Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
e1339d94
Commit
e1339d94
authored
Jul 11, 2017
by
Achilleas Pipinellis
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update health check docs
parent
d9ed329b
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
87 additions
and
70 deletions
+87
-70
doc/user/admin_area/monitoring/health_check.md
doc/user/admin_area/monitoring/health_check.md
+87
-70
No files found.
doc/user/admin_area/monitoring/health_check.md
View file @
e1339d94
...
...
@@ -6,7 +6,7 @@
be deprecated in GitLab 9.1. Read more in the
[
old behavior
](
#old-behavior
)
section.
-
[
Access token
](
#access-token
)
has been deprecated in GitLab 9.4
in favor of
[
IP
W
hitelist
](
#ip-whitelist
)
in favor of
[
IP
w
hitelist
](
#ip-whitelist
)
GitLab provides liveness and readiness probes to indicate service health and
reachability to required services. These probes report on the status of the
...
...
@@ -14,106 +14,123 @@ database connection, Redis connection, and access to the filesystem. These
endpoints
[
can be provided to schedulers like Kubernetes
][
kubernetes
]
to hold
traffic until the system is ready or restart the container as needed.
## IP
W
hitelist
## IP
w
hitelist
To access monitoring resources
the client IP needs to be included in the
whitelist.
To add or remove hosts or IP ranges from the list you can edit
`gitlab.rb`
or
`gitlab.yml`
.
To access monitoring resources
, the client IP needs to be included in a
whitelist.
You can add single hosts or use IP ranges
.
Example whitelist configuration:
```
yaml
monitoring
:
**For Omnibus installations**
1.
Open
`/etc/gitlab/gitlab.rb`
and add or uncomment the following:
```ruby
gitlab_rails['monitoring_whitelist'] = ['127.0.0.0/8']
```
1.
Save the file and [reconfigure] GitLab for the changes to take effect.
---
**For installations from source**
1.
Edit
`config/gitlab.yml`
:
```yaml
monitoring:
ip_whitelist:
- 127.0.0.0/8 # by default only local IPs are allowed to access monitoring resources
```
```
## Access Token (Deprecated)
1.
Save the file and [restart] GitLab for the changes to take effect.
An access token needs to be provided while accessing the probe endpoints. The current
accepted token can be found under the
**Admin area ➔ Monitoring ➔ Health check**
(
`admin/health_check`
) page of your GitLab instance.
[
reconfigure
]:
../../../administration/gitlab_restart.md#omnibus-gitlab-reconfigure
[
restart
]:
../../../administration/gitlab_restart.md#installations-from-source
![
access token
](
img/health_check_token.png
)
## Using the endpoint
The access token can be passed as a URL parameter
:
With default whitelist settings, the probes can be accessed from localhost
:
```
https://gitlab.example.com/-/readiness?token=ACCESS_TOKEN
```
-
`http://localhost/-/readiness`
-
`http://localhost/-/liveness`
which will then provide a report of system health in JSON format:
which will then provide a report of system health in JSON format.
Readiness example output:
```
{
"db_check"
: {
"status"
: "ok"
"queues_check"
: {
"status"
: "ok"
},
"redis_check"
: {
"status"
: "ok"
"redis_check"
: {
"status"
: "ok"
},
"fs_shards_check": {
"status": "ok",
"labels": {
"shard": "default"
}
"shared_state_check" : {
"status" : "ok"
},
"fs_shards_check" : {
"labels" : {
"shard" : "default"
},
"status" : "ok"
},
"db_check" : {
"status" : "ok"
},
"cache_check" : {
"status" : "ok"
}
}
```
## Using the Endpoint
Liveness example output:
With default whitelist settings, the probes can be accessed from localhost:
-
`http://localhost/-/readiness`
-
`http://localhost/-/liveness`
```
{
"fs_shards_check" : {
"status" : "ok"
},
"cache_check" : {
"status" : "ok"
},
"db_check" : {
"status" : "ok"
},
"redis_check" : {
"status" : "ok"
},
"queues_check" : {
"status" : "ok"
},
"shared_state_check" : {
"status" : "ok"
}
}
```
## Status
On failure, the endpoint will return a
`500`
HTTP status code. On success, the endpoint
will return a valid successful HTTP status code, and a
`success`
message.
##
Old behavior
##
Access token (Deprecated)
>**Notes:**
-
Liveness and readiness probes were
[
introduced
][
ce-10416
]
in GitLab 9.1.
-
The
`health_check`
endpoint was
[
introduced
][
ce-3888
]
in GitLab 8.8 and will
be deprecated in GitLab 9.1. Read more in the
[
old behavior
](
#old-behavior
)
section.
>**Note:**
Access token has been deprecated in GitLab 9.4
in favor of
[
IP whitelist
](
#ip-whitelist
)
GitLab provides a health check endpoint for uptime monitoring on the
`health_check`
web
endpoint. The health check reports on the overall system status based on the status of
the database connection, the state of the database migrations, and the ability to write
and access the cache. This endpoint can be provided to uptime monitoring services like
[
Pingdom
][
pingdom
]
,
[
Nagios
][
nagios-health
]
, and
[
NewRelic
][
newrelic-health
]
.
Once you have the
[
access token
](
#access-token
)
or your client IP is
[
whitelisted
](
#ip-whitelist
)
,
health information can be retrieved as plain text, JSON, or XML using the
`health_check`
endpoint:
-
`https://gitlab.example.com/health_check?token=ACCESS_TOKEN`
-
`https://gitlab.example.com/health_check.json?token=ACCESS_TOKEN`
-
`https://gitlab.example.com/health_check.xml?token=ACCESS_TOKEN`
You can also ask for the status of specific services:
-
`https://gitlab.example.com/health_check/cache.json?token=ACCESS_TOKEN`
-
`https://gitlab.example.com/health_check/database.json?token=ACCESS_TOKEN`
-
`https://gitlab.example.com/health_check/migrations.json?token=ACCESS_TOKEN`
For example, the JSON output of the following health check:
An access token needs to be provided while accessing the probe endpoints. The current
accepted token can be found under the
**Admin area ➔ Monitoring ➔ Health check**
(
`admin/health_check`
) page of your GitLab instance.
```
bash
curl
--header
"TOKEN: ACCESS_TOKEN"
https://gitlab.example.com/health_check.json
```
![
access token
](
img/health_check_token.png
)
would be like
:
The access token can be passed as a URL parameter
:
```
{"healthy":true,"message":"success"}
https://gitlab.example.com/-/readiness?token=ACCESS_TOKEN
```
On failure, the endpoint will return a
`500`
HTTP status code. On success, the endpoint
will return a valid successful HTTP status code, and a
`success`
message. Ideally your
uptime monitoring should look for the success message.
[
ce-10416
]:
https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/10416
[
ce-3888
]:
https://gitlab.com/gitlab-org/gitlab-ce/merge_requests/3888
[
pingdom
]:
https://www.pingdom.com
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment