Back to Victoriametrics

vmauth

docs/victoriametrics/vmauth.md

1.142.078.2 KB
Original Source

vmauth is an HTTP proxy, which can authorize, route, and load balance requests across VictoriaMetrics components or any other HTTP backends.

Quick start

Just download the vmutils-* archive from releases page, unpack it, and pass the following flag to the vmauth binary in order to start authorizing and proxying requests:

sh
/path/to/vmauth -auth.config=/path/to/auth/config.yml

The -auth.config command-line flag must point to a valid config. See use cases with typical -auth.config examples.

vmauth accepts HTTP requests on port 8427 and proxies them according to the provided -auth.config. The port can be modified via the -httpListenAddr command-line flag.

See how to reload config without restart.

Docker images for vmauth are available at Docker Hub and Quay. See how vmauth is used in docker-compose environment.

Pass -help to vmauth in order to see all the supported command-line flags with their descriptions.

Feel free to contact us if you need a customized auth proxy for VictoriaMetrics with the support of LDAP, SSO, RBAC, SAML, accounting, and rate limiting, such as vmgateway.

VictoriaMetrics Cloud provides built-in access control with organization-level roles, and lets you create and revoke read, write, or read/write access tokens with a couple of clicks from the UI, without the need of additional proxies. See the VictoriaMetrics Cloud documentation to get started.

Use cases

Simple HTTP proxy

The following -auth.config instructs vmauth to proxy all the incoming requests to the given backend. For example, requests to http://vmauth:8427/foo/bar are proxied to http://backend/foo/bar:

yaml
unauthorized_user:
  url_prefix: "http://backend/"

vmauth can balance load among multiple backends - see these docs for details.

See also authorization and routing docs.

Generic HTTP proxy for different backends

vmauth can proxy requests to different backends depending on the requested path, query args, and any HTTP request header.

For example, the following -auth.config instructs vmauth to make the following:

  • Requests starting with /app1/ are proxied to http://app1-backend/, while the /app1/ path prefix is dropped according to drop_src_path_prefix_parts. For example, the request to http://vmauth:8427/app1/foo/bar?baz=qwe is proxied to http://app1-backend/foo/bar?baz=qwe.
  • Requests starting with /app2/ are proxied to http://app2-backend/, while the /app2/ path prefix is dropped according to drop_src_path_prefix_parts. For example, the request to http://vmauth:8427/app2/index.html is proxied to http://app2-backend/index.html.
  • Other requests are proxied to http://default-backed/.
yaml
unauthorized_user:
  url_map:
  - src_paths:
    - "/app1/.*"
    drop_src_path_prefix_parts: 1
    url_prefix: "http://app1-backend/"
  - src_paths:
    - "/app2/.*"
    drop_src_path_prefix_parts: 1
    url_prefix: "http://app2-backend/"
  url_prefix: "http://default-backed/"

Sometimes it is necessary to proxy all requests that do not match url_map to a special 404 page, which could count as invalid requests. Use default_url for this case. For example, the following -auth.config instructs vmauth to send all the requests, which do not match url_map, to the http://some-backend/404-page.html page. The requested path is passed via the request_path query arg. For example, the request to http://vmauth:8427/foo/bar?baz=qwe is proxied to http://some-backend/404-page.html?request_path=%2Ffoo%2Fbar%3Fbaz%3Dqwe.

yaml
unauthorized_user:
  url_map:
  - src_paths:
    - "/app1/.*"
    drop_src_path_prefix_parts: 1
    url_prefix: "http://app1-backend/"
  - src_paths:
    - "/app2/.*"
    drop_src_path_prefix_parts: 1
    url_prefix: "http://app2-backend/"
  default_url: "http://some-backend/404-page.html"

See routing docs for details.

See also authorization and load balancing docs.

Generic HTTP load balancer

vmauth can balance load across multiple HTTP backends using least-loaded round-robin. For example, the following -auth.config instructs vmauth to spread load among multiple application instances:

yaml
unauthorized_user:
  url_prefix:
  - "http://app-instance-1/"
  - "http://app-instance-2/"
  - "http://app-instance-3/"

See load balancing docs for more details.

See also authorization and routing docs.

Load balancer for vmagent

If vmagent is used for processing data push requests, then it is possible to scale the performance of data processing at vmagent by spreading the load among multiple identically configured vmagent instances. This can be done with the following config for vmauth:

yaml
unauthorized_user:
  url_map:
  - src_paths:
    - "/prometheus/api/v1/write"
    - "/influx/write"
    - "/api/v1/import"
    - "/api/v1/import/.*"
    url_prefix:
    - "http://vmagent-1:8429/"
    - "http://vmagent-2:8429/"
    - "http://vmagent-3:8429/"

See load balancing docs for more details.

See also authorization and routing docs.

Load balancer for VictoriaMetrics cluster

VictoriaMetrics cluster accepts incoming data via vminsert nodes and processes incoming requests via vmselect nodes according to these docs. vmauth can be used for balancing both insert and select requests among vminsert and vmselect nodes, when the following -auth.config is used:

yaml
unauthorized_user:
  url_map:
  - src_paths:
    - "/insert/.*"
    url_prefix:
    - "http://vminsert-1:8480/"
    - "http://vminsert-2:8480/"
    - "http://vminsert-3:8480/"
  - src_paths:
    - "/select/.*"
    - "/admin/.*"
    url_prefix:
    - "http://vmselect-1:8481/"
    - "http://vmselect-2:8481/"

See load balancing docs for more details.

See also authorization and routing docs.

High availability

vmauth automatically switches from a temporarily unavailable backend to other hot standby backends listed in url_prefix if it runs with the -loadBalancingPolicy=first_available command-line flag. The load balancing policy can be overridden at user and url_map sections of -auth.config via load_balancing_policy option. For example, the following config instructs vmauth to proxy requests to http://victoria-metrics-main:8428/ backend. If this backend becomes unavailable, then vmauth starts proxying requests to http://victoria-metrics-standby1:8428/. If this backend also becomes unavailable, then requests are proxied to the last specified backend - http://victoria-metrics-standby2:8428/:

yaml
unauthorized_user:
  url_prefix:
  - "http://victoria-metrics-main:8428/"
  - "http://victoria-metrics-standby1:8428/"
  - "http://victoria-metrics-standby2:8428/"
  load_balancing_policy: first_available

See load-balancing docs for more details.

See also authorization and routing docs.

TLS termination proxy

vmauth can terminate HTTPS requests to backend services when it runs with the following command-line flags:

sh
/path/to/vmauth -tls -tlsKeyFile=/path/to/tls_key_file -tlsCertFile=/path/to/tls_cert_file -httpListenAddr=0.0.0.0:443
  • -httpListenAddr sets the address to listen for incoming HTTPS requests
  • -tls enables accepting TLS connections at -httpListenAddr
  • -tlsKeyFile sets the path to the TLS certificate key file
  • -tlsCertFile sets the path to the TLS certificate file

See also automatic issuing of TLS certificates.

See also authorization, routing and load balancing docs.

Basic Auth proxy

vmauth can authorize access to backends depending on the provided Basic Auth request headers. For example, the following config proxies requests to single-node VictoriaMetrics if they contain Basic Auth header with the given username and password:

yaml
users:
- username: foo
  password: bar
  url_prefix: "http://victoria-metrics:8428/"

See also authorization, routing and load balancing docs.

