Go to file
Ivan Valdes 88d2d2472c
release: use GitHub's gh to create GitHub release
Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-10-11 13:24:16 -07:00
.devcontainer Bump go toolchain to 1.23.1 2024-09-26 22:38:57 +02:00
.github release: use GitHub's gh to create GitHub release 2024-10-11 13:24:16 -07:00
api dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
CHANGELOG Bump go toolchain to 1.23.1 2024-09-26 22:38:57 +02:00
client Merge pull request #18705 from mmorel-35/testifier/require-error 2024-10-10 10:08:44 +01:00
contrib Automate labels for contrib pull requests. 2024-05-12 22:24:21 +12:00
Documentation release: use GitHub's gh to create GitHub release 2024-10-11 13:24:16 -07:00
etcdctl dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
etcdutl dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
hack ci: Introduce yamllint for actions workflow files 2023-05-26 16:34:23 +08:00
logos Incorporate xkcd dependency meme into README 2023-04-25 14:49:50 +02:00
pkg dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
scripts release: use GitHub's gh to create GitHub release 2024-10-11 13:24:16 -07:00
security Automate labels for security pull requests. 2024-05-12 22:24:21 +12:00
server dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
tests dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
tools dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
.gitignore etcd-dump-logs: Fix order of imports.. 2022-12-30 09:22:39 +01:00
.go-version Bump go version to 1.23.2 2024-10-02 03:34:11 +05:30
.header
ADOPTERS.md Add Cyberfusion to adopters 2024-02-22 18:55:53 +01:00
bill-of-materials.json dependency: bump github.com/prometheus/client_golang from 1.19.1 to 1.20.0 2024-08-24 03:10:29 +02:00
bill-of-materials.override.json etcd: Replace ghodss/yaml with sigs.k8s.io/yaml 2019-05-02 12:34:36 +05:30
code-of-conduct.md *: update project code of conduct 2019-09-18 14:09:18 -04:00
codecov.yml Update codecov config to support commenting code coverage in PRs 2024-06-12 11:23:31 +02:00
CONTRIBUTING.md docs(contributing): document how to install stress tool 2024-10-02 07:37:04 +02:00
DCO
Dockerfile build(deps): bump distroless/static-debian12 from b033683 to 69830f2 2024-09-30 17:22:26 +00:00
dummy.go Split etcdctl into etcdctl (public API access) & etcdutl (direct surgery on files) 2021-05-17 11:54:03 +02:00
etcd.conf.yml.sample config: support AllowedCN and AllowedHostname through config file 2024-05-07 22:39:16 +02:00
go.mod dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
go.sum dependency: bump golang.org/x/crypto from 0.27.0 to 0.28.0 and bump golang.org/x/text from 0.18.0 to 0.19.0 2024-10-08 19:55:05 +02:00
GOVERNANCE.md Complete migration to OWNERS file. 2023-11-05 00:02:45 +13:00
LICENSE
Makefile Add run-govulncheck Makefile target 2024-06-15 15:47:13 -07:00
OWNERS Add siyuanfoundation to reviewers. 2024-05-20 10:11:41 -07:00
Procfile remove Procfile.v2 and Procfile.learner 2023-06-09 18:37:09 +05:30
README.md changed the scorecard badge link to the standard format 2024-07-04 01:59:59 +05:30

etcd

Go Report Card Coverage Tests codeql-analysis Docs Godoc Releases LICENSE OpenSSF Scorecard Arm CI sponsored by Actuated

Note: The main branch may be in an unstable or even broken state during development. For stable versions, see releases.

etcd Logo

etcd is a distributed reliable key-value store for the most critical data of a distributed system, with a focus on being:

  • Simple: well-defined, user-facing API (gRPC)
  • Secure: automatic TLS with optional client cert authentication
  • Fast: benchmarked 10,000 writes/sec
  • Reliable: properly distributed using Raft

etcd is written in Go and uses the Raft consensus algorithm to manage a highly-available replicated log.

etcd is used in production by many companies, and the development team stands behind it in critical deployment scenarios, where etcd is frequently teamed with applications such as Kubernetes, locksmith, vulcand, Doorman, and many others. Reliability is further ensured by rigorous robustness testing.

