Query Service#
Changed in version 2.0.
ESS provides a Query service that allows a Pod Owner (or other agents with Control access to the Pod) to query RDF (Resource Description Framework) data in the Pod. Specifically, the ESS Query service provides a Quad Pattern Fragment (QPF) interface that the Pod Owner (or other agents with Control access to the Pod) can use to query RDF data.
See also:
QPF Query Service#
ESS Query service has the following QPF endpoint:
https://fragments.{ESS DOMAIN}/qpf
Query Parameters#
To query a Pod using QPF, you can specify the following query
parameters to the service as part of a GET
operation:
?storage={POD}&subject={SUBJECT}&predicate={PREDICATE}&object={OBJECT}&graph={GRAPH}
Tip
The Query service includes the
Hypermedia Control as part of every result set.
You can issue a GET
to the service with only the storage
parameter set (i.e., omit the data matching pattern parameters) to
return just the Hypermedia Control.
The Hypermedia Control provides the supported query template and mapping of the QPF quad pattern selector parameters for querying data.
The table of parameters is provided below to complement the returned Hypermedia Control information. However, Hypermedia Control acts as the definitive source.
Parameter |
Description |
---|---|
|
Required. URL of the Pod to query. URL-encode the value. If the Note
|
|
The subject to match, as defined in the QPF quad pattern selector. Triples with blank node values will be normalized into statements with URIs. URL-encode the value. |
|
The predicate to match, as defined in the QPF quad pattern selector. URL-encode the value. |
|
The object to match, as defined in the QPF quad pattern selector. URL-encode the value. |
|
The graph (the URL of the Resource) to match, as defined in the QPF quad pattern selector. URL-encode the value. |
Query Response#
Important
The query results may lag behind the current state of the Resource. For more details, see Query Service Indexer.
The response includes:
Hypermedia Control that includes the search pattern template.
Metadata that includes the estimated count of matching data and links for pagination.
Matching Data Results that includes up to
INRUPT_FRAGMENTS_PAGE_SIZE
number of matching records.
For example:
@prefix foaf: <http://xmlns.com/foaf/0.1/> .
@prefix hydra: <http://www.w3.org/ns/hydra/core#> .
@prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .
@prefix sd: <http://www.w3.org/ns/sparql-service-description#> .
@prefix void: <http://rdfs.org/ns/void#> .
_:b0 {
<https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F>
void:subset <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article> ;
hydra:search [ hydra:mapping [ hydra:property sd:graph ;
hydra:variable "graph"
] ;
hydra:mapping [ hydra:property rdf:subject ;
hydra:variable "subject"
] ;
hydra:mapping [ hydra:property rdf:predicate ;
hydra:variable "predicate"
] ;
hydra:mapping [ hydra:property rdf:object ;
hydra:variable "object"
] ;
hydra:template "https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F{&graph,subject,predicate,object}"
] .
_:b0 foaf:primaryTopic <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article> .
<https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article>
void:subset <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article> ;
void:triples "10"^^<http://www.w3.org/2001/XMLSchema#long> ;
hydra:next <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article&after=285896126> ;
hydra:previous <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article&before=285896101> ;
hydra:view <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article> ;
foaf:isPrimaryTopicOf _:b0 .
}
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList> {
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title2>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title0>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title3>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title1>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title4>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
}
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList> {
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title3>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title1>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title4>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title2>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title0>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
}
Hypermedia Control#
Per the Quad Pattern Fragment (QPF) specification, successful query response includes the Hypermedia controls. The returned Hypermedia controls includes the search pattern template.
For example:
<https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F>
void:subset <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article> ;
hydra:search [ hydra:mapping [ hydra:property sd:graph ;
hydra:variable "graph"
] ;
hydra:mapping [ hydra:property rdf:subject ;
hydra:variable "subject"
] ;
hydra:mapping [ hydra:property rdf:predicate ;
hydra:variable "predicate"
] ;
hydra:mapping [ hydra:property rdf:object ;
hydra:variable "object"
] ;
hydra:template "https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F{&graph,subject,predicate,object}"
] .
For more information, see Hypermedia controls in the QPF specification.
Metadata#
Per the Quad Pattern Fragment (QPF) specification, a successful query response includes the metadata.
The returned metadata includes:
An estimate of the number of matches.
For example:
_:b0 foaf:primaryTopic <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article> .
