docs/victoriametrics/vmauth.md
vmauth is an HTTP proxy, which can authorize, route, and load balance requests across VictoriaMetrics components or any other HTTP backends.
Just download the vmutils-* archive from releases page, unpack it, and pass the following flag to the vmauth binary in order to start authorizing and proxying requests:
/path/to/vmauth -auth.config=/path/to/auth/config.yml
The -auth.config command-line flag must point to a valid config. See use cases with typical -auth.config examples.
vmauth accepts HTTP requests on port 8427 and proxies them according to the provided -auth.config.
The port can be modified via the -httpListenAddr command-line flag.
See how to reload config without restart.
Docker images for vmauth are available at Docker Hub and Quay.
See how vmauth is used in docker-compose environment.
Pass -help to vmauth in order to see all the supported command-line flags with their descriptions.
Feel free to contact us if you need a customized auth proxy for VictoriaMetrics with the support of LDAP, SSO, RBAC, SAML, accounting, and rate limiting, such as vmgateway.
VictoriaMetrics Cloud provides built-in access control with organization-level roles, and lets you create and revoke read, write, or read/write access tokens with a couple of clicks from the UI, without the need of additional proxies. See the VictoriaMetrics Cloud documentation to get started.
The following -auth.config instructs vmauth to proxy all the incoming requests to the given backend.
For example, requests to http://vmauth:8427/foo/bar are proxied to http://backend/foo/bar:
unauthorized_user:
url_prefix: "http://backend/"
vmauth can balance load among multiple backends - see these docs for details.
See also authorization and routing docs.
vmauth can proxy requests to different backends depending on the requested path, query args, and any HTTP request header.
For example, the following -auth.config instructs vmauth to make the following:
/app1/ are proxied to http://app1-backend/, while the /app1/ path prefix is dropped according to drop_src_path_prefix_parts.
For example, the request to http://vmauth:8427/app1/foo/bar?baz=qwe is proxied to http://app1-backend/foo/bar?baz=qwe./app2/ are proxied to http://app2-backend/, while the /app2/ path prefix is dropped according to drop_src_path_prefix_parts.
For example, the request to http://vmauth:8427/app2/index.html is proxied to http://app2-backend/index.html.http://default-backed/.unauthorized_user:
url_map:
- src_paths:
- "/app1/.*"
drop_src_path_prefix_parts: 1
url_prefix: "http://app1-backend/"
- src_paths:
- "/app2/.*"
drop_src_path_prefix_parts: 1
url_prefix: "http://app2-backend/"
url_prefix: "http://default-backed/"
Sometimes it is necessary to proxy all requests that do not match url_map to a special 404 page, which could count as invalid requests.
Use default_url for this case. For example, the following -auth.config instructs vmauth to send all the requests,
which do not match url_map, to the http://some-backend/404-page.html page. The requested path is passed via the request_path query arg.
For example, the request to http://vmauth:8427/foo/bar?baz=qwe is proxied to http://some-backend/404-page.html?request_path=%2Ffoo%2Fbar%3Fbaz%3Dqwe.
unauthorized_user:
url_map:
- src_paths:
- "/app1/.*"
drop_src_path_prefix_parts: 1
url_prefix: "http://app1-backend/"
- src_paths:
- "/app2/.*"
drop_src_path_prefix_parts: 1
url_prefix: "http://app2-backend/"
default_url: "http://some-backend/404-page.html"
See routing docs for details.
See also authorization and load balancing docs.
vmauth can balance load across multiple HTTP backends using least-loaded round-robin.
For example, the following -auth.config instructs vmauth to spread load among multiple application instances:
unauthorized_user:
url_prefix:
- "http://app-instance-1/"
- "http://app-instance-2/"
- "http://app-instance-3/"
See load balancing docs for more details.
See also authorization and routing docs.
If vmagent is used for processing data push requests, then it is possible to scale the performance of data processing at vmagent by spreading the load among multiple identically configured vmagent instances.
This can be done with the following config for vmauth:
unauthorized_user:
url_map:
- src_paths:
- "/prometheus/api/v1/write"
- "/influx/write"
- "/api/v1/import"
- "/api/v1/import/.*"
url_prefix:
- "http://vmagent-1:8429/"
- "http://vmagent-2:8429/"
- "http://vmagent-3:8429/"
See load balancing docs for more details.
See also authorization and routing docs.
VictoriaMetrics cluster accepts incoming data via vminsert nodes and processes incoming requests via vmselect nodes according to these docs.
vmauth can be used for balancing both insert and select requests among vminsert and vmselect nodes, when the following -auth.config is used:
unauthorized_user:
url_map:
- src_paths:
- "/insert/.*"
url_prefix:
- "http://vminsert-1:8480/"
- "http://vminsert-2:8480/"
- "http://vminsert-3:8480/"
- src_paths:
- "/select/.*"
- "/admin/.*"
url_prefix:
- "http://vmselect-1:8481/"
- "http://vmselect-2:8481/"
See load balancing docs for more details.
See also authorization and routing docs.
vmauth automatically switches from a temporarily unavailable backend to other hot standby backends listed in url_prefix
if it runs with the -loadBalancingPolicy=first_available command-line flag. The load balancing policy can be overridden at user and url_map sections of -auth.config via load_balancing_policy option. For example, the following config instructs vmauth to proxy requests to http://victoria-metrics-main:8428/ backend.
If this backend becomes unavailable, then vmauth starts proxying requests to http://victoria-metrics-standby1:8428/.
If this backend also becomes unavailable, then requests are proxied to the last specified backend - http://victoria-metrics-standby2:8428/:
unauthorized_user:
url_prefix:
- "http://victoria-metrics-main:8428/"
- "http://victoria-metrics-standby1:8428/"
- "http://victoria-metrics-standby2:8428/"
load_balancing_policy: first_available
See load-balancing docs for more details.
See also authorization and routing docs.
vmauth can terminate HTTPS requests to backend services when it runs with the following command-line flags:
/path/to/vmauth -tls -tlsKeyFile=/path/to/tls_key_file -tlsCertFile=/path/to/tls_cert_file -httpListenAddr=0.0.0.0:443
-httpListenAddr sets the address to listen for incoming HTTPS requests-tls enables accepting TLS connections at -httpListenAddr-tlsKeyFile sets the path to the TLS certificate key file-tlsCertFile sets the path to the TLS certificate fileSee also automatic issuing of TLS certificates.
See also authorization, routing and load balancing docs.
vmauth can authorize access to backends depending on the provided Basic Auth request headers.
For example, the following config proxies requests to single-node VictoriaMetrics
if they contain Basic Auth header with the given username and password:
users:
- username: foo
password: bar
url_prefix: "http://victoria-metrics:8428/"
See also authorization, routing and load balancing docs.
vmauth can authorize access to backends depending on the provided Bearer Token request headers.
For example, the following config proxies requests to single-node VictoriaMetrics
if they contain the given bearer_token:
users:
- bearer_token: ABCDEF
url_prefix: "http://victoria-metrics:8428/"
See also authorization, routing and load balancing docs.
vmauth can authorize access{{% available_from "v1.137.0" %}} to backends depending on the provided JWT token in Authorization request header.
