2014-08-22 00:25:42 +00:00
|
|
|
---
|
2020-04-07 18:55:19 +00:00
|
|
|
layout: docs
|
|
|
|
page_title: Watches
|
|
|
|
description: >-
|
|
|
|
Watches are a way of specifying a view of data (e.g. list of nodes, KV pairs,
|
|
|
|
health checks) which is monitored for updates. When an update is detected, an
|
|
|
|
external handler is invoked. A handler can be any executable. As an example,
|
|
|
|
you could watch the status of health checks and notify an external system when
|
|
|
|
a check is critical.
|
2014-08-22 00:25:42 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Watches
|
|
|
|
|
2015-02-05 03:25:29 +00:00
|
|
|
Watches are a way of specifying a view of data (e.g. list of nodes, KV pairs, health
|
|
|
|
checks) which is monitored for updates. When an update is detected, an external handler
|
2017-10-22 01:39:09 +00:00
|
|
|
is invoked. A handler can be any executable or HTTP endpoint. As an example, you could watch the status
|
2015-02-05 03:25:29 +00:00
|
|
|
of health checks and notify an external system when a check is critical.
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-09 23:20:00 +00:00
|
|
|
Watches are implemented using blocking queries in the [HTTP API](/api).
|
2015-02-05 03:25:29 +00:00
|
|
|
Agents automatically make the proper API calls to watch for changes
|
2014-08-22 00:25:42 +00:00
|
|
|
and inform a handler when the data view has updated.
|
|
|
|
|
2022-01-10 21:13:13 +00:00
|
|
|
Watches can be configured as part of the [agent's configuration](/docs/agent/config/agent-config-files#watches),
|
2014-08-22 00:25:42 +00:00
|
|
|
causing them to run once the agent is initialized. Reloading the agent configuration
|
|
|
|
allows for adding or removing watches dynamically.
|
|
|
|
|
2020-10-14 15:23:05 +00:00
|
|
|
Alternatively, the [watch command](/commands/watch) enables a watch to be
|
2015-02-05 03:25:29 +00:00
|
|
|
started outside of the agent. This can be used by an operator to inspect data in Consul
|
2014-08-22 00:25:42 +00:00
|
|
|
or to easily pipe data into processes without being tied to the agent lifecycle.
|
|
|
|
|
|
|
|
In either case, the `type` of the watch must be specified. Each type of watch
|
2015-02-05 03:25:29 +00:00
|
|
|
supports different parameters, some required and some optional. These options are specified
|
|
|
|
in a JSON body when using agent configuration or as CLI flags for the watch command.
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
## Handlers
|
|
|
|
|
2015-02-05 03:25:29 +00:00
|
|
|
The watch configuration specifies the view of data to be monitored.
|
2017-10-22 01:51:37 +00:00
|
|
|
Once that view is updated, the specified handler is invoked. Handlers can be either an
|
2017-10-22 01:55:15 +00:00
|
|
|
executable or an HTTP endpoint. A handler receives JSON formatted data
|
2017-10-22 01:39:09 +00:00
|
|
|
with invocation info, following a format that depends on the type of the watch.
|
|
|
|
Each watch type documents the format type. Because they map directly to an HTTP
|
|
|
|
API, handlers should expect the input to match the format of the API. A Consul
|
|
|
|
index is also given, corresponding to the responses from the
|
2020-04-09 23:20:00 +00:00
|
|
|
[HTTP API](/api).
|
2017-10-22 01:39:09 +00:00
|
|
|
|
|
|
|
### Executable
|
|
|
|
|
|
|
|
An executable handler reads the JSON invocation info from stdin. Additionally,
|
|
|
|
the `CONSUL_INDEX` environment variable will be set to the Consul index
|
|
|
|
Anything written to stdout is logged.
