App configuration (fly.toml)
You can configure an app for deployment on Fly.io using a fly.toml
file. Configuration of builds, environment variables, internet-exposed services, disk mounts, and release commands go here. fly.toml
configuration applies for apps managed by Fly Launch commands.
App configuration files
Most of the time you’ll use the fly.toml
file that you get automatically when you run fly launch
to create an app. There are also ways to re-use config files and to generate them in different formats.
Ways to get a config file
- Run
flyctl launch
in your project source directory to create a new app andfly.toml
file automatically. - Run
flyctl config save -a <existing-app-name>
to download afly.toml
file from an existing app. - Create one by hand with help from this reference, or copy and modify an example file.
Config file formats
The default configuration file generated by Fly Launch is called fly.toml
.
TOML is a simple configuration file format. If you’re a VSCode user, then you can install the Even Better TOML extension for automatic fly.toml
validation and hints drawn from this documentation.
If you want your config file in JSON or YAML format, use the --json
and --yaml
options in flyctl commands:
- Add the
--yaml
or--json
options tofly launch
. - For existing apps, run
fly config save -a <existing-app-name
and specify--yaml
or--json
. Remove yourfly.toml
file when done as it takes precedence. - Run
fly config show --local
to preview different formats in your terminal.fly config show
defaults to JSON, but you can also specify--toml
or--yaml
options.
The app
name
The first key/value in any fly.toml
file is the application name. This will also be used to create the host name that the application will use by default. For example:
app = "restless-fire-6276"
Whenever flyctl
is run, it will look for a fly.toml
file in the current directory and use the application name in that file. This behavior can be overridden by using the -a
flag to set the application name, or on some commands (such as deploy
) by using a -c
flag to point to a different fly.toml
file.
Primary region
fly deploy
uses the primary_region
option to determine where to create new Machines, as well as to set the PRIMARY_REGION
environment variable within the Machines it deploys. Replace ord
with the three-letter code for your Fly Region of choice.
primary_region = "ord"
Runtime options
The following options are available to control the lifecycle of a running application. These are optional and can be placed at the top level of the fly.toml
file:
kill_signal
option
When shutting down a Fly Machine, by default, Fly.io sends a SIGINT
signal to the running process. Typically this triggers a hard shutdown option on most applications. The kill_signal
option allows you to change what signal is sent so that you can trigger a softer, less disruptive shutdown. Options are SIGINT
(default), SIGTERM
, SIGQUIT
, SIGUSR1
, SIGUSR2
, SIGKILL
, or SIGSTOP
. For example, to set the kill signal to SIGTERM, you would add:
kill_signal = "SIGTERM"
kill_timeout
option
The time to wait, in seconds, before stopping a Machine after sending the SIGINT
signal or the signal set by kill_signal
. Set kill_timeout
to a value that gives your app enough time to exit gracefully. The default setting is 5 seconds. The maximum kill_timeout
is 300 seconds (five minutes).
For example, to set the timeout to two minutes:
kill_timeout = 120
Console command
The command to run when you run the fly console
command. Configure the console_command
field with the command that opens your framework’s console, and then fly console
will run that command automatically in a new, dedicated Machine. The new Machine is configured with the image and environment from your app’s latest release, but your app isn’t started, and no traffic will be routed to it. The Machine gets destroyed when you exit the console.
Here’s an example of a console command for Django:
console_command = "/code/manage.py shell"
swap_size_mb
option
Setting this option enables Linux swap on Machines. A swap partition is created with size swap_size_mb
, expressed in megabytes.
Swapping to disk can help avoid out-of-memory crashes on brief spikes in memory use. Swap is much slower than RAM, so if performance is important, a better solution is to increase the Machine memory with fly scale memory
.
swap_size_mb = 512
The build
section
The optional build section contains key/values concerned with how the application should be built. You can read more about builders in Builders and Fly
builder
[build]
builder = "paketobuildpacks/builder:base"
buildpacks = ["gcr.io/paketo-buildpacks/nodejs"]
The builder “builder” uses CNB Buildpacks and Builders to create the application image. These are third party toolkits which can use Heroku compatible build processes or other tools. The tooling is all managed by the buildpacks and buildpacks are assembled into CNB Builders - images complete with the buildpacks and OS to run the tool chains.
In our example above, the builder is being set to use Paketo’s all-purpose builder with the NodeJS buildpack.
Specify a Docker image
[build]
image = "flyio/hellofly:latest"
The image builder is used when you want to immediately deploy an existing public image. When deployed, there will be no build process; the image will be prepared and uploaded to Fly.io infrastructure as is. This option is useful if you already have a working Docker image you want to deploy on Fly.io or you want a well known Docker image from a repository to be run.
Specify a Dockerfile
[build]
dockerfile = "Dockerfile.test"
dockerfile
accepts a relative path to a Dockerfile, or a URL. By default, flyctl
looks for Dockerfile
in the application root.
Gotchas:
- This option will not change the Docker context path, which is set to the project root directory by default. If you want the
Dockerfile
to use its containing directory as the context root, usefly deploy <directory>
. - When specifying a local Dockerfile, make sure it’s not excluded from the Docker build context in your
.dockerignore
.
Specify a Docker ignore file
[build]
ignorefile = "/path/.dockerignore"
ignorefile
accepts a relative path to a .dockerignore
file. By default, flyctl
looks for the .dockerignore
file in the working directory.