JWT tokens are verified using RSA or ECDSA public keys. The following auth config proxies requests to single-node VictoriaMetrics if they contain a valid JWT token:
users:
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
url_prefix: "http://victoria-metrics:8428/"
JWT tokens must contain a "vm_access": {} claim, more on that in JWT claim-based request templating
For testing, skip signature verification with skip_verify: true (not recommended for production).
users:
- jwt:
skip_verify: true
url_prefix: "http://victoria-metrics:8428"
JWT authentication cannot be combined with other auth methods (bearer_token, username, password) in the same users config.
Instead of specifying public keys manually, vmauth can automatically fetch{{% available_from "v1.138.0" %}}
and rotate public keys from an OpenID Connect (OIDC) provider via its Discovery endpoint.
This is useful when integrating with identity providers such as Keycloak, Auth0, Okta, or Google.
Set oidc.issuer to the base URL of the OIDC provider. vmauth will:
{issuer}/.well-known/openid-configuration to discover the jwks_uri.jwks_uri to obtain the public keys used to verify JWT signatures.JWT tokens must contain an iss claim that matches the configured issuer value exactly.
users:
- jwt:
oidc:
issuer: "https://your-identity-provider.example.com"
url_prefix: "http://victoria-metrics:8428/"
The oidc option cannot be combined with public_keys, public_key_files, or skip_verify.
If the OIDC provider is temporarily unavailable during a key refresh, vmauth continues using the previously fetched keys until the next successful refresh.
If no keys have been fetched yet (e.g., on startup when the provider is unreachable), the config section is skipped during authentication.
vmauth can route requests to different backends depending on the claims contained
in the provided JWT token based on match_claims{{% available_from "v1.138.0" %}} field.
This enables RBAC-style setups where tokens carrying different roles
(e.g. admin, viewer, writer) are mapped to different users — each with its own
url_prefix or url_map configuration — all authenticated against the same public key.
Claim matching is configured via the match_claims field inside the jwt user section.
A user is selected only if:
match_claims entries evaluate successfully (logical AND).If match_claims is not set or is empty, the user matches any valid JWT token
signed with the configured public key.
Claim names support dot-notation for traversal of nested JSON objects
(a simplified JSONPath-style approach), for example vm_access.metrics_account_id matches {"vm_access": {"metrics_account_id": 1}} and
security.permissions.0.read matches `{"security": {"permissions": [{"read": 1}]}}.
Claim names must point to a leaf value or an array. The supported leaf types are string, integer, float and boolean.
If the claim value is an array, each scalar element is compared against the match value - the claim matches if any element matches. Objects and nested arrays inside the array are skipped.
All configured claims must match and the values use regular expression syntax.
For example, the following config routes requests based on the role claim in the JWT token:
users:
- jwt:
oidc:
issuer: "https://your-identity-provider.example.com"
url_prefix: "http://victoria-metrics:8428/"
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims:
role: admin
url_prefix: "http://victoria-metrics-admin:8428/"
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims:
role: viewer
url_prefix: "http://victoria-metrics-readonly:8428/"
The following config demonstrates matching on nested claims using dot-notation:
users:
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims:
vm_access.metrics_account_id: 1
url_prefix: "http://victoria-metrics-tenant-1:8428/"
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims:
foo.bar: baz
url_prefix: "http://victoria-metrics-tenant-2:8428/"
The following config matches against array claim values.
The first user matches a token with claim {"roles": ["admin"]}, while the second matches a token with claim {"roles": ["read"]} or {"roles": ["write"]}.
users:
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims:
roles: admin
url_prefix: "http://victoria-metrics-admin:8428/"
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims:
roles: "^(read|write)$"
url_prefix: "http://victoria-metrics-readonly:8428/"
The following config matches any valid token (no claim filtering),
equivalent to the behavior when match_claims is omitted:
users:
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims: {}
url_prefix: "http://victoria-metrics:8428/"
The following config demonstrates matching on nested claims using dot-notation and regex value match for multiple tenants access:
users:
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims:
vm_access.metrics_account_id: "(0|1|2)"
url_prefix: "http://victoria-metrics-vmselect-1:8481/select/multitenant?extra_filters={vm_account_id=~\"(0|1|2)\"}"
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
match_claims:
vm_access.metrics_account_id: "(3|4|5)"
url_prefix: "http://victoria-metrics-vmselect-1:8481/select/multitenant?extra_filters={vm_account_id=~\"(3|4|5)\"}"
When multiple users have match_claims entries that all match the incoming token,
vmauth selects the user whose match_claims map contains the greatest number of entries.
A more specific match (more claim constraints) always takes priority over a less specific one.
For example, given the following config and a token containing both role=admin and iss=foo:
users:
- jwt:
match_claims:
iss: foo
url_prefix: "http://victoria-metrics-default:8428/"
- jwt:
match_claims:
iss: foo
role: admin
url_prefix: "http://victoria-metrics-admin:8428/"
The second user is selected because it has two matching claim entries compared to one,
and requests are proxied to http://victoria-metrics-admin:8428/.
If two users match with the same number of match_claims entries,
the selection becomes non-deterministic. To avoid ambiguity, ensure that
claim match conditions across users with the same number of entries are mutually exclusive.
For example, the following config is ambiguous when a token contains both role=foo and team=platform:
users:
- jwt:
match_claims:
role: foo
url_prefix: "http://backend-a:8428/"
- jwt:
match_claims:
team: platform
url_prefix: "http://backend-b:8428/"
Both users have one claim entry each, so if the token satisfies both, neither takes priority. Resolve this by adding the same match claim keys to both users:
users:
- jwt:
match_claims:
team: ops
role: foo
url_prefix: "http://backend-a:8428/"
- jwt:
match_claims:
team: platform
role: admin
url_prefix: "http://backend-b:8428/"
JWT claim-based matching can be combined with
JWT claim-based request templating
for dynamic URL rewriting based on vm_access claim fields.
vmauth can dynamically rewrite{{% available_from "v1.137.0" %}} upstream URLs and request headers using values from the JWT vm_access claim.
This enables routing different users to different backends or tenants based solely on the JWT token,
without maintaining separate user configs per tenant.
Example: minimal valid JWT. If vm_access is empty, tenant 0:0 is assumed and no additional filters are applied.
{
"exp": 2770832322,
"vm_access": {}
}
Example: complete JWT with vm_access claim defining explicit access rules for metrics and logs.
{
"exp": 1771953418,
"vm_access": {
"metrics_account_id": 1,
"metrics_project_id": 2,
"metrics_extra_labels": ["dev=team","env=prod"],
"metrics_extra_filters": ["{env=~\"prod|dev\",team!=\"test\"}"],
"logs_account_id": 2,
"logs_project_id": 3,
"logs_extra_filters": ["{\"namespace\":\"my-app\",\"env\":\"prod\"}"],
"logs_extra_stream_filters": []
}
}
Placeholders are written directly into url_prefix and headers values in the auth config.