See etcdctl for a simple command line client.

etcd reliability is important

Original image credited to xkcd.com/2347, alterations by Josh Berkus.

Maintainers

Maintainers strive to shape an inclusive open source project culture where users are heard and contributors feel respected and empowered. Maintainers aim to build productive relationships across different companies and disciplines. Read more about Maintainers role and responsibilities.

Getting started

Getting etcd

The easiest way to get etcd is to use one of the pre-built release binaries which are available for OSX, Linux, Windows, and Docker on the release page.

For more installation guides, please check out play.etcd.io and operating etcd.

Running etcd

First start a single-member cluster of etcd.

If etcd is installed using the pre-built release binaries, run it from the installation location as below:

/tmp/etcd-download-test/etcd

The etcd command can be simply run as such if it is moved to the system path as below:

mv /tmp/etcd-download-test/etcd /usr/local/bin/
etcd

This will bring up etcd listening on port 2379 for client communication and on port 2380 for server-to-server communication.

Next, let's set a single key, and then retrieve it:

etcdctl put mykey "this is awesome"
etcdctl get mykey

etcd is now running and serving client requests. For more, please check out:

etcd TCP ports

The official etcd ports are 2379 for client requests, and 2380 for peer communication.

Running a local etcd cluster

First install goreman, which manages Procfile-based applications.

Our Procfile script will set up a local example cluster. Start it with:

goreman start

This will bring up 3 etcd members infra1, infra2 and infra3 and optionally etcd grpc-proxy, which runs locally and composes a cluster.

Every cluster member and proxy accepts key value reads and key value writes.

Follow the comments in Procfile script to add a learner node to the cluster.

Install etcd client v3

go get go.etcd.io/etcd/client/v3

Next steps

Now it's time to dig into the full etcd API and other guides.

Contact

Community meetings

etcd contributors and maintainers meet every week at 11:00 AM (USA Pacific) on Thursday and meetings alternate between community meetings and issue triage meetings. Meeting agendas are recorded in a shared Google doc and everyone is welcome to suggest additional topics or other agendas.

Issue triage meetings are aimed at getting through our backlog of PRs and Issues. Triage meetings are open to any contributor; you don't have to be a reviewer or approver to help out! They can also be a good way to get started contributing.

The meeting lead role is rotated for each meeting between etcd maintainers or sig-etcd leads and is recorded in a shared Google sheet.

Meeting recordings are uploaded to the official etcd YouTube channel.

Get calendar invitations by joining etcd-dev mailing group.

Join the CNCF-funded Zoom channel: zoom.us/my/cncfetcdproject

Contributing

See CONTRIBUTING for details on setting up your development environment, submitting patches and the contribution workflow.

Please refer to community-membership.md for information on becoming an etcd project member. We welcome and look forward to your contributions to the project!

Please also refer to roadmap to get more details on the priorities for the next few major or minor releases.

Reporting bugs

See reporting bugs for details about reporting any issues. Before opening an issue please check it is not covered in our frequently asked questions.

Reporting a security vulnerability

See security disclosure and release process for details on how to report a security vulnerability and how the etcd team manages it.

Issue and PR management

See issue triage guidelines for details on how issues are managed.

See PR management for guidelines on how pull requests are managed.

etcd Emeritus Maintainers

These emeritus maintainers dedicated a part of their career to etcd and reviewed code, triaged bugs and pushed the project forward over a substantial period of time. Their contribution is greatly appreciated.

  • Fanmin Shi
  • Anthony Romano
  • Brandon Philips
  • Joe Betz
  • Gyuho Lee
  • Jingyi Hu
  • Xiang Li
  • Ben Darnell
  • Sam Batschelet
  • Piotr Tabor
  • Hitoshi Mitake

License

etcd is under the Apache 2.0 license. See the LICENSE file for details.