Files
faas/watchdog/README.md

88 lines
3.1 KiB
Markdown

Watchdog
==========
The FaaS watchdog is designed to marshal a HTTP request between your public HTTP URL and a individual function.
Creating a function:
- [x] Use an existing or a new Docker image
- [x] Add the fwatchdog binary from the [Releases page](https://github.com/alexellis/faas/releases) via `curl` or `ADD https://`
- [x] Set an `fprocess` environmental variable with the function you want to run for each request
- [x] Expose port 8080
- [x] Set the `CMD` to `fwatchdog`
Example Dockerfile:
```
FROM alpine:3.5
ADD https://github.com/alexellis/faas/releases/download/v0.5-alpha/fwatchdog /usr/bin
RUN chmod +x /usr/bin/fwatchdog
# Define your UNIX binary here
ENV fprocess="/bin/cat"
CMD ["fwatchdog"]
```
**Implementing the a healthcheck**
Docker swarm will keep your function out of the DNS-RR / IPVS pool if the task (container) is not healthy.
Here is an example of the `echo` function implementing a healthcheck with a 5-second checking interval.
```
FROM functions/alpine
ENV fprocess="cat /etc/hostname"
HEALTHCHECK --interval=5s CMD [ -e /tmp/.lock ] || exit 1
```
The watchdog process creates a .lock file in `/tmp/` on starting its internal Golang HTTP server. `[ -e file_name ]` is shell to check if a file exists.
Swarm tutorial on Healthchecks:
* [Test-drive Docker Healthcheck in 10 minutes](http://blog.alexellis.io/test-drive-healthcheck/)
**Environmental overrides:**
A number of environmental overrides can be added for additional flexibility and options:
| Option | Usage |
|------------------------|--------------|
| `fprocess` | The process to invoke for each function call. This must be a UNIX binary and accept input via STDIN and output via STDOUT. |
| `marshal_requests` | Instead of re-directing the raw HTTP body into your fprocess, it will first be marshalled into JSON. Use this if you need to work with HTTP headers |
| `content_type` | Force a specific Content-Type response for all responses. |
| `write_timeout` | HTTP timeout for writing a response body from your function |
| `read_timeout` | HTTP timeout for reading the payload from the client caller |
| `suppress_lock` | The watchdog will attempt to write a lockfile to /tmp/ for swarm healthchecks - set this to true to disable behaviour. |
## Advanced / tuning
**Content-Type of request/response**
By default the watchdog will match the response of your function to the "Content-Type" of the client.
* If your client sends a JSON post with a Content-Type of `application/json` this will be matched automatically in the response.
* If your client sends a JSON post with a Content-Type of `text/plain` this will be matched automatically in the response too
To override the Content-Type of all your responses set the `content_type` environmental variable.
**Tuning auto-scaling**
Auto-scaling starts at 1 replica and steps up in blocks of 5:
* 1->5
* 5->10
* 10->15
* 15->20
You can override the upper limit of auto-scaling by setting the following label on your container:
```
com.faas.max_replicas: "10"
```
If you want to disable scaling, set the `com.faas.max_replicas` value to `"1"`.