Specify a multistage Docker build target
[build]
build-target = "test"
If your Dockerfile has multiple stages, you can specify one as the target for deployment. The target stage must have a CMD
or ENTRYPOINT
set.
Specify Docker build arguments
You can pass build-time arguments to both Dockerfile and Buildpack builds using the [build.args]
sub-section:
[build.args]
USER="plugh"
MODE="production"
You can also pass build arguments to flyctl deploy
using --build-arg
. Command line args take priority over args with the same name in fly.toml
.
Note that build arguments are not available in the runtime container. If you need build information at runtime - like a Git revision - store it in a file at build time, like:
RUN echo $GIT_REVISION > REVISION
Likewise, application environment variables and secrets are not available to builds.
The deploy
section
This section configures deployment-related settings such as the release command or deployment strategy.
Run one-off commands before releasing a deployment
To run a command in a temporary Machine—using the app’s successfully built Docker image—before the release is deployed, define a release_command
:
[deploy]
release_command = "bin/rails db:prepare"
The release_command
value replaces CMD
in the temporary Machine. This is useful for running database migrations before app Machines are created or updated with the new release. Note that the Docker image’s ENTRYPOINT
is not overridden by the release_command
; ENTRYPOINT
always runs.
The temporary Machine has full access to the network, environment variables and secrets, but not to persistent volumes. Changes made to the file system on the temporary Machine will not be retained or deployed. The building/compiling of your project should be done in your Dockerfile. If you need to modify persistent volumes or configure your application, consider making use of CMD
or ENTRYPOINT
in your Dockerfile, or of a process group command.
The temporary Machine inherits the size from the largest Machine in the default process group of the app as of flyctl v0.0.508 (they also default larger on empty/new apps, using the Machine shared-cpu-2x
preset). The default process group is defined as either the app
process, or the first process group in alphabetical order (if an app
process is not present).
A non-zero exit status from this command will stop the deployment. fly deploy
will display logs from the command. Logs are available via fly logs
as well.
To ensure the command runs in a specific region, such as dfw
, set PRIMARY_REGION = 'dfw'
in your application environment in fly.toml
or with fly deploy -e PRIMARY_REGION=dfw
. Setting PRIMARY_REGION
is important if you’re running database replicas in multiple regions.
The environment variable RELEASE_COMMAND=1
is set within the temporary release Machine. You can use this to define behavior in your Dockerfile’s ENTRYPOINT
that’s conditional on being run on a release Machine.
By default, the release command has 5 minutes to complete before it is killed. It is possible to increase or decrease the timeout with fly deploy --release-command-timeout=10m
or by setting release_command_timeout = "10m"
in [deploy]
section of fly.toml
.
Picking a deployment strategy
[deploy]
strategy = "bluegreen"
strategy
controls the way a new release replaces the previous release. Different strategies offer trade-offs between downtime and reliability.
strategy
may also be specified at deploy time with flyctl deploy --strategy
.
The available strategies are:
rolling: The default strategy for apps with or without volumes. One by one, each running Machine is taken down and replaced by a new release Machine.
immediate: Replace all Machines with new releases immediately without waiting for health checks to pass. This is useful in emergency situations where you’re confident about release health and can’t wait for health checks.
canary: Boots a single, new Machine with the new release, verifies its health, and then proceeds with a rolling
restart strategy.
bluegreen: For every running Machine, a new one is booted alongside it in the same region. Once all of the new Machines pass health checks, traffic gets migrated to the new Machines and the old Machines are destroyed. If your app is scaled to 2 or more Machines, this strategy can reduce deploy time by running tasks in parallel. You need to configure at least one health check to use the bluegreen
strategy. The bluegreen
strategy doesn’t work if Machines have volumes attached.
Note: If max-per-region
is set to 1, then the default strategy is set to rolling
. This happens because canary
needs to temporarily run more than one Machine to work correctly. The bluegreen
strategy will behave similarly with max-per-region
set to 1.
Rolling deploy configuration
[deploy]
strategy = "rolling"
max_unavailable = 1
For rolling deploys, you can use max_unavailable
to control how many Machines can be down at a time.
Whole number values, greater than or equal to one, specify exactly how many Machines can be down at a time. For example, a value of “1” would update one-at-a-time.
Fractional values, between zero and one, provide a percentage of Machines that can be down at a time. For example, the default value of 0.33 means that a maximum of one third of your Machines can be down during a deploy.
Dealing with timeout errors while deploying a new version
Every time fly deploy
runs, it builds a new docker image, pushes it to an internal registry, and then updates or creates Machines for the app. Sometimes the image is too large, or the platform is slower than usual pulling the new image layers, triggering the default 5 minute timeout waiting for the Machine to be in a started state.
The good thing is that this timeout can be controlled in two ways, with the --wait-timeout
option, for example fly deploy --wait-timeout=10m
, or as a more permanent fly.toml
setting:
[deploy]
wait_timeout = "10m"
The env
variables section
[env]
LOG_LEVEL = "debug"
RAILS_ENV = "production"
S3_BUCKET = "my-app-production"
This optional section allows setting non-sensitive information as environment variables in the application’s runtime environment.
For sensitive information, such as credentials or passwords, use the secrets CLI command.
