Options: Outgoing connections
MongooseIM can be configured to talk to external services like databases or HTTP servers.
The interface for outgoing connections management is available via the outgoing_pools
config option for the following types of connections:
cassandra
- pool of connections to Cassandra clusterredis
- pool of connections to Redis serverhttp
- pool of connections to an HTTP(S) server MongooseIM can talk to, for example HTTP authentication backend or HTTP notificationselastic
- pool of connections to ElasticSearch serverrdbms
- pool of connections to an RDBMS databaserabbit
- pool of connections to a RabbitMQ server-
ldap
- pool of connections to an LDAP server -
Syntax: Each pool is specified in a subsection starting with
[outgoing_pools.type.tag]
, wheretype
is one of available connection types andtag
is an arbitrary value uniquely identifying the pool within its type. This allows you to create multiple dedicated pools of the same type.
General pool options¶
outgoing_pools.*.*.scope
¶
- Syntax: string, one of:
"global"
,"host_type"
. - Default:
"global"
- Example:
scope = "host_type"
scope
can be set to:
global
- meaning that the pool will be started once no matter how many XMPP hosts are served by MongooseIM.-
host_type
- the pool will be started for each static XMPP host or host type served by MongooseIM.Note
A pool with scope
global
and tagdefault
is used by services that are not configured by host_type, likeservice_domain_db
orservice_mongoose_system_metrics
, or by modules that don't support dynamic domains, likemod_pubsub
. If a global default pool is not configured, these services will fail.Note
The option
host
is still supported and behaves equivalent tohost_type
; however, it is deprecated in favour of the latter.
Worker pool options¶
All pools are managed by the inaka/worker_pool library.
Available options are:
outgoing_pools.*.*.strategy
¶
- Syntax: string, one of:
"best_worker"
,"random_worker"
,"next_worker"
,"available_worker"
,"next_available_worker"
- Default:
"best_worker"
- Example:
strategy = "available_worker"
Defines worker selection strategy. Consult worker_pool documentation for details.
outgoing_pools.*.*.workers
¶
- Syntax: positive integer
- Default: 10 (20 for Cassandra pool)
- Example:
workers = 100
Number of workers to be started by the pool.
outgoing_pools.*.*.call_timeout
¶
- Syntax: positive integer
- Default: 5000 (60000 for RDBMS pool)
- Example:
call_timeout = 3000
Number of milliseconds after which a call to the pool will time out.
Connection options¶
Options specific to a pool connection are defined in a subsection starting with [outgoing_pools.*.*.connection]
.
For example:
1 2 3 4 5 6 |
|
RDBMS options¶
outgoing_pools.rdbms.*.connection.driver
¶
- Syntax: string, one of
"pgsql"
,"mysql"
,"cockroachdb"
or"odbc"
(a supported driver) - Default: none - this option is mandatory
- Example:
driver = "psgql"
Selects the driver for RDBMS connection. The choice of a driver impacts the set of available options.
outgoing_pools.rdbms.*.connection.keepalive_interval
¶
- Syntax: positive integer
- Default: not set - disabled by default
- Example:
keepalive_interval = 30
When enabled, MongooseIM will send SELECT 1
query through every DB connection at given interval to keep them open. This option should be used to ensure that database connections are restarted after they became broken (e.g. due to a database restart or a load balancer dropping connections). Currently, not every network-related error returned from a database driver to a regular query will imply a connection restart.
outgoing_pools.rdbms.*.connection.query_timeout
¶
- Syntax: positive integer, in milliseconds
- Default: 5000
- Example:
query_timeout = 5000
How long MongooseIM will wait for the database to answer for a query.
outgoing_pools.rdbms.*.connection.max_start_interval
¶
- Syntax: positive integer
- Default: 30
- Example:
max_start_interval = 30
When MongooseIM fails to connect to the DB, it retries with an exponential backoff. This option limits the backoff time for faster reconnection when the DB becomes reachable again.
Options for pgsql
, cockroachdb
and mysql
¶
outgoing_pools.rdbms.*.connection.host
¶
- Syntax: string
- Default: no default; required for
pgsql
,cockroachdb
andmysql
- Example:
host = "localhost"
outgoing_pools.rdbms.*.connection.port
¶
- Syntax: integer, between 0 and 65535
- Default:
5432
forpgsql
;26257
forcockroachdb
;3306
formysql
- Example:
port = 5343
outgoing_pools.rdbms.*.connection.database
¶
- Syntax: string
- Default: no default; required for
pgsql
,cockroachdb
andmysql
- Example:
database = "mim-db"
outgoing_pools.rdbms.*.connection.username
¶
- Syntax: string
- Default: no default; required for
pgsql
,cockroachdb
andmysql
- Example:
username = "mim-user"
outgoing_pools.rdbms.*.connection.password
¶
- Syntax: string
- Default: no default; required for
pgsql
,cockroachdb
andmysql
- Example:
password = "mim-password"
To enable TLS, you need to include the TLS section in the connection options. There is one additonal option for PostgreSQL and CockroachDB:
outgoing_pools.rdbms.*.connection.tls.required
¶
- Syntax: boolean
- Default:
false
- Example:
tls.required = true
This option can be used to enforce a TLS connection.
