2020-08-22 04:07:46 +02:00
![Gatus ](static/logo-with-name.png )
2019-09-15 01:59:05 +02:00
2020-04-10 23:19:59 +02:00
![build ](https://github.com/TwinProduction/gatus/workflows/build/badge.svg?branch=master )
2020-09-26 21:21:06 +02:00
[![Go Report Card ](https://goreportcard.com/badge/github.com/TwinProduction/gatus? )](https://goreportcard.com/report/github.com/TwinProduction/gatus)
2020-10-22 05:08:11 +02:00
[![codecov ](https://codecov.io/gh/TwinProduction/gatus/branch/master/graph/badge.svg )](https://codecov.io/gh/TwinProduction/gatus)
2020-10-08 01:14:21 +02:00
[![Go version ](https://img.shields.io/github/go-mod/go-version/TwinProduction/gatus.svg )](https://github.com/TwinProduction/gatus)
2019-09-15 01:59:05 +02:00
[![Docker pulls ](https://img.shields.io/docker/pulls/twinproduction/gatus.svg )](https://cloud.docker.com/repository/docker/twinproduction/gatus)
2020-10-22 05:08:11 +02:00
[![Follow TwinProduction ](https://img.shields.io/github/followers/TwinProduction?label=Follow&style=social )](https://github.com/TwinProduction)
2019-09-05 01:37:13 +02:00
2019-09-15 01:25:59 +02:00
A service health dashboard in Go that is meant to be used as a docker
image with a custom configuration file.
2019-09-11 03:05:57 +02:00
2020-09-26 21:18:52 +02:00
I personally deploy it in my Kubernetes cluster and let it monitor the status of my
2020-04-18 18:13:09 +02:00
core applications: https://status.twinnation.org/
2019-11-11 22:15:35 +01:00
2019-09-11 03:05:57 +02:00
2020-08-28 04:23:21 +02:00
## Table of Contents
2020-08-29 19:23:03 +02:00
- [Features ](#features )
2020-08-28 04:23:21 +02:00
- [Usage ](#usage )
- [Configuration ](#configuration )
- [Conditions ](#conditions )
2020-10-02 01:57:52 +02:00
- [Placeholders ](#placeholders )
- [Functions ](#functions )
2020-09-17 01:26:19 +02:00
- [Alerting ](#alerting )
- [Configuring Slack alerts ](#configuring-slack-alerts )
- [Configuring PagerDuty alerts ](#configuring-pagerduty-alerts )
- [Configuring Twilio alerts ](#configuring-twilio-alerts )
- [Configuring custom alerts ](#configuring-custom-alerts )
2020-08-28 04:23:21 +02:00
- [Docker ](#docker )
- [Running the tests ](#running-the-tests )
- [Using in Production ](#using-in-production )
- [FAQ ](#faq )
- [Sending a GraphQL request ](#sending-a-graphql-request )
2020-10-05 01:49:02 +02:00
- [Recommended interval ](#recommended-interval )
- [Default timeouts ](#default-timeouts )
- [Monitoring a TCP service ](#monitoring-a-tcp-service )
2020-10-17 05:07:14 +02:00
- [disable-monitoring-lock ](#disable-monitoring-lock )
2020-08-28 04:23:21 +02:00
2020-08-29 19:23:03 +02:00
## Features
The main features of Gatus are:
- **Highly flexible health check conditions**: While checking the response status may be enough for some use cases, Gatus goes much further and allows you to add conditions on the response time, the response body and even the IP address.
- **Ability to use Gatus for user acceptance tests**: Thanks to the point above, you can leverage this application to create automated user acceptance tests.
- **Very easy to configure**: Not only is the configuration designed to be as readable as possible, it's also extremely easy to add a new service or a new endpoint to monitor.
2020-09-17 02:55:15 +02:00
- **Alerting**: While having a pretty visual dashboard is useful to keep track of the state of your application(s), you probably don't want to stare at it all day. Thus, notifications via Slack, PagerDuty and Twilio are supported out of the box with the ability to configure a custom alerting provider for any needs you might have, whether it be a different provider or a custom application that manages automated rollbacks.
2020-08-29 19:23:03 +02:00
- **Metrics**
- **Low resource consumption**: As with most Go applications, the resource footprint that this application requires is negligibly small.