|
|
|
|
|
|
|
|
Here is an example configuration, where `handler_type` is optionally set to
|
|
|
|
`script`:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2017-10-22 01:39:09 +00:00
|
|
|
{
|
|
|
|
"type": "key",
|
|
|
|
"key": "foo/bar/baz",
|
|
|
|
"handler_type": "script",
|
|
|
|
"args": ["/usr/bin/my-service-handler.sh", "-redis"]
|
|
|
|
}
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2017-10-04 23:48:00 +00:00
|
|
|
Prior to Consul 1.0, watches used a single `handler` field to define the command to run, and
|
|
|
|
would always run in a shell. In Consul 1.0, the `args` array was added so that handlers can be
|
|
|
|
run without a shell. The `handler` field is deprecated, and you should include the shell in
|
|
|
|
the `args` to run under a shell, eg. `"args": ["sh", "-c", "..."]`.
|
|
|
|
|
2017-10-22 01:39:09 +00:00
|
|
|
### HTTP endpoint
|
|
|
|
|
2017-10-22 03:09:37 +00:00
|
|
|
An HTTP handler sends an HTTP request when a watch is invoked. The JSON invocation info is sent
|
|
|
|
as a payload along the request. The response also contains the Consul index as a header named
|
|
|
|
`X-Consul-Index`.
|
2017-10-22 01:51:37 +00:00
|
|
|
|
|
|
|
The HTTP handler can be configured by setting `handler_type` to `http`. Additional handler options
|
2017-10-22 03:09:37 +00:00
|
|
|
are set using `http_handler_config`. The only required parameter is the `path` field which specifies
|
|
|
|
the URL to the HTTP endpoint. Consul uses `POST` as the default HTTP method, but this is also configurable.
|
2018-09-22 01:30:16 +00:00
|
|
|
Other optional fields are `header`, `timeout` and `tls_skip_verify`. The watch invocation data is
|
2017-10-22 03:09:37 +00:00
|
|
|
always sent as a JSON payload.
|
2017-10-22 01:39:09 +00:00
|
|
|
|
|
|
|
Here is an example configuration:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2017-10-22 01:39:09 +00:00
|
|
|
{
|
|
|
|
"type": "key",
|
|
|
|
"key": "foo/bar/baz",
|
|
|
|
"handler_type": "http",
|
|
|
|
"http_handler_config": {
|
2020-04-09 00:09:01 +00:00
|
|
|
"path": "https://localhost:8000/watch",
|
2017-10-22 01:39:09 +00:00
|
|
|
"method": "POST",
|
2020-04-09 00:09:01 +00:00
|
|
|
"header": { "x-foo": ["bar", "baz"] },
|
2017-10-22 01:39:09 +00:00
|
|
|
"timeout": "10s",
|
|
|
|
"tls_skip_verify": false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2014-08-22 00:25:42 +00:00
|
|
|
## Global Parameters
|
|
|
|
|
|
|
|
In addition to the parameters supported by each option type, there
|
|
|
|
are a few global parameters that all watches support:
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
- `datacenter` - Can be provided to override the agent's default datacenter.
|
|
|
|
- `token` - Can be provided to override the agent's default ACL token.
|
|
|
|
- `args` - The handler subprocess and arguments to invoke when the data view updates.
|
|
|
|
- `handler` - The handler shell command to invoke when the data view updates.
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
## Watch Types
|
|
|
|
|
2015-02-05 03:28:10 +00:00
|
|
|
The following types are supported. Detailed documentation on each is below:
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
- [`key`](#key) - Watch a specific KV pair
|
|
|
|
- [`keyprefix`](#keyprefix) - Watch a prefix in the KV store
|
|
|
|
- [`services`](#services) - Watch the list of available services
|
|
|
|
- [`nodes`](#nodes) - Watch the list of nodes
|
|
|
|
- [`service`](#service)- Watch the instances of a service
|
|
|
|
- [`checks`](#checks) - Watch the value of health checks
|
|
|
|
- [`event`](#event) - Watch for custom user events
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
### Type: key ((#key))
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
The "key" watch type is used to watch a specific key in the KV store.