Bearer Token auth proxy

vmauth can authorize access to backends depending on the provided Bearer Token request headers. For example, the following config proxies requests to single-node VictoriaMetrics if they contain the given bearer_token:

yaml
users:
- bearer_token: ABCDEF
  url_prefix: "http://victoria-metrics:8428/"

See also authorization, routing and load balancing docs.

JWT Token auth proxy

vmauth can authorize access{{% available_from "v1.137.0" %}} to backends depending on the provided JWT token in Authorization request header. JWT tokens are verified using RSA or ECDSA public keys. The following auth config proxies requests to single-node VictoriaMetrics if they contain a valid JWT token:

yaml
users:
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
  url_prefix: "http://victoria-metrics:8428/"

JWT tokens must contain a "vm_access": {} claim, more on that in JWT claim-based request templating

For testing, skip signature verification with skip_verify: true (not recommended for production).

yaml
users:
- jwt:
    skip_verify: true
  url_prefix: "http://victoria-metrics:8428"

JWT authentication cannot be combined with other auth methods (bearer_token, username, password) in the same users config.

OIDC Discovery

Instead of specifying public keys manually, vmauth can automatically fetch{{% available_from "v1.138.0" %}} and rotate public keys from an OpenID Connect (OIDC) provider via its Discovery endpoint. This is useful when integrating with identity providers such as Keycloak, Auth0, Okta, or Google.

Set oidc.issuer to the base URL of the OIDC provider. vmauth will:

  1. Fetch {issuer}/.well-known/openid-configuration to discover the jwks_uri.
  2. Download the JSON Web Key Set (JWKS) from the jwks_uri to obtain the public keys used to verify JWT signatures.
  3. Automatically refresh the keys every 5 minutes to handle key rotation.

JWT tokens must contain an iss claim that matches the configured issuer value exactly.

yaml
users:
- jwt:
    oidc:
      issuer: "https://your-identity-provider.example.com"
  url_prefix: "http://victoria-metrics:8428/"

The oidc option cannot be combined with public_keys, public_key_files, or skip_verify.

If the OIDC provider is temporarily unavailable during a key refresh, vmauth continues using the previously fetched keys until the next successful refresh. If no keys have been fetched yet (e.g., on startup when the provider is unreachable), the config section is skipped during authentication.

JWT claim matching

vmauth can route requests to different backends depending on the claims contained in the provided JWT token based on match_claims{{% available_from "v1.138.0" %}} field.

This enables RBAC-style setups where tokens carrying different roles (e.g. admin, viewer, writer) are mapped to different users — each with its own url_prefix or url_map configuration — all authenticated against the same public key.

Claim matching is configured via the match_claims field inside the jwt user section. A user is selected only if:

  1. All configured match_claims entries evaluate successfully (logical AND).
  2. The token signature is cryptographically valid.

If match_claims is not set or is empty, the user matches any valid JWT token signed with the configured public key.

Claim names support dot-notation for traversal of nested JSON objects (a simplified JSONPath-style approach), for example vm_access.metrics_account_id matches {"vm_access": {"metrics_account_id": 1}} and security.permissions.0.read matches `{"security": {"permissions": [{"read": 1}]}}. Claim names must point to a leaf value or an array. The supported leaf types are string, integer, float and boolean. If the claim value is an array, each scalar element is compared against the match value - the claim matches if any element matches. Objects and nested arrays inside the array are skipped. All configured claims must match and the values use regular expression syntax.

For example, the following config routes requests based on the role claim in the JWT token:

yaml
users:
- jwt:
    oidc:
      issuer: "https://your-identity-provider.example.com"
  url_prefix: "http://victoria-metrics:8428/"
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims:
      role: admin
  url_prefix: "http://victoria-metrics-admin:8428/"
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims:
      role: viewer
  url_prefix: "http://victoria-metrics-readonly:8428/"

The following config demonstrates matching on nested claims using dot-notation:

yaml
users:
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims:
      vm_access.metrics_account_id: 1
  url_prefix: "http://victoria-metrics-tenant-1:8428/"
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims:
      foo.bar: baz
  url_prefix: "http://victoria-metrics-tenant-2:8428/"

The following config matches against array claim values. The first user matches a token with claim {"roles": ["admin"]}, while the second matches a token with claim {"roles": ["read"]} or {"roles": ["write"]}.

yaml
users:
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims:
      roles: admin
  url_prefix: "http://victoria-metrics-admin:8428/"
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims:
      roles: "^(read|write)$"
  url_prefix: "http://victoria-metrics-readonly:8428/"

The following config matches any valid token (no claim filtering), equivalent to the behavior when match_claims is omitted:

yaml
users:
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims: {}
  url_prefix: "http://victoria-metrics:8428/"

The following config demonstrates matching on nested claims using dot-notation and regex value match for multiple tenants access:

yaml
users:
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims:
      vm_access.metrics_account_id: "(0|1|2)"
  url_prefix: "http://victoria-metrics-vmselect-1:8481/select/multitenant?extra_filters={vm_account_id=~\"(0|1|2)\"}"
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
    match_claims:
      vm_access.metrics_account_id: "(3|4|5)"
  url_prefix: "http://victoria-metrics-vmselect-1:8481/select/multitenant?extra_filters={vm_account_id=~\"(3|4|5)\"}"

JWT claim matching. Conflict resolution

When multiple users have match_claims entries that all match the incoming token, vmauth selects the user whose match_claims map contains the greatest number of entries. A more specific match (more claim constraints) always takes priority over a less specific one.

For example, given the following config and a token containing both role=admin and iss=foo:

yaml
users:
- jwt:
    match_claims:
      iss: foo
  url_prefix: "http://victoria-metrics-default:8428/"
- jwt:
    match_claims:
      iss: foo
      role: admin
  url_prefix: "http://victoria-metrics-admin:8428/"

The second user is selected because it has two matching claim entries compared to one, and requests are proxied to http://victoria-metrics-admin:8428/.

If two users match with the same number of match_claims entries, the selection becomes non-deterministic. To avoid ambiguity, ensure that claim match conditions across users with the same number of entries are mutually exclusive.

For example, the following config is ambiguous when a token contains both role=foo and team=platform:

yaml
users:
- jwt:
    match_claims:
      role: foo
  url_prefix: "http://backend-a:8428/"
- jwt:
    match_claims:
      team: platform
  url_prefix: "http://backend-b:8428/"

Both users have one claim entry each, so if the token satisfies both, neither takes priority. Resolve this by adding the same match claim keys to both users:

yaml
users:
- jwt:
    match_claims:
      team: ops
      role: foo
  url_prefix: "http://backend-a:8428/"
- jwt:
    match_claims:
      team: platform
      role: admin
  url_prefix: "http://backend-b:8428/"

JWT claim-based matching can be combined with JWT claim-based request templating for dynamic URL rewriting based on vm_access claim fields.

JWT claim-based request templating

vmauth can dynamically rewrite{{% available_from "v1.137.0" %}} upstream URLs and request headers using values from the JWT vm_access claim. This enables routing different users to different backends or tenants based solely on the JWT token, without maintaining separate user configs per tenant.

Example: minimal valid JWT. If vm_access is empty, tenant 0:0 is assumed and no additional filters are applied.

json
{
  "exp": 2770832322,
  "vm_access": {}
}

Example: complete JWT with vm_access claim defining explicit access rules for metrics and logs.

json
{
  "exp": 1771953418,
  "vm_access": {
    "metrics_account_id": 1,
    "metrics_project_id": 2,
    "metrics_extra_labels": ["dev=team","env=prod"],
    "metrics_extra_filters": ["{env=~\"prod|dev\",team!=\"test\"}"],

    "logs_account_id": 2,
    "logs_project_id": 3,
    "logs_extra_filters": ["{\"namespace\":\"my-app\",\"env\":\"prod\"}"],
    "logs_extra_stream_filters": []
  }
}

Placeholders are written directly into url_prefix and headers values in the auth config. At request time each placeholder is replaced with the corresponding value from the vm_access claim of the incoming JWT token.