2019-09-09 03:07:08 +02:00
## Usage
2019-09-05 01:37:13 +02:00
2020-03-08 23:16:39 +01:00
By default, the configuration file is expected to be at `config/config.yaml` .
You can specify a custom path by setting the `GATUS_CONFIG_FILE` environment variable.
2020-04-15 02:13:06 +02:00
Here's a simple example:
2019-09-05 01:37:13 +02:00
```yaml
2019-11-16 21:49:06 +01:00
metrics: true # Whether to expose metrics at /metrics
2019-09-05 01:37:13 +02:00
services:
2019-09-09 03:07:08 +02:00
- name: twinnation # Name of your service, can be anything
2020-08-28 04:23:21 +02:00
url: "https://twinnation.org/health"
2020-09-01 06:25:57 +02:00
interval: 30s # Duration to wait between every status check (default: 60s)
2019-09-05 01:37:13 +02:00
conditions:
2020-04-12 05:14:20 +02:00
- "[STATUS] == 200" # Status must be 200
2020-04-15 02:13:06 +02:00
- "[BODY].status == UP" # The json path "$.status" must be equal to UP
2020-04-12 05:14:20 +02:00
- "[RESPONSE_TIME] < 300 " # Response time must be under 300ms
2020-04-15 02:13:06 +02:00
- name: example
2020-08-28 04:23:21 +02:00
url: "https://example.org/"
2020-04-12 05:17:31 +02:00
interval: 30s
2019-09-09 03:07:08 +02:00
conditions:
2019-12-04 23:27:27 +01:00
- "[STATUS] == 200"
2019-09-09 03:07:08 +02:00
```
2020-08-29 19:23:03 +02:00
This example would look like this:
![Simple example ](.github/assets/example.png )
2020-09-05 03:31:28 +02:00
Note that you can also add environment variables in the configuration file (i.e. `$DOMAIN` , `${DOMAIN}` )
2019-12-04 23:27:27 +01:00
2019-09-09 03:07:08 +02:00
2020-04-15 02:13:06 +02:00
### Configuration
2020-09-17 02:22:33 +02:00
| Parameter | Description | Default |
2020-10-02 01:57:52 +02:00
|:---------------------------------------- |:----------------------------------------------------------------------------- |:-------------- |
2020-09-17 02:22:33 +02:00
| `debug` | Whether to enable debug logs | `false` |
| `metrics` | Whether to expose metrics at /metrics | `false` |
| `services` | List of services to monitor | Required `[]` |
| `services[].name` | Name of the service. Can be anything. | Required `""` |
| `services[].url` | URL to send the request to | Required `""` |
| `services[].conditions` | Conditions used to determine the health of the service | `[]` |
2020-10-04 23:01:10 +02:00
| `services[].insecure` | Whether to skip verifying the server's certificate chain and host name | `false` |
2020-09-17 02:22:33 +02:00
| `services[].interval` | Duration to wait between every status check | `60s` |
| `services[].method` | Request method | `GET` |
| `services[].graphql` | Whether to wrap the body in a query param (`{"query":"$body"}`) | `false` |
| `services[].body` | Request body | `""` |
| `services[].headers` | Request headers | `{}` |
| `services[].alerts[].type` | Type of alert. Valid types: `slack` , `pagerduty` , `twilio` , `custom` | Required `""` |
| `services[].alerts[].enabled` | Whether to enable the alert | `false` |
| `services[].alerts[].failure-threshold` | Number of failures in a row needed before triggering the alert | `3` |
| `services[].alerts[].success-threshold` | Number of successes in a row before an ongoing incident is marked as resolved | `2` |
| `services[].alerts[].send-on-resolved` | Whether to send a notification once a triggered alert is marked as resolved | `false` |
| `services[].alerts[].description` | Description of the alert. Will be included in the alert sent | `""` |
| `alerting` | Configuration for alerting | `{}` |
2020-10-15 01:26:34 +02:00
| `alerting.slack` | Configuration for alerts of type `slack` | `{}` |
