1
0
Fork 0
mirror of https://github.com/Luzifer/elb-instance-status.git synced 2024-11-08 14:00:09 +00:00
Small monitoring daemon for AWS Autoscaling Group Healthchecks
Find a file
Knut Ahlers 94a4c4b26e
Add go1.18 dependency management
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2022-05-02 16:09:37 +02:00
.gitignore Initital version 2016-06-03 12:55:19 +02:00
.repo-runner.yaml Update build image 2018-04-27 12:02:59 +02:00
elb-instance-status.yml Expose metrics about checks for prometheus 2016-06-06 16:33:45 +02:00
go.mod Add go1.18 dependency management 2022-05-02 16:09:37 +02:00
go.sum Add go1.18 dependency management 2022-05-02 16:09:37 +02:00
History.md prepare release v0.6.1 2018-04-27 12:03:39 +02:00
LICENSE Fix license file 2018-04-27 12:01:08 +02:00
main.go Deprecate parameter 'warn-only', update yaml unmarshal 2018-04-27 11:55:43 +02:00
Makefile Replace gobuilder as build tool 2017-07-23 22:04:42 +02:00
metrics.go Expose metrics about checks for prometheus 2016-06-06 16:33:45 +02:00
prefixed_logger.go Add line prefixing to see which check logs lines 2016-11-29 13:33:14 +01:00
prefixed_logger_test.go Add line prefixing to see which check logs lines 2016-11-29 13:33:14 +01:00
README.md Update docs 2018-04-27 12:02:23 +02:00

Go Report Card

Luzifer / elb-instance-status

elb-instance-status is a small daemon you can run on any instance on an autoscaling group. It periodically executes commands using /bin/bash and checks for their exit status (0 = fine, everything else = not fine). The collected check results are exposed using an HTTP listener which then can be used by an ELB health check for that machine. This enables your autoscaling-group to react to custom health checks on your machine.

For example given you have a process eating all inodes on your machine and you have no chance to clean up these files you could use this daemon to terminate the instance as soon as the inode usage is too high. Maybe this is a bad example because file system cleanups should be possible all the time but you get the point: Something is wrong on one of your cattle-machines? Remove it.

The checks defined are executed every minute so you should take care not to do too expensive checks as they would stack up and could make your machine unstable. If you have checks taking longer than one minute you should do them using cron and only write a status file read by this daemon.

If the unhealthy threshold (default: 5 checks) is crossed the HTTP status will switch from 200 (OK) to 500 (Internal Server Error) which will cause the ELB to mark your machine unhealthy and the autoscaling-group will remove that machine. Of course you need to ensure there is a starting grace period to give your machine enough time to settle and get all checks green. And you also need to take care the new machines started as a replacement for the unhealthy ones are going to be healthy. Otherwise your whole cluster gets taken out of service.

Usage

  1. Install the daemon on your machine
  2. Write a yaml file containing the checks you want to execute
  3. Start the daemon
  4. Put an ELB health check on your autoscaling-group using the daemons /status path as the check target
# curl -is localhost:3000/status
HTTP/1.1 200 OK
Date: Fri, 03 Jun 2016 10:56:13 GMT
Content-Length: 426
Content-Type: text/plain; charset=utf-8

[PASS] Ensure there are at least 30% free inodes on /var/lib/docker
[PASS] Ensure there are at least 30% free inodes on /
[PASS] Ensure docker can start a small container
[PASS] Ensure volume on /var/lib/docker is mounted
[PASS] Ensure there is at least 30% free disk space on /var/lib/docker

Check format

The checks are defined in a quite simple yaml file:

---
root_free_inodes:
  name: Ensure there are at least 30% free inodes on /
  command: test $(df -i | grep "/$" | xargs | cut -d ' ' -f 5 | sed "s/%//") -lt 70
 
lib_docker_mounted:
  name: Ensure volume on /var/lib/docker is mounted
  command: mount | grep -q /var/lib/docker
 
docker_run:
  name: Ensure docker can start a small container
  command: docker run --rm alpine /bin/sh -c "echo testing123" | grep -q testing123

They consist of an unique ID and three keys for each check:

  • name (required), A descriptive name of the check (do not use the same name twice!)
  • command (required), The check itself. Needs to have exit code 0 if everything is fine and any other if somthing is wrong.
    The checks are executed using /bin/bash -c "<command>".
  • warn_only (optional, default: false), Only put a WARN-line into the output but do not set HTTP status to 500