding password.

        • clientid
          TypeString
          Description

          Template for overriding clientid.

    • exproto

      TypeStruct(exproto)

      exproto

      • server

        TypeStruct(exproto_grpc_server)
        Description

        Configurations for starting the ConnectionAdapter service

        exproto_grpc_server

        • bind
          TypeString
          Description

          Listening address and port for the gRPC server.

        • ssl_options
          TypeStruct(ssl_server_opts)
          Description

          SSL configuration for the gRPC server.

          ssl_server_opts

          • cacertfile
            TypeString
            Default"${EMQX_ETC_DIR}/certs/cacert.pem"
            Description

            Trusted PEM format CA certificates bundle file.
            The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
            NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

          • cacerts
            TypeBoolean
            Description

            Deprecated since 5.1.4.

          • certfile
            TypeString
            Default"${EMQX_ETC_DIR}/certs/cert.pem"
            Description

            PEM format certificates chain file.
            The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

          • keyfile
            TypeString
            Default"${EMQX_ETC_DIR}/certs/key.pem"
            Description

            PEM format private key file.

          • verify
            TypeEnum(verify_peer,verify_none)
            Defaultverify_none
            Description

            Enable or disable peer verification.

          • reuse_sessions
            TypeBoolean
            Defaulttrue
            Description

            Enable TLS session reuse.
            Has no effect when TLS version is configured (or negotiated) to 1.3

          • depth
            TypeInteger(0..+inf)
            Default10
            Description

            Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
            if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
            if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

          • password
            TypeSecret
            Description

            String containing the user's password. Only used if the private key file is password-protected.
            A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

          • versions
            TypeArray(String)
            Default["tlsv1.3", "tlsv1.2"]
            Description

            All TLS/DTLS versions to be supported.
            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
            In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

          • ciphers
            TypeArray(String)
            Default[]
            Description

            This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
            Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

            The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

            NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
            If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
            PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

          • secure_renegotiate
            TypeBoolean
            Defaulttrue
            Description

            Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

            By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

            Has no effect when TLS version is configured (or negotiated) to 1.3.

          • log_level
            TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
            Defaultnotice
            Description

            The minimum level of logging allowed for SSL output.

            The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

          • hibernate_after
            TypeDuration
            Default"5s"
            Description

            Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

            The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • partial_chain
            TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
            Description

            Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

          • verify_peer_ext_key_usage
            TypeString
            Description

            Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

            Allowed values are

            • clientAuth
            • serverAuth
            • codeSigning
            • emailProtection
            • timeStamping
            • ocspSigning
            • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

            Comma-separated string is also supported for validating more than one key usages.

            For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

          • dhfile
            TypeString
            Description

            Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
            NOTE: The dhfile option is not supported by TLS 1.3.

          • fail_if_no_peer_cert
            TypeBoolean
            Defaultfalse
            Description

            This option is only effective if verify is set to verify_peer.

            If set to true, EMQX will reject the connection if the client fails to provide a certificate.

            If set to false, EMQX will accept clients which don't present a certificate.

          • honor_cipher_order
            TypeBoolean
            Defaulttrue
            Description

            An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

            The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

            It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

          • client_renegotiation
            TypeBoolean
            Defaulttrue
            Description

            In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
            Has no effect when TLS version is configured (or negotiated) to 1.3

          • handshake_timeout
            TypeDuration
            Default"15s"
            Description

            Maximum time duration allowed for the handshake to complete
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • handler

        TypeStruct(exproto_grpc_handler)
        Description

        Configurations for request to ConnectionHandler service

        exproto_grpc_handler

        • address
          TypeString
          Description

          gRPC server address.

        • service_name
          TypeOneOf(String("ConnectionHandler"),String("ConnectionUnaryHandler"))
          DefaultConnectionUnaryHandler
          Description

          The service name to handle the connection events. In the initial version, we expected to use streams to improve the efficiency of requests in ConnectionHandler. But unfortunately, events between different streams are out of order. It causes the OnSocketCreated event to may arrive later than OnReceivedBytes. So we added the ConnectionUnaryHandler service since v5.0.25 and forced the use of Unary in it to avoid ordering problems.

        • ssl_options
          TypeStruct(ssl_client_opts)
          Description

          SSL configuration for the gRPC client.

          ssl_client_opts

          • cacertfile
            TypeString
            Description

            Trusted PEM format CA certificates bundle file.
            The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
            NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

          • cacerts
            TypeBoolean
            Description

            Deprecated since 5.1.4.

          • certfile
            TypeString
            Description

            PEM format certificates chain file.
            The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

          • keyfile
            TypeString
            Description

            PEM format private key file.

          • verify
            TypeEnum(verify_peer,verify_none)
            Defaultverify_none
            Description

            Enable or disable peer verification.

          • reuse_sessions
            TypeBoolean
            Defaulttrue
            Description

            Enable TLS session reuse.
            Has no effect when TLS version is configured (or negotiated) to 1.3

          • depth
            TypeInteger(0..+inf)
            Default10
            Description

            Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
            if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
            if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

          • password
            TypeSecret
            Description

            String containing the user's password. Only used if the private key file is password-protected.
            A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

          • versions
            TypeArray(String)
            Default["tlsv1.3", "tlsv1.2"]
            Description

            All TLS/DTLS versions to be supported.
            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
            In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

          • ciphers
            TypeArray(String)
            Default[]
            Description

            This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
            Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

            The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

            NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

            NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
            If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
            PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

          • secure_renegotiate
            TypeBoolean
            Defaulttrue
            Description

            Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

            By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

            Has no effect when TLS version is configured (or negotiated) to 1.3.

          • log_level
            TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
            Defaultnotice
            Description

            The minimum level of logging allowed for SSL output.

            The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

          • hibernate_after
            TypeDuration
            Default"5s"
            Description

            Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

            The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • partial_chain
            TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
            Description

            Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

          • verify_peer_ext_key_usage
            TypeString
            Description

            Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

            Allowed values are

            • clientAuth
            • serverAuth
            • codeSigning
            • emailProtection
            • timeStamping
            • ocspSigning
            • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

            Comma-separated string is also supported for validating more than one key usages.

            For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

          • enable
            TypeBoolean
            Defaultfalse
            Description

            Enable TLS.

          • server_name_indication
            TypeOneOf(String("disable"),String)
            Description

            Specify the host name to be used in TLS Server Name Indication extension.
            For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
            If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
            The host name is then also used in the host name verification of the peer certificate.
            The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
        • ${endpoint_name}: endpoint name
      • listeners

        TypeStruct(tcp_udp_listeners)

        tcp_udp_listeners

        • tcp
          TypeMap($name->Struct(tcp_listener))
          Description

          A map from listener names to listener settings.

          tcp_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

        • ssl
          TypeMap($name->Struct(ssl_listener))
          Description

          A map from listener names to listener settings.

          ssl_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • ssl_options
            TypeStruct(listener_ssl_opts)
            Description

            SSL Socket options.

            listener_ssl_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["tlsv1.3", "tlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • gc_after_handshake
              TypeBoolean
              Defaultfalse
              Description

              Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

            • ocsp
              TypeStruct(ocsp)

              ocsp

              • enable_ocsp_stapling
                TypeBoolean
                Defaultfalse
                Description

                Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

              • responder_url
                TypeString
                Description

                URL for the OCSP responder to check the server certificate against.

              • issuer_pem
                TypeString
                Description

                PEM-encoded certificate of the OCSP issuer for the server certificate.

              • refresh_interval
                TypeDuration
                Default"5m"
                Description

                The period to refresh the OCSP response for the server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • refresh_http_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout for the HTTP request when checking OCSP responses.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • enable_crl_check
              TypeBoolean
              Defaultfalse
              Description

              Whether to enable CRL verification for this listener.

        • udp
          TypeMap($name->Struct(udp_listener))
          Description

          A map from listener names to listener settings.

          udp_listener

          • health_check
            TypeStruct(udp_health_check)
            Description

            Some Cloud platform use a request-reply mechanism to check whether a UDP port is healthy, here can configure this pair.

            udp_health_check

            • request
              TypeString
              Description

              The content of the request.

            • reply
              TypeString
              Description

              The content to reply.

          • udp_options
            TypeStruct(udp_opts)

            udp_opts

            • active_n
              TypeInteger
              Default100
              Description

              Specify the {active, N} option for the socket. See: https://erlang.org/doc/man/inet.html#setopts-2

            • recbuf
              TypeBytesize
              Description

              Size of the kernel-space receive buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              Size of the kernel-space send buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Description

              Size of the user-space buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              Allow local reuse of port numbers.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

        • dtls
          TypeMap($name->Struct(dtls_listener))
          Description

          A map from listener names to listener settings.

          dtls_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • health_check
            TypeStruct(udp_health_check)
            Description

            Some Cloud platform use a request-reply mechanism to check whether a UDP port is healthy, here can configure this pair.

            udp_health_check

            • request
              TypeString
              Description

              The content of the request.

            • reply
              TypeString
              Description

              The content to reply.

          • udp_options
            TypeStruct(udp_opts)

            udp_opts

            • active_n
              TypeInteger
              Default100
              Description

              Specify the {active, N} option for the socket. See: https://erlang.org/doc/man/inet.html#setopts-2

            • recbuf
              TypeBytesize
              Description

              Size of the kernel-space receive buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              Size of the kernel-space send buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Description

              Size of the user-space buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              Allow local reuse of port numbers.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • dtls_options
            TypeStruct(dtls_opts)
            Description

            DTLS socket options

            dtls_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["dtlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • gc_after_handshake
              TypeBoolean
              Defaultfalse
              Description

              Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

            • ocsp
              TypeStruct(ocsp)

              ocsp

              • enable_ocsp_stapling
                TypeBoolean
                Defaultfalse
                Description

                Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

              • responder_url
                TypeString
                Description

                URL for the OCSP responder to check the server certificate against.

              • issuer_pem
                TypeString
                Description

                PEM-encoded certificate of the OCSP issuer for the server certificate.

              • refresh_interval
                TypeDuration
                Default"5m"
                Description

                The period to refresh the OCSP response for the server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • refresh_http_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout for the HTTP request when checking OCSP responses.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • enable_crl_check
              TypeBoolean
              Defaultfalse
              Description

              Whether to enable CRL verification for this listener.