At request time each placeholder is replaced with the corresponding value from the vm_access claim of the incoming JWT token.
The following placeholders are supported:
| Placeholder | JWT claim field |
|---|---|
{{.MetricsTenant}} -> 0:0 | metrics_account_id int, |
metrics_project_id int | |
{{.MetricsExtraLabels}} | metrics_extra_labels string array |
{{.MetricsExtraFilters}} | metrics_extra_filters string array |
{{.LogsAccountID}} | logs_account_id int |
{{.LogsProjectID}} | logs_project_id int |
{{.LogsExtraFilters}} | logs_extra_filters string array |
{{.LogsExtraStreamFilters}} | logs_extra_stream_filters string array |
Placeholders are supported in the following locations:
{{.MetricsTenant}}, {{.LogsAccountID}} and {{.LogsProjectID}} are allowed in path segments.?extra_filters={{.MetricsExtraFilters}}).AccountID: {{.LogsAccountID}}).Placeholders are not supported in response headers.
They are also only valid for JWT-authenticated users — using them in configs for username/password or bearer_token users causes a configuration error.
Example: route requests to the VictoriaMetrics single-node:
users:
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
url_prefix: "http://vminsert:8480/prometheus/?extra_filters={{.MetricsExtraFilters}}&extra_label={{.MetricsExtraLabels}}"
Example: route requests to the VictoriaMetrics cluster:
users:
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
url_map:
- src_paths:
- "/api/v1/write"
url_prefix: "http://vminsert:8480/insert/{{.MetricsTenant}}/prometheus/"
- src_paths:
- "/api/v1/query"
- "/api/v1/query_range"
url_prefix: "http://vmselect:8481/select/{{.MetricsTenant}}/prometheus/"
Example: route requests to the VictoriaLogs cluster:
users:
- jwt:
public_keys:
- |
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA...
-----END PUBLIC KEY-----
headers:
- "AccountID: {{.LogsAccountID}}"
- "ProjectID: {{.LogsProjectID}}"
url_map:
- src_paths:
- "/select/.*"
url_prefix:
- http://vlselect:9428
- src_paths:
- "/insert/.*"
url_prefix:
- http://vlinsert:9428
See also authorization, routing and load balancing docs.
The following -auth.config instructs proxying insert and select requests from the Basic Auth user tenant1 to the tenant 1, while requests from the user tenant2 are sent to tenant 2:
users:
- username: tenant1
password: "***"
url_map:
- src_paths:
- "/api/v1/write"
url_prefix: "http://vminsert-backend:8480/insert/1/prometheus/"
- src_paths:
- "/api/v1/query"
- "/api/v1/query_range"
- "/api/v1/series"
- "/api/v1/labels"
- "/api/v1/label/.+/values"
url_prefix: "http://vmselect-backend:8481/select/1/prometheus/"
- username: tenant2
password: "***"
url_map:
- src_paths:
- "/api/v1/write"
url_prefix: "http://vminsert-backend:8480/insert/2/prometheus/"
- src_paths:
- "/api/v1/query"
- "/api/v1/query_range"
- "/api/v1/series"
- "/api/v1/labels"
- "/api/v1/label/.+/values"
url_prefix: "http://vmselect-backend:8481/select/2/prometheus/"
See also authorization, routing and load balancing docs.
Enterprise version of vmauth can be configured for routing requests
to different backends depending on the following subject fields in the TLS certificate provided by client:
organizational_unit aka OUorganization aka Ocommon_name aka CNFor example, the following -auth.config routes requests from clients with organizational_unit: finance TLS certificates to http://victoriametrics-finance:8428 backend, while requests from clients with organizational_unit: devops TLS certificates are routed to http://victoriametrics-devops:8428 backend:
users:
- mtls:
organizational_unit: finance
url_prefix: "http://victoriametrics-finance:8428"
- mtls:
organizational_unit: devops
url_prefix: "http://victoriametrics-devops:8428"
mTLS protection must be enabled for mTLS-based routing.
See also authorization, routing and load balancing docs.
vmauth can be configured to add mandatory query arguments before proxying requests to backends.
For example, the following config adds extra_label to all the requests, which are proxied to single-node VictoriaMetrics:
unauthorized_user:
url_prefix: "http://victoria-metrics:8428/?extra_label=foo=bar"
See also authorization, routing and load balancing docs.
By default, vmauth doesn't strip the path prefix from the original request when proxying it to the matching backend.
Sometimes it is needed to drop the path prefix before proxying the request to the backend. This can be done by specifying the number of /-delimited prefix parts to drop from the request path via drop_src_path_prefix_parts option at url_map level or at user level or -auth.config.
For example, if you need to serve requests to vmalert at /vmalert/ path prefix, while serving requests to vmagent at /vmagent/ path prefix,
then the following -auth.config can be used:
unauthorized_user:
url_map:
# proxy all the requests, which start with `/vmagent/`, to the vmagent backend
- src_paths:
- "/vmagent/.*"
# drop /vmagent/ path prefix from the original request before proxying it to url_prefix.
drop_src_path_prefix_parts: 1
url_prefix: "http://vmagent-backend:8429/"
# proxy all the requests, which start with `/vmalert`, to the vmalert backend
- src_paths:
- "/vmalert/.*"
# drop /vmalert/ path prefix from the original request before proxying it to url_prefix.
drop_src_path_prefix_parts: 1
url_prefix: "http://vmalert-backend:8880/"
vmauth supports the following authorization mechanisms:
See also security docs, routing docs and load balancing docs.
vmauth can proxy requests to different backends depending on the following parts of the HTTP request:
See also authorization and load balancing.
For debug purposes, extra logging for failed requests can be enabled by setting dump_request_on_errors: true {{% available_from "v1.107.0" %}} on the user level. Please note that such logging may expose sensitive information and should be used only for debugging.
src_paths option can be specified inside url_map in order to route requests by path.
The following -auth.config routes requests to paths starting with /app1/ to http://app1-backend,
while requests with paths starting with /app2 are routed to http://app2-backend, and the rest of the requests
are routed to http://some-backend/404-page.html:
unauthorized_user:
url_map:
- src_paths:
- "/app1/.*"
url_prefix: "http://app1-backend/"
- src_paths:
- "/app2/.*"
url_prefix: "http://app2-backend/"
default_url: http://some-backend/404-page.html
src_paths accepts a list of regular expressions. The incoming request is routed to the given url_prefix if the whole requested path matches at least one src_paths entry.
See also how to drop request path prefix.
src_hosts option can be specified inside url_map in order to route requests by host header.
The following -auth.config routes requests to app1.my-host.com host to http://app1-backend, while routing requests to app2.my-host.com host to http://app2-backend, and the rest of the requests are routed to http://some-backend/404-page.html:
unauthorized_user:
url_map:
- src_hosts:
- "app1\\.my-host\\.com"
url_prefix: "http://app1-backend/"
- src_hosts:
- "app2\\.my-host\\.com"
url_prefix: "http://app2-backend/"
default_url: http://some-backend/404-page.html
src_hosts accepts a list of regular expressions. The incoming request is routed to the given url_prefix if the whole request host matches at least one src_hosts entry.
src_query_args option can be specified inside url_map in order to route requests by the given query arg.
