Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
284dcea8
Commit
284dcea8
authored
Jul 11, 2017
by
Achilleas Pipinellis
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update health check docs
parent
072ec149
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
66 additions
and
36 deletions
+66
-36
doc/user/admin_area/monitoring/health_check.md
doc/user/admin_area/monitoring/health_check.md
+66
-36
No files found.
doc/user/admin_area/monitoring/health_check.md
View file @
284dcea8
...
...
@@ -6,7 +6,7 @@
be deprecated in GitLab 9.1. Read more in the
[
old behavior
](
#old-behavior
)
section.
-
[
Access token
](
#access-token
)
has been deprecated in GitLab 9.4
in favor of
[
IP
W
hitelist
](
#ip-whitelist
)
in favor of
[
IP
w
hitelist
](
#ip-whitelist
)
GitLab provides liveness and readiness probes to indicate service health and
reachability to required services. These probes report on the status of the
...
...
@@ -14,67 +14,97 @@ database connection, Redis connection, and access to the filesystem. These
endpoints
[
can be provided to schedulers like Kubernetes
][
kubernetes
]
to hold
traffic until the system is ready or restart the container as needed.
## IP
W
hitelist
## IP
w
hitelist
To access monitoring resources, the client IP needs to be included in a whitelist.
[
Read how to add IPs to a whitelist for the monitoring endpoints.
][
admin
]
.
## Using the
E
ndpoint
## Using the
e
ndpoint
With default whitelist settings, the probes can be accessed from localhost:
-
`http://localhost/-/readiness`
-
`http://localhost/-/liveness`
## Status
which will then provide a report of system health in JSON format.
On failure, the endpoint will return a
`500`
HTTP status code. On success, the endpoint
will return a valid successful HTTP status code, and a
`success`
message.
Readiness example output:
## Old behavior
```
{
"queues_check" : {
"status" : "ok"
},
"redis_check" : {
"status" : "ok"
},
"shared_state_check" : {
"status" : "ok"
},
"fs_shards_check" : {
"labels" : {
"shard" : "default"
},
"status" : "ok"
},
"db_check" : {
"status" : "ok"
},
"cache_check" : {
"status" : "ok"
}
}
```
>**Notes:**
-
Liveness and readiness probes were
[
introduced
][
ce-10416
]
in GitLab 9.1.
-
The
`health_check`
endpoint was
[
introduced
][
ce-3888
]
in GitLab 8.8 and will
be deprecated in GitLab 9.1. Read more in the
[
old behavior
](
#old-behavior
)
section.
Liveness example output:
GitLab provides a health check endpoint for uptime monitoring on the
`health_check`
web
endpoint. The health check reports on the overall system status based on the status of
the database connection, the state of the database migrations, and the ability to write
and access the cache. This endpoint can be provided to uptime monitoring services like
[
Pingdom
][
pingdom
]
,
[
Nagios
][
nagios-health
]
, and
[
NewRelic
][
newrelic-health
]
.
```
{
"fs_shards_check" : {
"status" : "ok"
},
"cache_check" : {
"status" : "ok"
},
"db_check" : {
"status" : "ok"
},
"redis_check" : {
"status" : "ok"
},
"queues_check" : {
"status" : "ok"
},
"shared_state_check" : {
"status" : "ok"
}
}
```
Once you have the
[
access token
](
#access-token
)
or your client IP is
[
whitelisted
](
#ip-whitelist
)
,
health information can be retrieved as plain text, JSON, or XML using the
`health_check`
endpoint:
## Status
-
`https://gitlab.example.com/health_check?token=ACCESS_TOKEN`
-
`https://gitlab.example.com/health_check.json?token=ACCESS_TOKEN`
-
`https://gitlab.example.com/health_check.xml?token=ACCESS_TOKEN`
On failure, the endpoint will return a
`500`
HTTP status code. On success, the endpoint
will return a valid successful HTTP status code, and a
`success`
message.
You can also ask for the status of specific services:
## Access token (Deprecated)
-
`https://gitlab.example.com/health_check/cache.json?token=ACCESS_TOKEN`
-
`https://gitlab.example.com/health_check/database.json?token=ACCESS_TOKEN`
-
`https://gitlab.example.com/health_check/migrations.json?token=ACCESS_TOKEN`
>**Note:**
Access token has been deprecated in GitLab 9.4
in favor of
[
IP whitelist
](
#ip-whitelist
)
For example, the JSON output of the following health check:
An access token needs to be provided while accessing the probe endpoints. The current
accepted token can be found under the
**Admin area ➔ Monitoring ➔ Health check**
(
`admin/health_check`
) page of your GitLab instance.
```
bash
curl
--header
"TOKEN: ACCESS_TOKEN"
https://gitlab.example.com/health_check.json
```
![
access token
](
img/health_check_token.png
)
would be like
:
The access token can be passed as a URL parameter
:
```
{"healthy":true,"message":"success"}
https://gitlab.example.com/-/readiness?token=ACCESS_TOKEN
```
On failure, the endpoint will return a
`500`
HTTP status code. On success, the endpoint
will return a valid successful HTTP status code, and a
`success`
message. Ideally your
uptime monitoring should look for the success message.
[
ce-10416
]:
https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/10416
[
ce-3888
]:
https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/3888
[
pingdom
]:
https://www.pingdom.com
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment