[metrics-bugs] #33941 [Internal Services/Tor Sysadmin Team]: Nagios checks for op-??.onionperf.torproject.net

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Apr 27 14:10:20 UTC 2020


#33941: Nagios checks for op-??.onionperf.torproject.net
-------------------------------------------------+---------------------
 Reporter:  karsten                              |          Owner:  tpa
     Type:  task                                 |         Status:  new
 Priority:  Medium                               |      Milestone:
Component:  Internal Services/Tor Sysadmin Team  |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:                                       |  Actual Points:
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+---------------------

Comment (by karsten):

 I don't know Prometheus or Grafana, so I cannot say how difficult it would
 be to use them. My preference for using Nagios is mostly because we
 already have other checks running in Nagios. And I'm looking for something
 we can deploy really soon, so that we can turn off an AWS host running our
 own Nagios before the end of the month.

 Here's a new plan: How about I write another short Python script that
 downloads the latest log file from OnionPerf hosts via HTTPS with header
 `"Accept-Encoding: gzip"` and performs some basic checks to see if
 measurements are still being made? This wouldn't cover the disk space
 check (which I hope is under control now with #33396 being merged). But it
 would cover many other failure types preventing us from making continuous
 measurements.

 What do you think? Should I write some more Python today?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33941#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the metrics-bugs mailing list