      • enable_stats

        TypeBoolean
        Defaulttrue
        Description

        Whether to enable client process statistic

      • idle_timeout

        TypeDuration
        Default"30s"
        Description

        The idle time of the client connection process. It has two purposes:

        1. A newly created client process that does not receive any client requests after that time will be closed directly.
        2. A running client process that does not receive any client requests after this time will go into hibernation to save resources.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • clientinfo_override

        TypeStruct(clientinfo_override)
        Description

        ClientInfo override.

        clientinfo_override

        • username
          TypeString
          Description

          Template for overriding username.

        • password
          TypeString
          Description

          Template for overriding password.

        • clientid
          TypeString
          Description

          Template for overriding clientid.

    • gbt32960

      TypeStruct(gbt32960)

      gbt32960

      • mountpoint

        TypeString
        Default"gbt32960/${clientid}/"
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
        • ${endpoint_name}: endpoint name
      • retry_interval

        TypeDuration
        Default"8s"
        Description

        Re-send time interval
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • max_retry_times

        TypeInteger(0..+inf)
        Default3
        Description

        Re-send max times

      • message_queue_len

        TypeInteger(0..+inf)
        Default10
        Description

        Max message queue length

      • listeners

        TypeStruct(tcp_listeners)

        tcp_listeners

        • tcp
          TypeMap($name->Struct(tcp_listener))
          Description

          A map from listener names to listener settings.

          tcp_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

        • ssl
          TypeMap($name->Struct(ssl_listener))
          Description

          A map from listener names to listener settings.

          ssl_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • ssl_options
            TypeStruct(listener_ssl_opts)
            Description

            SSL Socket options.

            listener_ssl_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["tlsv1.3", "tlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • gc_after_handshake
              TypeBoolean
              Defaultfalse
              Description

              Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

            • ocsp
              TypeStruct(ocsp)

              ocsp

              • enable_ocsp_stapling
                TypeBoolean
                Defaultfalse
                Description

                Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

              • responder_url
                TypeString
                Description

                URL for the OCSP responder to check the server certificate against.

              • issuer_pem
                TypeString
                Description

                PEM-encoded certificate of the OCSP issuer for the server certificate.

              • refresh_interval
                TypeDuration
                Default"5m"
                Description

                The period to refresh the OCSP response for the server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • refresh_http_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout for the HTTP request when checking OCSP responses.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • enable_crl_check
              TypeBoolean
              Defaultfalse
              Description

              Whether to enable CRL verification for this listener.

      • enable_stats

        TypeBoolean
        Defaulttrue
        Description

        Whether to enable client process statistic

      • idle_timeout

        TypeDuration
        Default"30s"
        Description

        The idle time of the client connection process. It has two purposes:

        1. A newly created client process that does not receive any client requests after that time will be closed directly.
        2. A running client process that does not receive any client requests after this time will go into hibernation to save resources.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • clientinfo_override

        TypeStruct(clientinfo_override)
        Description

        ClientInfo override.

        clientinfo_override

        • username
          TypeString
          Description

          Template for overriding username.

        • password
          TypeString
          Description

          Template for overriding password.

        • clientid
          TypeString
          Description

          Template for overriding clientid.

    • jt808

      TypeStruct(jt808)

      jt808

      • frame

        TypeStruct(jt808_frame)

        jt808_frame

        • max_length
          TypeInteger(0..+inf)
          Default8192
          Description

          The maximum length of the JT/T 808 frame.

      • proto

        TypeStruct(jt808_proto)

        jt808_proto

        • auth
          TypeOneOf(Struct(anonymous_true),Struct(anonymous_false))
          Description

          Authentication settings of the JT/T 808 Gateway.

          anonymous_true

          • allow_anonymous
            TypeOneOf(String("true"))
            Description

            Allow anonymous access to the JT/T 808 Gateway.

          • registry
            TypeString
            Description

            The JT/T 808 device registry central URL.

          • authentication
            TypeString
            Description

            The JT/T 808 device authentication central URL.

          anonymous_false

          • allow_anonymous
            TypeOneOf(String("false"))
            Description

            Allow anonymous access to the JT/T 808 Gateway.

          • registry
            TypeString
            Description

            The JT/T 808 device registry central URL.

          • authentication
            TypeString
            Description

            The JT/T 808 device authentication central URL.

        • up_topic
          TypeString
          Default"jt808/${clientid}/${phone}/up"
          Description

          The topic of the JT/T 808 protocol upstream message.

        • dn_topic
          TypeString
          Default"jt808/${clientid}/${phone}/dn"
          Description

          The topic of the JT/T 808 protocol downstream message.

      • mountpoint

        TypeString
        Default"jt808/${clientid}/"
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
        • ${endpoint_name}: endpoint name
      • retry_interval

        TypeDuration
        Default"8s"
        Description

        Re-send time interval
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • max_retry_times

        TypeInteger(0..+inf)
        Default3
        Description

        Re-send max times

      • message_queue_len

        TypeInteger(0..+inf)
        Default10
        Description

        Max message queue length

      • listeners

        TypeStruct(tcp_listeners)

        tcp_listeners

        • tcp
          TypeMap($name->Struct(tcp_listener))
          Description

          A map from listener names to listener settings.

          tcp_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

        • ssl
          TypeMap($name->Struct(ssl_listener))
          Description

          A map from listener names to listener settings.

          ssl_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • ssl_options
            TypeStruct(listener_ssl_opts)
            Description

            SSL Socket options.

            listener_ssl_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["tlsv1.3", "tlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • gc_after_handshake
              TypeBoolean
              Defaultfalse
              Description

              Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

            • ocsp
              TypeStruct(ocsp)

              ocsp

              • enable_ocsp_stapling
                TypeBoolean
                Defaultfalse
                Description

                Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

              • responder_url
                TypeString
                Description

                URL for the OCSP responder to check the server certificate against.

              • issuer_pem
                TypeString
                Description

                PEM-encoded certificate of the OCSP issuer for the server certificate.

              • refresh_interval
                TypeDuration
                Default"5m"
                Description

                The period to refresh the OCSP response for the server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • refresh_http_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout for the HTTP request when checking OCSP responses.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • enable_crl_check
              TypeBoolean
              Defaultfalse
              Description

              Whether to enable CRL verification for this listener.

      • enable_stats

        TypeBoolean
        Defaulttrue
        Description

        Whether to enable client process statistic

      • idle_timeout

        TypeDuration
        Default"30s"
        Description

        The idle time of the client connection process. It has two purposes:

        1. A newly created client process that does not receive any client requests after that time will be closed directly.
        2. A running client process that does not receive any client requests after this time will go into hibernation to save resources.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • clientinfo_override

        TypeStruct(clientinfo_override)
        Description

        ClientInfo override.

        clientinfo_override

        • username
          TypeString
          Description

          Template for overriding username.

        • password
          TypeString
          Description

          Template for overriding password.

        • clientid
          TypeString
          Description

          Template for overriding clientid.

    • lwm2m

      TypeStruct(lwm2m)

      lwm2m

      • xml_dir

        TypeString
        Description

        The Directory for LwM2M Resource definition.

      • lifetime_min

        TypeDuration
        Default"15s"
        Description

        Minimum value of lifetime allowed to be set by the LwM2M client.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • lifetime_max

        TypeDuration
        Default"86400s"
        Description

        Maximum value of lifetime allowed to be set by the LwM2M client.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • qmode_time_window

        TypeDuration(s)
        Default"22s"
        Description

        The value of the time window during which the network link is considered valid by the LwM2M Gateway in QMode mode. For example, after receiving an update message from a client, any messages within this time window are sent directly to the LwM2M client, and all messages beyond this time window are temporarily stored in memory.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • auto_observe

        TypeBoolean
        Defaultfalse
        Description

        Automatically observe the object list of REGISTER packet.

      • update_msg_publish_condition

        TypeEnum(always,contains_object_list)
        Defaultcontains_object_list
        Description

        Policy for publishing UPDATE event message.

        • always: send update events as long as the UPDATE request is received.
        • contains_object_list: send update events only if the UPDATE request carries any Object List
      • translators

        TypeStruct(lwm2m_translators)
        Description

        Topic configuration for LwM2M's gateway publishing and subscription.

        lwm2m_translators

        • command
          TypeStruct(translator)
          Description

          The topic for receiving downstream commands. For each new LwM2M client that succeeds in going online, the gateway creates a subscription relationship to receive downstream commands and send it to the LwM2M client

          translator

          • topic
            TypeString
            Description

            Topic Name

          • qos
            TypeInteger(0..2)
            Default0
            Description

            QoS Level

        • response
          TypeStruct(translator)
          Description

          The topic for gateway to publish the acknowledge events from LwM2M client

          translator

          • topic
            TypeString
            Description

            Topic Name

          • qos
            TypeInteger(0..2)
            Default0
            Description

            QoS Level

        • notify
          TypeStruct(translator)
          Description

          The topic for gateway to publish the notify events from LwM2M client. After succeed observe a resource of LwM2M client, Gateway will send the notify events via this topic, if the client reports any resource changes

          translator

          • topic
            TypeString
            Description

            Topic Name

          • qos
            TypeInteger(0..2)
            Default0
            Description

            QoS Level

        • register
          TypeStruct(translator)
          Description

          The topic for gateway to publish the register events from LwM2M client.

          translator

          • topic
            TypeString
            Description

            Topic Name

          • qos
            TypeInteger(0..2)
            Default0
            Description

            QoS Level

        • update
          TypeStruct(translator)
          Description

          The topic for gateway to publish the update events from LwM2M client

          translator

          • topic
            TypeString
            Description

            Topic Name

          • qos
            TypeInteger(0..2)
            Default0
            Description

            QoS Level

      • mountpoint

        TypeString
        Default"lwm2m/${endpoint_name}/"
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
        • ${endpoint_name}: endpoint name
      • listeners

        TypeStruct(udp_listeners)

        udp_listeners

        • udp
          TypeMap($name->Struct(udp_listener))
          Description

          A map from listener names to listener settings.

          udp_listener

          • health_check
            TypeStruct(udp_health_check)
            Description

            Some Cloud platform use a request-reply mechanism to check whether a UDP port is healthy, here can configure this pair.

            udp_health_check

            • request
              TypeString
              Description

              The content of the request.

