Edgee acts as a reverse proxy in front of a website, intercepting HTTP requests and running business logic on top of edge networks and CDNs such as Fastly and Cloudflare; the proxy interacts with WebAssembly components to implement features such as data collection for analytics, warehousing, and attribution data.
Once you have a valid configuration file (see next section), you can run the Edgee proxy in different ways, using the installer, Docker or running as a Rust crate.
/var/edgee/cert and /var/edgee/wasm respectively. Feel free to use /local/cert and /local/wasm for local development.
You can install and run edgee locally using the installer script:
$ curl https://install.edgee.ai | shOr via homebrew:
$ brew tap edgee-ai/cli
$ brew install edgeeOnce installed, you can run the local proxy as follows:
$ edgee serveYou can run it using the Docker CLI:
docker run \
-v $PWD/edgee.toml:/app/edgee.toml \
-v $PWD/cert:/var/edgee/cert \
-v $PWD/wasm:/var/edgee/wasm \
-p80:80 \
-p443:443 \
edgeecloud/edgee \
serveOr as part of a docker-compose.yml:
service:
edgee:
image: edgeecloud/edgee
ports:
- "80:80"
- "443:443"
volumes:
- "./edgee.toml:/app/edgee.toml"
- "./cert:/var/edgee/cert"
- "./wasm:/var/edgee/wasm"In case you encounter the error "no match for platform in manifest: not found", simply pull the image as follows:
docker pull edgeecloud/edgee:latest --platform linux/amd64And then use the docker run command as usual.
Build the Rust package using Cargo:
cargo build --releaseThen you can run the local proxy:
cargo run --release serveEdgee proxy is customized through the edgee.toml file (or edgee.yaml), which is expected in the current directory.
You can get started by coping the existing edgee.sample.toml file:
cp edgee.sample.toml edgee.tomlHere's a minimal sample configuration that sets Edgee to work as a regular reverse proxy. Later we'll see how to enable WebAssembly components.
# edgee.toml
[log]
level = "info"
[http]
address = "0.0.0.0:80"
force_https = true
[https]
address = "0.0.0.0:443"
cert = "/var/edgee/cert/server.pem"
key = "/var/edgee/cert/edgee.key"
[[routing]]
domain = "demo.edgee.dev"
[[routing.backends]]
name = "demo"
default = true
address = "192.168.0.10"
enable_ssl = trueEdgee allows you to control the granularity of logs you want to be displayed. The possible values are:
trace, debug, info, warn, error, and fatal. This setting defines the minimal level to
be displayed, so setting it to warn will show warn, error, and fatal messages while hidding the others.
The example above sets up one backend called "demo". As the default backend, it will receive all traffic directed to demo.edgee.dev. Additionaly, projects can have a number of backends and use routing rules to distribute traffic among them.
For example, we could add a second backend called "api" to handle all requests to demo.edgee.dev/api:
# edgee.toml
[[routing.rules]]
path_prefix = "/api/"
backend = "api"
[[routing.backends]]
name = "api"
enable_ssl = true
address = "192.168.0.30"The supported matchers are:
- path: the path matches exactly the provided value
- path_prefix: the path starts with the provided value
- path_regexp: the path matches the provided regexp
In addition to proxying the request, you could also rewrite the path:
# edgee.toml
[[routing.rules]]
path_prefix = "/api/"
rewrite = "/v1/"
backend = "api"This way, calling /api/test on port 80 will result in calling /v1/test on the API backend.
Edgee supports HTTP redirections, allowing you to redirect traffic temporarily from one URL to another.
Here's how you can set up a redirection in your edgee.toml configuration file:
# edgee.toml
[[routing.redirections]]
source = "/old-path"
target = "https://example.com/new-path"
[[routing.redirections]]
source = "/foo"
target = "/bar"In this example, requests to https://demo.edgee.dev/old-path will be temporarily (HTTP 302) redirected to https://example.com/new-path and requests to https://demo.edgee.dev/foo will be redirected to https://demo.edgee.dev/bar
Check out the official components docs to dive into the components architecture.
The Edgee proxy is designed for performance and extensibility, so you can easily integrate open source components based on the platforms you need. Here's a list of the components we've built so far:
You just need point to the WebAssembly implementation in your proxy configuration. You may also build your own components for integrations we don't provide yet.
Let's see how to implement data collection using the amplitude component.
You simply need to add a new session to your configuration pointing to the WebAssembly component that implements the data collection protocol:
# edgee.toml
[[components.data_collection]]
id = "amplitude"
file = "/var/edgee/wasm/amplitude.wasm"
settings.amplitude_api_key = "YOUR-API-KEY"You can enable debug logs for a specific component by setting the debug flag to true:
./edgee --debug-component amplitude serve