For example, the following -auth.config routes requests to http://app1-backend/ if db=foo query arg is present in the request, while routing requests with db query arg starting with bar to http://app2-backend, and the rest of the requests are routed to http://some-backend/404-page.html:
unauthorized_user:
url_map:
- src_query_args: ["db=foo"]
url_prefix: "http://app1-backend/"
- src_query_args: ["db=~bar.*"]
url_prefix: "http://app2-backend/"
default_url: http://some-backend/404-page.html
src_query_args accepts a list of strings in the format arg=value or arg=~regex.
The arg=value format means exact matching of the whole arg query arg value to the given value.
The arg=~regex format means regex matching of the whole arg query arg value to the given regex.
If at least a single query arg in the request matches at least one src_query_args entry, then the request is routed to the given url_prefix.
src_headers option can be specified inside url_map in order to route requests by the given HTTP request header.
For example, the following -auth.config routes requests to http://app1-backend if TenantID request header equals to 42, while routing requests to http://app2-backend if TenantID request header equals to 123:456, and the rest of the requests are routed to http://some-backend/404-page.html:
unauthorized_user:
url_map:
- src_headers: ["TenantID: 42"]
url_prefix: "http://app1-backend/"
- src_headers: ["TenantID: 123:456"]
url_prefix: "http://app2-backend/"
default_url: http://some-backend/404-page.html
If src_headers contains multiple entries, then it is enough to match only a single entry in order to route the request to the given url_prefix.
Any subset of src_paths, src_hosts, src_query_args and src_headers options can be specified simultaneously in a single url_map entry. In this case, the request is routed to the given url_prefix if the request matches all the provided configs simultaneously.
For example, the following -auth.config routes requests to http://app1-backend if all the conditions mentioned below are simultaneously met:
/app/.bar.bazdb=abc query argTenantID request header equals 42unauthorized_user:
url_map:
- src_paths: ["/app/.*"]
src_hosts: [".+\\.bar\\.baz"]
src_query_args: ["db=abc"]
src_headers: ["TenantID: 42"]
url_prefix: "http://app1-backend/"
Each url_prefix in the -auth.config can be specified in the following forms:
A single URL. For example:
unauthorized_user:
url_prefix: 'http://vminsert:8480/insert/0/prometheus/`
In this case, vmauth proxies requests to the specified URL.
A list of URLs. For example:
unauthorized_user:
url_prefix:
- 'http://vminsert-1:8480/insert/0/prometheus/'
- 'http://vminsert-2:8480/insert/0/prometheus/'
- 'http://vminsert-3:8480/insert/0/prometheus/'
In this case, vmauth spreads requests among the specified URLs using the least-loaded round-robin policy.
This guarantees that incoming load is shared uniformly among the specified backends.
See also discovering backend IPs.
vmauth automatically detects temporarily unavailable backends and spreads incoming queries among the remaining available backends.
This allows restarting and performing maintenance on backends without removing them from the url_prefix list.
By default, vmauth returns backend responses with all the HTTP status codes to the client. It is possible to configure automatic retry of requests at other backends if the backend responds with a status code specified in the -retryStatusCodes command-line flag.
It is possible to customize the list of HTTP response status codes to retry via the retry_status_codes list at the user and url_map level of -auth.config.
For example, the following config retries requests on other backends if the current backend returns a response with 500 or 502 HTTP status code:
unauthorized_user:
url_prefix:
- http://vmselect1:8481/
- http://vmselect2:8481/
- http://vmselect3:8481/
retry_status_codes: [500, 502]
By default, vmauth uses the least_loaded policy to distribute incoming requests across available backends.
The policy can be changed to first_available via the -loadBalancingPolicy command-line flag. In this case, vmauth sends all the requests to the first specified backend while it is available. vmauth starts sending requests to the next specified backend when the first backend is temporarily unavailable.
It is possible to customize the load-balancing policy at the user and url_map levels.
For example, the following config specifies a first_available load balancing policy for unauthorized requests:
unauthorized_user:
url_prefix:
- http://victoria-metrics-main:8428/
- http://victoria-metrics-standby:8428/
load_balancing_policy: first_available
The load balancing feature can be used in the following cases:
Balancing the load among multiple vmselect and/or vminsert nodes in VictoriaMetrics cluster.
The following -auth.config can be used to spread incoming requests among 3 vmselect nodes and retrying failed requests or requests with 500 and 502 response status codes:
unauthorized_user:
url_prefix:
- http://vmselect1:8481/
- http://vmselect2:8481/
- http://vmselect3:8481/
retry_status_codes: [500, 502]
Sending select queries to the closest availability zone (AZ), while falling back to other AZs with identical data if the closest AZ is unavailable.
For example, the following -auth.config sends select queries to https://vmselect-az1/ and uses the https://vmselect-az2/ as a fallback when https://vmselect-az1/ is temporarily unavailable or cannot return full responses.
See these docs for details about the deny_partial_response query arg, which is added to requests before they are proxied to backends.
unauthorized_user:
url_prefix:
- https://vmselect-az1/?deny_partial_response=1
- https://vmselect-az2/?deny_partial_response=1
retry_status_codes: [500, 502, 503]
load_balancing_policy: first_available
Load balancing can be configured independently for each user entry and for each url_map entry. See auth config docs for more details.
See also discovering backend IPs, authorization and routing.
By default, vmauth distributes load across the backends listed under url_prefix, as described in the load balancing docs.
Sometimes multiple backend instances can be hidden behind a single hostname. For example, vmselect-service hostname
may point to a cluster of vmselect instances in VictoriaMetrics cluster setup.
So the following config may fail to spread load among available vmselect instances, since vmauth will send all the requests to the same URL, which may end up with a single backend instance:
unauthorized_user:
url_prefix: http://vmselect-service/select/0/prometheus/
There are the following solutions for this issue:
To enumerate every vmselect hostname or IP in the url_prefix list:
unauthorized_user:
url_prefix:
- http://vmselect-1:8481/select/0/prometheus/
- http://vmselect-2:8481/select/0/prometheus/
- http://vmselect-3:8481/select/0/prometheus/
This scheme works great, but it requires manual updating of the -auth.config whenever vmselect services are restarted, downscaled, or upscaled.
To set discover_backend_ips: true option, so vmauth automatically discovers IPs behind the given hostname and then spreads load among the discovered IPs:
unauthorized_user:
url_prefix: http://vmselect-service:8481/select/0/prometheus/
discover_backend_ips: true
If the url_prefix contains a hostname with srv+ prefix, then the hostname without srv+ prefix is automatically resolved via DNS SRV to the list of hostnames with TCP ports, and vmauth balances load among the discovered TCP addresses:
unauthorized_user:
url_prefix: "http://srv+vmselect/select/0/prometheus"
discover_backend_ips: true
This functionality is useful for balancing load across backend instances running on different TCP ports, since DNS SRV records include TCP ports.
