Etcd Settings

This page covers settings for connecting MinIO AIStor to an external etcd cluster. Etcd provides a distributed key-value store used for DNS-based bucket routing with virtual-host-style access.

You can establish or modify settings by defining:

  • an environment variable on the host system prior to starting or restarting the AIStor Server. Refer to your operating system’s documentation for how to define an environment variable.
  • a configuration setting using mc admin config set.

If you define both an environment variable and the similar configuration setting, MinIO AIStor uses the environment variable value.

Some settings have only an environment variable or a configuration setting, but not both.

Each configuration setting controls fundamental MinIO AIStor behavior and functionality. Test configuration changes in a lower environment, such as DEV or QA, before applying to production.

Endpoints

Required

Specify a comma-separated list of etcd server endpoints. Setting this value enables the etcd integration.

All endpoints must use the same scheme (all http:// or all https://). When using https:// endpoints, MinIO AIStor connects using TLS 1.2 or later.

export MINIO_ETCD_ENDPOINTS="https://etcd1.example.net:2379,https://etcd2.example.net:2379,https://etcd3.example.net:2379"

No default value. This setting must be explicitly configured to enable etcd.

Path prefix

Optional

Set a namespace prefix for all keys stored in etcd. Use this to isolate multiple MinIO AIStor deployments sharing the same etcd cluster.

No default value.

CoreDNS path

Optional

Set the etcd path where MinIO AIStor stores bucket DNS records for CoreDNS integration.

The default value is /skydns.

Client certificate

Optional

Path to the client certificate file for mutual TLS (mTLS) authentication with the etcd cluster. Must be specified together with client certificate key.

No default value.

Client certificate key

Optional

Path to the client private key file for mutual TLS (mTLS) authentication with the etcd cluster. Must be specified together with client certificate.

No default value.