InfluxDB Docs

influxd run

The influxd run command is the default command for influxd. It starts and runs all the processes necessary for InfluxDB to function.


influxd run [flags]

Because run is the default command for influxd, the following commands are the same:

influxd run


FlagDescriptionInput type
--assets-pathOverride default assets by serving from a specific directory (developer mode)string
--bolt-pathPath to boltdb database (default ~/.influxdbv2/influxd.bolt)string
--e2e-testingAdd /debug/flush endpoint to clear stores; used for end-to-end tests (default false)
--engine-pathPath to persistent engine files (default ~/.influxdbv2/engine)string
-h, --helpHelp for the influxd command
--http-bind-addressBind address for the REST HTTP API (default :9999)string
--log-levelSupported log levels are debug, info, and error (default info)string
--reporting-disabledDisable sending telemetry data to
--secret-storeData store for secrets (bolt or vault) (default bolt)string
--session-lengthTTL in minutes for newly created sessions (default 60)integer
--session-renew-disabledDisables automatically extending session TTL on request
--storeData store for REST resources (bolt or memory) (default bolt)string
--tls-certPath to TLS certificate filestring
--tls-keyPath to TLS private key filestring
--tracing-typeSupported tracing types (log or jaeger)string
--vault-addrAddress of the Vault server (example:
--vault-cacertPath to a PEM-encoded CA certificate filestring
--vault-capathPath to a directory of PEM-encoded CA certificate filesstring
--vault-client-certPath to a PEM-encoded client certificatestring
--vault-client-keyPath to an unencrypted, PEM-encoded private key which corresponds to the matching client certificatestring
--vault-max-retriesMaximum number of retries when encountering a 5xx error code (default 2)integer
--vault-client-timeoutVault client timeout (default 60s)duration
--vault-skip-verifySkip certificate verification when communicating with Vault
--vault-tls-server-nameName to use as the SNI host when connecting to Vault via TLSstring
--vault-tokenVault authentication tokenstring