            • reply
              TypeString
              Description

              The content to reply.

          • udp_options
            TypeStruct(udp_opts)

            udp_opts

            • active_n
              TypeInteger
              Default100
              Description

              Specify the {active, N} option for the socket. See: https://erlang.org/doc/man/inet.html#setopts-2

            • recbuf
              TypeBytesize
              Description

              Size of the kernel-space receive buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              Size of the kernel-space send buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Description

              Size of the user-space buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              Allow local reuse of port numbers.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

        • dtls
          TypeMap($name->Struct(dtls_listener))
          Description

          A map from listener names to listener settings.

          dtls_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • health_check
            TypeStruct(udp_health_check)
            Description

            Some Cloud platform use a request-reply mechanism to check whether a UDP port is healthy, here can configure this pair.

            udp_health_check

            • request
              TypeString
              Description

              The content of the request.

            • reply
              TypeString
              Description

              The content to reply.

          • udp_options
            TypeStruct(udp_opts)

            udp_opts

            • active_n
              TypeInteger
              Default100
              Description

              Specify the {active, N} option for the socket. See: https://erlang.org/doc/man/inet.html#setopts-2

            • recbuf
              TypeBytesize
              Description

              Size of the kernel-space receive buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              Size of the kernel-space send buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Description

              Size of the user-space buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              Allow local reuse of port numbers.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • dtls_options
            TypeStruct(dtls_opts)
            Description

            DTLS socket options

            dtls_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["dtlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • gc_after_handshake
              TypeBoolean
              Defaultfalse
              Description

              Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

            • ocsp
              TypeStruct(ocsp)

              ocsp

              • enable_ocsp_stapling
                TypeBoolean
                Defaultfalse
                Description

                Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

              • responder_url
                TypeString
                Description

                URL for the OCSP responder to check the server certificate against.

              • issuer_pem
                TypeString
                Description

                PEM-encoded certificate of the OCSP issuer for the server certificate.

              • refresh_interval
                TypeDuration
                Default"5m"
                Description

                The period to refresh the OCSP response for the server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • refresh_http_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout for the HTTP request when checking OCSP responses.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • enable_crl_check
              TypeBoolean
              Defaultfalse
              Description

              Whether to enable CRL verification for this listener.

      • enable_stats

        TypeBoolean
        Defaulttrue
        Description

        Whether to enable client process statistic

      • idle_timeout

        TypeDuration
        Default"30s"
        Description

        The idle time of the client connection process. It has two purposes:

        1. A newly created client process that does not receive any client requests after that time will be closed directly.
        2. A running client process that does not receive any client requests after this time will go into hibernation to save resources.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • clientinfo_override

        TypeStruct(clientinfo_override)
        Description

        ClientInfo override.

        clientinfo_override

        • username
          TypeString
          Description

          Template for overriding username.

        • password
          TypeString
          Description

          Template for overriding password.

        • clientid
          TypeString
          Description

          Template for overriding clientid.

    • mqttsn

      TypeStruct(mqttsn)

      mqttsn

      • gateway_id

        TypeInteger
        Default1
        Description

        MQTT-SN Gateway ID. When the broadcast option is enabled, the gateway will broadcast ADVERTISE message with this value

      • broadcast

        TypeBoolean
        Defaultfalse
        Description

        Whether to periodically broadcast ADVERTISE messages

      • enable_qos3

        TypeBoolean
        Defaulttrue
        Description

        Allows connectionless clients to publish messages with a Qos of -1. This feature is defined for very simple client implementations which do not support any other features except this one. There is no connection setup nor tear down, no registration nor subscription. The client just sends its 'PUBLISH' messages to a GW

      • subs_resume

        TypeBoolean
        Defaultfalse
        Description

        Whether to initiate all subscribed topic name registration messages to the client after the Session has been taken over by a new channel

      • predefined

        TypeArray(Struct(mqttsn_predefined))
        Default[]
        Description

        The pre-defined topic IDs and topic names. A 'pre-defined' topic ID is a topic ID whose mapping to a topic name is known in advance by both the client's application and the gateway

        mqttsn_predefined

        • id
          TypeInteger(1..1024)
          Description

          Topic ID. Range: 1-65535

        • topic
          TypeString
          Description

          Topic Name

      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
        • ${endpoint_name}: endpoint name
      • listeners

        TypeStruct(udp_listeners)

        udp_listeners

        • udp
          TypeMap($name->Struct(udp_listener))
          Description

          A map from listener names to listener settings.

          udp_listener

          • health_check
            TypeStruct(udp_health_check)
            Description

            Some Cloud platform use a request-reply mechanism to check whether a UDP port is healthy, here can configure this pair.

            udp_health_check

            • request
              TypeString
              Description

              The content of the request.

            • reply
              TypeString
              Description

              The content to reply.

          • udp_options
            TypeStruct(udp_opts)

            udp_opts

            • active_n
              TypeInteger
              Default100
              Description

              Specify the {active, N} option for the socket. See: https://erlang.org/doc/man/inet.html#setopts-2

            • recbuf
              TypeBytesize
              Description

              Size of the kernel-space receive buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              Size of the kernel-space send buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Description

              Size of the user-space buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              Allow local reuse of port numbers.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

        • dtls
          TypeMap($name->Struct(dtls_listener))
          Description

          A map from listener names to listener settings.

          dtls_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • health_check
            TypeStruct(udp_health_check)
            Description

            Some Cloud platform use a request-reply mechanism to check whether a UDP port is healthy, here can configure this pair.

            udp_health_check

            • request
              TypeString
              Description

              The content of the request.

            • reply
              TypeString
              Description

              The content to reply.

          • udp_options
            TypeStruct(udp_opts)

            udp_opts

            • active_n
              TypeInteger
              Default100
              Description

              Specify the {active, N} option for the socket. See: https://erlang.org/doc/man/inet.html#setopts-2

            • recbuf
              TypeBytesize
              Description

              Size of the kernel-space receive buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              Size of the kernel-space send buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Description

              Size of the user-space buffer for the socket.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              Allow local reuse of port numbers.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • dtls_options
            TypeStruct(dtls_opts)
            Description

            DTLS socket options

            dtls_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["dtlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • gc_after_handshake
              TypeBoolean
              Defaultfalse
              Description

              Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

            • ocsp
              TypeStruct(ocsp)

              ocsp

              • enable_ocsp_stapling
                TypeBoolean
                Defaultfalse
                Description

                Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

              • responder_url
                TypeString
                Description

                URL for the OCSP responder to check the server certificate against.

              • issuer_pem
                TypeString
                Description

                PEM-encoded certificate of the OCSP issuer for the server certificate.

              • refresh_interval
                TypeDuration
                Default"5m"
                Description

                The period to refresh the OCSP response for the server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • refresh_http_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout for the HTTP request when checking OCSP responses.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • enable_crl_check
              TypeBoolean
              Defaultfalse
              Description

              Whether to enable CRL verification for this listener.

      • enable_stats

        TypeBoolean
        Defaulttrue
        Description

        Whether to enable client process statistic

      • idle_timeout

        TypeDuration
        Default"30s"
        Description

        The idle time of the client connection process. It has two purposes:

        1. A newly created client process that does not receive any client requests after that time will be closed directly.
        2. A running client process that does not receive any client requests after this time will go into hibernation to save resources.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • clientinfo_override

        TypeStruct(clientinfo_override)
        Description

        ClientInfo override.

        clientinfo_override

        • username
          TypeString
          Description

          Template for overriding username.

        • password
          TypeString
          Description

          Template for overriding password.

        • clientid
          TypeString
          Description

          Template for overriding clientid.

    • ocpp

      TypeStruct(ocpp)

      ocpp

      • mountpoint

        TypeString
        Default"ocpp/"
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
        • ${endpoint_name}: endpoint name
      • default_heartbeat_interval

        TypeDuration(s)
        Default"60s"
        Description

        The default Heartbeat time interval
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • heartbeat_checking_times_backoff

        TypeInteger
        Default1
        Description

        The backoff for heartbeat checking times

      • upstream

        TypeStruct(upstream)

        upstream

        • topic
          TypeString
          Default"cp/${cid}"
          Description

          The topic for Upload stream Call Request messages.

        • topic_override_mapping
          TypeMap($name->String)
          Default{}
          Description

          Upload stream topic override mapping by Message Name.

        • reply_topic
          TypeString
          Default"cp/${cid}/Reply"
          Description

          The topic for Upload stream Reply messages.

        • error_topic
          TypeString
          Default"cp/${cid}/Reply"
          Description

          The topic for Upload stream error topic.

      • dnstream

        TypeStruct(dnstream)

        dnstream

        • topic
          TypeString
          Default"cs/${cid}"
          Description

          Download stream topic to receive request/control messages from third-party system. This value is a wildcard topic name that subscribed by every connected Charge Point.

        • max_mqueue_len
          TypeInteger
          Default100
          Description

          The maximum message queue length for download stream message delivery.

      • message_format_checking

        TypeOneOf(String("all"),String("upstream_only"),String("dnstream_only"),String("disable"))
        Defaultdisable
        Description

        Whether to enable message format legality checking. EMQX checks the message format of the upload stream and download stream against the format defined in json-schema. When the check fails, emqx will reply with a corresponding answer message.

        The checking strategy can be one of the following values:

        • all: check all messages
        • upstream_only: check upload stream messages only
        • dnstream_only: check download stream messages only
        • disable: don't check any messages
      • json_schema_dir

        TypeString
        Default"${application_priv}/schemas"
        Description

        JSON Schema directory for OCPP message definitions. Default: ${application}/priv/schemas

      • json_schema_id_prefix

        TypeString
        Default"urn:OCPP:1.6:2019:12:"
        Description

        The ID prefix for the OCPP message schemas.

      • listeners

        TypeStruct(ws_listeners)

        ws_listeners

        • ws
          TypeMap($name->Struct(ws_listener))
          Description

          Websocket listener.

          ws_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • websocket
            TypeStruct(websocket)

            websocket

            • path
              TypeString
              Default"/ocpp"
              Description

              WebSocket's MQTT protocol path. So the address of EMQX Broker's WebSocket is: ws://{ip}:{port}/mqtt

            • piggyback
              TypeEnum(single,multiple)
              Defaultsingle
              Description

              Whether a WebSocket message is allowed to contain multiple MQTT packets.