Env variable names are strictly case-sensitive and cannot begin with FLY_
(as this could clash with the runtime environment). Env values can only be strings.
Secrets take precedence over env variables with the same name.
Note: In Apps V2, the primary_region
option sets the PRIMARY_REGION
environment variable within a Machine and overrides any value set in the [env]
section.
The http_service
section
For apps that only need HTTP and HTTPS services, you can replace the [[services]]
section with this simpler alternative.
An [http_service]
section defines a service that listens on ports 80 and 443. Port 80 will have an HTTP handler. Port 443 will have a TLS and HTTP handler. You can configure additional services on different ports by adding [[services]]
sections.
As with the more verbose [[services]]
, you can specify a list of processes to limit the service definition to Machines belonging to process groups that should receive HTTP requests.
[http_service]
internal_port = 8080
force_https = true
auto_stop_machines = "stop"
auto_start_machines = true
min_machines_running = 0
[http_service.concurrency]
type = "requests"
soft_limit = 200
hard_limit = 250
processes
: For apps with multiple processes. The process group that this service belongs to. Define process groups in the processes section.internal_port
: The port this service (and application) will use to communicate with clients. The default is 8080. We recommend applications use the default.force_https
: A Boolean which determines whether to enforce HTTP to HTTPS redirects.auto_stop_machines
: The action, if any, that Fly Proxy should take when the app is idle for several minutes. Options are"off"
,"stop"
, or"suspend"
. If"off"
, Fly Proxy will never stop Machines. If"stop"
, Fly Proxy stops Machines when the app has excess capacity. If"suspend"
, Fly Proxy suspends Machines (if possible) when the app has excess capacity. Starting a Machine from asuspended
state is faster than starting a Machine from astopped
state, but there are some caveats. If there’s only one Machine in a region, then the Machine is stopped or suspended if it has no traffic. The Fly Proxy runs a process to automatically stop Machines every few minutes. The default if not set is"off"
.auto_start_machines
: Whether to automatically start an application’s Machines when a new request is made to the application and there’s no excess capacity, per region. If there’s only one Machine in a region, then it’s started whenever a request is made to the application. The default if not set istrue
.min_machines_running
: The number of Machines to keep running, in the primary region only, whenauto_stop_machines
is"stop"
or"suspend"
. The default if not set is0
.
We recommend configuring auto_stop_machines
and auto_start_machines
so that they are both enabled or both disabled, to avoid having Machines that either never start or never stop. Learn more about how Fly Proxy autostop/autostart works, including how Fly Proxy determines excess capacity in a region using the soft_limit
setting.
http_service.concurrency
The http_service
concurrency section configures how to measure load for an application to inform Fly Proxy load balancing and autostop/autostart. The [http_service.concurrency]
section has the same settings as [services.concurrency]
, which are:
type
specifies what metric is used to determine when to auto start or stop, or when a given Machine should receive more or less traffic (load balancing). The two supported values areconnections
andrequests
.
connections: Load balance and scale based on the number of concurrent TCP connections. This is the default when unspecified. This is also the default when fly.toml
is created with fly launch
. A new connection is established for each HTTP request; consider the requests
type for HTTP apps.
requests: Load balance and scale based on the number of HTTP requests. This is recommended for web services, because the Fly Proxy can pool and reuse connections for requests.
hard_limit
: When a Fly Machine is at or over this number of concurrent connections or requests, the system will stop sending new traffic to that Machine. If unset, nohard_limit
is enforced.soft_limit
: When a Fly Machine is at or over this number of concurrent connections or requests, the system will deprioritize sending new traffic to that Machine and only send it to that Machine if all other Machines are also at or above theirsoft_limit
. This setting is also used to determine excess capacity for the autostop/autostart feature. If unset, the default is 20.
For more information about concurrency settings, see Guidelines for concurrency settings.
http_service.http_options.idle_timeout
Configure an idle-timeout for connections to your app.
[http_service.http_options]
idle_timeout = 600
http_service.http_options.response.pristine
Configures Fly Proxy to not add any Fly headers to HTTP responses. The following response headers won’t be added and won’t be modified if returned by the app:
Server
Via
Fly-Request-Id
Fly-Cache-Status
This is useful if you are building a platform on top of Fly and have your own load balancer that already adds similar response headers.
[http_service.http_options.response]
pristine = true
http_service.http_options.response.headers
Add or remove HTTP response headers.
In the following example, Example-Header
will be removed from the final response that Fly Proxy sends, while Example-Header-1
and Example-Multi-Value
and their values will be added to the response header.
[http_service.http_options.response.headers]
Example-Header = false
Example-Header-1 = "value"
Example-Multi-Value = ["value1", "value2"]
http_service.http_options.h2_backend
Indicates whether the app supports HTTP/2 cleartext (H2C) with prior knowledge or not.
In the following example, h2_backend
is set to true
, which allows the app to expose HTTP/2-only service, like gRPC, via http
handler.
[http_service.http_options]
h2_backend = true
http_service.tls_options
Configure the TLS versions and ALPN protocols that Fly’s edge will use to terminate TLS for your application with:
[http_service.tls_options]
alpn = ["h2", "http/1.1"]
versions = ["TLSv1.2", "TLSv1.3"]
default_self_signed = false
alpn
: Array of strings indicating how to handle ALPN negotiations with clients.versions
: Array of strings indicating which TLS versions are allowed.default_self_signed
: Whentrue
, serve a self-signed certificate if no certificate exists. Default isfalse
.