The discover_backend_ips option can be specified at user and url_map level in the -auth.config. It can also be enabled globally via the -discoverBackendIPs command-line flag.
See also load balancing docs.
If url_prefix contains a URL with the hostname starting with srv+ prefix, then vmauth uses DNS SRV lookup for the hostname without the srv+ prefix and selects a random TCP address (e.g., hostname plus TCP port) from the resolved results.
For example, if some-addr DNS SRV record contains some-host:12345 TCP address,
then url_prefix: http://srv+some-addr/some/path is automatically resolved into url_prefix: http://some-host:12345/some/path.
DNS SRV resolution is performed whenever a new connection to the url_prefix backend is established.
See also discovering backend addresses.
vmauth supports setting and removing HTTP request headers before sending requests to backends.
This is done via the headers option. For example, the following -auth.config sets TenantID: foobar header to requests proxied to http://backend:1234/. It also overrides the X-Forwarded-For request header with an empty value. This effectively removes the X-Forwarded-For header from requests proxied to http://backend:1234/:
unauthorized_user:
url_prefix: "http://backend:1234/"
headers:
- "TenantID: foobar"
- "X-Forwarded-For:"
users:
- username: "foo"
password: "bar"
# dump request details on errors (can contain sensitive information)
dump_request_on_errors: true
url_map:
- src_paths: ["/select/.*"]
headers:
- "AccountID: 1"
- "ProjectID: 0"
url_prefix:
- "http://backend:9428/"
vmauth also supports setting and removing HTTP response headers before returning the response from the backend to the client.
This is done via the response_headers option. For example, the following -auth.config sets Foo: bar response header
and removes the Server response header before returning the response to the client:
unauthorized_user:
url_prefix: "http://backend:1234/"
response_headers:
- "Foo: bar"
- "Server:"
See also Host header docs.
By default, vmauth sets the Host HTTP header to the backend hostname when proxying requests to the corresponding backend.
Sometimes it is needed to keep the original Host header from the client request sent to vmauth. For example, if backends use host-based routing.
In this case, set keep_original_host: true. For example, the following config instructs to use the original Host header from client requests when proxying requests to the backend:1234:
unauthorized_user:
url_prefix: "http://backend:1234/"
keep_original_host: true
It is also possible to set the Host header to an arbitrary value when proxying the request to the configured backend, via headers option:
unauthorized_user:
url_prefix: "http://backend:1234/"
headers:
- "Host: foobar"
vmauth supports dynamic reload of -auth.config via the following ways:
By sending SIGHUP signal to vmauth process:
kill -HUP `pidof vmauth`
By querying /-/reload endpoint. It is recommended to protect it with -reloadAuthKey. See security docs for details.
By passing the interval for config check to the -configCheckInterval command-line flag.
vmauth may limit the number of concurrent requests according to the following command-line flags:
-maxConcurrentRequests limits the global number of concurrent requests vmauth can serve across all the configured users.-maxConcurrentPerUserRequests limits the number of concurrent requests vmauth can serve per each configured user.It is also possible to set individual limits on the number of concurrent requests per user with the max_concurrent_requests option.
For example, the following -auth.config limits the number of concurrent requests from the user foo to 10:
users:
- username: foo
password: bar
url_prefix: "http://some-backend/"
max_concurrent_requests: 10
vmauth responds with 429 Too Many Requests HTTP error when the number of concurrent requests exceeds the configured limits for the duration
exceeding the -maxQueueDuration command-line flag value.
The following metrics related to concurrency limits are exposed by vmauth:
vmauth_concurrent_requests_capacity - the global limit on the number of concurrent requests vmauth can serve.
It is set via the -maxConcurrentRequests command-line flag.vmauth_concurrent_requests_current - the current number of concurrent requests vmauth processes.vmauth_concurrent_requests_limit_reached_total - the number of requests rejected with 429 Too Many Requests error
because the global concurrency limit has been reached.vmauth_user_concurrent_requests_capacity{username="..."} - the limit on the number of concurrent requests for the given username.vmauth_user_concurrent_requests_current{username="..."} - the current number of concurrent requests for the given username.vmauth_user_concurrent_requests_limit_reached_total{username="..."} - the number of requests rejected with 429 Too Many Requests error
because the concurrency limit has been reached for the given username.vmauth_unauthorized_user_concurrent_requests_capacity - the limit on the number of concurrent requests for unauthorized users (if unauthorized_user section is used).vmauth_unauthorized_user_concurrent_requests_current - the current number of concurrent requests for unauthorized users (if unauthorized_user section is used).vmauth_unauthorized_user_concurrent_requests_limit_reached_total - the number of requests rejected with 429 Too Many Requests error
because the concurrency limit has been reached for unauthorized users (if the unauthorized_user section is used).See also request body buffering.
vmauth can buffer request bodies {{% available_from "v1.135.0" %}} before proxying the requests to backends. This prevents slow-writing clients from occupying backend connections.
This is especially important when clients send requests over unreliable or low-bandwidth networks (for example, IoT devices over EDGE networks),
where slow uploads can exhaust concurrency limits, increase latency, reduce ingestion rate, and trigger 429 Too Many Requests responses even when backend resources are not saturated.
Request body buffering can be configured with the -requestBufferSize command-line flag, which defines the maximum number of bytes to buffer from the request body
before proxying the request to the backend. If buffering exceeds the duration specified by the -maxQueueDuration command-line flag, the request is rejected.
Request bodies are buffered before applying per-user concurrency limits.
The following metrics related to request buffering are exposed by vmauth:
vmauth_http_request_errors_total{reason="reject_slow_client"} - the number of rejected requests because the request body couldn't be read during -maxQueueDuration.vmauth_buffer_request_body_duration_seconds - the summary for the request body buffering duration.
Use this metric to understand buffering performance and identify slow clients.See also concurrency limits.
By default, vmauth uses system settings when performing requests to HTTPS backends specified via the url_prefix option in the -auth.config. These settings can be overridden with the following command-line flags:
-backend.tlsInsecureSkipVerify allows skipping TLS verification when connecting to HTTPS backends.
This global setting can be overridden at the per-user level inside -auth.config via the tls_insecure_skip_verify option. For example:
- username: "foo"
url_prefix: "https://localhost"
tls_insecure_skip_verify: true
-backend.tlsCAFile allows specifying the path to the TLS Root CA for verifying backend TLS certificates.
This global setting can be overridden at the per-user level inside -auth.config via the tls_ca_file option.
For example:
- username: "foo"
url_prefix: "https://localhost"
tls_ca_file: "/path/to/tls/root/ca"
-backend.tlsCertFile and -backend.tlsKeyFile allow specifying a client TLS certificate for passing in requests to HTTPS backends,
so these certificates could be verified on the backend side (aka mTLS).