            • compress
              TypeBoolean
              Defaultfalse
              Description

              If true, compress WebSocket messages using zlib.
              The configuration items under deflate_opts belong to the compression-related parameter configuration.

            • idle_timeout
              TypeDuration
              Default"7200s"
              Description

              The timeout for waiting for the WebSocket upgrade request. After the timeout, the connection will be closed.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • max_frame_size
              TypeOneOf(String("infinity"),Integer)
              Defaultinfinity
              Description

              The maximum length of a single MQTT packet.

            • fail_if_no_subprotocol
              TypeBoolean
              Defaulttrue
              Description

              If true, the server will return an error when the client does not carry the Sec-WebSocket-Protocol field.
              Note: WeChat applet needs to disable this verification.

            • supported_subprotocols
              TypeString
              Default"ocpp1.6, ocpp2.0"
              Description

              Comma-separated list of supported subprotocols.

            • check_origin_enable
              TypeBoolean
              Defaultfalse
              Description

              If true, origin HTTP header will be validated against the list of allowed origins configured in check_origins parameter.

            • allow_origin_absence
              TypeBoolean
              Defaulttrue
              Description

              If false and check_origin_enable is true, the server will reject requests that don't have origin HTTP header.

            • check_origins
              TypeString
              Default"http://localhost:18083, http://127.0.0.1:18083"
              Description

              List of allowed origins.
              See check_origin_enable.

            • proxy_address_header
              TypeString
              Default"x-forwarded-for"
              Description

              HTTP header used to pass information about the client IP address. Relevant when the EMQX cluster is deployed behind a load-balancer.

            • proxy_port_header
              TypeString
              Default"x-forwarded-port"
              Description

              HTTP header used to pass information about the client port. Relevant when the EMQX cluster is deployed behind a load-balancer.

            • deflate_opts
              TypeStruct(deflate_opts)

              deflate_opts

              • level
                TypeEnum(none,default,best_compression,best_speed)
                Description

                Compression level.

              • mem_level
                TypeInteger(1..9)
                Default8
                Description

                Specifies the size of the compression state.
                Lower values decrease memory usage per connection.

              • strategy
                TypeEnum(default,filtered,huffman_only,rle)
                Defaultdefault
                Description

                Specifies the compression strategy.

              • server_context_takeover
                TypeEnum(takeover,no_takeover)
                Defaulttakeover
                Description

                Takeover means the compression state is retained between server messages.

              • client_context_takeover
                TypeEnum(takeover,no_takeover)
                Defaulttakeover
                Description

                Takeover means the compression state is retained between client messages.

              • server_max_window_bits
                TypeInteger(8..15)
                Default15
                Description

                Specifies the size of the compression context for the server.

              • client_max_window_bits
                TypeInteger(8..15)
                Default15
                Description

                Specifies the size of the compression context for the client.

        • wss
          TypeMap($name->Struct(wss_listener))
          Description

          Websocket over TLS listener.

          wss_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • ssl_options
            TypeStruct(listener_wss_opts)
            Description

            SSL Socket options.

            listener_wss_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["tlsv1.3", "tlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • websocket
            TypeStruct(websocket)

            websocket

            • path
              TypeString
              Default"/ocpp"
              Description

              WebSocket's MQTT protocol path. So the address of EMQX Broker's WebSocket is: ws://{ip}:{port}/mqtt

            • piggyback
              TypeEnum(single,multiple)
              Defaultsingle
              Description

              Whether a WebSocket message is allowed to contain multiple MQTT packets.

            • compress
              TypeBoolean
              Defaultfalse
              Description

              If true, compress WebSocket messages using zlib.
              The configuration items under deflate_opts belong to the compression-related parameter configuration.

            • idle_timeout
              TypeDuration
              Default"7200s"
              Description

              The timeout for waiting for the WebSocket upgrade request. After the timeout, the connection will be closed.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • max_frame_size
              TypeOneOf(String("infinity"),Integer)
              Defaultinfinity
              Description

              The maximum length of a single MQTT packet.

            • fail_if_no_subprotocol
              TypeBoolean
              Defaulttrue
              Description

              If true, the server will return an error when the client does not carry the Sec-WebSocket-Protocol field.
              Note: WeChat applet needs to disable this verification.

            • supported_subprotocols
              TypeString
              Default"ocpp1.6, ocpp2.0"
              Description

              Comma-separated list of supported subprotocols.

            • check_origin_enable
              TypeBoolean
              Defaultfalse
              Description

              If true, origin HTTP header will be validated against the list of allowed origins configured in check_origins parameter.

            • allow_origin_absence
              TypeBoolean
              Defaulttrue
              Description

              If false and check_origin_enable is true, the server will reject requests that don't have origin HTTP header.

            • check_origins
              TypeString
              Default"http://localhost:18083, http://127.0.0.1:18083"
              Description

              List of allowed origins.
              See check_origin_enable.

            • proxy_address_header
              TypeString
              Default"x-forwarded-for"
              Description

              HTTP header used to pass information about the client IP address. Relevant when the EMQX cluster is deployed behind a load-balancer.

            • proxy_port_header
              TypeString
              Default"x-forwarded-port"
              Description

              HTTP header used to pass information about the client port. Relevant when the EMQX cluster is deployed behind a load-balancer.

            • deflate_opts
              TypeStruct(deflate_opts)

              deflate_opts

              • level
                TypeEnum(none,default,best_compression,best_speed)
                Description

                Compression level.

              • mem_level
                TypeInteger(1..9)
                Default8
                Description

                Specifies the size of the compression state.
                Lower values decrease memory usage per connection.

              • strategy
                TypeEnum(default,filtered,huffman_only,rle)
                Defaultdefault
                Description

                Specifies the compression strategy.

              • server_context_takeover
                TypeEnum(takeover,no_takeover)
                Defaulttakeover
                Description

                Takeover means the compression state is retained between server messages.

              • client_context_takeover
                TypeEnum(takeover,no_takeover)
                Defaulttakeover
                Description

                Takeover means the compression state is retained between client messages.

              • server_max_window_bits
                TypeInteger(8..15)
                Default15
                Description

                Specifies the size of the compression context for the server.

              • client_max_window_bits
                TypeInteger(8..15)
                Default15
                Description

                Specifies the size of the compression context for the client.

      • enable_stats

        TypeBoolean
        Defaulttrue
        Description

        Whether to enable client process statistic

      • idle_timeout

        TypeDuration
        Default"30s"
        Description

        The idle time of the client connection process. It has two purposes:

        1. A newly created client process that does not receive any client requests after that time will be closed directly.
        2. A running client process that does not receive any client requests after this time will go into hibernation to save resources.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • clientinfo_override

        TypeStruct(clientinfo_override)
        Description

        ClientInfo override.

        clientinfo_override

        • username
          TypeString
          Description

          Template for overriding username.

        • password
          TypeString
          Description

          Template for overriding password.

        • clientid
          TypeString
          Description

          Template for overriding clientid.

    • stomp

      TypeStruct(stomp)

      stomp

      • frame

        TypeStruct(stomp_frame)

        stomp_frame

        • max_headers
          TypeInteger(0..+inf)
          Default10
          Description

          The maximum number of Header

        • max_headers_length
          TypeInteger(0..+inf)
          Default1024
          Description

          The maximum string length of the Header Value

        • max_body_length
          TypeInteger
          Default65536
          Description

          Maximum number of bytes of Body allowed per Stomp packet

      • mountpoint

        TypeString
        Default""
        Description

        When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

        • ${clientid}: clientid
        • ${username}: username
        • ${endpoint_name}: endpoint name
      • listeners

        TypeStruct(tcp_listeners)

        tcp_listeners

        • tcp
          TypeMap($name->Struct(tcp_listener))
          Description

          A map from listener names to listener settings.

          tcp_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

        • ssl
          TypeMap($name->Struct(ssl_listener))
          Description

          A map from listener names to listener settings.

          ssl_listener

          • acceptors
            TypeInteger
            Default16
            Description

            Size of the acceptor pool.

          • tcp_options
            TypeStruct(tcp_opts)
            Description

            Setting the TCP socket options.

            tcp_opts

            • active_n
              TypeInteger(0..+inf)
              Default100
              Description

              Specify the {active, N} option for this Socket.
              See: https://erlang.org/doc/man/inet.html#setopts-2

            • backlog
              TypeInteger(1..+inf)
              Default1024
              Description

              TCP backlog defines the maximum length that the queue of pending connections can grow to.

            • send_timeout
              TypeDuration
              Default"15s"
              Description

              The maximum time a process is suspended for sending data to a busy socket. After the timeout, the TCP connection and the process will be closed.

              The process is unsuspended only when the socket is unbusy, that is, the data accumulated in the Erlang internal buffer drops from the high watermark (specified by high_watermark) to the low watermark (default 4 KB).

              Therefore, (high_watermark - 4 KB) / send_timeout must be a suitable message outflow speed, otherwise the suspended process will never be able to recover before the timeout.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • send_timeout_close
              TypeBoolean
              Defaulttrue
              Description

              Close the connection if send timeout.

            • recbuf
              TypeBytesize
              Description

              The TCP receive buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • sndbuf
              TypeBytesize
              Description

              The TCP send buffer (OS kernel) for the connections.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • buffer
              TypeBytesize
              Default"4KB"
              Description

              The size of the user-space buffer used by the driver.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • high_watermark
              TypeBytesize
              Default"1MB"
              Description

              When EMQX tries to send more data than the OS has allocated for the socket's send buffer, the remaining data will be temporarily stored in Erlang's internal buffer and then sent in the background.

              If the amount of data queued in the internal buffer exceeds high_watermark, the corresponding socket will be marked as busy.

              The process sending data to this busy socket will be suspended until the socket is no longer busy, or the suspension time exceeds send_timeout.

              The socket will only be unbusy when the data in the internal buffer is below the low watermark.

              While the process is suspended, the message queue of the process may accumulate, see max_mailbox_len for details.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • nodelay
              TypeBoolean
              Defaulttrue
              Description

              The TCP_NODELAY flag for the connections. When set to true, data is sent immediately, regardless of size.

            • nolinger
              TypeBoolean
              Defaultfalse
              Description

              When enabled, SO_LINGER flag is set as (onoff=1, linger=0), which means the TCP socket is to be closed immediately by sending a TCP-RST packet, discarding any unsent data and skipping the graceful close steps, including CLOSE_WAIT, FIN_WAIT, and TIME_WAIT.

            • reuseaddr
              TypeBoolean
              Defaulttrue
              Description

              The SO_REUSEADDR flag for the connections.

            • keepalive
              TypeString
              Defaultnone
              Description

              Enable TCP keepalive for MQTT connections over TCP or SSL. The value is three comma separated numbers in the format of 'Idle,Interval,Probes'

              • Idle: The number of seconds a connection needs to be idle before the server begins to send out keep-alive probes (Linux default 7200).
              • Interval: The number of seconds between TCP keep-alive probes (Linux default 75).
              • Probes: The maximum number of TCP keep-alive probes to send before giving up and killing the connection if no response is obtained from the other end (Linux default 9). For example "240,30,5" means: EMQX should start sending TCP keepalive probes after the connection is in idle for 240 seconds, and the probes are sent every 30 seconds until a response is received from the MQTT client, if it misses 5 consecutive responses, EMQX should close the connection. Default: 'none'
          • proxy_protocol
            TypeBoolean
            Defaultfalse
            Description

            If a reverse proxy is deployed for EMQX, and the PROXY protocol is enabled at the proxy to pass the client's real IP, this option needs to be turned on so that EMQX can extract the client's real IP from the PROXY protocol header. EMQX will automatically detect the version of the PROXY protocol and support V1 and V2.

            For a detailed description of the PROXY protocol, please refer to: https://www.haproxy.com/blog/haproxy/proxy-protocol/

          • proxy_protocol_timeout
            TypeDuration
            Default"3s"
            Description

            Timeout for proxy protocol. EMQX will close the TCP connection if proxy protocol packet is not received within the timeout.
            A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

            For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

            Duration is equivalent to Duration(ms). The unit part is case-insensitive.

          • bind
            TypeString
            Description

            The IP address and port that the listener will bind.

          • max_connections
            TypeOneOf(Integer(1..+inf),String("infinity"))
            Default1024
            Description

            The maximum number of concurrent connections allowed by the listener.

          • max_conn_rate
            TypeInteger
            Default1000
            Description

            Maximum connections per second.

          • enable_authn
            TypeBoolean
            Defaulttrue
            Description

            Set true (default) to enable client authentication on this listener. When set to false clients will be allowed to connect without authentication.

          • mountpoint
            TypeString
            Description

            When publishing or subscribing, prefix all topics with a mountpoint string. The prefixed string will be removed from the topic name when the message is delivered to the subscriber. The mountpoint is a way that users can use to implement isolation of message routing between different listeners. For example if a client A subscribes to t with listeners.tcp.\<name>.mountpoint set to some_tenant, then the client actually subscribes to the topic some_tenant/t. Similarly, if another client B (connected to the same listener as the client A) sends a message to topic t, the message is routed to all the clients subscribed some_tenant/t, so client A will receive the message, with topic name t. Set to "" to disable the feature. Supported placeholders in mountpoint string:

            • ${clientid}: clientid
            • ${username}: username
            • ${endpoint_name}: endpoint name
          • access_rules
            TypeArray(String)
            Default[]
            Description

            An access rule list consisting of string rules to restrict or allow access from some addresses. The rules that appear earlier in the list are matched first. The format is allow | deny <address> | <CIDR> | all.

            For example:

            [\"deny 192.168.1.1\", \"allow 192.168.1.0/24\", \"deny, all\"]

          • ssl_options
            TypeStruct(listener_ssl_opts)
            Description

            SSL Socket options.

            listener_ssl_opts

            • cacertfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cacert.pem"
              Description

              Trusted PEM format CA certificates bundle file.
              The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
              NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

            • cacerts
              TypeBoolean
              Description

              Deprecated since 5.1.4.

            • certfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/cert.pem"
              Description

              PEM format certificates chain file.
              The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

            • keyfile
              TypeString
              Default"${EMQX_ETC_DIR}/certs/key.pem"
              Description

              PEM format private key file.

            • verify
              TypeEnum(verify_peer,verify_none)
              Defaultverify_none
              Description

              Enable or disable peer verification.

            • reuse_sessions
              TypeBoolean
              Defaulttrue
              Description

              Enable TLS session reuse.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • depth
              TypeInteger(0..+inf)
              Default10
              Description

              Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
              if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
              if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

            • password
              TypeSecret
              Description

              String containing the user's password. Only used if the private key file is password-protected.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • versions
              TypeArray(String)
              Default["tlsv1.3", "tlsv1.2"]
              Description

              All TLS/DTLS versions to be supported.
              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
              In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

            • ciphers
              TypeArray(String)
              Default[]
              Description

              This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
              Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

              The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

              NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

              NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
              If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
              PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

            • secure_renegotiate
              TypeBoolean
              Defaulttrue
              Description

              Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

              By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

              Has no effect when TLS version is configured (or negotiated) to 1.3.

            • log_level
              TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
              Defaultnotice
              Description

              The minimum level of logging allowed for SSL output.

              The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

            • hibernate_after
              TypeDuration
              Default"5s"
              Description

              Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

              The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • partial_chain
              TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
              Description

              Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

            • verify_peer_ext_key_usage
              TypeString
              Description

              Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

              Allowed values are

              • clientAuth
              • serverAuth
              • codeSigning
              • emailProtection
              • timeStamping
              • ocspSigning
              • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

              Comma-separated string is also supported for validating more than one key usages.

              For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

            • dhfile
              TypeString
              Description

              Path to a file containing PEM-encoded Diffie-Hellman parameters to be used by the server if a cipher suite using Diffie-Hellman key exchange is negotiated. If not specified, default parameters are used.
              NOTE: The dhfile option is not supported by TLS 1.3.

            • fail_if_no_peer_cert
              TypeBoolean
              Defaultfalse
              Description

              This option is only effective if verify is set to verify_peer.

              If set to true, EMQX will reject the connection if the client fails to provide a certificate.

              If set to false, EMQX will accept clients which don't present a certificate.

            • honor_cipher_order
              TypeBoolean
              Defaulttrue
              Description

              An important security setting. If this setting is enabled, the server will prioritize the cipher suites it prefers most from the list of cipher suites supported by the client, thus ignoring the client's preferences.

              The server's cipher suites are specified by ciphers, with preference decreasing from left to right.

              It is often better to use the server's preferences, as it is more likely that the server will be configured correctly.

            • client_renegotiation
              TypeBoolean
              Defaulttrue
              Description

              In protocols that support client-initiated renegotiation, the cost of resources of such an operation is higher for the server than the client. This can act as a vector for denial of service attacks. The SSL application already takes measures to counter-act such attempts, but client-initiated renegotiation can be strictly disabled by setting this option to false. The default value is true. Note that disabling renegotiation can result in long-lived connections becoming unusable due to limits on the number of messages the underlying cipher suite can encipher.
              Has no effect when TLS version is configured (or negotiated) to 1.3

            • handshake_timeout
              TypeDuration
              Default"15s"
              Description

              Maximum time duration allowed for the handshake to complete
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • gc_after_handshake
              TypeBoolean
              Defaultfalse
              Description

              Memory usage tuning. If enabled, will immediately perform a garbage collection after the TLS/SSL handshake.

            • ocsp
              TypeStruct(ocsp)

              ocsp

              • enable_ocsp_stapling
                TypeBoolean
                Defaultfalse
                Description

                Whether to enable Online Certificate Status Protocol (OCSP) stapling for the listener. If set to true, requires defining the OCSP responder URL and issuer PEM path.

              • responder_url
                TypeString
                Description

                URL for the OCSP responder to check the server certificate against.

              • issuer_pem
                TypeString
                Description

                PEM-encoded certificate of the OCSP issuer for the server certificate.

              • refresh_interval
                TypeDuration
                Default"5m"
                Description

                The period to refresh the OCSP response for the server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • refresh_http_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout for the HTTP request when checking OCSP responses.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • enable_crl_check
              TypeBoolean
              Defaultfalse
              Description

              Whether to enable CRL verification for this listener.

      • enable_stats

        TypeBoolean
        Defaulttrue
        Description

        Whether to enable client process statistic

      • idle_timeout

        TypeDuration
        Default"30s"
        Description

        The idle time of the client connection process. It has two purposes:

        1. A newly created client process that does not receive any client requests after that time will be closed directly.
        2. A running client process that does not receive any client requests after this time will go into hibernation to save resources.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • clientinfo_override

        TypeStruct(clientinfo_override)
        Description

        ClientInfo override.

        clientinfo_override

        • username
          TypeString
          Description

          Template for overriding username.

        • password
          TypeString
          Description

          Template for overriding password.

        • clientid
          TypeString
          Description

          Template for overriding clientid.

  • prometheus

    TypeOneOf(Struct(recommend_setting),Struct(legacy_deprecated_setting))
    Default{}

    recommend_setting

    • enable_basic_auth

      TypeBoolean
      Defaultfalse
      Description

      Enable or disable basic authentication for prometheus scrape api, not for Push Gateway

    • push_gateway

      TypeStruct(push_gateway)
      Description

      Push Gateway is optional, should not be configured if prometheus is to scrape EMQX.

      push_gateway

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable or disable Pushgateway

      • url

        TypeString
        Default"http://127.0.0.1:9091"
        Description

        URL of Pushgateway server. Pushgateway is optional, should not be configured if prometheus is to scrape EMQX.

      • interval

        TypeDuration
        Default"15s"
        Description

        Data reporting interval
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • headers

        TypeMap
        Default{}
        Description

        An HTTP Headers when pushing to Push Gateway.
        For example, { Authorization = "some-authz-tokens"}

      • job_name

        TypeString
        Default"${name}/instance/${name}~${host}"
        Description

        Job Name that is pushed to the Push Gateway. Available variables:

        • ${name}: Name of EMQX node.
        • ${host}: Host name of EMQX node.
          For example, when the EMQX node name is emqx@127.0.0.1 then the name variable takes value emqx and the host variable takes value 127.0.0.1. Default value is: ${name}/instance/${name}~${host}
    • collectors

      TypeStruct(collectors)
      Description

      The internal advanced metrics of the virtual machine are initially disabled and are usually only enabled during performance testing. Enabling them will increase the CPU load.

      collectors

      • vm_dist

        TypeEnum(disabled,enabled)
        Defaultdisabled
        Description

        Enable or disable VM distribution collector, collects information about the sockets and processes involved in the Erlang distribution mechanism.