Fly.io can also terminate TLS only and pass through directly to your service. For more information, refer to services.ports.tls_options
http_service.checks
To configure health checks for your HTTP service, you can use the http_service.checks
section. These checks expect a successful HTTP status in response (i.e, 2xx). Here is an example of a http_service.checks
section:
[[http_service.checks]]
grace_period = "10s"
interval = "30s"
method = "GET"
timeout = "5s"
path = "/"
Roughly translated, this section says every thirty seconds, perform an HTTP GET on the root path (e.g. http://appname.fly.dev/) looking for it to return an HTTP 200 status within five seconds. The parameters of a check
are listed below.
Times are in milliseconds unless units are specified.
grace_period
: The time to wait after a Machine starts before checking its health. Make sure this is long enough for your app to start up. For example, if your app takes 2 seconds to start up, give it some runway by settinggrace_period
to at least 3 seconds.interval
: The time between connectivity checks. There should be a balance between the interval and the grace period. If it’s long and your grace_period shorter than your app’s startup time, health check will take too long adding you your deployment time.timeout
: The maximum time a connection can take before being reported as failing its health check.method
: The HTTP method to be used for the check.path
: The path of the URL to be requested.protocol
: The protocol to be used (http
orhttps
).tls_server_name
: If the protocol ishttps
, the hostname to use for TLS certificate validation.tls_skip_verify
: Whentrue
(and using HTTPS protocol) skip verifying the certificates sent by the server.http_service.checks.headers
: This is a sub-section ofhttp_service.checks
. It uses the key/value pairs as a specification of header and header values that will get passed with the check call.
The http_service.machine_checks
section
You can use the same machine_checks
section for HTTP services as for services
. The machine_checks
section defines parameters for checking the health of a service.
[http_service.machine_checks]
image = "curlimages/curl"
entrypoint = ["/bin/sh", "-c"]
command = ["curl http://[$FLY_TEST_MACHINE_IP] | grep 'Hello, World!'"]
kill_signal = "SIGKILL"
kill_timeout = "5s"
The services
sections
The services
sections define how Fly Proxy connects requests that hit an app’s public Anycast or private Flycast address to services running within Machines, and configure other Fly Proxy behavior for a service. If a service only needs HTTP and HTTPS on standard ports, you can use the less verbose http_service
.
A services
section itself is a table of tables in TOML, so it is delimited with double square brackets. Tables within [[services]]
configure additional features and behaviors for the service, and are described in subsequent sections.
At least one services.ports
entry is required for each services
section, to set a port and handler for incoming requests.
An app can have:
- No
services
section (and nohttp_service
section): The application cannot be reached from the public internet, nor by a Flycast address; this is typical of apps that talk only over 6PN private networking to other apps on the same network. - One
services
section (or anhttp_service
section): One internal port mapped to one or more external ports. - Multiple
services
sections (or anhttp_service
section and one or moreservices
sections): Mapping multiple internal ports to multiple external ports.
Example (note the double square brackets):
[[services]]
internal_port = 8080
protocol = "tcp"
auto_stop_machines = "stop"
auto_start_machines = true
min_machines_running = 0
Settings:
processes
: For apps with multiple process groups, the process group or groups that this service belongs to. Define process groups in the processes section.internal_port
: The port this service (and application) will use to communicate with clients. The default is 8080. We recommend applications use the default.protocol
: The protocol that this service will use to communicate. Typicallytcp
for most applications, but can also beudp
.auto_stop_machines
: The action, if any, that Fly Proxy should take when the app is idle for several minutes. Options are"off"
,"stop"
, or"suspend"
. If"off"
, Fly Proxy will never stop Machines. If"stop"
, Fly Proxy stops Machines when the app has excess capacity. If"suspend"
, Fly Proxy suspends Machines (if possible) when the app has excess capacity. Starting a Machine from asuspended
state is faster than starting a Machine from astopped
state, but there are some caveats. If there’s only one Machine in a region, then the Machine is stopped or suspended if it has no traffic. The Fly Proxy runs a process to automatically stop Machines every few minutes. The default if not set is"off"
.auto_start_machines
: Whether to automatically start an application’s Machines when a new request is made to the application and there’s no excess capacity, per region. If there’s only one Machine in a region, then it’s started whenever a request is made to the application. The default if not set istrue
.min_machines_running
: The number of Machines to keep running, in the primary region only, whenauto_stop_machines
is"stop"
or"suspend"
. The default if not set is0
.
We recommend configuring auto_stop_machines
and auto_start_machines
so that they are both enabled or both disabled, to avoid having Machines that either never start or never stop. Learn more about how Fly Proxy autostop/autostart works, including how Fly Proxy determines excess capacity in a region using the soft_limit
setting.
services.ports
For each services
section in your fly.toml
, i.e. for each external port you want to accept connections on, you need a services.ports
section. The section is denoted by double square brackets like this:
[[services.ports]]
handlers = ["http"]
port = 80
force_https = true # optional
This example defines an HTTP handler on port 80.
handlers
: An array of strings, each string selecting a handler process to terminate the connection with at the edge. Here, thehttp
handler will accept HTTP traffic and pass it on to theinternal_port
of the application, which we defined in theservices
section above. For the list of available handlers, and how they manage network traffic, see the Public Network Services documentation.port
: An integer representing the external port to listen on (ports 1-65535).start_port
: For a port range, the first port to listen on.end_port
: For a port range, the last port to listen on.force_https
: A Boolean which determines whether to enforce HTTP to HTTPS redirects.
