Documentation ¶
Index ¶
- Constants
- Variables
- func ParseHost(host string) (string, string, string, error)
- type AliasNotifier
- type CheckAlias
- type CheckDocker
- type CheckGRPC
- type CheckH2PING
- type CheckHTTP
- type CheckIfServiceIDExists
- type CheckMonitor
- type CheckNotifier
- type CheckOSService
- type CheckTCP
- type CheckTTL
- type CheckUDP
- type DockerClient
- func (c *DockerClient) Close() error
- func (c *DockerClient) CreateExec(containerID string, cmd []string) (string, error)
- func (c *DockerClient) Host() string
- func (c *DockerClient) InspectExec(containerID, execID string) (int, error)
- func (c *DockerClient) StartExec(containerID, execID string) (*circbuf.Buffer, error)
- type GrpcHealthProbe
- type OSServiceClient
- type RPC
- type StatusHandler
Constants ¶
const ( // MinInterval is the minimal interval between // two checks. Do not allow for a interval below this value. // Otherwise we risk fork bombing a system. MinInterval = time.Second // DefaultBufSize is the maximum size of the captured // check output by default. Prevents an enormous buffer // from being captured DefaultBufSize = 4 * 1024 // 4KB // UserAgent is the value of the User-Agent header // for HTTP health checks. UserAgent = "Consul Health Check" )
const DefaultDockerHost = "unix:///var/run/docker.sock"
Variables ¶
var (
ErrOSServiceStatusCritical = errors.New(errOSServiceStatusCritical)
)
Functions ¶
Types ¶
type AliasNotifier ¶
type AliasNotifier interface { CheckNotifier AddAliasCheck(structs.CheckID, structs.ServiceID, chan<- struct{}) error RemoveAliasCheck(structs.CheckID, structs.ServiceID) Checks(*acl.EnterpriseMeta) map[structs.CheckID]*structs.HealthCheck }
AliasNotifier is a CheckNotifier specifically for the Alias check. This requires additional methods that are satisfied by the agent local state.
type CheckAlias ¶
type CheckAlias struct { Node string // Node name of the service. If empty, assumed to be this node. ServiceID structs.ServiceID // ID (not name) of the service to alias CheckID structs.CheckID // ID of this check RPC RPC // Used to query remote server if necessary RPCReq structs.NodeSpecificRequest // Base request Notify AliasNotifier // For updating the check state acl.EnterpriseMeta // contains filtered or unexported fields }
CheckAlias is a check type that aliases the health of another service instance or node. If the service aliased has any critical health checks, then this check is critical. If the service has no critical but warnings, then this check is warning, and if a service has only passing checks, then this check is passing.
func (*CheckAlias) Start ¶
func (c *CheckAlias) Start()
Start is used to start the check, runs until Stop() func (c *CheckAlias) Start() {
type CheckDocker ¶
type CheckDocker struct { CheckID structs.CheckID ServiceID structs.ServiceID Script string ScriptArgs []string DockerContainerID string Shell string Interval time.Duration Logger hclog.Logger Client *DockerClient StatusHandler *StatusHandler // contains filtered or unexported fields }
CheckDocker is used to periodically invoke a script to determine the health of an application running inside a Docker Container. We assume that the script is compatible with nagios plugins and expects the output in the same format. Supports failures_before_critical and success_before_passing.
func (*CheckDocker) Start ¶
func (c *CheckDocker) Start()
func (*CheckDocker) Stop ¶
func (c *CheckDocker) Stop()
type CheckGRPC ¶
type CheckGRPC struct { CheckID structs.CheckID ServiceID structs.ServiceID GRPC string Interval time.Duration Timeout time.Duration TLSClientConfig *tls.Config Logger hclog.Logger StatusHandler *StatusHandler // Set if checks are exposed through Connect proxies // If set, this is the target of check() ProxyGRPC string // contains filtered or unexported fields }
CheckGRPC is used to periodically send request to a gRPC server application that implements gRPC health-checking protocol. The check is passing if returned status is SERVING. The check is critical if connection fails or returned status is not SERVING. Supports failures_before_critical and success_before_passing.
type CheckH2PING ¶
type CheckH2PING struct { CheckID structs.CheckID ServiceID structs.ServiceID H2PING string Interval time.Duration Timeout time.Duration Logger hclog.Logger TLSClientConfig *tls.Config StatusHandler *StatusHandler // contains filtered or unexported fields }
func (*CheckH2PING) Start ¶
func (c *CheckH2PING) Start()
type CheckHTTP ¶
type CheckHTTP struct { CheckID structs.CheckID ServiceID structs.ServiceID HTTP string Header map[string][]string Method string Body string Interval time.Duration Timeout time.Duration Logger hclog.Logger TLSClientConfig *tls.Config OutputMaxSize int StatusHandler *StatusHandler DisableRedirects bool // Set if checks are exposed through Connect proxies // If set, this is the target of check() ProxyHTTP string // contains filtered or unexported fields }
CheckHTTP is used to periodically make an HTTP request to determine the health of a given check. The check is passing if the response code is 2XX. The check is warning if the response code is 429. The check is critical if the response code is anything else or if the request returns an error Supports failures_before_critical and success_before_passing.