|
|
|
|
It requires that the "key" parameter be specified.
|
|
|
|
|
|
|
|
This maps to the `/v1/kv/` API internally.
|
|
|
|
|
|
|
|
Here is an example configuration:
|
|
|
|
|
2021-07-31 01:37:33 +00:00
|
|
|
```json
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
|
|
|
"type": "key",
|
|
|
|
"key": "foo/bar/baz",
|
2017-10-04 23:48:00 +00:00
|
|
|
"args": ["/usr/bin/my-service-handler.sh", "-redis"]
|
2014-10-19 23:40:10 +00:00
|
|
|
}
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
Or, using the watch command:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-09 00:09:01 +00:00
|
|
|
$ consul watch -type=key -key=foo/bar/baz /usr/bin/my-key-handler.sh
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
An example of the output of this command:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
|
|
|
"Key": "foo/bar/baz",
|
|
|
|
"CreateIndex": 1793,
|
|
|
|
"ModifyIndex": 1793,
|
|
|
|
"LockIndex": 0,
|
|
|
|
"Flags": 0,
|
|
|
|
"Value": "aGV5",
|
|
|
|
"Session": ""
|
|
|
|
}
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
### Type: keyprefix ((#keyprefix))
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
The "keyprefix" watch type is used to watch a prefix of keys in the KV store.
|
2015-06-12 14:09:44 +00:00
|
|
|
It requires that the "prefix" parameter be specified. This watch
|
2020-04-06 20:27:35 +00:00
|
|
|
returns _all_ keys matching the prefix whenever _any_ key matching the prefix
|
2015-06-12 14:07:42 +00:00
|
|
|
changes.
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
This maps to the `/v1/kv/` API internally.
|
|
|
|
|
|
|
|
Here is an example configuration:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
|
|
|
"type": "keyprefix",
|
|
|
|
"prefix": "foo/",
|
2019-11-06 04:34:46 +00:00
|
|
|
"args": ["/usr/bin/my-prefix-handler.sh", "-redis"]
|
2014-10-19 23:40:10 +00:00
|
|
|
}
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
Or, using the watch command:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-09 00:09:01 +00:00
|
|
|
$ consul watch -type=keyprefix -prefix=foo/ /usr/bin/my-prefix-handler.sh
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
An example of the output of this command:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```text
|
|
|
|
[
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Key: 'foo/bar',
|
|
|
|
CreateIndex: 1796,
|
|
|
|
ModifyIndex: 1796,
|
|
|
|
LockIndex: 0,
|
|
|
|
Flags: 0,
|
|
|
|
Value: 'TU9BUg==',
|
|
|
|
Session: '',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Key: 'foo/baz',
|
|
|
|
CreateIndex: 1795,
|
|
|
|
ModifyIndex: 1795,
|
|
|
|
LockIndex: 0,
|
|
|
|
Flags: 0,
|
|
|
|
Value: 'YXNkZg==',
|
|
|
|
Session: '',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Key: 'foo/test',
|
|
|
|
CreateIndex: 1793,
|
|
|
|
ModifyIndex: 1793,
|
|
|
|
LockIndex: 0,
|
|
|
|
Flags: 0,
|
|
|
|
Value: 'aGV5',
|
|
|
|
Session: '',
|
|
|
|
},
|
2014-10-19 23:40:10 +00:00
|
|
|
]
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
### Type: services ((#services))
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
The "services" watch type is used to watch the list of available
|
|
|
|
services. It has no parameters.
|
|
|
|
|
|
|
|
This maps to the `/v1/catalog/services` API internally.
|
|
|
|
|
|
|
|
An example of the output of this command:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
|
|
|
"consul": [],
|
|
|
|
"redis": [],
|
|
|
|
"web": []
|
|
|
|
}
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
### Type: nodes ((#nodes))
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
The "nodes" watch type is used to watch the list of available
|
|
|
|
nodes. It has no parameters.