ODBC options¶
outgoing_pools.rdbms.*.connection.settings
¶
- Syntax: string
- Default: no default; required if the
"odbc"
driver is specified - Example:
settings = "DSN=mydb"
ODBC - specific string defining connection parameters.
ODBC SSL connection setup¶
If you've configured MongooseIM to use an ODBC driver, then the SSL options, along other connection options, should be present in the ~/.odbc.ini
file.
To enable SSL connection the sslmode
option needs to be set to verify-full
.
Additionally, you can provide the path to the CA certificate using the sslrootcert
option.
Example ~/.odbc.ini configuration¶
1 2 3 4 5 6 7 |
|
HTTP options¶
outgoing_pools.http.*.connection.host
¶
- Syntax:
"http[s]://string[:integer]"
- Default: no default; this option is mandatory
- Example:
host = "https://server.com:879"
outgoing_pools.http.*.connection.path_prefix
¶
- Syntax: string
- Default:
"/"
- Example:
path_prefix = "/api/auth/"
Initial part of path which will be common to all calls. Prefix will be automatically prepended to path specified by a call to the pool.
outgoing_pools.http.*.connection.request_timeout
¶
- Syntax: positive integer
- Default:
2000
(milliseconds) - Example:
request_timeout = 5000
Number of milliseconds after which http call to the server will time out. It should be lower than call_timeout
set at the pool level.
To enable TLS, you need to include the TLS section in the connection options.
Redis-specific options¶
Redis can be used as a session manager backend.
Global distribution (implemented in mod_global_distrib
) requires Redis pool.
There are two important limitations:
- for a session backend, the
Tag
parameter has to be equal todefault
redis
backend is not compatible withavailable_worker
strategy.
outgoing_pools.redis.*.connection.host
¶
- Syntax: string
- Default:
"127.0.0.1"
- Example:
host = "redis.local"
outgoing_pools.redis.*.connection.port
¶
- Syntax: integer, between 0 and 65535
- Default:
6379
- Example:
port = 9876
outgoing_pools.redis.*.connection.database
¶
- Syntax: non-negative integer
- Default:
0
- Example:
database = 2
Logical database index (zero-based).
outgoing_pools.redis.*.connection.password
¶
- Syntax: string
- Default:
""
- Example:
password = "topsecret"
Cassandra options¶
outgoing_pools.cassandra.*.connection.servers
¶
- Syntax: a TOML array of tables containing keys
"host"
and"port"
- Default:
[{host = "localhost", port = 9042}]
- Example:
servers = [{host = "host_one", port = 9042}, {host = "host_two", port = 9042}]
outgoing_pools.cassandra.*.connection.keyspace
¶
- Syntax: string
- Default:
"mongooseim"
- Example:
keyspace = "big_mongooseim_database"
To use plain text authentication (using cqerl_auth_plain_handler module):
outgoing_pools.cassandra.*.connection.auth.plain.username
¶
- Syntax: string
- Default: none, this option is mandatory
- Example:
username = "auser"
outgoing_pools.cassandra.*.connection.auth.plain.password
¶
- Syntax: string
- Default: none, this option is mandatory
- Example:
password = "somesecretpassword"
Support for other authentication modules may be added in the future.
To enable TLS, you need to include the TLS section in the connection options.
Elasticsearch options¶
Currently, only one pool tagged default
can be used.
outgoing_pools.elastic.default.connection.host
¶
- Syntax: non-empty string
- Default:
"localhost"
- Example:
host = "otherhost"
outgoing_pools.elastic.default.connection.port
¶
- Syntax: positive integer
- Default:
9200
- Example:
port = 9211
MongooseIM uses inaka/tirerl library to communicate with ElasticSearch.
This library uses worker_pool
in a bit different way than MongooseIM does, so the following options are not configurable:
call_timeout
(infinity)- worker selection strategy (
available_worker
or what's set asdefault_strategy
ofworker_pool
application)
The only pool-related variable you can tweak is thus the number of workers.
Run the following function in the MongooseIM shell to verify that the connection has been established:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 |
|
Note that the output might differ based on your ElasticSearch cluster configuration.
RabbitMQ options¶
The Tag
parameter must be set to event_pusher
in order to be able to use
the pool for mod_event_pusher_rabbit
.