      • mnesia

        TypeEnum(enabled,disabled)
        Defaultdisabled
        Description

        Collects Mnesia metrics mainly using mnesia:system_info/1

      • vm_statistics

        TypeEnum(enabled,disabled)
        Defaultdisabled
        Description

        Enable or disable VM statistics collector.

      • vm_system_info

        TypeEnum(enabled,disabled)
        Defaultdisabled
        Description

        Enable or disable VM system info collector.

      • vm_memory

        TypeEnum(enabled,disabled)
        Defaultdisabled
        Description

        Collects information about memory dynamically allocated by the Erlang emulator using erlang:memory/0 .

      • vm_msacc

        TypeEnum(enabled,disabled)
        Defaultdisabled
        Description

        Enable or disable VM microstate accounting metrics collector.

    legacy_deprecated_setting

    • push_gateway_server

      TypeString
      Default"http://127.0.0.1:9091"
      Description

      Deprecated since 5.4.0, use prometheus.push_gateway.url instead

    • interval

      TypeDuration
      Default"15s"
      Description

      Deprecated since 5.4.0, use prometheus.push_gateway.interval instead
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • headers

      TypeMap
      Default{}
      Description

      Deprecated since 5.4.0, use prometheus.push_gateway.headers instead

    • job_name

      TypeString
      Default"${name}/instance/${name}~${host}"
      Description

      Deprecated since 5.4.0, use prometheus.push_gateway.job_name instead

    • enable

      TypeBoolean
      Defaultfalse
      Description

      Deprecated since 5.4.0, use prometheus.push_gateway.url instead

    • vm_dist_collector

      TypeEnum(disabled,enabled)
      Defaultdisabled
      Description

      Deprecated since 5.4.0, use prometheus.collectors.vm_dist instead

    • mnesia_collector

      TypeEnum(enabled,disabled)
      Defaultdisabled
      Description

      Deprecated since 5.4.0, use prometheus.collectors.mnesia instead

    • vm_statistics_collector

      TypeEnum(enabled,disabled)
      Defaultdisabled
      Description

      Deprecated since 5.4.0, use prometheus.collectors.vm_statistics instead

    • vm_system_info_collector

      TypeEnum(enabled,disabled)
      Defaultdisabled
      Description

      Deprecated, use prometheus.collectors.vm_system_info instead

    • vm_memory_collector

      TypeEnum(enabled,disabled)
      Defaultdisabled
      Description

      Deprecated since 5.4.0, use prometheus.collectors.vm_memory instead

    • vm_msacc_collector

      TypeEnum(enabled,disabled)
      Defaultdisabled
      Description

      Deprecated since 5.4.0, use prometheus.collectors.vm_msacc instead

  • exhook

    TypeStruct(exhook)

    exhook

    • servers

      TypeArray(Struct(server))
      Default[]
      Description

      List of exhook servers

      server

      • name

        TypeString
        Description

        Name of the exhook server

      • url

        TypeString
        Description

        URL of the gRPC server

      • request_timeout

        TypeDuration
        Default"5s"
        Description

        The timeout of request gRPC server
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • failed_action

        TypeEnum(deny,ignore)
        Defaultdeny
        Description

        The value that is returned when the request to the gRPC server fails for any reason

      • ssl

        TypeStruct(ssl_conf)

        ssl_conf

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

      • socket_options

        TypeStruct(socket_options)
        Default{keepalive = true, nodelay = true}

        socket_options

        • keepalive
          TypeBoolean
          Defaulttrue
          Description

          Enables/disables periodic transmission on a connected socket when no other data is exchanged. If the other end does not respond, the connection is considered broken and an error message is sent to the controlling process.

        • nodelay
          TypeBoolean
          Defaulttrue
          Description

          If true, option TCP_NODELAY is turned on for the socket, which means that also small amounts of data are sent immediately

        • recbuf
          TypeBytesize
          Description

          The minimum size of receive buffer to use for the socket
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

        • sndbuf
          TypeBytesize
          Description

          The minimum size of send buffer to use for the socket
          A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

      • auto_reconnect

        TypeOneOf(String("false"),Duration)
        Default"60s"
        Description

        Whether to automatically reconnect (initialize) the gRPC server. When gRPC is not available, Exhook tries to request the gRPC service at that interval and reinitialize the list of mounted hooks.

      • pool_size

        TypeInteger(1..+inf)
        Default8
        Description

        The process pool size for gRPC client

  • psk_authentication

    TypeStruct(psk_authentication)

    psk_authentication

    • enable

      TypeBoolean
      Defaultfalse
      Description

      Whether to enable TLS PSK support

    • init_file

      TypeString
      Description

      If init_file is specified, EMQX will import PSKs from the file into the built-in database at startup for use by the runtime. The file has to be structured line-by-line, each line must be in the format of PSKIdentity:SharedSecret. For example: mydevice1:c2VjcmV0

    • separator

      TypeString
      Default":"
      Description

      The separator between PSKIdentity and SharedSecret in the PSK file

    • chunk_size

      TypeInteger
      Default50
      Description

      The size of each chunk used to import to the built-in database from PSK file

  • slow_subs

    TypeStruct(slow_subs)

    slow_subs

    • enable

      TypeBoolean
      Defaultfalse
      Description

      Enable Slow Subscriptions

    • threshold

      TypeDuration
      Default"500ms"
      Description

      The Client ID and topic of the consumer whose message latency is greater than this threshold will be recorded in the slow subscription list.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • expire_interval

      TypeDuration
      Default"300s"
      Description

      The expiration time of the slow subscription record, if the record is not updated within the expiration time, then the record will be deleted.
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • top_k_num

      TypeInteger(1..+inf)
      Default10
      Description

      The maximum number of slow-subscription records, up to a maximum of 1000.

    • stats_type

      TypeEnum(whole,internal,response)
      Defaultwhole
      Description

      Message latency calculation method:

      • whole: The time from when the message arrives at the EMQX (the EMQX gets the message from the receive-buffer) until the message completes delivery.
      • internal: The time from when the message arrives at the EMQX (the EMQX gets the message from the receive-buffer) to when the message begins to be delivered (the EMQX attempts to write the message to the send-buffer).
      • response: The time from the start of message delivery to the completion.

      Note: The completion delivery time refers to the time when QoS 1 and 2 messages complete the MQTT message response process, i.e., the time when QoS 1 message receives the PUBACK packet and QoS 2 message receives the PUBCOMP packet. Since there is no response packet for QoS 0 message, the completion delivery time of the QoS 0 message will be replaced by the time when the message starts to be delivered. Therefore, when using the response method to calculate the latency, the latency of a QoS 0 message will always be equal to 0.

  • opentelemetry

    TypeStruct(opentelemetry)

    opentelemetry

    • metrics

      TypeStruct(otel_metrics)
      Description

      Open Telemetry Metrics configuration.

      otel_metrics

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable or disable Open Telemetry signal.

      • interval

        Aliasesscheduled_delay
        TypeDuration
        Default"10s"
        Description

        The delay interval between two consecutive exports of Open Telemetry signals.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • logs

      TypeStruct(otel_logs)
      Description

      Open Telemetry Logs configuration. If enabled, EMQX installs a log handler that formats events according to Open Telemetry log data model and exports them to the configured Open Telemetry collector or backend.

      otel_logs

      • level

        TypeEnum(debug,info,notice,warning,error,critical,alert,emergency,all)
        Defaultwarning
        Description

        The log level of the Open Telemetry log handler.

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable or disable Open Telemetry signal.

      • scheduled_delay

        TypeDuration
        Default"1s"
        Description

        The delay interval between two consecutive exports of Open Telemetry signals.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • traces

      TypeStruct(otel_traces)
      Description

      Open Telemetry Traces configuration.

      otel_traces

      • enable

        TypeBoolean
        Defaultfalse
        Description

        Enable or disable Open Telemetry signal.

      • scheduled_delay

        TypeDuration
        Default"5s"
        Description

        The delay interval between two consecutive exports of Open Telemetry signals.
        A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

        For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

        Duration is equivalent to Duration(ms). The unit part is case-insensitive.

      • filter

        TypeStruct(trace_filter)
        Description

        Open Telemetry Trace Filter configuration

        trace_filter

        • trace_mode
          TypeEnum(legacy,e2e)
          Defaultlegacy
          Description

          OpenTelemetry tracing mode.

          • legacy: follow the old tracing method, only trace message publishing and delivery. Span names will be compatible to versions before 5.9.
          • e2e: end-to-end tracing mode. All client behaviors will be traced:
            • connect and disconnect
            • subscribe and unsubscribe
            • messaging events such as PUBLISH, PUBACK, PUBREL etc. When enabled (for each type of events), there will be a background tracing for all clients at the configured sample ratio. From the dashboard, one can also add additional trace whitelist on top of the background tracing at full volume for a list of clients or topics. See dashboard or API documents for more details. More control and sampling options can be provided in e2e_tracing_options
        • trace_all
          TypeBoolean
          Defaultfalse
          Description

          If enabled, all published messages are traced, a new trace ID is generated if it can't be extracted from the message. Otherwise, only messages published with trace context are traced. Disabled by default. Note: this config only takes effect when trace_mode is set to legacy.

        • e2e_tracing_options
          TypeStruct(e2e_tracing_options)
          Default{}
          Description

          End-to-end tracing options

          e2e_tracing_options

          • cluster_identifier
            TypeString
            Defaultemqxcl
            Description

            An attribute value added into Span's Attributes. The attribute key will be cluster.id Typically, set a simple and easily recognizable name or use the cluster name to identify different EMQX clusters.

          • msg_trace_level
            TypeInteger(0..2)
            Default0
            Description

            Trace level for all message exchanges during the message publishing process.

            • 0: Basic events during message publish will be recorded as Spans. Including 'client.connect', 'client.authz', 'message.route', 'message.forward', 'message.handle_forward', 'broker.publish'.
            • 1: In addition to basic events. The events 'broker.puback', 'client.puback', 'broker.pubrec', 'client.pubrec' will be recorded as Spans. That is, the first response packet in the QoS1 or QoS2 message interaction.
            • 2: In addition to level 1. The events 'broker.pubrel', 'client.pubrel', 'broker.pubcomp', 'client.pubcomp' will be recorded as Spans.
          • clientid_match_rules_max
            TypeInteger(1..+inf)
            Default30
            Description

            Maximum length of the whitelist for clientid matching.

          • topic_match_rules_max
            TypeInteger(1..+inf)
            Default30
            Description

            Maximum length of the whitelist based for topic matching.

          • sample_ratio
            TypeString
            Default"10%"
            Description

            Background tracing sample ratio for the listed event types.

          • client_connect_disconnect
            TypeBoolean
            Defaultfalse
            Description

            Enable/disable background tracing for all clients' connect/disconnect events at the configured sample ratio.

          • client_subscribe_unsubscribe
            TypeBoolean
            Defaultfalse
            Description

            Enable/disable background tracing for all clients' subscribe/unsubscribe at the configured sample ratio.

          • client_messaging
            TypeBoolean
            Defaultfalse
            Description

            Enable/disable background messaging events for all clients at the configured sample ratio and trace-level.

    • exporter

      TypeStruct(otel_exporter)
      Description

      Open Telemetry Exporter

      otel_exporter

      • endpoint

        TypeString
        Default"http://localhost:4317"
        Description

        The target URL to which the exporter is going to send Open Telemetry signal data.

      • ssl_options

        TypeStruct(ssl_client_opts)
        Default{enable = false}
        Description

        SSL configuration for the Open Telemetry exporter

        ssl_client_opts

        • cacertfile
          TypeString
          Description

          Trusted PEM format CA certificates bundle file.
          The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
          NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

        • cacerts
          TypeBoolean
          Description

          Deprecated since 5.1.4.

        • certfile
          TypeString
          Description

          PEM format certificates chain file.
          The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

        • keyfile
          TypeString
          Description

          PEM format private key file.

        • verify
          TypeEnum(verify_peer,verify_none)
          Defaultverify_none
          Description

          Enable or disable peer verification.

        • reuse_sessions
          TypeBoolean
          Defaulttrue
          Description

          Enable TLS session reuse.
          Has no effect when TLS version is configured (or negotiated) to 1.3

        • depth
          TypeInteger(0..+inf)
          Default10
          Description

          Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
          if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
          if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

        • password
          TypeSecret
          Description

          String containing the user's password. Only used if the private key file is password-protected.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

        • versions
          TypeArray(String)
          Default["tlsv1.3", "tlsv1.2"]
          Description

          All TLS/DTLS versions to be supported.
          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
          In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

        • ciphers
          TypeArray(String)
          Default[]
          Description

          This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
          Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

          The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

          NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

          NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
          If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
          PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

        • secure_renegotiate
          TypeBoolean
          Defaulttrue
          Description

          Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

          By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

          Has no effect when TLS version is configured (or negotiated) to 1.3.

        • log_level
          TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
          Defaultnotice
          Description

          The minimum level of logging allowed for SSL output.

          The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

        • hibernate_after
          TypeDuration
          Default"5s"
          Description

          Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

          The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
          A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

          For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

          Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • partial_chain
          TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
          Description

          Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

        • verify_peer_ext_key_usage
          TypeString
          Description

          Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

          Allowed values are

          • clientAuth
          • serverAuth
          • codeSigning
          • emailProtection
          • timeStamping
          • ocspSigning
          • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

          Comma-separated string is also supported for validating more than one key usages.

          For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

        • enable
          TypeBoolean
          Defaultfalse
          Description

          Enable TLS.

        • server_name_indication
          TypeOneOf(String("disable"),String)
          Description

          Specify the host name to be used in TLS Server Name Indication extension.
          For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
          If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
          The host name is then also used in the host name verification of the peer certificate.
          The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

  • api_key

    TypeStruct(api_key)

    api_key

    • bootstrap_file

      TypeString
      Default""
      Description

      The bootstrap file provides API keys for EMQX. EMQX will load these keys on startup to authorize API requests. It contains colon-separated values in the format: api_key:api_secret:role. Each line specifies an API key and its associated secret, and the role of this key. The 'role' part should be the pre-defined access scope group name, for example, administrator or viewer. The 'role' is introduced in 5.4, to be backward compatible, if it is missing, the key is implicitly granted administrator role.

  • license

    TypeStruct(key_license)
    Description

    Defines the EMQX Enterprise license.

    EMQX Enterprise is initially provided with a default trial license. This license, issued in April 2024, is valid for a period of 5 years. It supports up to 25 concurrent connections, catering to early-stage development and testing needs.

    For deploying EMQX Enterprise in a production environment, a different license is required. You can apply for a production license by visiting https://www.emqx.com/apply-licenses/emqx?version=5

    key_license

    • key

      TypeOneOf(String("default"),String)
      Defaultdefault
      Description

      This configuration parameter is designated for the license key and supports below input formats:

      • Direct Key: Enter the secret key directly as a string value.
      • File Path: Specify the path to a file that contains the secret key. Ensure the path starts with file://.
      • "default": Use string value "default" to apply the default trial license.

      Note: An invalid license key or an incorrect file path may prevent EMQX from starting successfully. If a file path is used, EMQX attempts to reload the license key from the file every 2 minutes. Any failure in reloading the license file will be recorded as an error level log message, and EMQX continues to apply the license loaded previously.

    • connection_low_watermark

      TypeString
      Default"75%"
      Description

      Low watermark limit below which license connection quota usage alarms are deactivated

    • connection_high_watermark

      TypeString
      Default"80%"
      Description

      High watermark limit above which license connection quota usage alarms are activated

  • schema_registry

    TypeStruct(schema_registry)

    schema_registry

    • external

      TypeMap($name->OneOf(Struct(confluent_schema_registry)))
      Default{}
      Description

      Confluent External Schema Registry configuration.

      confluent_schema_registry

      • type

        TypeString("confluent")
        Defaultconfluent
        Description

        External Schema Registry Type

      • url

        TypeString
        Description

        URL endpoint for external registry.

      • auth

        TypeOneOf(String("none"),Struct(confluent_schema_registry_auth_basic))
        Defaultnone
        Description

        Authentication options for accessing external registry.

        confluent_schema_registry_auth_basic

        • username
          TypeString
          Description

          Username for basic authentication method.

        • password
          TypeSecret
          Description

          Password for basic authentication method.
          A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

    • schemas

      TypeMap($name->OneOf(Struct(avro),Struct(protobuf),Struct(json)))
      Default{}
      Description

      Registered schemas.

      avro

      • type

        TypeString("avro")
        Description

        Must be avro for Avro schema.

      • source

        TypeString
        Description

        Source text for the schema.

      • description

        TypeString
        Default""
        Description

        A description for this schema.

      protobuf

      • type

        TypeString("protobuf")
        Description

        Must be protobuf for protobuf schema.

      • source

        TypeString
        Description

        Source text for the schema.

      • description

        TypeString
        Default""
        Description

        A description for this schema.

      json

      • type

        TypeString("json")
        Description

        Must be json for JSON schema.

      • source

        TypeString
        Description

        Source text for the schema.

      • description

        TypeString
        Default""
        Description

        A description for this schema.

  • file_transfer

    TypeStruct(file_transfer)

    file_transfer

    • enable

      TypeBoolean
      Defaultfalse
      Description

      Enable the File Transfer feature.
      Enabling File Transfer implies reserving special MQTT topics in order to serve the protocol.
      This toggle also affects the availability of the File Transfer REST API and storage-dependent background activities (e.g. garbage collection).

    • init_timeout

      TypeDuration
      Default"10s"
      Description

      Timeout for EMQX to initialize the file transfer.
      After reaching the timeout (e.g. due to system is overloaded), the PUBACK message for init will contain error code (0x80).
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • store_segment_timeout

      TypeDuration
      Default"5m"
      Description

      Timeout for storing a file segment.
      After reaching the timeout (e.g. due to system overloaded), the PUBACK message will contain error code (0x80).
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • assemble_timeout

      TypeDuration
      Default"5m"
      Description

      Timeout for assembling and exporting file segments into a final file.
      After reaching the timeout (e.g. due to system is overloaded), the PUBACK message for fin will contain error code (0x80)
      A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

      For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

      Duration is equivalent to Duration(ms). The unit part is case-insensitive.

    • storage

      TypeStruct(storage_backend)
      Default{local {}}
      Description

      Storage settings for file transfer.

      storage_backend

      • local

        TypeStruct(local_storage)
        Description

        Local file system backend to store uploaded fragments and temporary data.

        local_storage

        • segments
          TypeStruct(local_storage_segments)
          Default{gc {}}
          Description

          Settings for local segments storage, which include uploaded transfer fragments and temporary data.

          local_storage_segments

          • root
            TypeString
            Description

            File system path to keep uploaded fragments and temporary data.

          • gc
            TypeStruct(local_storage_segments_gc)
            Description

            Garbage collection settings for the intermediate and temporary files in the local file system.

            local_storage_segments_gc

            • interval
              TypeDuration
              Default"1h"
              Description

              Interval of periodic garbage collection.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • maximum_segments_ttl
              TypeDuration(s)
              Default"24h"
              Description

              Maximum TTL of a segment kept in the local file system.
              This is a hard limit: no segment will outlive this TTL, even if some file transfer specifies a TTL more than that.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • minimum_segments_ttl
              TypeDuration(s)
              Default"5m"
              Description

              Minimum TTL of a segment kept in the local file system.
              This is a hard limit: no segment will be garbage collected before reaching this TTL, even if some file transfer specifies a TTL less than that.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

        • exporter
          TypeStruct(local_storage_exporter_backend)
          Default{local {}}
          Description

          Exporter for the local file system storage backend.
          Exporter defines where and how fully transferred and assembled files are stored.

          local_storage_exporter_backend

          • local
            TypeStruct(local_storage_exporter)
            Description

            Exporter to the local file system.

            local_storage_exporter

            • root
              TypeString
              Description

              Directory where the uploaded files are kept.

