Contents
- Coordinating Independent Monitoring Agent Architecture (CIMAA)
- Architectural overview
- Status
- Changes
- 0.6.0 (2015-05-29)
- 0.5.3 (2015-03-10)
- 0.5.2 (2015-02-24)
- 0.5.1 (2015-02-11)
- 0.5.0 (2015-02-10)
- 0.4.1 (2015-02-09)
- 0.4.0 (2015-02-09)
- 0.3.1 (2015-02-07)
- 0.3.0 (2015-01-21)
- 0.2.3 (2015-01-16)
- 0.2.2 (2015-01-16)
- 0.2.1 (2015-01-16)
- 0.2.0 (2015-01-14)
- 0.1.3 (2014-12-22)
- 0.1.2 (2014-12-18)
- 0.1.1 (2014-12-17)
- 0.1.0 (2014-12-15)
We were looking for a monitoring solution that could replace our previous in-house system, which replaces Nagios. Certain characteristics were very important to us:
Support metrics and faults
Simplicity
We wanted a solution that was easy to manage. Many monitoring systems require maintenance of infrastructure, like message busses, databases, or special coordinators.
Distributed
Distributed configuration
Our automation is geared toward self-contained applications that are in charge of all aspects of their configuration, including monitoring.
When an application is deployed to a host, it should be able to easily implement local monitoring configuration.
Distributed checks
Checks are spread over hosts being monitored. A common pitfall with Nagios is that a central monitoring host can't keep up with all of the tests it needs to perform.
No mother ship. Many distributes systems use a centralized coordinator, which creates a single point of failure and a source of complexity.
Flexibility
It should be easy to choose monitoring infrastructure to suit your environment.
Nagios (and nagionic) plugin support
Something we think Nagios got right is using separate programs to perform checks. This makes debugging checks very easy and allows checks to be implemented in a variety of ways.
We wanted to be able to leverage existing plugins as well as build on the simplicity of using external programs to implement checks.
Application monitoring with Docker support
Monitoring of our applications is as important to us as system monitoring. A common approach to this is to provide a monitoring interface in running services that can be used to access monitoring information. This is especially important when using Docker, because it allows a monitoring agent to just access a port exposed by a container, rather than breaking encapsulation with external monitoring scripts.
We shopped and failed to find an existing system that addressed our needs. Maybe we would have found something eventually, but we realized that will less effort than it would take to find and integrate what we needed, we could build something very simple.
We'd built an in-house system before, which while satisfying some of the requirements above, still fell short and was more complicated than what we were comfortable maintaining over the long run. Experience with this system and with Nagios earlier informed out requirements and our approach.
A CIMAA system consists of one or more agents spread over each machine we control. Generally, each agent is only responsible for checking the machine it runs on.
- Store heartbeat and fault information in a database. The database is pluggable. The first implementation is for DynamoDB.
- Use pluggable alerters to notify about critical faults. An initial implementation supports PagerDuty.
- Use pluggable metrics sinks. Initial implementations include logs (log files, syslog-ng, etc.) and Kinesis.
Configured locally
Nagios plugins
CIMAA plugins
Stand-alone programs that output JSON fault and metric data.
Network checks
TCP addresses or unix-domain sockets that output JSON fault and metric data.
Simple network tests:
- Can an address be connected to.
- simple HTTP checks with url, expected status code and maybe expected text content.
Check whether agents are running (using hearbeats) and whether notifications are working.
If notification failures are detected, can notify operations staff over secondary or tertiary channels.
Alert if global squelch has been in place too long.
Run as ordinary checks on many or all agents.
Avoids need for mother ship.
We'll need to put some thought into strategies and support for avoiding thundering herds.
Patterns stored in database to prevent notifications of critical errors for faults with names matching the patterns.
(Currently, regular expressions, but maybe these should be less powerful.)
Can be used in cases where you only want to alert when there are faults on multiple hosts for a service. In this case, squelch host-specific alerts and implement a meta-monitor that uses data from multiple hosts.
We're still building.
- Initial agent implementation with:
- support for Nagios and CIMAA plugins.
- faults
- database
- alerts
- Metric support
- metrics output
- metric-threshold checks
- logging back-end
- Kinesis back-end
- DynamoDB database implementation
- PagerDuty alerter implementation.
- Slack alerter implementation.
- Meta checks for dead agents and forgotten squelches.
- Production use
- Web front end to view current faults and squelches and to manage squelches (in progress as a separate package).
- Network checks
- Check rules that prevent alerts in sleeping hours for less important checks.
- Maybe database configuration of checks to be performed everywhere.
- Maybe a backup alert mechanism. We already have this to some extent if sentry is used.
- Support non-escalating faults, and use them for failures in monitors. These should not be used when reporting application failures (#15).
- Parse metrics from Nagios plugin output by default. If thresholds are specified and metric parsing is disabled, an error is generated (#12).
- Add 'since' field to DynamoDB data store (#18).
- Report startup errors via configured logging (including Sentry) instead of letting them get quietly ignored in log files.
- Report errors parsing check configurations as monitored failures, always critical, without causing the agent to exit.
- Restrict the length of descriptions passed to PagerDuty.
- Retry DynamoDB operations when exceeding the provisioned number of operations, ensuring Sentry alerts are generated when Sentry is configured.
- Make all uncaught exceptions from Agent.perform get reported in a Sentry visible way.
- Automatically remove the agent from the database on SIGTERM.
- Fix setup.py version.
- Times stored in DynamoDB are converted to integers; sub-second resolution isn't needed.
- If a check test returns alternating critical/error states (it's unusual for a test to return critical), it stays critical until it clears.
- Moved stub implementations into
zc.cimaa.stub
to make them easier to use outside of tests (e.g. when debugging real installations.) - Check meta-failures (check had error, such as invalid output) now start soft to avoid alerting on intermittent check failures.
- Fixed: missing sys import for squelch script.
- Allow "optional" as synonym for "?" in threshold specifications (https://bitbucket.org/zc/cimaa/issue/5/).
- Prefer SUDO_USER is getpass.getuser() returns "root" (https://bitbucket.org/zc/cimaa/issue/6/).
- Fix data conversions in dynamo db.
- Make databases return floats for times; dynamodb had returned decimals.
- Renamed meta-monitor entry point to meta-check.
Added an alerter that talks to Slack.
Added a meta-monitor for dead agents and forgotten squelches.
This required adding a new method to the database API.
Added a
permanent
flag for squelches intended to hang around indefinitely. The meta-monitor doesn't complain about permanent squelches.Replaced the dynamodb-specific squelch script with generic squelch and unsquelch scripts.
On monitor timeout, error rather than going critical immediately. Timeouts can be intermittent and we don't want to alert in this case.
Fix local variable reference in DynamoDB implementation.
Restore message
field on fault records returned by DynamoDB, if
omitted because of empty string value.
Fixed log level configuration for Sentry.
Initial release.