Any other Tag
can be used for other purposes.
outgoing_pools.rabbit.*.connection.host
¶
- Syntax: string
- Default:
"localhost"
- Example:
host = "anotherhost"
outgoing_pools.rabbit.*.connection.port
¶
- Syntax: integer
- Default:
5672
- Example:
port = 4561
outgoing_pools.rabbit.*.connection.username
¶
- Syntax: string
- Default:
"guest"
- Example:
username = "corpop"
outgoing_pools.rabbit.*.connection.password
¶
- Syntax: string
- Default:
"guest"
- Example:
password = "guest"
outgoing_pools.rabbit.*.connection.confirms_enabled
¶
- Syntax: boolean
- Default:
false
- Example:
confirms_enabled = false
Enables/disables one-to-one publishers confirms.
outgoing_pools.rabbit.*.connection.max_worker_queue_len
¶
- Syntax: non-negative integer or
"infinity"
- Default:
1000
- Example:
max_worker_queue_len = "infinity"
Sets a limit of messages in a worker's mailbox above which the worker starts dropping the messages. If a worker message queue length reaches the limit, messages from the head of the queue are dropped until the queue length is again below the limit. Use infinity
to disable.
LDAP options¶
outgoing_pools.ldap.*.connection.servers
¶
- Syntax: an array of strings
- Default:
["localhost"]
- Example:
servers = ["ldap_one", "ldap_two"]
outgoing_pools.ldap.*.connection.port
¶
- Syntax: integer
- Default:
389
(or636
if TLS is enabled) - Example:
port = 800
outgoing_pools.ldap.*.connection.root_dn
¶
- Syntax: string
- Default: empty string
- Example:
root_dn = "cn=admin,dc=example,dc=com"
Leaving out this option makes it an anonymous connection, which most likely is what you want.
outgoing_pools.ldap.*.connection.password
¶
- Syntax: string
- Default: empty string
- Example:
password = "topsecret"
outgoing_pools.ldap.*.connection.connect_interval
¶
- Syntax: positive integer
- Default:
10000
- Example:
connect_interval = 20000
Reconnect interval after a failed connection.
To enable TLS, you need to include the TLS section in the connection options.
TLS options¶
TLS options for a given pool type/tag pair are defined in a subsection starting with [outgoing_pools.[pool_type].[pool_tag].connection.tls]
.
outgoing_pools.*.*.connection.tls.verify_mode
¶
- Syntax: string, one of:
"peer"
,"selfsigned_peer"
,"none"
- Default:
"peer"
- Example:
tls.verify_mode = "none"
Specifies the way server certificate verification works:
peer
- makes sure the server certificate is valid and signed by a trusted CA. Requires a validcacertfile
.selfsigned_peer
- makes sure the server certificate is valid, but allows self-signed certificates. Requires a validcacertfile
.none
- server certificate is not checked.
outgoing_pools.*.*.connection.tls.certfile
¶
- Syntax: string, path in the file system
- Default: not set
- Example:
tls.certfile = "server.pem"
Path to the X509 PEM file with a certificate. If the certificate is signed by an intermediate CA, you should specify here the whole CA chain by concatenating all public keys together.
outgoing_pools.*.*.connection.tls.cacertfile
¶
- Syntax: string, path in the file system
- Default: not set
- Example:
tls.cacertfile = "ca.pem"
Path to the X509 PEM file with a CA chain that will be used to verify clients. It won't have any effect if verify_mode
is set to "none"
.
outgoing_pools.*.*.connection.tls.keyfile
¶
- Syntax: string, path in the file system
- Default: not set
- Example:
tls.keyfile = "key.pem"
Path to the X509 PEM file with the private key.
outgoing_pools.*.*.connection.tls.password
¶
- Syntax: string
- Default: not set
- Example:
tls.password = "secret"
Password to the X509 PEM file with the private key.
outgoing_pools.*.*.connection.tls.ciphers
¶
- Syntax: string with the OpenSSL cipher suite specification
- Default: not set, all supported cipher suites are accepted
- Example:
tls.ciphers = "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384"
Cipher suites to use. Please refer to the OpenSSL documentation for the cipher string format. For allowed values, see the Erlang/OTP SSL documentation.
outgoing_pools.*.*.connection.tls.versions
¶
- Syntax: list of strings
- Default: not set, all supported versions are accepted
- Example:
tls.versions = ["tlsv1.2", "tlsv1.3"]
TLS protocol versions to use. For allowed values, see the Erlang/OTP SSL documentation
outgoing_pools.*.*.connection.tls.server_name_indication.enabled
¶
- Syntax: boolean
- Default:
"true"
, but effective only ifverify_mode
is not"none"
. - Example:
tls.server_name_indication.enabled = false
Enables SNI extension to TLS protocol. You can set it to false
to disable the extension.
outgoing_pools.*.*.connection.tls.server_name_indication.host
¶
- Syntax: string
- Default: not set
- Example:
tls.server_name_indication.host = "domain.com"
Domain against which the certificates will be checked, using SNI.
outgoing_pools.*.*.connection.tls.server_name_indication.protocol
¶
- Syntax: string, one of
"default"
or"https"
- Default: "default"
- Example:
tls.server_name_indication_protocol = "https"
See the OTP documentation for an explanation. You'd usually want to set it to "https"
for reasons described in the security recommendations.