The following placeholders are supported:

PlaceholderJWT claim field
{{.MetricsTenant}} -> 0:0metrics_account_id int,
metrics_project_id int
{{.MetricsExtraLabels}}metrics_extra_labels string array
{{.MetricsExtraFilters}}metrics_extra_filters string array
{{.LogsAccountID}}logs_account_id int
{{.LogsProjectID}}logs_project_id int
{{.LogsExtraFilters}}logs_extra_filters string array
{{.LogsExtraStreamFilters}}logs_extra_stream_filters string array

Placeholders are supported in the following locations:

  • URL path — only {{.MetricsTenant}}, {{.LogsAccountID}} and {{.LogsProjectID}} are allowed in path segments.
  • URL query parameters — any placeholder may be used as the full value of a query parameter (e.g. ?extra_filters={{.MetricsExtraFilters}}).
  • Request headers — any placeholder may be used as the full value of a request header (e.g. AccountID: {{.LogsAccountID}}).

Placeholders are not supported in response headers. They are also only valid for JWT-authenticated users — using them in configs for username/password or bearer_token users causes a configuration error.

Example: route requests to the VictoriaMetrics single-node:

yaml
users:
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
  url_prefix: "http://vminsert:8480/prometheus/?extra_filters={{.MetricsExtraFilters}}&extra_label={{.MetricsExtraLabels}}"

Example: route requests to the VictoriaMetrics cluster:

yaml
users:
- jwt:
    public_keys:
    - |
      -----BEGIN PUBLIC KEY-----
      MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
      -----END PUBLIC KEY-----
  url_map:
  - src_paths:
    - "/api/v1/write"
    url_prefix: "http://vminsert:8480/insert/{{.MetricsTenant}}/prometheus/"
  - src_paths:
    - "/api/v1/query"
    - "/api/v1/query_range"
    url_prefix: "http://vmselect:8481/select/{{.MetricsTenant}}/prometheus/"

Example: route requests to the VictoriaLogs cluster:

yaml
users:
- jwt:
    public_keys:
      - |
        -----BEGIN PUBLIC KEY-----
        MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
        -----END PUBLIC KEY-----
  headers:
  - "AccountID: {{.LogsAccountID}}"
  - "ProjectID: {{.LogsProjectID}}"
  url_map:
  - src_paths:
      - "/select/.*"
    url_prefix:
      - http://vlselect:9428
  - src_paths:
      - "/insert/.*"
    url_prefix:
      - http://vlinsert:9428

See also authorization, routing and load balancing docs.

Per-tenant authorization

The following -auth.config instructs proxying insert and select requests from the Basic Auth user tenant1 to the tenant 1, while requests from the user tenant2 are sent to tenant 2:

yaml
users:
- username: tenant1
  password: "***"
  url_map:
  - src_paths:
    - "/api/v1/write"
    url_prefix: "http://vminsert-backend:8480/insert/1/prometheus/"
  - src_paths:
    - "/api/v1/query"
    - "/api/v1/query_range"
    - "/api/v1/series"
    - "/api/v1/labels"
    - "/api/v1/label/.+/values"
    url_prefix: "http://vmselect-backend:8481/select/1/prometheus/"
- username: tenant2
  password: "***"
  url_map:
  - src_paths:
    - "/api/v1/write"
    url_prefix: "http://vminsert-backend:8480/insert/2/prometheus/"
  - src_paths:
    - "/api/v1/query"
    - "/api/v1/query_range"
    - "/api/v1/series"
    - "/api/v1/labels"
    - "/api/v1/label/.+/values"
    url_prefix: "http://vmselect-backend:8481/select/2/prometheus/"

See also authorization, routing and load balancing docs.

mTLS-based request routing

Enterprise version of vmauth can be configured for routing requests to different backends depending on the following subject fields in the TLS certificate provided by client:

  • organizational_unit aka OU
  • organization aka O
  • common_name aka CN

For example, the following -auth.config routes requests from clients with organizational_unit: finance TLS certificates to http://victoriametrics-finance:8428 backend, while requests from clients with organizational_unit: devops TLS certificates are routed to http://victoriametrics-devops:8428 backend:

yaml
users:
- mtls:
    organizational_unit: finance
  url_prefix: "http://victoriametrics-finance:8428"
- mtls:
    organizational_unit: devops
  url_prefix: "http://victoriametrics-devops:8428"

mTLS protection must be enabled for mTLS-based routing.

See also authorization, routing and load balancing docs.

Enforcing query args

vmauth can be configured to add mandatory query arguments before proxying requests to backends. For example, the following config adds extra_label to all the requests, which are proxied to single-node VictoriaMetrics:

yaml
unauthorized_user:
  url_prefix: "http://victoria-metrics:8428/?extra_label=foo=bar"

See also authorization, routing and load balancing docs.

Dropping request path prefix

By default, vmauth doesn't strip the path prefix from the original request when proxying it to the matching backend. Sometimes it is needed to drop the path prefix before proxying the request to the backend. This can be done by specifying the number of /-delimited prefix parts to drop from the request path via drop_src_path_prefix_parts option at url_map level or at user level or -auth.config.

For example, if you need to serve requests to vmalert at /vmalert/ path prefix, while serving requests to vmagent at /vmagent/ path prefix, then the following -auth.config can be used:

yaml
unauthorized_user:
  url_map:

    # proxy all the requests, which start with `/vmagent/`, to the vmagent backend
  - src_paths:
    - "/vmagent/.*"

    # drop /vmagent/ path prefix from the original request before proxying it to url_prefix.
    drop_src_path_prefix_parts: 1
    url_prefix: "http://vmagent-backend:8429/"

    # proxy all the requests, which start with `/vmalert`, to the vmalert backend
  - src_paths:
    - "/vmalert/.*"

    # drop /vmalert/ path prefix from the original request before proxying it to url_prefix.
    drop_src_path_prefix_parts: 1
    url_prefix: "http://vmalert-backend:8880/"

Authorization

vmauth supports the following authorization mechanisms:

See also security docs, routing docs and load balancing docs.

Routing

vmauth can proxy requests to different backends depending on the following parts of the HTTP request:

See also authorization and load balancing. For debug purposes, extra logging for failed requests can be enabled by setting dump_request_on_errors: true {{% available_from "v1.107.0" %}} on the user level. Please note that such logging may expose sensitive information and should be used only for debugging.

Routing by path

src_paths option can be specified inside url_map in order to route requests by path.

The following -auth.config routes requests to paths starting with /app1/ to http://app1-backend, while requests with paths starting with /app2 are routed to http://app2-backend, and the rest of the requests are routed to http://some-backend/404-page.html:

yaml
unauthorized_user:
  url_map:
  - src_paths:
    - "/app1/.*"
    url_prefix: "http://app1-backend/"
  - src_paths:
    - "/app2/.*"
    url_prefix: "http://app2-backend/"
  default_url: http://some-backend/404-page.html

src_paths accepts a list of regular expressions. The incoming request is routed to the given url_prefix if the whole requested path matches at least one src_paths entry.

See also how to drop request path prefix.

