-
Notifications
You must be signed in to change notification settings - Fork 578
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handling host aliases and agent certificates in HA setups #5108
Comments
I have thought a while about how this could be solved from a configuration perspective, perhaps one of these ideas is possible to be actually implemented. A clustered service could have multiple command endpoints by make command_endpoint an array in this case. Icinga 2 should then run the check on any host and print the best result or on one connected host and use this result. It also has to be solved if the check can only give a valid result on one specific node. A cluster host could be an additional endpoint with its cluster address (or multiple addresses, so the host attribute being an array,) but this would require the agent also to have an alternative name in its certificate and to respond to this name. Also the agent has to accept both endpoints and zones in its configuration. This could perhaps also solve other issues where an host has multiple names. All cluster endpoints could build an additional zone, which than could be used as zone attribute instead of the command_endpoint attribute. This would have the same problem like command_endpoint as array which check result is to used. An internal "clustered" check could solve this perhaps to which allows to execute checks on all cluster members and allows to configure if the best result, the worst, minimum to ok or something else should be used. I have no idea which one could be solved in the easiest way and requiring the least amount of changed. But for wishlisting I would prefer the internal check or agents having an alternative name in the certificate and responding to it. I hope at least my thoughts are somehow helpful for you. |
Hey Dirk, thank you for your thoughts. Whats up with adding a completly new object called maybe "VirtualHost"? Regards |
I'm having a hard time understanding what this request is actually asking for or what problem is tried to be solved here. So if someone could provide a concrete example, I'd be happy. So when monitoring some HA-clustered service, I'd use the following approach right now:
There's also the suggestion of combining multiple checks into one result, so maybe this is also asking for something like |
You examples are what is quite easy to achieve but not all that could be relevant as there are cluster setups where a specific service has to be checked on a specific agent locally. To come up with an example that is very generic and so it could also be created without any real cluster solution. The cluster consists of two node, cluster services run on an additional name and one cluster service is a filesystem only checkable locally. In this case running the check on both nodes will always result in one good and one bad, so running it only on the cluster name would be preferred as it will give you proper results, but this can not be addressed with the agent at the moment. |
Okay, so you'd basically want to have something like |
A different scenario posted by a user: https://community.icinga.com/t/use-icinga-agent-on-multihomed-hosts-with-independent-ip-addresses-for-services/8709 |
Environment:
In HA setups there is often a virtual IP address associated with a dns name. The address can point to different hosts. Often the address ist moved by a cluster framework, sometimes by hand.
The easy way would be to have a dummy host pointing to the virtual IP and monitoring the service on the agent endpoint. The problem with this solution is:
It would be great to have parameters inside the host object that would tell Icinga2 which real hosts are possible endpoints of this dummy. If one of the certificates is presented, Icinga2 will allow the connection and the service will be monitored on the agent endpoints.
The text was updated successfully, but these errors were encountered: