Core
Minimum Configuration
This module requires no configuration.
Environmental Variables
Name | Required | Description | Example |
---|---|---|---|
REDIS_HOST | True | Redis host to be used | localhost |
REDIS_PORT | True | Redis port to be used | 6379 |
ADMIN_HTTP_PORT | False | Port to be used by admin REST and GraphQL APIs | 3030 |
ADMIN_SOCKET_PORT | False | Port to be used by admin WebSocket API | 3031 |
GRPC_PORT | False | Port to be used by the gRPC server | 55152 |
MASTER_KEY | False | A secret string to be used for admin request header authorization | M4ST3RK3Y |
GRCP_KEY | False | Specifying a secret enables gRPC signed request protection | someRandomSecret |
SERVICE_MONITOR_INTERVAL_MS | False | Service discovery monitor interval in ms (default: 30000) | 5000 |
SERVICE_RECONN_RETRIES | False | Reconnection attempts before removal of offline services (default: 5) | 5 |
SERVICE_RECONN_INIT_MS | False | Initial delay for linear backoff reconnection to offline services in ms (default: 250) 125 |
gRPC Request Protection
This is an optional feature meant to further secure module intercommunication.
When enabled, Conduit and all of its modules make use of a common secret string to sign their outgoing
and verify the authenticity of their incoming remote process calls.
This feature should not be used as a replacement for deployment network level whitelisting.
It does not encrypt gRPC requests either.
To enable it, simply specify a secret string to GRPC_KEY
for every single Core or module instance you're going to deploy.