This global setting can be overridden at the per-user level inside -auth.config via tls_cert_file and tls_key_file options. For example:
- username: "foo"
url_prefix: "https://localhost"
tls_cert_file: "/path/to/tls/cert"
tls_key_file: "/path/to/tls/key"
-backend.tlsServerName allows specifying optional TLS ServerName for passing in requests to HTTPS backends.
This global setting can be overridden at the per-user level inside -auth.config via the tls_server_name option. For example:
- username: "foo"
url_prefix: "https://localhost"
tls_server_name: "foo.bar.com"
The -backend.tlsCAFile, -backend.tlsCertFile, -backend.tlsKeyFile, tls_ca_file, tls_cert_file, and tls_key_file may point either to a local file or to a http / https URL.
The file is checked for modifications every second and is automatically re-read when it is updated.
The Enterprise version of vmauth can be configured to allow/deny incoming requests via global and per-user IP filters.
For example, the following config allows requests to vmauth from 10.0.0.0/24 network and from 1.2.3.4 IP address, while denying requests from 10.0.0.42 IP address:
users:
# User configs here
ip_filters:
allow_list:
- 10.0.0.0/24
- 1.2.3.4
deny_list: [10.0.0.42]
The following config allows requests for the user foobar only from the IP 127.0.0.1:
users:
- username: "foobar"
password: "***"
url_prefix: "http://localhost:8428"
ip_filters:
allow_list: [127.0.0.1]
By default, the client's TCP address is utilized for IP filtering. In scenarios where vmauth operates behind a reverse proxy, it is advisable to configure vmauth to retrieve the client IP address from an HTTP header (e.g., X-Forwarded-For) {{% available_from "v1.107.0" %}} or via the Proxy Protocol for TCP load balancers. This can be achieved using the global configuration flags:
-httpRealIPHeader=X-Forwarded-For {{% available_from "v1.107.0" %}}-httpListenAddr.useProxyProtocol=trueHTTP headers are inherently untrustworthy. It is strongly recommended to implement additional security measures, such as:
X-Forwarded-For headers at the internet-facing reverse proxy (e.g., before traffic reaches vmauth).-httpRealIPHeader at internet-facing vmauth.removeXFFHTTPHeaderValue for the internet-facing vmauth. It instructs vmauth to replace the value of X-Forwarded-For HTTP header with remoteAddr of the client.See additional recommendations for security and privacy concerns
The values of httpRealIPHeader {{% available_from "v1.107.0" %}} can be changed on a per-user basis in the user-specific configuration.
users:
- username: "foobar"
password: "***"
url_prefix: "http://localhost:8428"
ip_filters:
allow_list: [127.0.0.1]
real_ip_header: X-Forwarded-For
- username: "foobar"
password: "***"
url_prefix: "http://localhost:8428"
ip_filters:
allow_list: [127.0.0.1]
real_ip_header: CF-Connecting-IP
See the config example of using IP filters.
vmauth reads username, password, and bearer_token config values from the Authorization request header.
It is possible to read these auth tokens from any other request header by specifying it via the -httpAuthHeader command-line flag.
For example, the following command instructs vmauth to read the auth token from the X-Amz-Firehose-Access-Key header:
./vmauth -httpAuthHeader='X-Amz-Firehose-Access-Key'
It is possible to read auth tokens from multiple headers. For example, the following command instructs vmauth to read auth token
from both Authorization and X-Amz-Firehose-Access-Key headers:
./vmauth -httpAuthHeader='Authorization' -httpAuthHeader='X-Amz-Firehose-Access-Key'
See also authorization docs and security docs.
By default, vmauth sends all query arguments specified in url_prefix to the backend. It also proxies query args from client requests if they do not clash with the args specified in the url_prefix. This is needed for security; e.g., it prevents the client from overriding security-sensitive query args specified at url_prefix, such as tenant_id, password, auth_key, extra_filters, etc.
vmauth provides the ability to specify a list of query args, which can be proxied from the client request to the backend if they clash with the args specified in the url_prefix. In this case, the client query args are added to the url_prefix args before being proxied to the backend. This can be done via the following options:
Via -mergeQueryArgs command-line flag. This flag may contain a comma-separated list of client query arg names, which are allowed
to merge with the url_prefix query args when sending the request to the backend. This option is applied globally to all the configured backends.
Via merge_query_args option at the user and url_map level. These values override the -mergeQueryArgs command-line flag.
The example below sends the request to http://victoria-logs:9429/select/logsql/query?extra_filters={env="prod"}&extra_filters={team="dev"}&query=error when vmauth receives request to http://vmauth/select/logsql/query?extra_filters={team="dev"}&query=error:
unauthorized_user:
# Merge `extra_filter` query arg from the clients with the `extra_filter` query args specified in the `url_prefix` below
merge_query_args: [extra_filters]
url_map:
- src_paths: ["/select/.+"]
url_prefix: 'http://victoria-logs:9428/?extra_filters={env="prod"}'
vmauth allows configuring access logs {{% available_from "v1.138.0" %}} printing per-user:
unauthorized_user:
url_prefix: 'http://localhost:8428/'
# Log all requests to this user
access_log: {}
Access logs contain limited information to prevent exposing sensitive data. See an example of the printed access log below:
2026-02-26T15:00:00.207Z info VictoriaMetrics/app/vmauth/auth_config.go:134 access_log request_host="localhost:8427" request_uri="/prometheus/api/v1/query_range?query=1&start=1772116199.897&end=1772117999.897&step=5s" status_code=200 remote_addr="127.0.0.1:63425" user_agent="Mozilla/5.0..." referer="http://localhost:8427/vmui/?" duration_ms=8 username="unauthorized"
The printed log starts with access_log prefix and is followed with request_host, request_uri, status_code, remote_addr,
user_agent, referer, duration_ms and username fields in logfmt format. Such logs can be later
analyzed in VictoriaLogs:
access_log | extract 'access_log <access_log>' | unpack_logfmt from access_log
| stats by(username, request_host, status_code) count()
Access logs can skip logging requests with specified status codes:
users:
- username: foo
password: bar
url_prefix: 'http://localhost:8428/'
access_log:
filters:
# except requests with HTTP status codes below
skip_status_codes: [200, 202]
Access logs can be enabled or disabled per-user with hot config reload.