2020-09-19 22:22:12 +02:00
| `alerting.slack.webhook-url` | Slack Webhook URL | Required `""` |
2020-10-15 01:26:34 +02:00
| `alerting.pagerduty` | Configuration for alerts of type `pagerduty` | `{}` |
2020-09-19 22:22:12 +02:00
| `alerting.pagerduty.integration-key` | PagerDuty Events API v2 integration key. | Required `""` |
2020-10-15 01:26:34 +02:00
| `alerting.twilio` | Settings for alerts of type `twilio` | `{}` |
2020-09-17 02:22:33 +02:00
| `alerting.twilio.sid` | Twilio account SID | Required `""` |
| `alerting.twilio.token` | Twilio auth token | Required `""` |
| `alerting.twilio.from` | Number to send Twilio alerts from | Required `""` |
| `alerting.twilio.to` | Number to send twilio alerts to | Required `""` |
2020-10-15 01:26:34 +02:00
| `alerting.custom` | Configuration for custom actions on failure or alerts | `{}` |
2020-09-19 22:22:12 +02:00
| `alerting.custom.url` | Custom alerting request url | Required `""` |
2020-09-17 02:22:33 +02:00
| `alerting.custom.body` | Custom alerting request body. | `""` |
| `alerting.custom.headers` | Custom alerting request headers | `{}` |
2020-10-15 01:26:34 +02:00
| `security` | Security configuration | `{}` |
| `security.basic` | Basic authentication security configuration | `{}` |
| `security.basic.username` | Username for Basic authentication | Required `""` |
| `security.basic.password-sha512` | Password's SHA512 hash for Basic authentication | Required `""` |
2020-10-17 05:07:14 +02:00
| `disable-monitoring-lock` | Whether to [disable the monitoring lock ](#disable-monitoring-lock ) | `false` |
2020-04-15 02:13:06 +02:00
2020-04-10 22:34:20 +02:00
### Conditions
Here are some examples of conditions you can use:
2020-09-19 22:58:56 +02:00
| Condition | Description | Passing values | Failing values |
2020-10-02 01:57:52 +02:00
|:-----------------------------|:------------------------------------------------------- |:-------------------------- | -------------- |
2020-09-19 22:58:56 +02:00
| `[STATUS] == 200` | Status must be equal to 200 | 200 | 201, 404, ... |
| `[STATUS] < 300` | Status must lower than 300 | 200, 201, 299 | 301, 302, ... |
| `[STATUS] <= 299` | Status must be less than or equal to 299 | 200, 201, 299 | 301, 302, ... |
| `[STATUS] > 400` | Status must be greater than 400 | 401, 402, 403, 404 | 400, 200, ... |
2020-10-05 01:49:02 +02:00
| `[CONNECTED] == true` | Connection to host must've been successful | true, false | |
2020-09-19 22:58:56 +02:00
| `[RESPONSE_TIME] < 500` | Response time must be below 500ms | 100ms, 200ms, 300ms | 500ms, 501ms |
2020-10-02 01:57:52 +02:00
| `[IP] == 127.0.0.1` | Target IP must be 127.0.0.1 | 127.0.0.1 | 0.0.0.0 |
| `[BODY] == 1` | The body must be equal to 1 | 1 | `{}` , `2` , ... |
2020-09-19 22:58:56 +02:00
| `[BODY].user.name == john` | JSONPath value of `$.user.name` is equal to `john` | `{"user":{"name":"john"}}` | |
| `[BODY].data[0].id == 1` | JSONPath value of `$.data[0].id` is equal to 1 | `{"data":[{"id":1}]}` | |
2020-10-02 01:57:52 +02:00
| `[BODY].age == [BODY].id` | JSONPath value of `$.age` is equal JSONPath `$.id` | `{"age":1,"id":1}` | |
2020-09-19 22:58:56 +02:00
| `len([BODY].data) < 5` | Array at JSONPath `$.data` has less than 5 elements | `{"data":[{"id":1}]}` | |
| `len([BODY].name) == 8` | String at JSONPath `$.name` has a length of 8 | `{"name":"john.doe"}` | `{"name":"bob"}` |
2020-10-02 01:57:52 +02:00
| `[BODY].name == pat(john*)` | String at JSONPath `$.name` matches pattern `john*` | `{"name":"john.doe"}` | `{"name":"bob"}` |
2020-04-10 22:34:20 +02:00
