# Copyright (c) HashiCorp, Inc. # SPDX-License-Identifier: BUSL-1.1 disable_mlock = true telemetry { prometheus_retention_time = "24h" disable_hostname = true } listener "tcp" { address = "0.0.0.0:${port}" purpose = "proxy" tls_disable = true } listener "tcp" { address = "0.0.0.0:${port_ops}" purpose = "ops" tls_disable = true } worker { name = "${worker_name}" public_addr = "${worker_name}:${port}" initial_upstreams = ["${initial_upstream}"] tags { type = ${type_tags}, } } # This key_id needs to match the corresponding upstream controller's # "worker-auth" kms kms "aead" { purpose = "worker-auth" aead_type = "aes-gcm" key = "OLFhJNbEb3umRjdhY15QKNEmNXokY1Iq" key_id = "global_worker-auth" } # This key_id needs to match the corresponding downstream worker's # "worker-auth" kms kms "aead" { purpose = "downstream-worker-auth" aead_type = "aes-gcm" key = "X+IJMVT6OnsrIR6G/9OTcJSX+lM9FSPN" key_id = "downstream_worker-auth" } events { audit_enabled = true sysevents_enabled = true observations_enable = true sink "stderr" { name = "all-events" description = "All events sent to stderr" event_types = ["*"] format = "cloudevents-json" } sink { name = "Log File" event_types = ["*"] format = "cloudevents-json" file { path = "/boundary/logs" file_name = "events.log" } audit_config { audit_filter_overrides { secret = "redact" sensitive = "redact" } } } }