You can have more than one services.ports
section. The default configuration, for example, contains two. We’ve already seen one above. The second one defines an external port 443 for secure connections, using the tls
handler.
[[services.ports]]
handlers = ["tls", "http"]
port = 443
For UDP applications, make sure to bind the application to the same port as defined in the relevant services.ports
section. For example, the configuration below will listen on port 5000 and the application will need to bind to fly-global-services:5000
to receive traffic. Leave handlers
unset for UDP services.
[[services]]
internal_port = 5000
protocol = "udp"
[[services.ports]]
port = 5000
Instead of using multiple port definitions, you can specify a range of ports. For example, the configuration below will listen on the ports 8080
, 8081
, 8082
, 8083
, 8084
and 8085
:
[[services.ports]]
handlers = ["tls"]
start_port = 8080
end_port = 8085
services.ports.http_options.idle_timeout
Configure an idle-timeout for connections to your app.
[services.ports.http_options]
idle_timeout = 600
services.ports.http_options.response.pristine
Configures Fly Proxy to not add any Fly headers to HTTP responses. The following response headers won’t be added and won’t be modified if returned by the app:
Server
Via
Fly-Request-Id
Fly-Cache-Status
This is useful if you are building a platform on top of Fly and have your own load balancer that already adds similar response headers.
[services.ports.http_options.response]
pristine = true
services.ports.http_options.response.headers
Add or remove HTTP response headers.
In the following example, Example-Header
will be removed from the final response that Fly Proxy sends, while Example-Header-1
and Example-Multi-Value
and their values will be added to the response header.
[services.ports.http_options.response.headers]
Example-Header = false
Example-Header-1 = "value"
Example-Multi-Value = ["value1", "value2"]
services.ports.http_options.h2_backend
Indicates whether the app supports HTTP/2 cleartext (H2C) with prior knowledge or not.
In the following example, h2_backend
is set to true
, which allows the app to expose HTTP/2-only service, like gRPC, via http
handler.
[services.ports.http_options]
h2_backend = true
services.ports.proxy_proto_options
Configure the version of the PROXY protocol that your app accepts. Version 1 is the default.
For example:
[[services.ports]]
handlers = ["proxy_proto"]
port = 5000
proxy_proto_options = { version = "v2" }
version
: A string to indicate that the TCP connection uses PROXY protocol version 2. The default when not set is version 1.
services.ports.tls_options
Configure the TLS versions and ALPN protocols that Fly’s edge will use to terminate TLS for your application with:
[[services.ports]]
handlers = ["tls", "http"]
port = 443
tls_options = { "alpn" = ["h2", "http/1.1"], "versions" = ["TLSv1.2", "TLSv1.3"] }
alpn
: Array of strings indicating how to handle ALPN negotiations with clients.versions
: Array of strings indicating which TLS versions are allowed.default_self_signed
: Whentrue
, serve a self-signed certificate if no certificate exists. Default isfalse
.
Fly.io can also terminate TLS only and pass through directly to your service. This works for a variety of applications that can benefit from offloading TLS termination and accept the unencrypted connection.
One use case is applications using HTTP/2, like gRPC. Fly’s edge terminates TLS and sends h2c (HTTP/2 without TLS) directly to your application through our backhaul. The config below will negotiate HTTP/2 with clients, and then send h2c to the application:
[[services.ports]]
handlers = ["tls"]
port = 443
tls_options = { "alpn" = ["h2"] }
services.concurrency
The services concurrency sub-section configures how to measure load for an application to inform Fly Proxy load balancing and autostop/autostart.
This section is a simple list of key/values, so the section is denoted with single square brackets like so:
[services.concurrency]
type = "connections"
hard_limit = 25
soft_limit = 20
type
specifies what metric is used to determine when a given Machine has reached a concurrency limit. The two supported values are connections
and requests
.
connections: Load balance and scale based on the number of concurrent TCP connections. This is the default when unspecified. This is also the default when fly.toml
is created with fly launch
. A new connection is established for each HTTP request; consider the requests
type for HTTP apps.
requests: Load balance and scale based on the number of HTTP requests. This is recommended for web services, because the Fly Proxy can pool and reuse connections for requests.
hard_limit
: When a Fly Machine is at or over this number of concurrent connections or requests, the system will stop sending new traffic to that Machine. If unset, nohard_limit
is enforced.soft_limit
: When a Fly Machine is at or over this number of concurrent connections or requests, the system will deprioritize sending new traffic to that Machine and only send it to that Machine if all other Machines are also at or above theirsoft_limit
. This setting is also used to determine excess capacity for the autostop/autostart feature. If unset, the default is 20.