2020-07-24 22:45:51 +02:00
2020-10-02 01:57:52 +02:00
#### Placeholders
2020-10-05 01:49:02 +02:00
| Placeholder | Description | Example of resolved value |
|:----------------------- |:------------------------------------------------------- |:------------------------- |
| `[STATUS]` | Resolves into the HTTP status of the request | 404
| `[RESPONSE_TIME]` | Resolves into the response time the request took, in ms | 10
| `[IP]` | Resolves into the IP of the target host | 192.168.0.232
| `[BODY]` | Resolves into the response body. Supports JSONPath. | `{"name":"john.doe"}`
| `[CONNECTED]` | Resolves into whether a connection could be established | `true`
2020-10-02 01:57:52 +02:00
#### Functions
2020-10-02 02:04:04 +02:00
| Function | Description | Example |
|:-----------|:---------------------------------------------------------------------------------------------------------------- |:-------------------------- |
| `len` | Returns the length of the object/slice. Works only with the `[BODY]` placeholder. | `len([BODY].username) > 8`
| `pat` | Specifies that the string passed as parameter should be evaluated as a pattern. Works only with `==` and `!=` . | `[IP] == pat(192.168.*)`
2020-10-02 01:57:52 +02:00
2020-10-02 02:04:04 +02:00
**NOTE**: Use `pat` only when you need to. `[STATUS] == pat(2*)` is a lot more expensive than `[STATUS] < 300` .
2020-10-02 01:57:52 +02:00
### Alerting
2020-08-22 20:15:44 +02:00
2020-09-17 01:26:19 +02:00
#### Configuring Slack alerts
2020-08-22 20:15:44 +02:00
```yaml
alerting:
2020-09-19 22:22:12 +02:00
slack:
webhook-url: "https://hooks.slack.com/services/**********/**********/**********"
2020-08-22 20:15:44 +02:00
services:
- name: twinnation
2020-08-28 04:23:21 +02:00
url: "https://twinnation.org/health"
2020-09-26 21:18:52 +02:00
interval: 30s
2020-08-22 20:15:44 +02:00
alerts:
- type: slack
enabled: true
description: "healthcheck failed 3 times in a row"
2020-09-05 03:31:28 +02:00
send-on-resolved: true
2020-08-22 20:15:44 +02:00
- type: slack
enabled: true
2020-09-17 02:22:33 +02:00
failure-threshold: 5
2020-08-22 20:15:44 +02:00
description: "healthcheck failed 5 times in a row"
2020-09-05 03:31:28 +02:00
send-on-resolved: true
2020-08-22 20:15:44 +02:00
conditions:
- "[STATUS] == 200"
- "[BODY].status == UP"
- "[RESPONSE_TIME] < 300 "
2020-08-28 04:23:21 +02:00
```
2020-09-05 03:31:28 +02:00
Here's an example of what the notifications look like:
![Slack notifications ](.github/assets/slack-alerts.png )
2020-09-17 01:26:19 +02:00
#### Configuring PagerDuty alerts
It is highly recommended to set `services[].alerts[].send-on-resolved` to `true` for alerts
of type `pagerduty` , because unlike other alerts, the operation resulting from setting said
parameter to `true` will not create another incident, but mark the incident as resolved on
PagerDuty instead.
```yaml
alerting:
2020-09-19 22:22:12 +02:00
pagerduty:
integration-key: "********************************"
2020-09-17 01:26:19 +02:00
services:
- name: twinnation
url: "https://twinnation.org/health"
2020-09-26 21:18:52 +02:00
interval: 30s
2020-09-17 01:26:19 +02:00
alerts:
- type: pagerduty
enabled: true
2020-09-17 02:22:33 +02:00
failure-threshold: 3
success-threshold: 5
2020-09-17 01:26:19 +02:00
send-on-resolved: true
2020-09-26 21:18:52 +02:00
description: "healthcheck failed 3 times in a row"
2020-09-17 01:26:19 +02:00
conditions:
- "[STATUS] == 200"
- "[BODY].status == UP"
- "[RESPONSE_TIME] < 300 "
```
#### Configuring Twilio alerts
2020-09-04 23:43:14 +02:00
```yaml
alerting:
twilio:
2020-09-05 03:31:28 +02:00
sid: "..."
