blob: dd2018400a178bd4d6a89d93eebe2552acd0691d [file] [log] [blame]
Krzysztof Piotr Oledzki09605412009-09-23 22:09:24 +02001/*
2 * Health-checks.
3 *
4 * Copyright 2008-2009 Krzysztof Piotr Oledzki <ole@ans.pl>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Thierry FOURNIER7eeb4352013-06-14 15:28:25 +020013#ifndef _TYPES_CHECKS_H
14#define _TYPES_CHECKS_H
15
Willy Tarreau8e85ad52013-12-11 16:45:07 +010016#include <sys/time.h>
17
18#include <common/config.h>
19#include <common/mini-clist.h>
20#include <common/regex.h>
21
22#include <types/connection.h>
23#include <types/obj_type.h>
24#include <types/task.h>
25#include <types/server.h>
26
Willy Tarreau6aaa1b82013-12-11 17:09:34 +010027/* enum used by check->result. Must remain in this order, as some code uses
28 * result >= CHK_RES_PASSED to declare success.
29 */
30enum chk_result {
31 CHK_RES_UNKNOWN = 0, /* initialized to this by default */
Willy Tarreau23964182014-05-20 20:56:30 +020032 CHK_RES_NEUTRAL, /* valid check but no status information */
Willy Tarreau6aaa1b82013-12-11 17:09:34 +010033 CHK_RES_FAILED, /* check failed */
34 CHK_RES_PASSED, /* check succeeded and server is fully up again */
35 CHK_RES_CONDPASS, /* check reports the server doesn't want new sessions */
36};
Willy Tarreau8e85ad52013-12-11 16:45:07 +010037
Willy Tarreau2c115e52013-12-11 19:41:16 +010038/* flags used by check->state */
39#define CHK_ST_INPROGRESS 0x0001 /* a check is currently running */
Willy Tarreau2e10f5a2013-12-11 20:11:55 +010040#define CHK_ST_CONFIGURED 0x0002 /* this check is configured and may be enabled */
41#define CHK_ST_ENABLED 0x0004 /* this check is currently administratively enabled */
Willy Tarreau33a08db2013-12-11 21:03:31 +010042#define CHK_ST_PAUSED 0x0008 /* checks are paused because of maintenance (health only) */
Willy Tarreau33434322013-12-11 21:15:19 +010043#define CHK_ST_AGENT 0x0010 /* check is an agent check (otherwise it's a health check) */
Willy Tarreau8e85ad52013-12-11 16:45:07 +010044
Krzysztof Piotr Oledzki09605412009-09-23 22:09:24 +020045/* check status */
46enum {
47 HCHK_STATUS_UNKNOWN = 0, /* Unknown */
48 HCHK_STATUS_INI, /* Initializing */
Krzysztof Piotr Oledzki213014e2009-09-27 15:50:02 +020049 HCHK_STATUS_START, /* Check started - SPECIAL STATUS */
Krzysztof Piotr Oledzki09605412009-09-23 22:09:24 +020050
Krzysztof Piotr Oledzki213014e2009-09-27 15:50:02 +020051 /* Below we have finished checks */
Krzysztof Piotr Oledzki09605412009-09-23 22:09:24 +020052 HCHK_STATUS_CHECKED, /* DUMMY STATUS */
Krzysztof Piotr Oledzki97f07b82009-12-15 22:31:24 +010053
Simon Hormanb7cd8f92012-03-19 07:25:28 +090054 HCHK_STATUS_HANA, /* Health analyze detected enough consecutive errors */
Krzysztof Piotr Oledzki97f07b82009-12-15 22:31:24 +010055
Krzysztof Piotr Oledzki09605412009-09-23 22:09:24 +020056 HCHK_STATUS_SOCKERR, /* Socket error */
57
58 HCHK_STATUS_L4OK, /* L4 check passed, for example tcp connect */
59 HCHK_STATUS_L4TOUT, /* L4 timeout */
60 HCHK_STATUS_L4CON, /* L4 connection problem, for example: */
61 /* "Connection refused" (tcp rst) or "No route to host" (icmp) */
62
63 HCHK_STATUS_L6OK, /* L6 check passed */
64 HCHK_STATUS_L6TOUT, /* L6 (SSL) timeout */
65 HCHK_STATUS_L6RSP, /* L6 invalid response - protocol error */
66
67 HCHK_STATUS_L7TOUT, /* L7 (HTTP/SMTP) timeout */
68 HCHK_STATUS_L7RSP, /* L7 invalid response - protocol error */
69
Simon Hormanb7cd8f92012-03-19 07:25:28 +090070 /* Below we have layer 5-7 data available */
Krzysztof Piotr Oledzki09605412009-09-23 22:09:24 +020071 HCHK_STATUS_L57DATA, /* DUMMY STATUS */
72 HCHK_STATUS_L7OKD, /* L7 check passed */
73 HCHK_STATUS_L7OKCD, /* L7 check conditionally passed */
74 HCHK_STATUS_L7STS, /* L7 response error, for example HTTP 5xx */
75
Simon Horman98637e52014-06-20 12:30:16 +090076 HCHK_STATUS_PROCERR, /* External process check failure */
77 HCHK_STATUS_PROCTOUT, /* External process check timeout */
78 HCHK_STATUS_PROCOK, /* External process check passed */
79
Krzysztof Piotr Oledzki09605412009-09-23 22:09:24 +020080 HCHK_STATUS_SIZE
81};
Krzysztof Piotr Oledzki213014e2009-09-27 15:50:02 +020082
Cyril Bontéac92a062014-12-27 22:28:38 +010083/* environment variables memory requirement for different types of data */
84#define EXTCHK_SIZE_EVAL_INIT 0 /* size determined during the init phase,
85 * such environment variables are not updatable. */
86#define EXTCHK_SIZE_ULONG 20 /* max string length for an unsigned long value */
87
88/* external checks environment variables */
89enum {
90 EXTCHK_PATH = 0,
91
92 /* Proxy specific environment variables */
93 EXTCHK_HAPROXY_PROXY_NAME, /* the backend name */
94 EXTCHK_HAPROXY_PROXY_ID, /* the backend id */
95 EXTCHK_HAPROXY_PROXY_ADDR, /* the first bind address if available (or empty) */
96 EXTCHK_HAPROXY_PROXY_PORT, /* the first bind port if available (or empty) */
97
98 /* Server specific environment variables */
99 EXTCHK_HAPROXY_SERVER_NAME, /* the server name */
100 EXTCHK_HAPROXY_SERVER_ID, /* the server id */
101 EXTCHK_HAPROXY_SERVER_ADDR, /* the server address */
102 EXTCHK_HAPROXY_SERVER_PORT, /* the server port if available (or empty) */
103 EXTCHK_HAPROXY_SERVER_MAXCONN, /* the server max connections */
104 EXTCHK_HAPROXY_SERVER_CURCONN, /* the current number of connections on the server */
105
106 EXTCHK_SIZE
107};
108
Krzysztof Piotr Oledzki97f07b82009-12-15 22:31:24 +0100109
110/* health status for response tracking */
111enum {
112 HANA_STATUS_UNKNOWN = 0,
113
114 HANA_STATUS_L4_OK, /* L4 successful connection */
115 HANA_STATUS_L4_ERR, /* L4 unsuccessful connection */
116
117 HANA_STATUS_HTTP_OK, /* Correct http response */
118 HANA_STATUS_HTTP_STS, /* Wrong http response, for example HTTP 5xx */
119 HANA_STATUS_HTTP_HDRRSP, /* Invalid http response (headers) */
120 HANA_STATUS_HTTP_RSP, /* Invalid http response */
121
122 HANA_STATUS_HTTP_READ_ERROR, /* Read error */
123 HANA_STATUS_HTTP_READ_TIMEOUT, /* Read timeout */
124 HANA_STATUS_HTTP_BROKEN_PIPE, /* Unexpected close from server */
125
126 HANA_STATUS_SIZE
127};
128
129enum {
130 HANA_ONERR_UNKNOWN = 0,
131
132 HANA_ONERR_FASTINTER, /* Force fastinter*/
133 HANA_ONERR_FAILCHK, /* Simulate a failed check */
134 HANA_ONERR_SUDDTH, /* Enters sudden death - one more failed check will mark this server down */