For more information about concurrency settings, see Guidelines for concurrency settings.
services.tcp_checks
When a service is running, Fly Proxy can check up on it by connecting to a port. The services.tcp_checks
section defines parameters for those checks. For example, the default tcp_checks
looks like this:
[[services.tcp_checks]]
grace_period = "1s"
interval = "15s"
restart_limit = 0
timeout = "2s"
Times are in milliseconds unless units are specified.
grace_period
: The time to wait after a Machine starts before checking its health. Make sure this is long enough for your application to start up. For example if your app takes 2 seconds to start up, give it some runway by setting this to at least 3 seconds.interval
: The time between connectivity checks. If the interval is long, and thegrace_period
is shorter than your app’s startup time, then the health check will take longer and will add to your deployment time.timeout
: The maximum time a connection can take before being reported as failing its health check.
services.http_checks
Another way of checking a service is running is through HTTP checks as defined in the services.http_checks
section. These checks are more thorough than services.tcp_checks
as they require not just a connection but a successful HTTP status in response (i.e, 2xx). Here is an example of a services.http_checks
section:
[[services.http_checks]]
interval = 10000
grace_period = "5s"
method = "get"
path = "/"
protocol = "http"
timeout = 2000
tls_skip_verify = false
[services.http_checks.headers]
Roughly translated, this section says every ten seconds, perform an HTTP GET on the root path (e.g. http://appname.fly.dev/) looking for it to return an HTTP 200 status within two seconds. The parameters of a http_check
are listed below.
Times are in milliseconds unless units are specified.
grace_period
: The time to wait after a Machine starts before checking its health. Make sure this is long enough for your app to start up. For example, if your app takes 2 seconds to start up, give it some runway by settinggrace_period
to at least 3 seconds.interval
: The time between connectivity checks. There should be a balance between the interval and the grace period. If it’s long and your grace_period shorter than your app’s startup time, health check will take too long adding you your deployment time.timeout
: The maximum time a connection can take before being reported as failing its health check.method
: The HTTP method to be used for the check.path
: The path of the URL to be requested.protocol
: The protocol to be used (http
orhttps
).tls_server_name
: If the protocol ishttps
, the hostname to use for TLS certificate validation.tls_skip_verify
: Whentrue
(and using HTTPS protocol) skip verifying the certificates sent by the server.services.http_checks.headers
: This is a sub-section ofservices.http_checks
. It uses the key/value pairs as a specification of header and header values that will get passed with the http_check call.
Note: The services.http_checks
section is optional and not generated in the default fly.toml
file.
services.machine_checks
Machine checks work a bit differently than the other checks. They run on each deploy, and if they fail, the deploy is stopped. A new Machine is spawned with the environment variable FLY_TEST_MACHINE_IP
set to the 6PN IPv6 address of the Machine being tested. This is useful for running integration tests on Machines before a deployment. Here’s an example:
[[services.machine_checks]]
image = "curlimages/curl"
entrypoint = ["/bin/sh", "-c"]
command = ["curl http://[$FLY_TEST_MACHINE_IP] | grep 'Hello, World!'"]
kill_signal = "SIGKILL"
kill_timeout = "5s"
This example uses the curl
image to run a test. It checks that the Machine is serving a page with the text “Hello, World!”.
image
: The Docker image to use for the test. We default to the one used for the process group the Machine is in.entrypoint
: The entrypoint for the test. Defaults to the entrypoint of the Machine being tested if not setcommand
: The command to run for the test.kill_signal
: The signal to send to the test process if it runs too long. Defaults to the signal of the image, if a custom image is set.kill_timeout
: The time to wait before sending the kill signal. Defaults to the timeout of the image, if a custom image is set.
Machine checks are especially useful for canary deploys. flyctl
will spawn a new Machine, ensure all machine capabilities are functional, and then deploy the rest of the Machines in your app.
The mounts
section
This section supports the Volumes feature for persistent storage. The section has two required entries: source
and destination
.
[mounts]
source = "myapp_data"
destination = "/data"
processes = ["disk"] # optional - attach volumes to Machines that belong to one or more process groups
initial_size = "20gb" # optional - the size of the volume created on first deploy
source
The source
is a volume name that this app should mount. Any volume with this name, in the same region as the app and that isn’t already mounted, may be mounted. A volume of this name must exist in some region for the application to deploy.
destination
The destination
is the directory where the source
volume should be mounted on the running app. This cannot be /
since that’s where the root file system is mounted.
processes
Optionally, you can specify a list of processes to limit volume mounts by process group. You can even specify two different [[mounts]]
sections to mount different source volumes to Machines in different process groups. Note the need to use double brackets if there are multiple [[mounts]]
defined.
initial_size
Optionally, you can specify the size of the volume to be created when launching an app for the first time.
This value is only used by fly launch
and fly deploy
commands in case they need to create a new volume; it is ignored by the fly volume create
command.
The value can be a string with units, like initial_size = "30GB"
for example. The value can also be an integer, like initial_size = 30
for example, with GB as the default unit.
snapshot_retention
Optionally, you can specify the number of days snapshots of the volumes in this app are retained.
The default is 5 days when unset. The minimum is 1 day. The maximum is 60 days.
For example, the following config retains snapshots of volumes for 14 days:
[mounts]
source = "myapp_data"
destination = "/data"
snapshot_retention = 14
auto_extend_size_threshold
Optional. The threshold of storage used on a volume, by percentage, that triggers extending the volume’s size by the value of auto_extend_size_increment
,
unless the resulting size would exceed auto_extend_size_limit
.
auto_extend_size_increment
The increment, in GB, by which to extend the volume after reaching the auto_extend_size_threshold
. Required with auto_extend_size_threshold
.
auto_extend_size_limit
Maximum size, in GB, of a volume after an extension is completed. Required with auto_extend_size_threshold
.
Auto extend volume size configuration
You can optionally configure volumes to automatically extend when they reach a usage threshold.
For example, the following config extends the size of the volume by 1GB when it reaches 80% capacity. The volume extensions are limited to 5GB in total. auto_extend_size_limit
is optional.
[[mounts]]
source = "data"
destination = "/data"
auto_extend_size_threshold = 80
auto_extend_size_increment = "1GB"
auto_extend_size_limit = "5GB"
The vm
section
This section defines the compute requirements for the Machines used for the application.
The default Machine size is shared-cpu-1x
but it is not enforced if not specified in fly.toml
. It means commands like fly deploy
won’t attempt to update the compute requirements (or size) for a Machine. fly scale
commands will use existing Machines to infer new Machine sizes, and in the event that there are no Machines, they will use shared-cpu-1x
.
If you care about a predictable scaling up from zero case, or if you have different compute requirements for different process groups, then it is highly recommended to add this section to fly.toml
. Once compute requirements are set, fly deploy
and fly scale count
commands will enforce them. If you change the size of the Machines using fly scale vm
(or its sibling fly scale memory
) then it will be reset on next fly deploy
unless fly.toml
is updated accordingly. Learn more about Machine size configuration precedence.
All keys are optional and size
has lower precedence than all other keys.
[[vm]]
size = "shared-cpu-2x"
memory = "2gb"
cpus = 4
cpu_kind = "performance"
gpus = 1
gpu_kind = "a100-pcie-40gb"
kernel_args = "no-hlt=true"
host_dedication_id = "customer-id"
processes = ["app"]
size
The Machine preset size to use as base, like size = "shared-cpu-1x"
for example.
To get the full list, run fly platform vm-sizes
or check the pricing page.
memory
The memory to request. It can be expressed with units, like memory = "2GB"
or memory = "512mb"
for example. The value can also be an integer, like memory = 1024
for example, with MB as the default unit.
cpus
The number of vCPUs to request. Valid values are 1
, 2
, 4
, 8
, or 16
, but depends on cpu_kind
.
cpu_kind
The kind of CPU to request. Valid values are shared
and performance
.
gpus
The number of GPUs to request. Valid values are 1
, 2
, 4
, 8
, but depends on gpu_kind
.
Setting this value requires also setting gpu_kind
.
gpu_kind
The kind of GPU to request. Valid values are a10
, l40s
, a100-pcie-40gb
and a100-sxm4-80gb
.
Setting this value assumes gpus = 1
if not present.
kernel_args
Additional kernel parameters provided to the kernel when booting the VM.
host_dedication_id
In the case of having a dedicated host, this is the value to set so Machines are launched on dedicated hardware.
processes
Optionally, you can specify a list of processes to limit by process group. You can even specify two different [[vm]]
sections to have different compute requirements per process group. Note the need to use double brackets if there are multiple [[vm]]
sections defined.
A [[vm]]
section without a processes
key applies to all process groups, except when another [[vm]]
section targets a specific process group. For example the following snippets uses shared-cpu-4x
for app
and other
process groups but performance-1x
for worker
group.
[processes]
app = "/start-app"
worker = "/start-worker"
other = "/start-other"
[[vm]]
size = "shared-cpu-4x"
[[vm]]
size = "performance-1x"
processes = ["worker"]
The restart
section
[[restart]]
policy = "never"
retries = 10
processes = ["app"]
When a machine unexpectedly exits, our scheduling machinery follows a machine’s restart policy to restart it without your intervention. These policies are quite similar to docker’s container restart policies:
- always: we’ll attempt to restart the machine no matter the exit code.
- never: we won’t restart the machine even if it exits with a non-zero exit code.
- on-failure: we’ll only restart the machine if it exited with a non-zero exit code (due to a failure or crash). This is the default policy if one is not explicitly set.
A restart policy can be targeted to a specific process group. If a group is not specified, all machines in an app will have the same default restart policy. You can also specify the number of times we should retry restarting the machine before giving up.
The checks
section
If your app doesn’t have public-facing services, or you want independent health checks that don’t affect request routing,
use this top-level checks
section instead of [[services.checks]]
.
Unlike service-level checks, top-level checks require:
- A port number
- A unique name
- The type of check (
http
ortcp
)
[checks]
[checks.name_of_your_http_check]
grace_period = "30s"
interval = "15s"
method = "get"
path = "/path/to/status"
port = 5500
timeout = "10s"
type = "http"
[checks.name_of_your_http_check.headers]
Content-Type = "application/json"
Authorization = "super-secret"
[checks.name_of_your_tcp_check]
grace_period = "30s"
interval = "15s"
port = 1234
timeout = "10s"
type = "tcp"
Fields are very similar to [[services.checks]]
:
port
: Internal port to connect to. Needs to be available on0.0.0.0
. Required.type
: Eithertcp
orhttp
. Required.grace_period
: The time to wait after a Machine starts before checking its health. Make sure you give your app enough time to start up. For example if your app takes 2 seconds to start up, give it some runway by setting this to at least 3 seconds.interval
: The time between check runs. If yourgrace_period
is shorter than your app’s startup time, andinterval
is too long, checks will increase deployment times.processes
: For apps with multiple processes. The process group to apply the health checks to. Define process groups in the processes section.
