etcdv3-ruby Gem Version Build Status codecov

Ruby client for Etcd V3

Getting Started


To install etcdv3, run the following command:

gem install etcdv3

Establishing a connection

require 'etcdv3'

# Insecure connection
conn = ',,')

# Secure connection using default certificates
conn = 'https://hostname:port')

# Secure connection with Auth
conn = 'https://hostname:port', user: 'root', password: 'mysecretpassword')

# Secure connection specifying custom certificates
# Coming soon...

High Availability

In the event of a failure, the client will work to restore connectivity by cycling through the specified endpoints until a connection can be established. With that being said, it is encouraged to specify multiple endpoints when available.

However, sometimes this is not what you want. If you need more control over failures, you can suppress this mechanism by using

conn = 'https://hostname:port', allow_reconnect: false)

This will still rotate the endpoints, but it will raise an exception so you can handle the failure yourself. On next call to the new endpoint (since they were rotated) is tried. One thing you need to keep in mind if auth is enabled, you need to take care of GRPC::Unauthenticated exception and manually re-authenticate when token expires. To reiterate, you are responsible for handling the errors, so some understanding of how this gem and etcd works is recommended.

Adding, Fetching and Deleting Keys

 # Put
 conn.put('foo', 'bar')

 # Get

 # Get actual value
 value = conn.get('my').kvs.first.value

 # Get Key Range
 conn.get('foo', range_end: 'foo80')

 # Delete Key

 # Delete Key Range
 conn.del('foo', range_end: 'foo80')

User Management

# Add User
conn.user_add('admin', 'secret')

# Delete User

# Get User

# List Users

Role Management

# Add Role

# Grant Permission to Role
conn.role_grant_permission('admin', :readwrite, 'foo', 'foo99')

# Delete Role

# List Roles

Authentication Management

# Configure a root user
conn.user_add('root', 'mysecretpassword')

# Grant root role to root user
conn.user_grant_role('root', 'root')

# Enable Authentication

After you enable authentication, you must authenticate.

# This will generate and assign an auth token that will be used in future requests.
conn.authenticate('root', 'mysecretpassword')

Disabling auth will clear the auth token and all previously attached user information



# Grant a lease with a 100 second TTL

# Attach key to lease
conn.put('foo', 'bar', lease: 1234566789)

# Get information about lease and its attached keys

# Revoke lease and delete all keys attached


Transactions provide an easy way to process multiple requests in a single transaction.

Note: You cannot modify the same key multiple times within a single transaction.

conn.transaction do |txn| = [
    # Is the value of 'target_key' equal to 'compare_value'
    txn.value('target_key', :equal, 'compare_value'),
    # Is the version of 'target_key' greater than 10
    txn.version('target_key', :greater, 10)

  txn.success = [
    txn.put('txn1', 'success')

  txn.failure = [
    txn.put('txn1', 'failed', lease: lease_id)


# Watch for changes on a specified key for at most 10 seconds and return
events ='foo', timeout: 10)

# Watch for changes on a specified key range and return
events ='foo', range_end: 'fop')

# Watch for changes since a given revision
events ='foo', start_revision: 42)

# Watches for changes continuously until killed.
event_count = 0'boom') do |events|
  puts events
  event_count = event_count + 1
  break if event_count >= 10


# First, get yourself a lease
lease_id = conn.lease_grant(100)['ID']

# Attempt to lock distibuted lock 'foo', wait at most 10 seconds
lock_key = conn.lock('foo', lease_id, timeout: 10).key

# Unlock the 'foo' lock using the key returned from `lock`

# Perform a critical section while holding the lock 'hello'
conn.with_lock('hello', lease_id) do
  puts "kitty!"


# List all active Alarms

# Deactivate ALL active Alarms


The default timeout for all requests is 120 seconds.

# Specify `command_timeout` to override the default global timeout.
conn = 'https://hostname:port', command_timeout: 5) # 5 seconds

# You can also specify request specific timeouts.
conn.get("foo", timeout: 2)

Timeouts apply to and can be set when:

  • Adding, Fetching and Deleting keys
  • User, Role, and Authentication Management
  • Leases
  • Transactions

Note: Timeouts currently do not affect Watch or Maintenance related commands.


If you're looking to get involved, Fork the project and send pull requests.