Go to file
Ivan Valdes dfda61bbbf
make: fix verify-dep
Makefile's target `verify-dep` current behavior is to use `go list` to
check consistent dependency versions from direct dependencies. Ignoring
indirect dependencies in a multi-module project could lead to version
mismatches. If module A imports module B, module B's dependency will be
an indirect dependency in module A. Which can potentially have a version
mismatch. Therefore, use `go mod edit` with indirect dependencies, too.
So it can work with all dependencies defined in go.mod.

Fix displaying dependencies with mismatches, as the old code was
searching with grep just for the prefix, which would show other
dependencies that shared the same prefix.

Signed-off-by: Ivan Valdes <ivan@vald.es>
2024-06-19 09:02:17 -07:00
.devcontainer Migrate to go1.22 2024-03-06 17:15:36 -05:00
.github build(deps): bump github/codeql-action from 3.25.8 to 3.25.10 2024-06-17 20:39:34 +00:00
api dependency: bump google.golang.org/protobuf from 1.34.1 to 1.34.2 2024-06-17 21:49:52 +02:00
CHANGELOG Update release-3.5 changelog 2024-06-14 22:12:35 +02:00
client dependency: bump google.golang.org/protobuf from 1.34.1 to 1.34.2 2024-06-17 21:49:52 +02:00
contrib Automate labels for contrib pull requests. 2024-05-12 22:24:21 +12:00
Documentation Update documentation for migration to prow. 2024-05-23 06:36:50 +12:00
etcdctl dependency: bump github.com/spf13/cobra from 1.8.0 to 1.8.1 2024-06-17 22:09:15 +02:00
etcdutl dependency: bump github.com/spf13/cobra from 1.8.0 to 1.8.1 2024-06-17 22:09:15 +02:00
hack ci: Introduce yamllint for actions workflow files 2023-05-26 16:34:23 +08:00
logos Incorporate xkcd dependency meme into README 2023-04-25 14:49:50 +02:00
pkg Merge pull request #18062 from stackbaek/main 2024-06-19 09:35:54 +01:00
scripts make: fix verify-dep 2024-06-19 09:02:17 -07:00
security Automate labels for security pull requests. 2024-05-12 22:24:21 +12:00
server Merge pull request #18062 from stackbaek/main 2024-06-19 09:35:54 +01:00
tests Use $(MAKE) instead of make 2024-06-18 19:16:30 +02:00
tools Merge pull request #17680 from serathius/issue-17529 2024-06-18 08:32:40 +02:00
.gitignore etcd-dump-logs: Fix order of imports.. 2022-12-30 09:22:39 +01:00
.go-version Bump Go version to 1.22.4: CVE 2024-24790 fix 2024-06-05 14:12:52 +05:30
.header
ADOPTERS.md Add Cyberfusion to adopters 2024-02-22 18:55:53 +01:00
bill-of-materials.json depdendency: bump github.com/prometheus/common from 0.45.0 to 0.46.0. 2024-01-17 22:28:43 +13:00
bill-of-materials.override.json etcd: Replace ghodss/yaml with sigs.k8s.io/yaml 2019-05-02 12:34:36 +05:30
code-of-conduct.md *: update project code of conduct 2019-09-18 14:09:18 -04:00
codecov.yml Update codecov config to support commenting code coverage in PRs 2024-06-12 11:23:31 +02:00
CONTRIBUTING.md Update documentation for migration to prow. 2024-05-23 06:36:50 +12:00
DCO
Dockerfile build(deps): bump distroless/static-debian12 from 8cbe18a to 4197211 2024-04-08 17:13:48 +00:00
dummy.go Split etcdctl into etcdctl (public API access) & etcdutl (direct surgery on files) 2021-05-17 11:54:03 +02:00
etcd.conf.yml.sample config: support AllowedCN and AllowedHostname through config file 2024-05-07 22:39:16 +02:00
go.mod Merge pull request #17680 from serathius/issue-17529 2024-06-18 08:32:40 +02:00
go.sum Merge pull request #17680 from serathius/issue-17529 2024-06-18 08:32:40 +02:00
GOVERNANCE.md Complete migration to OWNERS file. 2023-11-05 00:02:45 +13:00
LICENSE
Makefile Add run-govulncheck Makefile target 2024-06-15 15:47:13 -07:00
OWNERS Add siyuanfoundation to reviewers. 2024-05-20 10:11:41 -07:00
Procfile remove Procfile.v2 and Procfile.learner 2023-06-09 18:37:09 +05:30
README.md Refresh community meeting docs 2024-03-19 06:48:54 +13:00

etcd

Go Report Card Coverage Tests codeql-analysis Docs Godoc Releases LICENSE OpenSSF Scorecard Arm CI sponsored by Actuated