-auth.config is represented in the following yml format:
# An arbitrary number of usernames may be put here.
# It is possible to set multiple identical usernames with different passwords.
# Such usernames can be differentiated by the `name` option.
users:
# Requests with the 'Authorization: Bearer XXXX' and 'Authorization: Token XXXX'
# headers are proxied to http://localhost:8428 .
# For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query
# Requests with the Basic Auth username=XXXX are proxied to http://localhost:8428 as well.
- bearer_token: "XXXX"
url_prefix: "http://localhost:8428"
# Requests with the 'Authorization: Foo XXXX' header are proxied to http://localhosT:8428 .
# For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query
- auth_token: "Foo XXXX"
url_prefix: "http://localhost:8428"
# Requests with the 'Authorization: Bearer YYY' header are proxied to http://localhost:8428 ,
# The `X-Scope-OrgID: foobar` HTTP header is added to every proxied request.
# The `X-Server-Hostname` http header is removed from the proxied response.
# For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query
- bearer_token: "YYY"
url_prefix: "http://localhost:8428"
# extra headers to add to the request or remove from the request (if header value is empty)
headers:
- "X-Scope-OrgID: foobar"
# extra headers to add to the response or remove from the response (if header value is empty)
response_headers:
- "X-Server-Hostname:" # empty value means the header will be removed from the response
# All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
# are proxied to http://localhost:8428 .
# For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query
#
# The given user can send a maximum of 10 concurrent requests according to the provided max_concurrent_requests.
# Excess concurrent requests are rejected with 429 HTTP status code.
# See also -maxConcurrentPerUserRequests and -maxConcurrentRequests command-line flags.
- username: "local-single-node"
password: "***"
url_prefix: "http://localhost:8428"
max_concurrent_requests: 10
# All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
# are proxied to http://localhost:8428 with extra_label=team=dev query arg.
# For example, http://vmauth:8427/api/v1/query is proxied to http://localhost:8428/api/v1/query?extra_label=team=dev
- username: "local-single-node2"
password: "***"
url_prefix: "http://localhost:8428?extra_label=team=dev"
# All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
# are proxied to https://localhost:8428.
# For example, http://vmauth:8427/api/v1/query is proxied to https://localhost/api/v1/query
# TLS verification is skipped for https://localhost.
- username: "local-single-node-with-tls"
password: "***"
url_prefix: "https://localhost"
tls_insecure_skip_verify: true
# All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
# are load-balanced among http://vmselect1:8481/select/123/prometheus and http://vmselect2:8481/select/123/prometheus
# For example, http://vmauth:8427/api/v1/query is proxied to the following URLs in a round-robin manner:
# - http://vmselect1:8481/select/123/prometheus/api/v1/select
# - http://vmselect2:8481/select/123/prometheus/api/v1/select
- username: "cluster-select-account-123"
password: "***"
url_prefix:
- "http://vmselect1:8481/select/123/prometheus"
- "http://vmselect2:8481/select/123/prometheus"
# All the requests to http://vmauth:8427 with the given Basic Auth (username:password)
# are load-balanced between http://vminsert1:8480/insert/42/prometheus and http://vminsert2:8480/insert/42/prometheus
# For example, http://vmauth:8427/api/v1/write is proxied to the following URLs in a round-robin manner:
# - http://vminsert1:8480/insert/42/prometheus/api/v1/write
# - http://vminsert2:8480/insert/42/prometheus/api/v1/write
- username: "cluster-insert-account-42"
password: "***"
url_prefix:
- "http://vminsert1:8480/insert/42/prometheus"
- "http://vminsert2:8480/insert/42/prometheus"
# A single user for querying and inserting data:
#
# - Requests to http://vmauth:8427/api/v1/query, http://vmauth:8427/api/v1/query_range
# and http://vmauth:8427/api/v1/label/<label_name>/values are proxied to the following URLs in a round-robin manner:
# - http://vmselect1:8481/select/42/prometheus
# - http://vmselect2:8481/select/42/prometheus
# For example, http://vmauth:8427/api/v1/query is proxied to http://vmselect1:8480/select/42/prometheus/api/v1/query
# or to http://vmselect2:8480/select/42/prometheus/api/v1/query .
# Requests are retried at other url_prefix backends if response status codes match 500 or 502.
#
# - Requests to http://vmauth:8427/api/v1/write are proxied to http://vminsert:8480/insert/42/prometheus/api/v1/write .
# The "X-Scope-OrgID: abc" HTTP header is added to these requests.
# The "X-Server-Hostname" HTTP header is removed from the proxied response.
#
# Request which do not match `src_paths` from the `url_map` are proxied to the urls from `default_url`
# in a round-robin manner. The original request path is passed in `request_path` query arg.
# For example, request to http://vmauth:8427/non/existing/path are proxied:
# - to http://default1:8888/unsupported_url_handler?request_path=/non/existing/path
# - or http://default2:8888/unsupported_url_handler?request_path=/non/existing/path
#
# Regular expressions are allowed in `src_paths` and `src_hosts` entries.
- username: "foobar"
# log requests that failed url_map rules in the following form:
# statusCode=<SC> remoteAddr: "<IP>, X-Forwarded-For: <IP>"; requestURI: <URI>; missing route for <URL>"(host: <HOST>; path: <PATH>; args: <ARGS>; headers: <HEADERS>)
# May contain sensitive information and is recommended to use only for debugging purposes.
dump_request_on_errors: true
url_map:
- src_paths:
- "/api/v1/query"
- "/api/v1/query_range"
- "/api/v1/label/[^/]+/values"
url_prefix:
- "http://vmselect1:8481/select/42/prometheus"
- "http://vmselect2:8481/select/42/prometheus"
retry_status_codes: [500, 502]
- src_paths: ["/api/v1/write"]
url_prefix: "http://vminsert:8480/insert/42/prometheus"
headers:
- "X-Scope-OrgID: abc"
response_headers:
- "X-Server-Hostname:" # empty value means the header will be removed from the response
ip_filters:
deny_list: [127.0.0.1]
default_url:
- "http://default1:8888/unsupported_url_handler"
- "http://default2:8888/unsupported_url_handler"
# Requests without an Authorization header are proxied according to the `unauthorized_user` section.
# Requests are proxied in round-robin fashion between `url_prefix` backends.
# The deny_partial_response query arg is added to all the proxied requests.
# The requests are retried if url_prefix backends send 500 or 503 response status codes.
# Note that the unauthorized_user section takes precedence when processing a route without credentials,
# even if such a route also exists in the users section (see https://github.com/VictoriaMetrics/VictoriaMetrics/issues/5236).
unauthorized_user:
url_prefix:
- http://vmselect-az1/?deny_partial_response=1
- http://vmselect-az2/?deny_partial_response=1
retry_status_codes: [503, 500]
ip_filters:
allow_list: ["1.2.3.0/24", "127.0.0.1"]
deny_list:
- 10.1.0.1
The config may contain %{ENV_VAR} placeholders, which are substituted by the corresponding ENV_VAR environment variable values.
This may be useful for passing secrets to the config.
By default, vmauth accepts HTTP requests at the 8427 port (this port can be changed via the -httpListenAddr command-line flag).
The Enterprise version of vmauth supports the ability to accept mTLS requests at this port, by specifying -tls and -mtls command-line flags. For example, the following command runs vmauth, which accepts only mTLS requests at port 8427:
./vmauth -tls -mtls -auth.config=...
By default, system-wide TLS Root CA is used to verify client certificates if the -mtls command-line flag is specified.
It is possible to specify a custom TLS Root CA via the -mtlsCAFile command-line flag.
See also automatic issuing of TLS certificates and mTLS-based request routing.
It is expected that all the backend services protected by vmauth are located in an isolated private network, so they can be accessed by external users only via vmauth.