135 HANA_ONERR_MARKDWN, /* Mark this server down, now! */
136};
137
138enum {
Simon Hormane0d1bfb2011-06-21 14:34:58 +0900139 HANA_ONMARKEDDOWN_NONE = 0,
Simon Hormane0d1bfb2011-06-21 14:34:58 +0900140 HANA_ONMARKEDDOWN_SHUTDOWNSESSIONS, /* Shutdown peer sessions */
141};
142
143enum {
Justin Karnegeseb2c24a2012-05-24 15:28:52 -0700144 HANA_ONMARKEDUP_NONE = 0,
145 HANA_ONMARKEDUP_SHUTDOWNBACKUPSESSIONS, /* Shutdown peer sessions */
146};
147
148enum {
Krzysztof Piotr Oledzki97f07b82009-12-15 22:31:24 +0100149 HANA_OBS_NONE = 0,
150
151 HANA_OBS_LAYER4, /* Observe L4 - for example tcp */
152 HANA_OBS_LAYER7, /* Observe L7 - for example http */
153
154 HANA_OBS_SIZE
155};
156
Willy Tarreau8e85ad52013-12-11 16:45:07 +0100157struct check {
Cyril Bonté9ce13112014-11-15 22:41:27 +0100158 struct xprt_ops *xprt; /* transport layer operations for health checks */
Willy Tarreau8e85ad52013-12-11 16:45:07 +0100159 struct connection *conn; /* connection state for health checks */
160 unsigned short port; /* the port to use for the health checks */
161 struct buffer *bi, *bo; /* input and output buffers to send/recv check */
162 struct task *task; /* the task associated to the health check processing, NULL if disabled */
163 struct timeval start; /* last health check start time */
164 long duration; /* time in ms took to finish last health check */
165 short status, code; /* check result, check code */
Cyril Bonté9ce13112014-11-15 22:41:27 +0100166 char desc[HCHK_DESC_LEN]; /* health check description */
Willy Tarreau8e85ad52013-12-11 16:45:07 +0100167 int use_ssl; /* use SSL for health checks */
168 int send_proxy; /* send a PROXY protocol header with checks */
Simon Hormane16c1b32015-01-30 11:22:57 +0900169 struct list *tcpcheck_rules; /* tcp-check send / expect rules */
Willy Tarreau8e85ad52013-12-11 16:45:07 +0100170 struct tcpcheck_rule *current_step; /* current step when using tcpcheck */
Baptiste Assmann69e273f2013-12-11 00:52:19 +0100171 struct tcpcheck_rule *last_started_step;/* pointer to latest tcpcheck rule started */
Willy Tarreau8e85ad52013-12-11 16:45:07 +0100172 int inter, fastinter, downinter; /* checks: time in milliseconds */
Willy Tarreau6aaa1b82013-12-11 17:09:34 +0100173 enum chk_result result; /* health-check result : CHK_RES_* */
Willy Tarreau2c115e52013-12-11 19:41:16 +0100174 int state; /* state of the check : CHK_ST_* */
Willy Tarreau8e85ad52013-12-11 16:45:07 +0100175 int health; /* 0 to rise-1 = bad;
176 * rise to rise+fall-1 = good */
177 int rise, fall; /* time in iterations */
178 int type; /* Check type, one of PR_O2_*_CHK */
James Brown55f9ff12015-10-21 18:19:05 -0700179 char *send_string; /* optionally send a string when connecting to the agent */
180 int send_string_len; /* length of agent command string */
Willy Tarreau8e85ad52013-12-11 16:45:07 +0100181 struct server *server; /* back-pointer to server */
Simon Horman98637e52014-06-20 12:30:16 +0900182 char **argv; /* the arguments to use if running a process-based check */
183 char **envp; /* the environment to use if running a process-based check */