Routing by host

src_hosts option can be specified inside url_map in order to route requests by host header.

The following -auth.config routes requests to app1.my-host.com host to http://app1-backend, while routing requests to app2.my-host.com host to http://app2-backend, and the rest of the requests are routed to http://some-backend/404-page.html:

yaml
unauthorized_user:
  url_map:
  - src_hosts:
    - "app1\\.my-host\\.com"
    url_prefix: "http://app1-backend/"
  - src_hosts:
    - "app2\\.my-host\\.com"
    url_prefix: "http://app2-backend/"
  default_url: http://some-backend/404-page.html

src_hosts accepts a list of regular expressions. The incoming request is routed to the given url_prefix if the whole request host matches at least one src_hosts entry.

Routing by query arg

src_query_args option can be specified inside url_map in order to route requests by the given query arg.

For example, the following -auth.config routes requests to http://app1-backend/ if db=foo query arg is present in the request, while routing requests with db query arg starting with bar to http://app2-backend, and the rest of the requests are routed to http://some-backend/404-page.html:

yaml
unauthorized_user:
  url_map:
  - src_query_args: ["db=foo"]
    url_prefix: "http://app1-backend/"
  - src_query_args: ["db=~bar.*"]
    url_prefix: "http://app2-backend/"
  default_url: http://some-backend/404-page.html

src_query_args accepts a list of strings in the format arg=value or arg=~regex. The arg=value format means exact matching of the whole arg query arg value to the given value. The arg=~regex format means regex matching of the whole arg query arg value to the given regex. If at least a single query arg in the request matches at least one src_query_args entry, then the request is routed to the given url_prefix.

Routing by header

src_headers option can be specified inside url_map in order to route requests by the given HTTP request header.

For example, the following -auth.config routes requests to http://app1-backend if TenantID request header equals to 42, while routing requests to http://app2-backend if TenantID request header equals to 123:456, and the rest of the requests are routed to http://some-backend/404-page.html:

yaml
unauthorized_user:
  url_map:
  - src_headers: ["TenantID: 42"]
    url_prefix: "http://app1-backend/"
  - src_headers: ["TenantID: 123:456"]
    url_prefix: "http://app2-backend/"
  default_url: http://some-backend/404-page.html

If src_headers contains multiple entries, then it is enough to match only a single entry in order to route the request to the given url_prefix.

Routing by multiple parts

Any subset of src_paths, src_hosts, src_query_args and src_headers options can be specified simultaneously in a single url_map entry. In this case, the request is routed to the given url_prefix if the request matches all the provided configs simultaneously.

For example, the following -auth.config routes requests to http://app1-backend if all the conditions mentioned below are simultaneously met:

  • the request path starts with /app/
  • the requested hostname ends with .bar.baz
  • the request contains db=abc query arg
  • the TenantID request header equals 42
yaml
unauthorized_user:
  url_map:
  - src_paths: ["/app/.*"]
    src_hosts: [".+\\.bar\\.baz"]
    src_query_args: ["db=abc"]
    src_headers: ["TenantID: 42"]
    url_prefix: "http://app1-backend/"

Load balancing

Each url_prefix in the -auth.config can be specified in the following forms:

  • A single URL. For example:

    yaml
    unauthorized_user:
      url_prefix: 'http://vminsert:8480/insert/0/prometheus/`
    

    In this case, vmauth proxies requests to the specified URL.

  • A list of URLs. For example:

    yaml
    unauthorized_user:
      url_prefix:
      - 'http://vminsert-1:8480/insert/0/prometheus/'
      - 'http://vminsert-2:8480/insert/0/prometheus/'
      - 'http://vminsert-3:8480/insert/0/prometheus/'
    

    In this case, vmauth spreads requests among the specified URLs using the least-loaded round-robin policy. This guarantees that incoming load is shared uniformly among the specified backends. See also discovering backend IPs.

    vmauth automatically detects temporarily unavailable backends and spreads incoming queries among the remaining available backends. This allows restarting and performing maintenance on backends without removing them from the url_prefix list.

    By default, vmauth returns backend responses with all the HTTP status codes to the client. It is possible to configure automatic retry of requests at other backends if the backend responds with a status code specified in the -retryStatusCodes command-line flag. It is possible to customize the list of HTTP response status codes to retry via the retry_status_codes list at the user and url_map level of -auth.config. For example, the following config retries requests on other backends if the current backend returns a response with 500 or 502 HTTP status code:

    yaml
    unauthorized_user:
      url_prefix:
      - http://vmselect1:8481/
      - http://vmselect2:8481/
      - http://vmselect3:8481/
      retry_status_codes: [500, 502]
    

    By default, vmauth uses the least_loaded policy to distribute incoming requests across available backends. The policy can be changed to first_available via the -loadBalancingPolicy command-line flag. In this case, vmauth sends all the requests to the first specified backend while it is available. vmauth starts sending requests to the next specified backend when the first backend is temporarily unavailable. It is possible to customize the load-balancing policy at the user and url_map levels. For example, the following config specifies a first_available load balancing policy for unauthorized requests:

    yaml
    unauthorized_user:
      url_prefix:
      - http://victoria-metrics-main:8428/
      - http://victoria-metrics-standby:8428/
      load_balancing_policy: first_available
    

The load balancing feature can be used in the following cases:

  • Balancing the load among multiple vmselect and/or vminsert nodes in VictoriaMetrics cluster. The following -auth.config can be used to spread incoming requests among 3 vmselect nodes and retrying failed requests or requests with 500 and 502 response status codes:

    yaml
    unauthorized_user:
      url_prefix:
      - http://vmselect1:8481/
      - http://vmselect2:8481/
      - http://vmselect3:8481/
      retry_status_codes: [500, 502]
    
  • Sending select queries to the closest availability zone (AZ), while falling back to other AZs with identical data if the closest AZ is unavailable. For example, the following -auth.config sends select queries to https://vmselect-az1/ and uses the https://vmselect-az2/ as a fallback when https://vmselect-az1/ is temporarily unavailable or cannot return full responses. See these docs for details about the deny_partial_response query arg, which is added to requests before they are proxied to backends.

    yaml
    unauthorized_user:
      url_prefix:
      - https://vmselect-az1/?deny_partial_response=1
      - https://vmselect-az2/?deny_partial_response=1
      retry_status_codes: [500, 502, 503]
      load_balancing_policy: first_available
    

Load balancing can be configured independently for each user entry and for each url_map entry. See auth config docs for more details.

See also discovering backend IPs, authorization and routing.

Discovering backend IPs

By default, vmauth distributes load across the backends listed under url_prefix, as described in the load balancing docs. Sometimes multiple backend instances can be hidden behind a single hostname. For example, vmselect-service hostname may point to a cluster of vmselect instances in VictoriaMetrics cluster setup. So the following config may fail to spread load among available vmselect instances, since vmauth will send all the requests to the same URL, which may end up with a single backend instance:

yaml
unauthorized_user:
  url_prefix: http://vmselect-service/select/0/prometheus/

There are the following solutions for this issue:

  • To enumerate every vmselect hostname or IP in the url_prefix list:

    yaml
    unauthorized_user:
      url_prefix:
      - http://vmselect-1:8481/select/0/prometheus/
      - http://vmselect-2:8481/select/0/prometheus/
      - http://vmselect-3:8481/select/0/prometheus/
    

    This scheme works great, but it requires manual updating of the -auth.config whenever vmselect services are restarted, downscaled, or upscaled.