For HTTP checks only:
method
: The HTTP method to be used for the check.path
: The path of the URL to be requested.timeout
: The maximum time a connection can take before being reported as failing its health check.headers
: Specify key/value pairs will get passed as HTTP headers on the check request.
Again, times are in milliseconds unless units are specified.
The processes
section
The processes
section allows you to define process groups to be run on separate Machines within a single app. Learn more about running multiple process groups in an app.
Each Machine can run a different command on start, allowing you to re-use your code base for different tasks (web server, queue worker, etc).
To run multiple processes, you’ll need a [processes]
block containing a map of a name and command to start the application.
[processes]
web = "bundle exec rails server -b [::] -p 8080"
worker = "bundle exec sidekiqswarm"
Furthermore, you can “match” a specific process (or processes) to an [http_service]
or [[services]]
configuration. For example:
[http_service]
processes = ["web"] # this service only applies to the web process
internal_port = 8080
force_https = true
Volumes can also be assigned to specific processes; use double brackets to include more than one [[mounts]]
section, and mount differently named volumes to Machines in different process groups:
[[mounts]]
source = "data"
destination = "/data"
processes = ["app"]
The metrics
section
Fly apps can be configured to export custom metrics to the Fly.io-hosted Prometheus service.
[metrics]
port = 9091
path = "/metrics" # default for most prometheus exporters
Custom metrics can be also configured for specific processes
, using double brackets to define multiple [[metrics]]
tables:
[[metrics]]
port = 9394
path = "/metrics"
processes = ["web"]
[[metrics]]
port = 9113
path = "/metrics"
processes = ["proxy"]
Check out Metrics on Fly.io for more information about collecting metrics for your apps.
The statics
sections
When statics
are set, requests under url_prefix
that are present as files in guest_path
will be delivered directly to clients, bypassing your web server. These assets are extracted from your Docker image and delivered directly from our proxy on worker hosts.
[[statics]]
guest_path = "/app/public"
url_prefix = "/public"
Each [[statics]]
block maps a URL prefix to a path inside your container. You can have up to 10 mappings in an application.
The “guest path” — the path inside your container where the files to serve are located — can overlap with other static mappings; the URL prefix should not (so, two mappings to /public/foo
and /public/bar
are fine, but two mappings to /public
are not).
Alternatively, you can serve statics directly from object storage using Tigris. Similar to machine statics, requests under url_prefix
are served from static assets in your Tigris bucket under guest_path
. The same rules apply for overlapping URL prefixes.
[[statics]]
guest_path = "/app/public"
url_prefix = "/public"
tigris_bucket = "my-bucket"
Serving statics from Tigris supports index documents. When an index document is specified, requests to the root or any of its subfolders serve the index document.
[[statics]]
guest_path = "/app/public"
url_prefix = "/public"
tigris_bucket = "my-bucket"
index_document = "index.html"
In this configuration, a request to https://example.com/public/
will serve the file /app/public/index.html
stored in my-bucket
. Similarly, a request to https://example.com/public/assets/
, will serve the file /app/public/assets/index.html
.
Caveats
This feature should not be compared directly with a CDN, for the following reasons:
This feature does not exempt you from having to run a web service in your Machine.
Serving an index document is only supported for statics served directly from Tigris. The index document must have the same name in all the relevant locations in your Tigris bucket.
For statics served from your container, it will not find
index.html
at the root. The full path must be requested.You can’t set
Cache-Control
or any other headers on assets. If you need those, you’ll need to deliver them from your application and set the relevant headers.Assets are not delivered, by default, from all edge Fly.io regions. Rather, assets are delivered from the regions the application is deployed in.
statics
does not honor symlinks. So, if/app/public
in your container is actually a symlink to something like/app-39403/public
, you’ll want to use the absolute original path in your statics configuration.
The files
section
When files
are set, the contents from one of raw_value
, local_path
, or secret_name
will be written to the Machine at the provided guest_path
. The contents of both raw_value
and secret_name
must be base64 encoded.
Examples:
[[files]]
guest_path = "/path/to/hello.txt"
raw_value = "aGVsbG8gd29ybGQK"
[[files]]
guest_path = "/path/to/secret.txt"
secret_name = "SUPER_SECRET"
You can optionally restrict which Machine(s) contain the file using the processes field. For example:
[[files]]
guest_path = "/path/to/config.yaml"
local_path = "/local/path/config.yaml"
processes = ["web"]
To remove a previously configured file on the next deployment, either delete the files
entry entirely, or set its source to an empty string like this:
[[files]]
guest_path = "/path/to/config.yaml"
local_path = ""
The experimental
section
This section is for flags and feature settings which have yet to be promoted into the main configuration.
[experimental]
cmd = ["path/to/command", "arg1", "arg2"]
entrypoint = ["path/to/command", "arg1", "arg2"]
exec = ["path/to/command", "arg1", "arg2"]
cmd
This overrides the CMD
set by the Dockerfile. It should be specified as an array of strings, as seen in the example above.
entrypoint
This overrides the ENTRYPOINT
set by the Dockerfile. It should be specified as an array of strings, as seen in the example above.
exec
This overrides both the CMD
and the ENTRYPOINT
set by the Dockerfile. It should be specified as an array of strings, as seen in the example above.