184 struct pid_list *curpid; /* entry in pid_list used for current process-based test, or -1 if not in test */
Simon Horman0ba0e4a2015-01-30 11:23:00 +0900185 struct sockaddr_storage addr; /* the address to check */
Willy Tarreau8e85ad52013-12-11 16:45:07 +0100186};
187
Krzysztof Piotr Oledzki213014e2009-09-27 15:50:02 +0200188struct check_status {
189 short result; /* one of SRV_CHK_* */
190 char *info; /* human readable short info */
191 char *desc; /* long description */
192};
Krzysztof Piotr Oledzki97f07b82009-12-15 22:31:24 +0100193
Cyril Bontéac92a062014-12-27 22:28:38 +0100194struct extcheck_env {
195 char *name; /* environment variable name */
196 int vmaxlen; /* value maximum length, used to determine the required memory allocation */
197};
198
Krzysztof Piotr Oledzki97f07b82009-12-15 22:31:24 +0100199struct analyze_status {
200 char *desc; /* description */
201 unsigned char lr[HANA_OBS_SIZE]; /* result for l4/l7: 0 = ignore, 1 - error, 2 - OK */
202};
Thierry FOURNIER7eeb4352013-06-14 15:28:25 +0200203
Willy Tarreau98aec9f2013-12-06 16:16:41 +0100204/* possible actions for tcpcheck_rule->action */
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200205enum {
Willy Tarreau98aec9f2013-12-06 16:16:41 +0100206 TCPCHK_ACT_SEND = 0, /* send action, regular string format */
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200207 TCPCHK_ACT_EXPECT, /* expect action, either regular or binary string */
Baptiste Assmann69e273f2013-12-11 00:52:19 +0100208 TCPCHK_ACT_CONNECT, /* connect action, to probe a new port */
Baptiste Assmann22b09d22015-05-01 08:03:04 +0200209 TCPCHK_ACT_COMMENT, /* no action, simply a comment used for logs */
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200210};
211
Baptiste Assmann69e273f2013-12-11 00:52:19 +0100212/* flags used by tcpcheck_rule->conn_opts */
213#define TCPCHK_OPT_NONE 0x0000 /* no options specified, default */
214#define TCPCHK_OPT_SEND_PROXY 0x0001 /* send proxy-protocol string */
215#define TCPCHK_OPT_SSL 0x0002 /* SSL connection */
216
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200217struct tcpcheck_rule {
218 struct list list; /* list linked to from the proxy */
219 int action; /* action: send or expect */
Baptiste Assmannaa12b472015-04-25 16:16:48 +0200220 char *comment; /* comment to be used in the logs and on the stats socket */
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200221 /* match type uses NON-NULL pointer from either string or expect_regex below */
222 /* sent string is string */
223 char *string; /* sent or expected string */
224 int string_len; /* string lenght */
Thierry FOURNIER09af0d62014-06-18 11:35:54 +0200225 struct my_regex *expect_regex; /* expected */
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200226 int inverse; /* 0 = regular match, 1 = inverse match */
Baptiste Assmann69e273f2013-12-11 00:52:19 +0100227 unsigned short port; /* port to connect to */
228 unsigned short conn_opts; /* options when setting up a new connection */
Baptiste Assmann5ecb77f2013-10-06 23:24:13 +0200229};
230
Thierry FOURNIER7eeb4352013-06-14 15:28:25 +0200231#endif /* _TYPES_CHECKS_H */