Note: The main branch may be in an unstable or even broken state during development. For stable versions, see releases.

etcd Logo

etcd is a distributed reliable key-value store for the most critical data of a distributed system, with a focus on being:

  • Simple: well-defined, user-facing API (gRPC)
  • Secure: automatic TLS with optional client cert authentication
  • Fast: benchmarked 10,000 writes/sec
  • Reliable: properly distributed using Raft

etcd is written in Go and uses the Raft consensus algorithm to manage a highly-available replicated log.

etcd is used in production by many companies, and the development team stands behind it in critical deployment scenarios, where etcd is frequently teamed with applications such as Kubernetes, locksmith, vulcand, Doorman, and many others. Reliability is further ensured by rigorous robustness testing.

See etcdctl for a simple command line client.

etcd reliability is important

Original image credited to xkcd.com/2347, alterations by Josh Berkus.

Maintainers

Maintainers strive to shape an inclusive open source project culture where users are heard and contributors feel respected and empowered. Maintainers aim to build productive relationships across different companies and disciplines. Read more about Maintainers role and responsibilities.

Getting started

Getting etcd

The easiest way to get etcd is to use one of the pre-built release binaries which are available for OSX, Linux, Windows, and Docker on the release page.

For more installation guides, please check out play.etcd.io and operating etcd.

Running etcd

First start a single-member cluster of etcd.

If etcd is installed using the pre-built release binaries, run it from the installation location as below:

/tmp/etcd-download-test/etcd

The etcd command can be simply run as such if it is moved to the system path as below:

mv /tmp/etcd-download-test/etcd /usr/local/bin/
etcd

This will bring up etcd listening on port 2379 for client communication and on port 2380 for server-to-server communication.

Next, let's set a single key, and then retrieve it:

etcdctl put mykey "this is awesome"
etcdctl get mykey

etcd is now running and serving client requests. For more, please check out:

etcd TCP ports

The official etcd ports are 2379 for client requests, and 2380 for peer communication.

Running a local etcd cluster

First install goreman, which manages Procfile-based applications.

Our Procfile script will set up a local example cluster. Start it with:

goreman start

This will bring up 3 etcd members infra1, infra2 and infra3 and optionally etcd grpc-proxy, which runs locally and composes a cluster.

Every cluster member and proxy accepts key value reads and key value writes.

Follow the comments in Procfile script to add a learner node to the cluster.

Install etcd client v3

go get go.etcd.io/etcd/client/v3

Next steps

Now it's time to dig into the full etcd API and other guides.

Contact

Community meetings

etcd contributors and maintainers meet every week at 11:00 AM (USA Pacific) on Thursday and meetings alternate between community meetings and issue triage meetings. Meeting agendas are recorded in a shared Google doc and everyone is welcome to suggest additional topics or other agendas.

Issue triage meetings are aimed at getting through our backlog of PRs and Issues. Triage meetings are open to any contributor; you don't have to be a reviewer or approver to help out! They can also be a good way to get started contributing.

The meeting lead role is rotated for each meeting between etcd maintainers or sig-etcd leads and is recorded in a shared Google sheet.

Meeting recordings are uploaded to the official etcd YouTube channel.

Get calendar invitations by joining etcd-dev mailing group.

Join the CNCF-funded Zoom channel: zoom.us/my/cncfetcdproject

Contributing

See CONTRIBUTING for details on setting up your development environment, submitting patches and the contribution workflow.

Please refer to community-membership.md for information on becoming an etcd project member. We welcome and look forward to your contributions to the project!

Please also refer to roadmap to get more details on the priorities for the next few major or minor releases.

Reporting bugs

See reporting bugs for details about reporting any issues. Before opening an issue please check it is not covered in our frequently asked questions.

Reporting a security vulnerability

See security disclosure and release process for details on how to report a security vulnerability and how the etcd team manages it.

Issue and PR management

See issue triage guidelines for details on how issues are managed.

See PR management for guidelines on how pull requests are managed.

etcd Emeritus Maintainers

These emeritus maintainers dedicated a part of their career to etcd and reviewed code, triaged bugs and pushed the project forward over a substantial period of time. Their contribution is greatly appreciated.

  • Fanmin Shi
  • Anthony Romano
  • Brandon Philips
  • Joe Betz
  • Gyuho Lee
  • Jingyi Hu
  • Xiang Li
  • Ben Darnell
  • Sam Batschelet
  • Piotr Tabor
  • Hitoshi Mitake

License

etcd is under the Apache 2.0 license. See the LICENSE file for details.