  • To set discover_backend_ips: true option, so vmauth automatically discovers IPs behind the given hostname and then spreads load among the discovered IPs:

    yaml
    unauthorized_user:
      url_prefix: http://vmselect-service:8481/select/0/prometheus/
      discover_backend_ips: true
    

    If the url_prefix contains a hostname with srv+ prefix, then the hostname without srv+ prefix is automatically resolved via DNS SRV to the list of hostnames with TCP ports, and vmauth balances load among the discovered TCP addresses:

    yaml
    unauthorized_user:
      url_prefix: "http://srv+vmselect/select/0/prometheus"
      discover_backend_ips: true
    

    This functionality is useful for balancing load across backend instances running on different TCP ports, since DNS SRV records include TCP ports.

    The discover_backend_ips option can be specified at user and url_map level in the -auth.config. It can also be enabled globally via the -discoverBackendIPs command-line flag.

See also load balancing docs.

SRV URLs

If url_prefix contains a URL with the hostname starting with srv+ prefix, then vmauth uses DNS SRV lookup for the hostname without the srv+ prefix and selects a random TCP address (e.g., hostname plus TCP port) from the resolved results.

For example, if some-addr DNS SRV record contains some-host:12345 TCP address, then url_prefix: http://srv+some-addr/some/path is automatically resolved into url_prefix: http://some-host:12345/some/path. DNS SRV resolution is performed whenever a new connection to the url_prefix backend is established.

See also discovering backend addresses.

Modifying HTTP headers

vmauth supports setting and removing HTTP request headers before sending requests to backends. This is done via the headers option. For example, the following -auth.config sets TenantID: foobar header to requests proxied to http://backend:1234/. It also overrides the X-Forwarded-For request header with an empty value. This effectively removes the X-Forwarded-For header from requests proxied to http://backend:1234/:

yaml
unauthorized_user:
  url_prefix: "http://backend:1234/"
  headers:
  - "TenantID: foobar"
  - "X-Forwarded-For:"

users:
  - username: "foo"
    password: "bar"
    # dump request details on errors (can contain sensitive information)
    dump_request_on_errors: true
    url_map:
      - src_paths: ["/select/.*"]
        headers:
          - "AccountID: 1"
          - "ProjectID: 0"
        url_prefix:
          - "http://backend:9428/"

vmauth also supports setting and removing HTTP response headers before returning the response from the backend to the client. This is done via the response_headers option. For example, the following -auth.config sets Foo: bar response header and removes the Server response header before returning the response to the client:

yaml
unauthorized_user:
  url_prefix: "http://backend:1234/"
  response_headers:
  - "Foo: bar"
  - "Server:"

See also Host header docs.

Host HTTP header

By default, vmauth sets the Host HTTP header to the backend hostname when proxying requests to the corresponding backend. Sometimes it is needed to keep the original Host header from the client request sent to vmauth. For example, if backends use host-based routing. In this case, set keep_original_host: true. For example, the following config instructs to use the original Host header from client requests when proxying requests to the backend:1234:

yaml
unauthorized_user:
  url_prefix: "http://backend:1234/"
  keep_original_host: true

It is also possible to set the Host header to an arbitrary value when proxying the request to the configured backend, via headers option:

yaml
unauthorized_user:
  url_prefix: "http://backend:1234/"
  headers:
  - "Host: foobar"

Config reload

vmauth supports dynamic reload of -auth.config via the following ways:

  • By sending SIGHUP signal to vmauth process:

    sh
    kill -HUP `pidof vmauth`
    
  • By querying /-/reload endpoint. It is recommended to protect it with -reloadAuthKey. See security docs for details.

  • By passing the interval for config check to the -configCheckInterval command-line flag.

Concurrency limiting

vmauth may limit the number of concurrent requests according to the following command-line flags:

  • -maxConcurrentRequests limits the global number of concurrent requests vmauth can serve across all the configured users.
  • -maxConcurrentPerUserRequests limits the number of concurrent requests vmauth can serve per each configured user.

It is also possible to set individual limits on the number of concurrent requests per user with the max_concurrent_requests option. For example, the following -auth.config limits the number of concurrent requests from the user foo to 10:

yaml
users:
- username: foo
  password: bar
  url_prefix: "http://some-backend/"
  max_concurrent_requests: 10

vmauth responds with 429 Too Many Requests HTTP error when the number of concurrent requests exceeds the configured limits for the duration exceeding the -maxQueueDuration command-line flag value.

The following metrics related to concurrency limits are exposed by vmauth:

  • vmauth_concurrent_requests_capacity - the global limit on the number of concurrent requests vmauth can serve. It is set via the -maxConcurrentRequests command-line flag.
  • vmauth_concurrent_requests_current - the current number of concurrent requests vmauth processes.
  • vmauth_concurrent_requests_limit_reached_total - the number of requests rejected with 429 Too Many Requests error because the global concurrency limit has been reached.
  • vmauth_user_concurrent_requests_capacity{username="..."} - the limit on the number of concurrent requests for the given username.
  • vmauth_user_concurrent_requests_current{username="..."} - the current number of concurrent requests for the given username.
  • vmauth_user_concurrent_requests_limit_reached_total{username="..."} - the number of requests rejected with 429 Too Many Requests error because the concurrency limit has been reached for the given username.
  • vmauth_unauthorized_user_concurrent_requests_capacity - the limit on the number of concurrent requests for unauthorized users (if unauthorized_user section is used).
  • vmauth_unauthorized_user_concurrent_requests_current - the current number of concurrent requests for unauthorized users (if unauthorized_user section is used).
  • vmauth_unauthorized_user_concurrent_requests_limit_reached_total - the number of requests rejected with 429 Too Many Requests error because the concurrency limit has been reached for unauthorized users (if the unauthorized_user section is used).

See also request body buffering.

Request body buffering

vmauth can buffer request bodies {{% available_from "v1.135.0" %}} before proxying the requests to backends. This prevents slow-writing clients from occupying backend connections. This is especially important when clients send requests over unreliable or low-bandwidth networks (for example, IoT devices over EDGE networks), where slow uploads can exhaust concurrency limits, increase latency, reduce ingestion rate, and trigger 429 Too Many Requests responses even when backend resources are not saturated.

Request body buffering can be configured with the -requestBufferSize command-line flag, which defines the maximum number of bytes to buffer from the request body before proxying the request to the backend. If buffering exceeds the duration specified by the -maxQueueDuration command-line flag, the request is rejected.

Request bodies are buffered before applying per-user concurrency limits.

The following metrics related to request buffering are exposed by vmauth:

  • vmauth_http_request_errors_total{reason="reject_slow_client"} - the number of rejected requests because the request body couldn't be read during -maxQueueDuration.
  • vmauth_buffer_request_body_duration_seconds - the summary for the request body buffering duration. Use this metric to understand buffering performance and identify slow clients.

See also concurrency limits.