type CheckIfServiceIDExists ¶
CheckIfServiceIDExists is used to determine if a service exists
type CheckMonitor ¶
type CheckMonitor struct { Notify CheckNotifier CheckID structs.CheckID ServiceID structs.ServiceID Script string ScriptArgs []string Interval time.Duration Timeout time.Duration Logger hclog.Logger OutputMaxSize int StatusHandler *StatusHandler // contains filtered or unexported fields }
CheckMonitor is used to periodically invoke a script to determine the health of a given check. It is compatible with nagios plugins and expects the output in the same format. Supports failures_before_critical and success_before_passing.
func (*CheckMonitor) Start ¶
func (c *CheckMonitor) Start()
Start is used to start a check monitor. Monitor runs until stop is called
type CheckNotifier ¶
type CheckNotifier interface { UpdateCheck(checkID structs.CheckID, status, output string) // ServiceExists return true if the given service does exists ServiceExists(serviceID structs.ServiceID) bool }
CheckNotifier interface is used by the CheckMonitor to notify when a check has a status update. The update should take care to be idempotent.
type CheckOSService ¶
type CheckOSService struct { CheckID structs.CheckID ServiceID structs.ServiceID OSService string Interval time.Duration Timeout time.Duration Logger hclog.Logger StatusHandler *StatusHandler Client *OSServiceClient // contains filtered or unexported fields }
func (*CheckOSService) CheckType ¶
func (c *CheckOSService) CheckType() structs.CheckType
func (*CheckOSService) Start ¶
func (c *CheckOSService) Start()
func (*CheckOSService) Stop ¶
func (c *CheckOSService) Stop()
type CheckTCP ¶
type CheckTCP struct { CheckID structs.CheckID ServiceID structs.ServiceID TCP string Interval time.Duration Timeout time.Duration Logger hclog.Logger TLSClientConfig *tls.Config StatusHandler *StatusHandler // contains filtered or unexported fields }
CheckTCP is used to periodically make a TCP connection to determine the health of a given check. The check is passing if the connection succeeds The check is critical if the connection returns an error Supports failures_before_critical and success_before_passing.
type CheckTTL ¶
type CheckTTL struct { Notify CheckNotifier CheckID structs.CheckID ServiceID structs.ServiceID TTL time.Duration Logger hclog.Logger OutputMaxSize int // contains filtered or unexported fields }
CheckTTL is used to apply a TTL to check status, and enables clients to set the status of a check but upon the TTL expiring, the check status is automatically set to critical.
func (*CheckTTL) SetStatus ¶
SetStatus is used to update the status of the check, and to renew the TTL. If expired, TTL is restarted. output is returned (might be truncated)
type CheckUDP ¶
type CheckUDP struct { CheckID structs.CheckID ServiceID structs.ServiceID UDP string Message string Interval time.Duration Timeout time.Duration Logger hclog.Logger StatusHandler *StatusHandler // contains filtered or unexported fields }
CheckUDP is used to periodically send a UDP datagram to determine the health of a given check. The check is passing if the connection succeeds, the response is bytes.Equal to the bytes passed in or if the error returned is a timeout error The check is critical if: the connection succeeds but the response is not equal to the bytes passed in, the connection succeeds but the error returned is not a timeout error or the connection fails
type DockerClient ¶
type DockerClient struct {
// contains filtered or unexported fields
}
DockerClient is a simplified client for the Docker Engine API to execute the health checks and avoid significant dependencies. It also consumes all data returned from the Docker API through a ring buffer with a fixed limit to avoid excessive resource consumption.
func NewDockerClient ¶
func NewDockerClient(host string, maxbuf int64) (*DockerClient, error)
func (*DockerClient) Close ¶
func (c *DockerClient) Close() error
func (*DockerClient) CreateExec ¶
func (c *DockerClient) CreateExec(containerID string, cmd []string) (string, error)
func (*DockerClient) Host ¶
func (c *DockerClient) Host() string
func (*DockerClient) InspectExec ¶
func (c *DockerClient) InspectExec(containerID, execID string) (int, error)
type GrpcHealthProbe ¶
type GrpcHealthProbe struct {
// contains filtered or unexported fields
}
GrpcHealthProbe connects to gRPC application and queries health service for application/service status.
func NewGrpcHealthProbe ¶
func NewGrpcHealthProbe(target string, timeout time.Duration, tlsConfig *tls.Config) *GrpcHealthProbe
NewGrpcHealthProbe constructs GrpcHealthProbe from target string in format server[/service] If service is omitted, health of the entire application is probed
func (*GrpcHealthProbe) Check ¶
func (probe *GrpcHealthProbe) Check(target string) error
Check if the target of this GrpcHealthProbe is healthy If nil is returned, target is healthy, otherwise target is not healthy
type OSServiceClient ¶
type OSServiceClient struct { }
func NewOSServiceClient ¶
func NewOSServiceClient() (*OSServiceClient, error)
func (*OSServiceClient) Check ¶
func (client *OSServiceClient) Check(serviceName string) error
type RPC ¶
type RPC interface {
RPC(ctx context.Context, method string, args interface{}, reply interface{}) error
}
RPC is an interface that an RPC client must implement. This is a helper interface that is implemented by the agent delegate for checks that need to make RPC calls.
type StatusHandler ¶
type StatusHandler struct {
// contains filtered or unexported fields
}
StatusHandler keep tracks of successive error/success counts and ensures that status can be set to critical/passing only once the successive number of event reaches the given threshold.
func NewStatusHandler ¶
func NewStatusHandler(inner CheckNotifier, logger hclog.Logger, successBeforePassing, failuresBeforeWarning, failuresBeforeCritical int) *StatusHandler
NewStatusHandler set counters values to threshold in order to immediatly update status after first check.