token: "..."
from: "+1-234-567-8901"
to: "+1-234-567-8901"
2020-09-04 23:43:14 +02:00
services:
- name: twinnation
interval: 30s
url: "https://twinnation.org/health"
alerts:
- type: twilio
enabled: true
2020-09-17 02:22:33 +02:00
failure-threshold: 5
send-on-resolved: true
2020-09-26 21:18:52 +02:00
description: "healthcheck failed 5 times in a row"
2020-09-04 23:43:14 +02:00
conditions:
- "[STATUS] == 200"
- "[BODY].status == UP"
- "[RESPONSE_TIME] < 300 "
```
2020-08-28 04:23:21 +02:00
2020-09-17 01:26:19 +02:00
#### Configuring custom alerts
2020-08-28 04:23:21 +02:00
While they're called alerts, you can use this feature to call anything.
For instance, you could automate rollbacks by having an application that keeps tracks of new deployments, and by
leveraging Gatus, you could have Gatus call that application endpoint when a service starts failing. Your application
would then check if the service that started failing was recently deployed, and if it was, then automatically
roll it back.
The values `[ALERT_DESCRIPTION]` and `[SERVICE_NAME]` are automatically substituted for the alert description and the
2020-09-05 03:57:31 +02:00
service name respectively in the body (`alerting.custom.body`) as well as the url (`alerting.custom.url`).
If you have `send-on-resolved` set to `true` , you may want to use `[ALERT_TRIGGERED_OR_RESOLVED]` to differentiate
the notifications. It will be replaced for either `TRIGGERED` or `RESOLVED` , based on the situation.
2020-08-28 04:23:21 +02:00
For all intents and purpose, we'll configure the custom alert with a Slack webhook, but you can call anything you want.
```yaml
alerting:
custom:
url: "https://hooks.slack.com/services/**********/**********/**********"
method: "POST"
body: |
{
2020-09-05 03:57:31 +02:00
"text": "[ALERT_TRIGGERED_OR_RESOLVED]: [SERVICE_NAME] - [ALERT_DESCRIPTION]"
2020-08-28 04:23:21 +02:00
}
services:
- name: twinnation
url: "https://twinnation.org/health"
2020-09-26 21:18:52 +02:00
interval: 30s
2020-08-28 04:23:21 +02:00
alerts:
- type: custom
enabled: true
2020-09-17 02:22:33 +02:00
failure-threshold: 10
success-threshold: 3
2020-09-05 03:57:31 +02:00
send-on-resolved: true
2020-08-28 04:23:21 +02:00
description: "healthcheck failed 10 times in a row"
conditions:
- "[STATUS] == 200"
- "[BODY].status == UP"
- "[RESPONSE_TIME] < 300 "
2020-09-04 23:43:14 +02:00
```
2020-09-17 01:26:19 +02:00
## Docker
2020-09-18 05:48:09 +02:00
Other than using one of the examples provided in the `examples` folder, you can also try it out locally by
creating a configuration file - we'll call it `config.yaml` for this example - and running the following
command:
2020-09-17 01:26:19 +02:00
```
2020-09-28 18:50:22 +02:00
docker run -p 8080:8080 --mount type=bind,source="$(pwd)"/config.yaml,target=/config/config.yaml --name gatus twinproduction/gatus
2020-09-17 01:26:19 +02:00
```
2020-09-18 05:48:09 +02:00
If you're on Windows, replace `"$(pwd)"` by the absolute path to your current directory, e.g.:
```
2020-09-28 18:50:22 +02:00
docker run -p 8080:8080 --mount type=bind,source=C:/Users/Chris/Desktop/config.yaml,target=/config/config.yaml --name gatus twinproduction/gatus
2020-09-18 05:48:09 +02:00
```
2020-09-17 01:26:19 +02:00
## Running the tests
```
go test ./... -mod vendor
```
## Using in Production
See the [example ](example ) folder.
## FAQ
### Sending a GraphQL request
By setting `services[].graphql` to true, the body will automatically be wrapped by the standard GraphQL `query` parameter.