|
|
|
|
|
|
|
|
This maps to the `/v1/catalog/nodes` API internally.
|
|
|
|
|
|
|
|
An example of the output of this command:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```text
|
|
|
|
[
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: 'nyc1-consul-1',
|
|
|
|
Address: '192.241.159.115',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: 'nyc1-consul-2',
|
|
|
|
Address: '192.241.158.205',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: 'nyc1-consul-3',
|
|
|
|
Address: '198.199.77.133',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: 'nyc1-worker-1',
|
|
|
|
Address: '162.243.162.228',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: 'nyc1-worker-2',
|
|
|
|
Address: '162.243.162.226',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: 'nyc1-worker-3',
|
|
|
|
Address: '162.243.162.229',
|
2020-04-09 00:09:01 +00:00
|
|
|
}
|
2014-10-19 23:40:10 +00:00
|
|
|
]
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
### Type: service ((#service))
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
The "service" watch type is used to monitor the providers
|
2015-02-05 03:25:29 +00:00
|
|
|
of a single service. It requires the "service" parameter
|
2020-04-06 20:27:35 +00:00
|
|
|
and optionally takes the parameters "tag" and
|
2019-04-29 19:28:01 +00:00
|
|
|
"passingonly". The "tag" parameter will filter by one or more tags.
|
|
|
|
It may be either a single string value or a slice of strings.
|
2020-04-06 20:27:35 +00:00
|
|
|
The "passingonly" is a boolean that will filter to only the
|
2019-04-29 19:28:01 +00:00
|
|
|
instances passing all health checks.
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
This maps to the `/v1/health/service` API internally.
|
|
|
|
|
2019-04-29 19:28:01 +00:00
|
|
|
Here is an example configuration with a single tag:
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
|
|
|
"type": "service",
|
2014-12-27 05:51:48 +00:00
|
|
|
"service": "redis",
|
2019-04-29 19:28:01 +00:00
|
|
|
"args": ["/usr/bin/my-service-handler.sh", "-redis"],
|
|
|
|
"tag": "bar"
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Here is an example configuration with multiple tags:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2019-04-29 19:28:01 +00:00
|
|
|
{
|
|
|
|
"type": "service",
|
|
|
|
"service": "redis",
|
|
|
|
"args": ["/usr/bin/my-service-handler.sh", "-redis"],
|
|
|
|
"tag": ["bar", "foo"]
|
2014-10-19 23:40:10 +00:00
|
|
|
}
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
Or, using the watch command:
|
|
|
|
|
2019-04-29 19:28:01 +00:00
|
|
|
Single tag:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-09 00:09:01 +00:00
|
|
|
$ consul watch -type=service -service=redis -tag=bar /usr/bin/my-service-handler.sh
|
|
|
|
```
|
2019-04-29 19:28:01 +00:00
|
|
|
|
|
|
|
Multiple tag:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-09 00:09:01 +00:00
|
|
|
$ consul watch -type=service -service=redis -tag=bar -tag=foo /usr/bin/my-service-handler.sh
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
An example of the output of this command:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```text
|
|
|
|
[
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: {
|
|
|
|
Node: 'foobar',
|
|
|
|
Address: '10.1.10.12',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
2020-04-06 20:27:35 +00:00
|
|
|
Service: {
|
|
|
|
ID: 'redis',
|
|
|
|
Service: 'redis',
|
|
|
|
Tags: ['bar', 'foo'],
|
|
|
|
Port: 8000,
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
