[metrics-bugs] #33941 [Internal Services/Tor Sysadmin Team]: Nagios checks for op-??.onionperf.torproject.net
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Apr 27 14:10:20 UTC 2020
#33941: Nagios checks for op-??.onionperf.torproject.net
-------------------------------------------------+---------------------
Reporter: karsten | Owner: tpa
Type: task | Status: new
Priority: Medium | Milestone:
Component: Internal Services/Tor Sysadmin Team | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+---------------------
Comment (by karsten):
I don't know Prometheus or Grafana, so I cannot say how difficult it would
be to use them. My preference for using Nagios is mostly because we
already have other checks running in Nagios. And I'm looking for something
we can deploy really soon, so that we can turn off an AWS host running our
own Nagios before the end of the month.
Here's a new plan: How about I write another short Python script that
downloads the latest log file from OnionPerf hosts via HTTPS with header
`"Accept-Encoding: gzip"` and performs some basic checks to see if
measurements are still being made? This wouldn't cover the disk space
check (which I hope is under control now with #33396 being merged). But it
would cover many other failure types preventing us from making continuous
measurements.
What do you think? Should I write some more Python today?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33941#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the metrics-bugs
mailing list