For instance, the following configuration:
```yaml
services:
- name: filter users by gender
url: http://localhost:8080/playground
method: POST
graphql: true
body: |
{
user(gender: "female") {
id
name
gender
avatar
}
}
headers:
Content-Type: application/json
conditions:
- "[STATUS] == 200"
- "[BODY].data.user[0].gender == female"
```
will send a `POST` request to `http://localhost:8080/playground` with the following body:
```json
{"query":" {\n user(gender: \"female\") {\n id\n name\n gender\n avatar\n }\n }"}
```
2020-10-05 01:49:02 +02:00
### Recommended interval
2020-10-17 05:07:14 +02:00
**NOTE**: This does not _really_ apply if `disable-monitoring-lock` is set to `true` , as the monitoring lock is what
tells Gatus to only evaluate one service at a time.
To ensure that Gatus provides reliable and accurate results (i.e. response time), Gatus only evaluates one service at a time
2020-10-05 01:49:02 +02:00
In other words, even if you have multiple services with the exact same interval, they will not execute at the same time.
You can test this yourself by running Gatus with several services configured with a very short, unrealistic interval,
such as 1ms. You'll notice that the response time does not fluctuate - that is because while services are evaluated on
different goroutines, there's a global lock that prevents multiple services from running at the same time.
Unfortunately, there is a drawback. If you have a lot of services, including some that are very slow or prone to time out (the default
time out is 10s for HTTP and 5s for TCP), then it means that for the entire duration of the request, no other services can be evaluated.
**This does mean that Gatus will be unable to evaluate the health of other services**.
The interval does not include the duration of the request itself, which means that if a service has an interval of 30s
and the request takes 2s to complete, the timestamp between two evaluations will be 32s, not 30s.
While this does not prevent Gatus' from performing health checks on all other services, it may cause Gatus to be unable
to respect the configured interval, for instance:
- Service A has an interval of 5s, and times out after 10s to complete
- Service B has an interval of 5s, and takes 1ms to complete
- Service B will be unable to run every 5s, because service A's health evaluation takes longer than its interval
To sum it up, while Gatus can really handle any interval you throw at it, you're better off having slow requests with
higher interval.
As a rule of the thumb, I personally set interval for more complex health checks to `5m` (5 minutes) and
simple health checks used for alerting (PagerDuty/Twilio) to `30s` .
### Default timeouts
| Protocol | Timeout |
|:-------- |:------- |
| HTTP | 10s
| TCP | 5s
### Monitoring a TCP service
By prefixing `services[].url` with `tcp:\\` , you can monitor TCP services at a very basic level:
```yaml
- name: redis
url: "tcp://127.0.0.1:6379"
interval: 30s
conditions:
- "[CONNECTED] == true"
```
Placeholders `[STATUS]` and `[BODY]` as well as the fields `services[].body` , `services[].insecure` ,
`services[].headers` , `services[].method` and `services[].graphql` are not supported for TCP services.
**NOTE**: `[CONNECTED] == true` does not guarantee that the service itself is healthy - it only guarantees that there's
something at the given address listening to the given port, and that a connection to that address was successfully
established.
2020-10-15 01:26:34 +02:00
### Basic authentication
You can require Basic authentication by leveraging the `security.basic` configuration:
```yaml
security:
basic:
username: "john.doe"
password-sha512: "6b97ed68d14eb3f1aa959ce5d49c7dc612e1eb1dafd73b1e705847483fd6a6c809f2ceb4e8df6ff9984c6298ff0285cace6614bf8daa9f0070101b6c89899e22"
```
The example above will require that you authenticate with the username `john.doe` as well as the password `hunter2` .
2020-10-17 05:07:14 +02:00
### disable-monitoring-lock
Setting `disable-monitoring-lock` to `true` means that multiple services could be monitored at the same time.
While this behavior wouldn't generally be harmful, conditions using the `[RESPONSE_TIME]` placeholder could be impacted
by the evaluation of multiple services at the same time, therefore, the default value for this parameter is `false` .
2020-10-17 22:20:31 +02:00
There are three main reasons why you might want to disable the monitoring lock:
2020-10-17 22:12:40 +02:00
- You're using Gatus for load testing (each services are periodically evaluated on a different goroutine, so
technically, if you create 100 services with a 1 seconds interval, Gatus will send 100 requests per second)
- You have a _lot_ of services to monitor
- You want to test multiple services at very short interval (< 5s )