          • s3
            TypeStruct(s3_exporter)
            Description

            Exporter to the S3 API compatible object storage.

            s3_exporter

            • access_key_id
              TypeString
              Description

              The access key ID of the S3 bucket.

            • secret_access_key
              TypeSecret
              Description

              The secret access key of the S3 bucket.
              A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

            • host
              TypeString
              Description

              The host of the S3 endpoint.

            • port
              TypeInteger(1..+inf)
              Description

              The port of the S3 endpoint.

            • access_method
              TypeEnum(path,vhost)
              Defaultpath
              Description

              Method to be used to access the bucket through HTTP API.

            • transport_options
              TypeStruct(transport_options)
              Description

              Options for the HTTP transport layer used by the S3 client.

              transport_options

              • ipv6_probe
                TypeBoolean
                Defaultfalse
                Description

                Whether to probe for IPv6 support.

              • connect_timeout
                TypeDuration
                Default"15s"
                Description

                The timeout when connecting to the HTTP server.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

              • pool_size
                TypeInteger(1..+inf)
                Default8
                Description

                The pool size.

              • enable_pipelining
                TypeInteger(1..+inf)
                Description

                Deprecated since 5.8.2.

              • ssl
                TypeStruct(ssl_client_opts)
                Default{enable = false}
                Description

                SSL connection settings.

                ssl_client_opts

                • cacertfile
                  TypeString
                  Description

                  Trusted PEM format CA certificates bundle file.
                  The certificates in this file are used to verify the TLS peer's certificates. Append new certificates to the file if new CAs are to be trusted. There is no need to restart EMQX to have the updated file loaded, because the system regularly checks if file has been updated (and reload).
                  NOTE: invalidating (deleting) a certificate from the file will not affect already established connections.

                • cacerts
                  TypeBoolean
                  Description

                  Deprecated since 5.1.4.

                • certfile
                  TypeString
                  Description

                  PEM format certificates chain file.
                  The certificates in this file should be in reversed order of the certificate issue chain. That is, the host's certificate should be placed in the beginning of the file, followed by the immediate issuer certificate and so on. Although the root CA certificate is optional, it should be placed at the end of the file if it is to be added.

                • keyfile
                  TypeString
                  Description

                  PEM format private key file.

                • verify
                  TypeEnum(verify_peer,verify_none)
                  Defaultverify_none
                  Description

                  Enable or disable peer verification.

                • reuse_sessions
                  TypeBoolean
                  Defaulttrue
                  Description

                  Enable TLS session reuse.
                  Has no effect when TLS version is configured (or negotiated) to 1.3

                • depth
                  TypeInteger(0..+inf)
                  Default10
                  Description

                  Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path. So, if depth is 0 the PEER must be signed by the trusted ROOT-CA directly;
                  if 1 the path can be PEER, Intermediate-CA, ROOT-CA;
                  if 2 the path can be PEER, Intermediate-CA1, Intermediate-CA2, ROOT-CA.

                • password
                  TypeSecret
                  Description

                  String containing the user's password. Only used if the private key file is password-protected.
                  A string holding some sensitive information, such as a password. When secret starts with file://, the rest of the string is interpreted as a path to a file containing the secret itself: whole content of the file except any trailing whitespace characters is considered a secret value. Note: when clustered, all EMQX nodes should have the same file present before using file:// secrets.

                • versions
                  TypeArray(String)
                  Default["tlsv1.3", "tlsv1.2"]
                  Description

                  All TLS/DTLS versions to be supported.
                  NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config.
                  In case PSK cipher suites are intended, make sure to configure ['tlsv1.2', 'tlsv1.1'] here.

                • ciphers
                  TypeArray(String)
                  Default[]
                  Description

                  This config holds TLS cipher suite names separated by comma, or as an array of strings. e.g. "TLS_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256" or ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"].
                  Ciphers (and their ordering) define the way in which the client and server encrypts information over the network connection. Selecting a good cipher suite is critical for the application's data security, confidentiality and performance.

                  The names should be in OpenSSL string format (not RFC format). All default values and examples provided by EMQX config documentation are all in OpenSSL format.

                  NOTE: Certain cipher suites are only compatible with specific TLS versions ('tlsv1.1', 'tlsv1.2' or 'tlsv1.3') incompatible cipher suites will be silently dropped. For instance, if only 'tlsv1.3' is given in the versions, configuring cipher suites for other versions will have no effect.

                  NOTE: PSK ciphers are suppressed by 'tlsv1.3' version config
                  If PSK cipher suites are intended, 'tlsv1.3' should be disabled from versions.
                  PSK cipher suites: "RSA-PSK-AES256-GCM-SHA384,RSA-PSK-AES256-CBC-SHA384, RSA-PSK-AES128-GCM-SHA256,RSA-PSK-AES128-CBC-SHA256, RSA-PSK-AES256-CBC-SHA,RSA-PSK-AES128-CBC-SHA, RSA-PSK-DES-CBC3-SHA,RSA-PSK-RC4-SHA"

                • secure_renegotiate
                  TypeBoolean
                  Defaulttrue
                  Description

                  Whether to reject TLS renegotiation attempts that are not compliant with RFC 5746.

                  By default, secure_renegotiate is set to true, which forces secure renegotiation. If set to false, secure renegotiation will still be used, but will fall back to insecure renegotiation if the peer does not support RFC 5746, which increases the risk of a MitM attack.

                  Has no effect when TLS version is configured (or negotiated) to 1.3.

                • log_level
                  TypeEnum(emergency,alert,critical,error,warning,notice,info,debug,none,all)
                  Defaultnotice
                  Description

                  The minimum level of logging allowed for SSL output.

                  The default is notice, set to a lower debug level for more detailed logging that can be used to investigate SSL handshake issues.

                • hibernate_after
                  TypeDuration
                  Default"5s"
                  Description

                  Specifies the amount of time that an SSL process will hibernate after being idle, thus reducing its memory footprint.

                  The hibernating process will be woken up when a new message arrives. Hibernating and waking up too often can cause CPU utilization to increase, as they both perform garbage collection on the process.
                  A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                  For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                  Duration is equivalent to Duration(ms). The unit part is case-insensitive.

                • partial_chain
                  TypeEnum(true,false,two_cacerts_from_cacertfile,cacert_from_cacertfile)
                  Description

                  Enable or disable peer verification with partial_chain. When local verifies a peer certificate during the x509 path validation process, it constructs a certificate chain that starts with the peer certificate and ends with a trust anchor. By default, if it is set to false, the trust anchor is the Root CA, and the certificate chain must be complete. However, if the setting is set to true or cacert_from_cacertfile, the last certificate in cacertfile will be used as the trust anchor certificate (intermediate CA). This creates a partial chain in the path validation. Alternatively, if it is configured with two_cacerts_from_cacertfile, one of the last two certificates in cacertfile will be used as the trust anchor certificate, forming a partial chain. This option is particularly useful for intermediate CA certificate rotation. However, please note that it incurs some additional overhead, so it should only be used for certificate rotation purposes.

                • verify_peer_ext_key_usage
                  TypeString
                  Description

                  Verify extended key usage in peer's certificate For additional peer certificate validation, the value defined here must present in the 'Extended Key Usage' of peer certificate defined in rfc5280.

                  Allowed values are

                  • clientAuth
                  • serverAuth
                  • codeSigning
                  • emailProtection
                  • timeStamping
                  • ocspSigning
                  • raw OID, for example: "OID:1.3.6.1.5.5.7.3.2" means id-pk 2 which is equivalent to clientAuth

                  Comma-separated string is also supported for validating more than one key usages.

                  For example, "serverAuth,OID:1.3.6.1.5.5.7.3.2"

                • enable
                  TypeBoolean
                  Defaultfalse
                  Description

                  Enable TLS.

                • server_name_indication
                  TypeOneOf(String("disable"),String)
                  Description

                  Specify the host name to be used in TLS Server Name Indication extension.
                  For instance, when connecting to "server.example.net", the genuine server which accepts the connection and performs TLS handshake may differ from the host the TLS client initially connects to, e.g. when connecting to an IP address or when the host has multiple resolvable DNS records
                  If not specified, it will default to the host name string which is used to establish the connection, unless it is IP address used.
                  The host name is then also used in the host name verification of the peer certificate.
                  The special value 'disable' prevents the Server Name Indication extension from being sent and disables the hostname verification check.

              • headers
                TypeMap
                Description

                List of HTTP headers.

              • max_retries
                TypeInteger(0..+inf)
                Description

                Max retry times if error on sending request.

              • request_timeout
                TypeDuration
                Description

                HTTP request timeout.
                A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

                For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

                Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • min_part_size
              TypeBytesize
              Default"5mb"
              Description

              The minimum part size for multipart uploads.
              Uploaded data will be accumulated in memory until this size is reached.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • max_part_size
              TypeBytesize
              Default"5gb"
              Description

              The maximum part size for multipart uploads.
              S3 uploader won't try to upload parts larger than this size.
              A string that represents a number of bytes, for example: 10B, 640kb, 4MB, 1GB. Units are binary standardized, i.e., 1MB equals 1024KB. units are not case sensitive, i.e., 1kb equals 1KB.

            • url_expire_time
              TypeDuration(s)
              Default"1h"
              Description

              The time in seconds for which the signed URLs to the S3 objects are valid.
              A string that represents a time duration, for example: 10s, 2.5m, 1h30m, 1W2D, or 2345ms, which is the smallest unit. Each configuration item has its own minimum precision. The part of the setting value that exceeds the precision will be ignored.

              For example, if a configuration item of type Duration(s) is set to 1200ms, the final effective value will be 1s instead of 1.2s.

              Duration is equivalent to Duration(ms). The unit part is case-insensitive.

            • bucket
              TypeString
              Description

              The name of the S3 bucket.
              A string for ${.path.to.var} style value interpolation, where the leading dot is optional, and ${.} represents all values as an object.

            • acl
              TypeEnum(private,public_read,public_read_write,authenticated_read,bucket_owner_read,bucket_owner_full_control)
              Description

              The ACL to use for the uploaded objects.

  • durable_queues

    TypeStruct(durable_queues)

    durable_queues

    • enable

      TypeBoolean
      Defaultfalse
      Description

      Enable the shared subscription feature.