Backend TLS setup

By default, vmauth uses system settings when performing requests to HTTPS backends specified via the url_prefix option in the -auth.config. These settings can be overridden with the following command-line flags:

  • -backend.tlsInsecureSkipVerify allows skipping TLS verification when connecting to HTTPS backends. This global setting can be overridden at the per-user level inside -auth.config via the tls_insecure_skip_verify option. For example:

    yaml
    - username: "foo"
      url_prefix: "https://localhost"
      tls_insecure_skip_verify: true
    
  • -backend.tlsCAFile allows specifying the path to the TLS Root CA for verifying backend TLS certificates. This global setting can be overridden at the per-user level inside -auth.config via the tls_ca_file option. For example:

    yaml
    - username: "foo"
      url_prefix: "https://localhost"
      tls_ca_file: "/path/to/tls/root/ca"
    
  • -backend.tlsCertFile and -backend.tlsKeyFile allow specifying a client TLS certificate for passing in requests to HTTPS backends, so these certificates could be verified on the backend side (aka mTLS). This global setting can be overridden at the per-user level inside -auth.config via tls_cert_file and tls_key_file options. For example:

    yaml
    - username: "foo"
      url_prefix: "https://localhost"
      tls_cert_file: "/path/to/tls/cert"
      tls_key_file: "/path/to/tls/key"
    
  • -backend.tlsServerName allows specifying optional TLS ServerName for passing in requests to HTTPS backends. This global setting can be overridden at the per-user level inside -auth.config via the tls_server_name option. For example:

    yaml
    - username: "foo"
      url_prefix: "https://localhost"
      tls_server_name: "foo.bar.com"
    

The -backend.tlsCAFile, -backend.tlsCertFile, -backend.tlsKeyFile, tls_ca_file, tls_cert_file, and tls_key_file may point either to a local file or to a http / https URL. The file is checked for modifications every second and is automatically re-read when it is updated.

IP filters

The Enterprise version of vmauth can be configured to allow/deny incoming requests via global and per-user IP filters.

For example, the following config allows requests to vmauth from 10.0.0.0/24 network and from 1.2.3.4 IP address, while denying requests from 10.0.0.42 IP address:

yaml
users:
# User configs here

ip_filters:
  allow_list:
  - 10.0.0.0/24
  - 1.2.3.4
  deny_list: [10.0.0.42]

The following config allows requests for the user foobar only from the IP 127.0.0.1:

yaml
users:
- username: "foobar"
  password: "***"
  url_prefix: "http://localhost:8428"
  ip_filters:
    allow_list: [127.0.0.1]

By default, the client's TCP address is utilized for IP filtering. In scenarios where vmauth operates behind a reverse proxy, it is advisable to configure vmauth to retrieve the client IP address from an HTTP header (e.g., X-Forwarded-For) {{% available_from "v1.107.0" %}} or via the Proxy Protocol for TCP load balancers. This can be achieved using the global configuration flags:

  • -httpRealIPHeader=X-Forwarded-For {{% available_from "v1.107.0" %}}
  • -httpListenAddr.useProxyProtocol=true

Security Considerations

HTTP headers are inherently untrustworthy. It is strongly recommended to implement additional security measures, such as:

  • Dropping X-Forwarded-For headers at the internet-facing reverse proxy (e.g., before traffic reaches vmauth).
  • Do not use -httpRealIPHeader at internet-facing vmauth.
  • Add removeXFFHTTPHeaderValue for the internet-facing vmauth. It instructs vmauth to replace the value of X-Forwarded-For HTTP header with remoteAddr of the client.

See additional recommendations for security and privacy concerns

Per-User Configuration

The values of httpRealIPHeader {{% available_from "v1.107.0" %}} can be changed on a per-user basis in the user-specific configuration.

yaml
users:
- username: "foobar"
  password: "***"
  url_prefix: "http://localhost:8428"
  ip_filters:
    allow_list: [127.0.0.1]
    real_ip_header: X-Forwarded-For
- username: "foobar"
  password: "***"
  url_prefix: "http://localhost:8428"
  ip_filters:
    allow_list: [127.0.0.1]
    real_ip_header: CF-Connecting-IP

See the config example of using IP filters.

Reading auth tokens from other HTTP headers

vmauth reads username, password, and bearer_token config values from the Authorization request header. It is possible to read these auth tokens from any other request header by specifying it via the -httpAuthHeader command-line flag. For example, the following command instructs vmauth to read the auth token from the X-Amz-Firehose-Access-Key header:

sh
./vmauth -httpAuthHeader='X-Amz-Firehose-Access-Key'

It is possible to read auth tokens from multiple headers. For example, the following command instructs vmauth to read auth token from both Authorization and X-Amz-Firehose-Access-Key headers:

sh
./vmauth -httpAuthHeader='Authorization' -httpAuthHeader='X-Amz-Firehose-Access-Key'

See also authorization docs and security docs.

Query args handling

By default, vmauth sends all query arguments specified in url_prefix to the backend. It also proxies query args from client requests if they do not clash with the args specified in the url_prefix. This is needed for security; e.g., it prevents the client from overriding security-sensitive query args specified at url_prefix, such as tenant_id, password, auth_key, extra_filters, etc.

vmauth provides the ability to specify a list of query args, which can be proxied from the client request to the backend if they clash with the args specified in the url_prefix. In this case, the client query args are added to the url_prefix args before being proxied to the backend. This can be done via the following options:

  • Via -mergeQueryArgs command-line flag. This flag may contain a comma-separated list of client query arg names, which are allowed to merge with the url_prefix query args when sending the request to the backend. This option is applied globally to all the configured backends.

  • Via merge_query_args option at the user and url_map level. These values override the -mergeQueryArgs command-line flag.

The example below sends the request to http://victoria-logs:9429/select/logsql/query?extra_filters={env="prod"}&extra_filters={team="dev"}&query=error when vmauth receives request to http://vmauth/select/logsql/query?extra_filters={team="dev"}&query=error:

yaml
unauthorized_user:
  # Merge `extra_filter` query arg from the clients with the `extra_filter` query args specified in the `url_prefix` below
  merge_query_args: [extra_filters]
  url_map:
  - src_paths: ["/select/.+"]
    url_prefix: 'http://victoria-logs:9428/?extra_filters={env="prod"}'

Access log

vmauth allows configuring access logs {{% available_from "v1.138.0" %}} printing per-user:

yaml
unauthorized_user:
  url_prefix: 'http://localhost:8428/'
  # Log all requests to this user
  access_log: {}

Access logs contain limited information to prevent exposing sensitive data. See an example of the printed access log below:

bash
2026-02-26T15:00:00.207Z        info    VictoriaMetrics/app/vmauth/auth_config.go:134   access_log request_host="localhost:8427" request_uri="/prometheus/api/v1/query_range?query=1&start=1772116199.897&end=1772117999.897&step=5s" status_code=200 remote_addr="127.0.0.1:63425" user_agent="Mozilla/5.0..." referer="http://localhost:8427/vmui/?" duration_ms=8 username="unauthorized"

The printed log starts with access_log prefix and is followed with request_host, request_uri, status_code, remote_addr, user_agent, referer, duration_ms and username fields in logfmt format. Such logs can be later analyzed in VictoriaLogs:

logsql
access_log | extract 'access_log <access_log>' | unpack_logfmt from access_log
| stats by(username, request_host, status_code) count()

Access logs can skip logging requests with specified status codes:

yaml
users:
- username: foo
  password: bar
  url_prefix: 'http://localhost:8428/'
  access_log:
    filters:
      # except requests with HTTP status codes below
      skip_status_codes: [200, 202]

Access logs can be enabled or disabled per-user with hot config reload.