<https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article>
void:subset <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article> ;
void:triples "10"^^<http://www.w3.org/2001/XMLSchema#long> ;
hydra:next <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article&after=285896126> ;
hydra:previous <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article&before=285896101> ;
hydra:view <https://fragments.example.com/qpf?storage=https%3A%2F%2Fstorage.example.com%2Fa211ad26-zzzz-9999-8b20-acb3aed0e369%2F&object=https%3A%2F%2Fwww.w3.org%2Fns%2Factivitystreams%23Article> ;
foaf:isPrimaryTopicOf _:b0 .
For more information, see metadata section in the QPF specification.
Matching Data Results#
Note
ESS Query service only returns matching data from the data that has been indexed.
Because the resource indexing occurs after the indexer consumes a resource change notification event, the query results may lag behind the current state of the Resource.
A successful query response includes the matching data in triples.
For example,
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList> {
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title2>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title0>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title3>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title1>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/myList#title4>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
}
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList> {
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title3>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title1>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title4>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title2>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
<https://storage.example.com/a211ad26-zzzz-9999-8b20-acb3aed0e369/readingLists/publicList#title0>
rdf:type <https://www.w3.org/ns/activitystreams#Article> .
}
The number of query results returned per page is determined by
INRUPT_FRAGMENTS_PAGE_SIZE
). For pagination information, see
Metadata.
Query Service Indexer#
To query your data, the Query service uses an indexer to index your RDF resources; i.e., the the Query service returns results only from the indexed RDF resources. For more information on the indexer, see Query Service Indexer.
Access Control#
UMA and Solid-OIDC Access Tokens#
For query access to the Pod, the ESS’ Query service can use either:
UMA token, or
Solid-OpenID Connect (OIDC) access token.
With the UMA authorization flow:
When you issue your query without an access token, the Query service returns a
401
along with a ticket and authorization server in the WWW-Authenticate header.From the authorization server, the client can exchange the UMA ticket for the UMA access token.
To exchange the UMA ticket for the access token, the client must include its
client_id
.
Include the access token in the header of your query request and retry.
See also:
Querying Agent#
Only Agents who have Control Read access to the root of the Pod, such as the Pod Owner, can access data from the QPF endpoint.
You can further specify which applications can query the endpoint by granting specific applications appropriate access.
Indexer#
To index the data in a resource, indexer requires Read access to the resource. The Query service only returns results from the indexed RDF resources.
See also:
Configuration#
As part of the installation process, Inrupt provides base Kustomize overlays and associated files that require deployment-specific configuration inputs.
The following configuration options are available for the service and may be set as part of updating the inputs for your deployment. The Inrupt-provided base Kustomize overlays may be using updated configuration values that differ from the default values.
Query Service Configuration#
- INRUPT_FRAGMENTS_PAGE_SIZE#
Default:
10
The number of matching results per page.
- QUARKUS_LOG_LEVEL#
Default:
INFO
Logging level.
UMA Configuration#
- INRUPT_AUTHZ_AS_URI#
The URI of the UMA Authorization Server.
The value must match:
INRUPT_JWT_AUTHORIZATION_SERVER_ISSUER
configuration for the service.INRUPT_UMA_ISSUER
configuration for UMA Service.
- INRUPT_JWT_AUTHORIZATION_SERVER_ISSUER#
The URI of the UMA token issuer.
The value must match
INRUPT_AUTHZ_AS_URI
.
- INRUPT_JWT_AUTHORIZATION_SERVER_JWKS#
The JWKS endpoint of the
INRUPT_JWT_AUTHORIZATION_SERVER_ISSUER
.
OIDC Configuration#
- INRUPT_JWT_ALLOWED_SIGNATURE_ALGORITHMS#
Default:
ES256
,RS256
A comma-separated list that specifies the allowed encryption algorithms used to sign ID tokens.
- INRUPT_JWT_ISSUER_ALLOW_LIST#
A comma-separated list [1] of trusted issuers of Solid-OIDC tokens.
If unset, the service accepts Solid-OIDC tokens from all issuers with the exception of those in the
INRUPT_JWT_ISSUER_DENY_LIST
.If set, the service accepts only the Solid-OIDC tokens from the issuers in the list with the following exception:
If an issuer is in both
INRUPT_JWT_ISSUER_ALLOW_LIST
andINRUPT_JWT_ISSUER_DENY_LIST
, theINRUPT_JWT_ISSUER_DENY_LIST
supersedes theINRUPT_JWT_ISSUER_ALLOW_LIST
and the issuer is not accepted by ESS.
See also
INRUPT_JWT_ISSUER_DENY_LIST
.Tip
Ensure that ESS UMA service’
INRUPT_JWT_ISSUER_ALLOW_LIST
is consistent with theINRUPT_JWT_ISSUER_ALLOW_LIST
value set for this service.