Do not transfer auth headers in plaintext over untrusted networks. Enable https at -httpListenAddr. This can be done by passing the following -tls* command-line flags to vmauth:
-tls
Whether to enable TLS for incoming HTTP requests at -httpListenAddr (aka https). -tlsCertFile and -tlsKeyFile must be set if -tls is set
-tlsCertFile string
Path to file with TLS certificate. Used only if -tls is set. Prefer ECDSA certs instead of RSA certs, since RSA certs are slow
-tlsKeyFile string
Path to file with TLS key. Used only if -tls is set
See also automatic issuing of TLS certificates.
See these docs on how to enable mTLS protection at vmauth.
Alternatively, TLS termination proxy may be put in front of vmauth.
It is recommended to protect the following endpoints with authKeys:
/-/reload with -reloadAuthKey command-line flag, so external users couldn't trigger config reload./flags with -flagsAuthKey command-line flag, so unauthorized users couldn't get command-line flag values./metrics with -metricsAuthKey command-line flag, so unauthorized users couldn't access vmauth metrics./debug/pprof with -pprofAuthKey command-line flag, so unauthorized users couldn't access profiling information.As an alternative, you can serve internal API routes on a different listen address using the command-line flag -httpInternalListenAddr=127.0.0.1:8426{{% available_from "v1.111.0" %}}.
To enable TLS on the public listener while keeping the internal listener non-TLS, configure multiple listeners like this:
/path/to/vmauth -httpInternalListenAddr=,localhost:8426 -httpListenAddr=0.0.0.0:443, -tls=true,false -tlsCertFile=a-cert.crt -tlsKeyFile=a-key.key
vmauth also supports restricting access by IP - see these docs. See also concurrency limiting docs.
vmauth Enterprise supports automatic issuing of TLS certificates via Let's Encrypt service.
The following command-line flags must be set in order to enable automatic issuance of TLS certificates:
-httpListenAddr must be set to listen on TCP port 443. For example, -httpListenAddr=:443. This port must be accessible by the Let's Encrypt service.-tls must be set to accept HTTPS requests at -httpListenAddr. Note that -tlsCertFile and -tlsKeyFile aren't needed when automatic TLS certificate issuing is enabled.-tlsAutocertHosts must be set to a comma-separated list of hosts, which can be reached via -httpListenAddr. TLS certificates are automatically issued for these hosts.-tlsAutocertEmail must be set to the contact email for the issued TLS certificates.-tlsAutocertCacheDir may be set to the directory path to persist the issued TLS certificates between vmauth restarts. If this flag isn't set, then TLS certificates are reissued on every restart.This functionality can be evaluated for free according to these docs.
See also security recommendations.
vmauth exports various metrics in Prometheus exposition format at http://vmauth-host:8427/metrics page. It is recommended to set up regular scraping of this page either via vmagent or via a Prometheus-compatible scraper, so the exported metrics can be analyzed later.
Use the official Grafana dashboard and alerting rules for vmauth monitoring.
If you use Google Cloud Managed Prometheus for scraping metrics from VictoriaMetrics components, then pass -metrics.exposeMetadata
command-line to them, so they add TYPE and HELP comments for each exposed metric on the /metrics page.
See these docs for details.
vmauth exports the following metrics for each defined user in -auth.config:
vmauth_user_requests_total counter - the number of requests served for the given usernamevmauth_user_request_errors_total counter - the number of request errors for the given usernamevmauth_user_request_backend_requests_total counter - the number of backend requests for the given usernamevmauth_user_request_backend_errors_total counter - the number of backend request errors for the given usernamevmauth_user_request_duration_seconds summary - the duration of requests for the given usernamevmauth_user_concurrent_requests_limit_reached_total counter - the number of failed requests
for the given username because of exceeded concurrency limitsvmauth_user_concurrent_requests_capacity gauge - the maximum number of concurrent requests
for the given usernamevmauth_user_concurrent_requests_current gauge - the current number of concurrent requests
for the given usernameBy default, per-user metrics contain only the username label. This label is set to the username field value at the corresponding user section in the -auth.config file.
It is possible to override the username label value by specifying the name field in addition to the username field.
For example, the following config will result in vmauth_user_requests_total{username="foobar"} instead of vmauth_user_requests_total{username="secret_user"}:
users:
- username: "secret_user"
name: "foobar"
# other config options here
Additional labels for per-user metrics can be specified via the metric_labels section. For example, the following config defines {dc="eu",team="dev"} labels additionally to username="foobar" label:
users:
- username: "foobar"
metric_labels:
dc: eu
team: dev
# other config options here
vmauth exports the following metrics if the unauthorized_user section is defined in -auth.config:
vmauth_unauthorized_user_requests_total counter - the number of requests served for unauthorized uservmauth_unauthorized_user_request_errors_total counter - the number of request errors for unauthorized uservmauth_unauthorized_user_request_backend_requests_total counter - the number of backend requests for unauthorized uservmauth_unauthorized_user_request_backend_errors_total counter - the number of backend request errors for unauthorized uservmauth_unauthorized_user_request_duration_seconds summary - the duration of requests for unauthorized uservmauth_unauthorized_user_concurrent_requests_limit_reached_total counter - the number of failed requests because of exceeded concurrency limits for unauthorized uservmauth_unauthorized_user_concurrent_requests_capacity gauge - the maximum number of concurrent requests for unauthorized uservmauth_unauthorized_user_concurrent_requests_current gauge - the current number of concurrent requests for unauthorized userIt is recommended to use binary releases - vmauth is located in vmutils-* archives there.
make vmauth from the root folder of the repository.
It builds the vmauth binary and puts it into the bin folder.make vmauth-prod from the root folder of the repository.
It builds the vmauth-prod binary and puts it into the bin folder.Run make package-vmauth. It builds victoriametrics/vmauth:<PKG_TAG> docker image locally.
<PKG_TAG> is an auto-generated image tag, which depends on the source code in the repository.
The <PKG_TAG> may be manually set via PKG_TAG=foobar make package-vmauth.
The base Docker image is alpine, but you can use any other base image by setting it via the <ROOT_IMAGE> environment variable. For example, the following command builds the image on top of scratch image:
ROOT_IMAGE=scratch make package-vmauth
vmauth provides handlers for collecting the following Go profiles:
0.0.0.0 with hostname if needed):curl http://0.0.0.0:8427/debug/pprof/heap > mem.pprof
0.0.0.0 with hostname if needed):curl http://0.0.0.0:8427/debug/pprof/profile > cpu.pprof
The command for collecting CPU profiles waits for 30 seconds before returning.
The collected profiles may be analyzed with go tool pprof. It is safe to share the collected profiles from a security perspective, as they do not contain sensitive information.
Pass -help command-line arg to vmauth in order to see all the configuration options:
These flags are available in both VictoriaMetrics OSS and VictoriaMetrics Enterprise. {{% content "vmauth_common_flags.md" %}}
These flags are available only in VictoriaMetrics enterprise. {{% content "vmauth_enterprise_flags.md" %}}