Auth config

-auth.config is represented in the following yml format:

yaml
# An arbitrary number of usernames may be put here.
# It is possible to set multiple identical usernames with different passwords.
# Such usernames can be differentiated by the `name` option.

users:
  # Requests with the 'Authorization: Bearer XXXX' and 'Authorization: Token XXXX'
  # headers are proxied to http://localhost:8428 .
  # For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query
  # Requests with the Basic Auth username=XXXX are proxied to http://localhost:8428 as well.
- bearer_token: "XXXX"
  url_prefix: "http://localhost:8428"

  # Requests with the 'Authorization: Foo XXXX' header are proxied to http://localhosT:8428 .
  # For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query
- auth_token: "Foo XXXX"
  url_prefix: "http://localhost:8428"

  # Requests with the 'Authorization: Bearer YYY' header are proxied to http://localhost:8428 ,
  # The `X-Scope-OrgID: foobar` HTTP header is added to every proxied request.
  # The `X-Server-Hostname` http header is removed from the proxied response.
  # For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query
- bearer_token: "YYY"
  url_prefix: "http://localhost:8428"
  # extra headers to add to the request or remove from the request (if header value is empty)
  headers:
    - "X-Scope-OrgID: foobar"
  # extra headers to add to the response or remove from the response (if header value is empty)
  response_headers:
    - "X-Server-Hostname:" # empty value means the header will be removed from the response

  # All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
  # are proxied to http://localhost:8428 .
  # For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query
  #
  # The given user can send a maximum of 10 concurrent requests according to the provided max_concurrent_requests.
  # Excess concurrent requests are rejected with 429 HTTP status code.
  # See also -maxConcurrentPerUserRequests and -maxConcurrentRequests command-line flags.
- username: "local-single-node"
  password: "***"
  url_prefix: "http://localhost:8428"
  max_concurrent_requests: 10

  # All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
  # are proxied to http://localhost:8428 with extra_label=team=dev query arg.
  # For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query?extra_label=team=dev
- username: "local-single-node2"
  password: "***"
  url_prefix: "http://localhost:8428?extra_label=team=dev"

  # All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
  # are proxied to https://localhost:8428.
  # For example, http://vmauth:8427/api/v1/query is proxied to https://localhost/api/v1/query
  # TLS verification is skipped for https://localhost.
- username: "local-single-node-with-tls"
  password: "***"
  url_prefix: "https://localhost"
  tls_insecure_skip_verify: true

  # All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
  # are load-balanced among http://vmselect1:8481/select/123/prometheus and http://vmselect2:8481/select/123/prometheus
  # For example, http://vmauth:8427/api/v1/query is proxied to the following URLs in a round-robin manner:
  #   - http://vmselect1:8481/select/123/prometheus/api/v1/select
  #   - http://vmselect2:8481/select/123/prometheus/api/v1/select
- username: "cluster-select-account-123"
  password: "***"
  url_prefix:
  - "http://vmselect1:8481/select/123/prometheus"
  - "http://vmselect2:8481/select/123/prometheus"

  # All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
  # are load-balanced between http://vminsert1:8480/insert/42/prometheus and http://vminsert2:8480/insert/42/prometheus
  # For example, http://vmauth:8427/api/v1/write is proxied to the following URLs in a round-robin manner:
  #   - http://vminsert1:8480/insert/42/prometheus/api/v1/write
  #   - http://vminsert2:8480/insert/42/prometheus/api/v1/write
- username: "cluster-insert-account-42"
  password: "***"
  url_prefix:
  - "http://vminsert1:8480/insert/42/prometheus"
  - "http://vminsert2:8480/insert/42/prometheus"

  # A single user for querying and inserting data:
  #
  # - Requests to http://vmauth:8427/api/v1/query, http://vmauth:8427/api/v1/query_range
  #   and http://vmauth:8427/api/v1/label/<label_name>/values are proxied to the following URLs in a round-robin manner:
  #     - http://vmselect1:8481/select/42/prometheus
  #     - http://vmselect2:8481/select/42/prometheus
  #   For example, http://vmauth:8427/api/v1/query is proxied to http://vmselect1:8480/select/42/prometheus/api/v1/query
  #   or to http://vmselect2:8480/select/42/prometheus/api/v1/query .
  #   Requests are retried at other url_prefix backends if response status codes match 500 or 502.
  #
  # - Requests to http://vmauth:8427/api/v1/write are proxied to http://vminsert:8480/insert/42/prometheus/api/v1/write .
  #   The "X-Scope-OrgID: abc" HTTP header is added to these requests.
  #   The "X-Server-Hostname" HTTP header is removed from the proxied response.
  #
  # Request which do not match `src_paths` from the `url_map` are proxied to the urls from `default_url`
  # in a round-robin manner. The original request path is passed in `request_path` query arg.
  # For example, request to http://vmauth:8427/non/existing/path are proxied:
  #  - to http://default1:8888/unsupported_url_handler?request_path=/non/existing/path
  #  - or http://default2:8888/unsupported_url_handler?request_path=/non/existing/path
  #
  # Regular expressions are allowed in `src_paths` and `src_hosts` entries.
- username: "foobar"
  # log requests that failed url_map rules in the following form:
  #   statusCode=<SC> remoteAddr: "<IP>, X-Forwarded-For: <IP>"; requestURI: <URI>; missing route for <URL>"(host: <HOST>; path: <PATH>; args: <ARGS>; headers: <HEADERS>)
  # May contain sensitive information and is recommended to use only for debugging purposes.
  dump_request_on_errors: true
  url_map:
  - src_paths:
    - "/api/v1/query"
    - "/api/v1/query_range"
    - "/api/v1/label/[^/]+/values"
    url_prefix:
    - "http://vmselect1:8481/select/42/prometheus"
    - "http://vmselect2:8481/select/42/prometheus"
    retry_status_codes: [500, 502]
  - src_paths: ["/api/v1/write"]
    url_prefix: "http://vminsert:8480/insert/42/prometheus"
    headers:
    - "X-Scope-OrgID: abc"
    response_headers:
    - "X-Server-Hostname:" # empty value means the header will be removed from the response
    ip_filters:
      deny_list: [127.0.0.1]
  default_url:
  - "http://default1:8888/unsupported_url_handler"
  - "http://default2:8888/unsupported_url_handler"

# Requests without an Authorization header are proxied according to the `unauthorized_user` section.
# Requests are proxied in round-robin fashion between `url_prefix` backends.
# The deny_partial_response query arg is added to all the proxied requests.
# The requests are retried if url_prefix backends send 500 or 503 response status codes.
# Note that the unauthorized_user section takes precedence when processing a route without credentials,
# even if such a route also exists in the users section (see https://github.com/VictoriaMetrics/VictoriaMetrics/issues/5236).
unauthorized_user:
  url_prefix:
  - http://vmselect-az1/?deny_partial_response=1
  - http://vmselect-az2/?deny_partial_response=1
  retry_status_codes: [503, 500]

ip_filters:
  allow_list: ["1.2.3.0/24", "127.0.0.1"]
  deny_list:
  - 10.1.0.1

The config may contain %{ENV_VAR} placeholders, which are substituted by the corresponding ENV_VAR environment variable values. This may be useful for passing secrets to the config.

mTLS protection

By default, vmauth accepts HTTP requests at the 8427 port (this port can be changed via the -httpListenAddr command-line flag). The Enterprise version of vmauth supports the ability to accept mTLS requests at this port, by specifying -tls and -mtls command-line flags. For example, the following command runs vmauth, which accepts only mTLS requests at port 8427:

sh
./vmauth -tls -mtls -auth.config=...

By default, system-wide TLS Root CA is used to verify client certificates if the -mtls command-line flag is specified. It is possible to specify a custom TLS Root CA via the -mtlsCAFile command-line flag.

See also automatic issuing of TLS certificates and mTLS-based request routing.

Security

It is expected that all the backend services protected by vmauth are located in an isolated private network, so they can be accessed by external users only via vmauth.