- INRUPT_JWT_ISSUER_DENY_LIST#
A comma-separated list [1] of disallowed issuers of Solid-OIDC tokens.
If unset, the service accepts Solid-OIDC tokens from all issuers unless
INRUPT_JWT_ISSUER_ALLOW_LIST
is set, in which case, the service only accepts tokens from those in theINRUPT_JWT_ISSUER_ALLOW_LIST
.If set, the service disallows the Solid-OIDC tokens from the issuers in the list. If
INRUPT_JWT_ISSUER_ALLOW_LIST
is also set, issuers not in theINRUPT_JWT_ISSUER_ALLOW_LIST
are also disallowed.
Tip
Ensure that ESS’ UMA service’s
INRUPT_JWT_ISSUER_DENY_LIST
is consistent with theINRUPT_JWT_ISSUER_DENY_LIST
value set for this service.
Kafka Configuration#
Tip
See also ESS’ Kafka Configuration.
- INRUPT_KAFKA_AUDITV1EVENTSENCRYPTED_CIPHER_PASSWORD#
The strong cipher key to use when running auditing with encrypted messages over the
auditv1eventsencrypted
topic.
- INRUPT_KAFKA_AUDITV1EVENTSPRODUCERENCRYPTED_CIPHER_PASSWORD#
The strong cipher key to use when running auditing with encrypted messages over the
auditv1eventsproducerencrypted
topic.Added in version 2.2.0.
- KAFKA_BOOTSTRAP_SERVERS#
Default:
localhost:9092
Comma-delimited list of Kafka broker servers for use by ESS services.
Setting
KAFKA_BOOTSTRAP_SERVERS
configures ESS to use the same Kafka instance(s) for all its Kafka message channels (e.g.,solidresource
andauditv1out
message channels). The UMA service uses theauditv1out
message channel.Note
Inrupt-provided overlays default to using
KAFKA_BOOTSTRAP_SERVERS
.To use a different Kafka instance for the
auditv1out
channel, use specific message channel configuration.See also ESS’ Kafka Configuration.
Configuration Logging#
Starting in 2.2, ESS services log their startup configuration.
- INRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW#
Default: inrupt,smallrye.jwt.expiration.grace,mp.jwt.verify.clock.skew,smallrye.jwt.always-check-authorization,smallrye.jwt.token.decryption.kid,smallrye.jwt.token.schemes,smallrye.jwt.require.named-principal,smallrye.jwt.time-to-live,smallrye.jwt.jwks.refresh-interval,smallrye.jwt.jwks.forced-refresh-interval,smallrye.jwt.required.claims,mp.jwt.verify.audiences
A comma-separated list of configuration property prefixes (case-sensitive) that determine which configurations are logged:
If the list is empty, NO configuration property is logged.
If a configuration property starts with a listed prefix (case-sensitive), the configuration property and its value are logged unless the configuration also matches a prefix in
INRUPT_LOGGING_CONFIGURATION_PREFIX_DENY
(which acts as a filter onINRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW
list).As such, if the configuration matches prefix in both
INRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW
andINRUPT_LOGGING_CONFIGURATION_PREFIX_DENY
, theINRUPT_LOGGING_CONFIGURATION_PREFIX_DENY
takes precedence and the configuration is not logged. For example, ifinrupt.
is an allow prefix, butinrupt.kafka.
is a deny prefix, all configurations that start withinrupt.kafka.
are excluded from the logs.
When specifying the prefixes, you can specify the prefixes using one of two formats:
using dot notation (e.g.,
inrupt.foobar.
), orusing the MicroProfile Config environmental variables conversion value (e.g.,
INRUPT_FOOBAR_
).
Warning
Use the same format for both
INRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW
andINRUPT_LOGGING_CONFIGURATION_PREFIX_DENY
.For example, if you change the format of
INRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW
, change the format ofINRUPT_LOGGING_CONFIGURATION_PREFIX_DENY
as well.Tip
To avoid allowing more than desired configurations, specify as much of the prefix as possible. If the prefix specifies the complete prefix term, include the term delineator. For example:
If using dot-notation, if you want to match configuration properties of the form
foobar.<xxxx>...
, specifyfoobar.
(including the dot.
) instead of, for example,foo
orfoobar
.If using converted form, if you want to match configuration properties of the form
FOOBAR_<XXXX>...
, specifyFOOBAR_
(including the underscore_
) instead of, for example,FOO
orFOOBAR
.
Added in version 2.2.0.
- INRUPT_LOGGING_CONFIGURATION_PREFIX_DENY#
Default: inrupt.kafka
A comma-separated list of configuration name prefixes (case-sensitive) that determines which configurations (that would otherwise match the
INRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW
) are not logged. That is,INRUPT_LOGGING_CONFIGURATION_PREFIX_DENY
acts as a filter onINRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW
. For example:If
foobar.
is an allowed prefix, to suppressfoobar.private.<anything>
, you can specifyfoobar.private.
to the deny list.If
foobar.
is not an allowed prefix, no property starting withfoobar.
is logged. As such, you do not need to specifyfoobar.private
to the deny list.
When specifying the prefixes, you can specify the prefixes using one of two formats:
using dot notation (e.g.,
inrupt.foobar.
), orusing the MicroProfile Config environmental variables conversion value (e.g.,
INRUPT_FOOBAR_
).
Warning
Use the same format for both
INRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW
andINRUPT_LOGGING_CONFIGURATION_PREFIX_DENY
.For example, if you change the format of
INRUPT_LOGGING_CONFIGURATION_PREFIX_ALLOW
, change the format ofINRUPT_LOGGING_CONFIGURATION_PREFIX_DENY
as well.Added in version 2.2.0.
Logging Redaction#
- INRUPT_LOGGING_REDACTION_NAME_ACTION#
Default: REPLACE
Type of the redaction to perform. Supported values are:
Action
Description
REPLACE
Default. Replaces the matching text with a specified replacement.
PLAIN
Leaves the matching field unprocessed. Only available if the redaction target is a field (i.e.,
INRUPT_LOGGING_REDACTION_{NAME}_FIELD
).DROP
Suppresses the matching field. Only available if the redaction target is a field (i.e.,
INRUPT_LOGGING_REDACTION_{NAME}_FIELD
).PRIORITIZE
Changes the log level of the matching message.
SHA256
Replaces the matching text with its hash.
If the action is
REPLACE
(default), see alsoINRUPT_LOGGING_REDACTION_{NAME}_REPLACEMENT
.If the action is to
PRIORITIZE
, see alsoINRUPT_LOGGING_REDACTION_{NAME}_LEVEL
.
For more information on log redaction, see Logging Redaction.
Added in version 2.2.0.
- INRUPT_LOGGING_REDACTION_NAME_ENABLED#
Default:
true
A boolean that determines whether the redaction configurations with the specified
INRUPT_LOGGING_REDACTION_{NAME}_
prefix is enabled.For more information on log redaction, see Logging Redaction.
Added in version 2.2.0.
- INRUPT_LOGGING_REDACTION_NAME_EXCEPTION#
Fully qualified name of the exception class to match in the log messages (includes inner exception). Configure to target an exception message class.
For more information on log redaction, see Logging Redaction.
Added in version 2.2.0.
- INRUPT_LOGGING_REDACTION_NAME_FIELD#
Exact name of the field to match in the log messages. Configure to target a specific log message field for redaction.
For more information on log redaction, see Logging Redaction.
Added in version 2.2.0.
- INRUPT_LOGGING_REDACTION_NAME_LEVEL#
A new log level to use for the log message if the
INRUPT_LOGGING_REDACTION_{NAME}_ACTION
isPRIORITIZE
.Added in version 2.2.0.
- INRUPT_LOGGING_REDACTION_NAME_PATTERN#
A regex (see Java regex pattern) to match in the log messages. Configure to target log message text that matches a specified pattern.
For more information on log redaction, see Logging Redaction.
Added in version 2.2.0.
- INRUPT_LOGGING_REDACTION_NAME_REPLACEMENT#
Replacement text to use if the
INRUPT_LOGGING_REDACTION_{NAME}_ACTION
isREPLACE
.If unspecified, defaults to
[REDACTED]
.For more information on log redaction, see Logging Redaction.
Added in version 2.2.0.
Application-Defined Metadata Propagation#
- INRUPT_AUDIT_PRODUCER_REQUEST_METADATA_ALLOW#
A comma-separated list [1] of application-defined properties that can be included in the associated audit events (unless specified in the corresponding
INRUPT_AUDIT_PRODUCER_REQUEST_METADATA_DENY
).This configuration is case-sensitive to the propagated properties in the baggage.
Tip
To include a propagated property that was added via the
INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_ALLOW
configuration, ensure that the cases of these properties match.See:
Manage Application-Defined Metadata Propagation to configure.
Application-Defined Metadata for more information.
Added in version 2.2.0.