Do not transfer auth headers in plaintext over untrusted networks. Enable https at -httpListenAddr. This can be done by passing the following -tls* command-line flags to vmauth:

sh
  -tls
     Whether to enable TLS for incoming HTTP requests at -httpListenAddr (aka https). -tlsCertFile and -tlsKeyFile must be set if -tls is set
  -tlsCertFile string
     Path to file with TLS certificate. Used only if -tls is set. Prefer ECDSA certs instead of RSA certs, since RSA certs are slow
  -tlsKeyFile string
     Path to file with TLS key. Used only if -tls is set

See also automatic issuing of TLS certificates.

See these docs on how to enable mTLS protection at vmauth.

Alternatively, TLS termination proxy may be put in front of vmauth.

It is recommended to protect the following endpoints with authKeys:

  • /-/reload with -reloadAuthKey command-line flag, so external users couldn't trigger config reload.
  • /flags with -flagsAuthKey command-line flag, so unauthorized users couldn't get command-line flag values.
  • /metrics with -metricsAuthKey command-line flag, so unauthorized users couldn't access vmauth metrics.
  • /debug/pprof with -pprofAuthKey command-line flag, so unauthorized users couldn't access profiling information.

As an alternative, you can serve internal API routes on a different listen address using the command-line flag -httpInternalListenAddr=127.0.0.1:8426{{% available_from "v1.111.0" %}}. To enable TLS on the public listener while keeping the internal listener non-TLS, configure multiple listeners like this:

/path/to/vmauth -httpInternalListenAddr=,localhost:8426 -httpListenAddr=0.0.0.0:443, -tls=true,false -tlsCertFile=a-cert.crt -tlsKeyFile=a-key.key

vmauth also supports restricting access by IP - see these docs. See also concurrency limiting docs.

Automatic issuing of TLS certificates

vmauth Enterprise supports automatic issuing of TLS certificates via Let's Encrypt service. The following command-line flags must be set in order to enable automatic issuance of TLS certificates:

  • -httpListenAddr must be set to listen on TCP port 443. For example, -httpListenAddr=:443. This port must be accessible by the Let's Encrypt service.
  • -tls must be set to accept HTTPS requests at -httpListenAddr. Note that -tlsCertFile and -tlsKeyFile aren't needed when automatic TLS certificate issuing is enabled.
  • -tlsAutocertHosts must be set to a comma-separated list of hosts, which can be reached via -httpListenAddr. TLS certificates are automatically issued for these hosts.
  • -tlsAutocertEmail must be set to the contact email for the issued TLS certificates.
  • -tlsAutocertCacheDir may be set to the directory path to persist the issued TLS certificates between vmauth restarts. If this flag isn't set, then TLS certificates are reissued on every restart.

This functionality can be evaluated for free according to these docs.

See also security recommendations.

Monitoring

vmauth exports various metrics in Prometheus exposition format at http://vmauth-host:8427/metrics page. It is recommended to set up regular scraping of this page either via vmagent or via a Prometheus-compatible scraper, so the exported metrics can be analyzed later. Use the official Grafana dashboard and alerting rules for vmauth monitoring.

If you use Google Cloud Managed Prometheus for scraping metrics from VictoriaMetrics components, then pass -metrics.exposeMetadata command-line to them, so they add TYPE and HELP comments for each exposed metric on the /metrics page. See these docs for details.

vmauth exports the following metrics for each defined user in -auth.config:

  • vmauth_user_requests_total counter - the number of requests served for the given username
  • vmauth_user_request_errors_total counter - the number of request errors for the given username
  • vmauth_user_request_backend_requests_total counter - the number of backend requests for the given username
  • vmauth_user_request_backend_errors_total counter - the number of backend request errors for the given username
  • vmauth_user_request_duration_seconds summary - the duration of requests for the given username
  • vmauth_user_concurrent_requests_limit_reached_total counter - the number of failed requests for the given username because of exceeded concurrency limits
  • vmauth_user_concurrent_requests_capacity gauge - the maximum number of concurrent requests for the given username
  • vmauth_user_concurrent_requests_current gauge - the current number of concurrent requests for the given username

By default, per-user metrics contain only the username label. This label is set to the username field value at the corresponding user section in the -auth.config file. It is possible to override the username label value by specifying the name field in addition to the username field. For example, the following config will result in vmauth_user_requests_total{username="foobar"} instead of vmauth_user_requests_total{username="secret_user"}:

yaml
users:
- username: "secret_user"
  name: "foobar"
  # other config options here

Additional labels for per-user metrics can be specified via the metric_labels section. For example, the following config defines {dc="eu",team="dev"} labels additionally to username="foobar" label:

yaml
users:
- username: "foobar"
  metric_labels:
   dc: eu
   team: dev
  # other config options here

vmauth exports the following metrics if the unauthorized_user section is defined in -auth.config:

  • vmauth_unauthorized_user_requests_total counter - the number of requests served for unauthorized user
  • vmauth_unauthorized_user_request_errors_total counter - the number of request errors for unauthorized user
  • vmauth_unauthorized_user_request_backend_requests_total counter - the number of backend requests for unauthorized user
  • vmauth_unauthorized_user_request_backend_errors_total counter - the number of backend request errors for unauthorized user
  • vmauth_unauthorized_user_request_duration_seconds summary - the duration of requests for unauthorized user
  • vmauth_unauthorized_user_concurrent_requests_limit_reached_total counter - the number of failed requests because of exceeded concurrency limits for unauthorized user
  • vmauth_unauthorized_user_concurrent_requests_capacity gauge - the maximum number of concurrent requests for unauthorized user
  • vmauth_unauthorized_user_concurrent_requests_current gauge - the current number of concurrent requests for unauthorized user

How to build from sources

It is recommended to use binary releases - vmauth is located in vmutils-* archives there.

Development build

  1. Install Go.
  2. Run make vmauth from the root folder of the repository. It builds the vmauth binary and puts it into the bin folder.

Production build

  1. Install Docker.
  2. Run make vmauth-prod from the root folder of the repository. It builds the vmauth-prod binary and puts it into the bin folder.

Building Docker images

Run make package-vmauth. It builds victoriametrics/vmauth:<PKG_TAG> docker image locally. <PKG_TAG> is an auto-generated image tag, which depends on the source code in the repository. The <PKG_TAG> may be manually set via PKG_TAG=foobar make package-vmauth.

The base Docker image is alpine, but you can use any other base image by setting it via the <ROOT_IMAGE> environment variable. For example, the following command builds the image on top of scratch image:

sh
ROOT_IMAGE=scratch make package-vmauth

Profiling

vmauth provides handlers for collecting the following Go profiles:

  • Memory profile. It can be collected with the following command (replace 0.0.0.0 with hostname if needed):
sh
curl http://0.0.0.0:8427/debug/pprof/heap > mem.pprof
  • CPU profile. It can be collected with the following command (replace 0.0.0.0 with hostname if needed):
sh
curl http://0.0.0.0:8427/debug/pprof/profile > cpu.pprof

The command for collecting CPU profiles waits for 30 seconds before returning.

The collected profiles may be analyzed with go tool pprof. It is safe to share the collected profiles from a security perspective, as they do not contain sensitive information.

Advanced usage

Pass -help command-line arg to vmauth in order to see all the configuration options:

Common flags

These flags are available in both VictoriaMetrics OSS and VictoriaMetrics Enterprise. {{% content "vmauth_common_flags.md" %}}

Enterprise flags

These flags are available only in VictoriaMetrics enterprise. {{% content "vmauth_enterprise_flags.md" %}}