- INRUPT_AUDIT_PRODUCER_REQUEST_METADATA_DENY#
A comma-separated list [1] of application-defined properties to exclude from the associated audit messages. This setting takes precedence over
INRUPT_AUDIT_PRODUCER_REQUEST_METADATA_ALLOW
.This configuration is case-sensitive to the propagated properties in the baggage.
Tip
To exclude a propagated property that was added via the
INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_ALLOW
configuration, ensure that the cases of these properties match.See:
Manage Application-Defined Metadata Propagation to configure.
Application-Defined Metadata for more information.
Added in version 2.2.0.
- INRUPT_LOGGING_REQUEST_METADATA_ALLOW#
A comma-separated list [1] of application-defined properties that can be included in the associated log messages (unless specified in the corresponding
INRUPT_LOGGING_REQUEST_METADATA_DENY
).This configuration is case-sensitive to the propagated properties in the baggage.
Tip
To include a propagated property that was added via the
INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_ALLOW
configuration, ensure that the cases of these properties match.See:
Manage Application-Defined Metadata Propagation to configure.
Application-Defined Metadata for more information.
Added in version 2.2.0.
- INRUPT_LOGGING_REQUEST_METADATA_DENY#
A comma-separated list [1] of application-defined properties to exclude from the associated log messages. This setting takes precedence over
INRUPT_LOGGING_REQUEST_METADATA_ALLOW
.This configuration is case-sensitive to the propagated properties in the baggage.
Tip
To exclude a propagated property that was added via the
INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_ALLOW
configuration, ensure that the cases of these properties match.See:
Manage Application-Defined Metadata Propagation to configure.
Application-Defined Metadata for more information.
Added in version 2.2.0.
- INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_ALLOW#
A comma-separated list [1] of non-baggage request headers to add to the baggage (unless specified in the corresponding
INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_DENY
); i.e., include these non-baggage request headers as application-defined properties.The configuration is case-insensitive; i.e., the listed headers do not need to match the case of the client request headers. For example, a list that includes
x-correlation-id
can matchx-correlation-id
header,X-CoRrElAtIoN-Id
header, etc.See:
Manage Application-Defined Metadata Propagation to configure.
Application-Defined Metadata for more information.
Added in version 2.2.0.
- INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_DENY#
A comma-separated list [1] of non-baggage request headers to exclude from being added to the baggage; i.e., excludes these headers as application-defined properties. This setting takes precedence over
INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_ALLOW
.The configuration is case-insensitive; i.e., the listed headers do not need to match the case of the client request headers. For example, a list that includes
x-correlation-id
can match (and exclude)x-correlation-id
header,X-CoRrElAtIoN-Id
header, etc.See:
Manage Application-Defined Metadata Propagation to configure.
Application-Defined Metadata for more information.
Added in version 2.2.0.
- INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_OVERRIDES#
A flag that determines ESS behavior when metadata property is defined both as a header and as a baggage entry:
If
true
, ESS updates/overrides the baggage entry with the header value.If
false
(the default), ESS keeps the baggage entry.
For details, Duplicate Property Definition.
Added in version 2.2.0.
- INRUPT_REQUEST_METADATA_REFLECTOR_HEADER_ALLOW#
A comma-separated list [1] of application-defined properties that can return as response headers (unless specified in the corresponding
INRUPT_REQUEST_METADATA_REFLECTOR_HEADER_DENY
).This configuration is case-sensitive to the propagated properties in the baggage.
Tip
To return a propagated property that was added via the
INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_ALLOW
configuration, ensure that the cases of these properties match.You may need to update
QUARKUS_HTTP_CORS_EXPOSED_HEADERS
to extend the list of CORS-safelisted response headers.
See:
Manage Application-Defined Metadata Propagation to configure.
Application-Defined Metadata for more information.
Added in version 2.2.0.
- INRUPT_REQUEST_METADATA_REFLECTOR_HEADER_DENY#
A comma-separated list [1] of application-defined properties to exclude from returning as response headers. This setting takes precedence over
INRUPT_REQUEST_METADATA_REFLECTOR_HEADER_ALLOW
.This configuration is case-sensitive to the propagated properties in the baggage.
Tip
To exclude a propagated property that was added via the
INRUPT_REQUEST_METADATA_PROPAGATOR_HEADER_ALLOW
configuration, ensure that the cases of these properties match.See:
Manage Application-Defined Metadata Propagation to configure.
Application-Defined Metadata for more information.
Added in version 2.2.0.
Additional Information#
See also https://quarkus.io/guides/all-config.