2020-04-06 20:27:35 +00:00
|
|
|
Checks: [
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: 'foobar',
|
|
|
|
CheckID: 'service:redis',
|
|
|
|
Name: "Service 'redis' check",
|
|
|
|
Status: 'passing',
|
|
|
|
Notes: '',
|
|
|
|
Output: '',
|
|
|
|
ServiceID: 'redis',
|
|
|
|
ServiceName: 'redis',
|
2014-10-19 23:40:10 +00:00
|
|
|
},
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
Node: 'foobar',
|
|
|
|
CheckID: 'serfHealth',
|
|
|
|
Name: 'Serf Health Status',
|
|
|
|
Status: 'passing',
|
|
|
|
Notes: '',
|
|
|
|
Output: '',
|
|
|
|
ServiceID: '',
|
|
|
|
ServiceName: '',
|
|
|
|
},
|
|
|
|
],
|
2020-04-09 00:09:01 +00:00
|
|
|
}
|
2014-10-19 23:40:10 +00:00
|
|
|
]
|
|
|
|
```
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
### Type: checks ((#checks))
|
2014-08-22 00:25:42 +00:00
|
|
|
|
|
|
|
The "checks" watch type is used to monitor the checks of a given
|
2014-11-26 13:48:33 +00:00
|
|
|
service or those in a specific state. It optionally takes the "service"
|
2015-02-05 03:25:29 +00:00
|
|
|
parameter to filter to a specific service or the "state" parameter to
|
|
|
|
filter to a specific state. By default, it will watch all checks.
|
2014-08-22 00:25:42 +00:00
|
|
|
|
2015-02-05 03:25:29 +00:00
|
|
|
This maps to the `/v1/health/state/` API if monitoring by state
|
2014-08-22 00:25:42 +00:00
|
|
|
or `/v1/health/checks/` if monitoring by service.
|
|
|
|
|
2019-11-02 06:18:46 +00:00
|
|
|
Here is an example configuration for monitoring by state:
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
|
|
|
"type": "checks",
|
|
|
|
"state": "passing",
|
|
|
|
"args": ["/usr/bin/my-check-handler.sh", "-passing"]
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Here is an example configuration for monitoring by service:
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
|
|
|
"type": "checks",
|
|
|
|
"service": "redis",
|
|
|
|
"args": ["/usr/bin/my-check-handler.sh", "-redis"]
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Or, using the watch command:
|
|
|
|
|
|
|
|
State:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-09 00:09:01 +00:00
|
|
|
$ consul watch -type=checks -state=passing /usr/bin/my-check-handler.sh -passing
|
|
|
|
```
|
2019-11-02 06:18:46 +00:00
|
|
|
|
|
|
|
Service:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-09 00:09:01 +00:00
|
|
|
$ consul watch -type=checks -service=redis /usr/bin/my-check-handler.sh -redis
|
|
|
|
```
|
2019-11-02 06:18:46 +00:00
|
|
|
|
2014-08-22 00:25:42 +00:00
|
|
|
An example of the output of this command:
|
|
|
|
|
2019-11-02 06:18:46 +00:00
|
|
|
```json
|
2014-10-19 23:40:10 +00:00
|
|
|
[
|
|
|
|
{
|
|
|
|
"Node": "foobar",
|
|
|
|
"CheckID": "service:redis",
|
|
|
|
"Name": "Service 'redis' check",
|
|
|
|
"Status": "passing",
|
|
|
|
"Notes": "",
|
|
|
|
"Output": "",
|
|
|
|
"ServiceID": "redis",
|
|
|
|
"ServiceName": "redis"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
```
|
2014-08-29 00:22:56 +00:00
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
### Type: event ((#event))
|
2014-08-29 00:22:56 +00:00
|
|
|
|
|
|
|
The "event" watch type is used to monitor for custom user
|
2020-10-14 15:23:05 +00:00
|
|
|
events. These are fired using the [consul event](/commands/event) command.
|
2015-02-05 03:25:29 +00:00
|
|
|
It takes only a single optional "name" parameter which restricts
|
2014-08-29 00:22:56 +00:00
|
|
|
the watch to only events with the given name.
|
|
|
|
|
2019-11-06 04:34:46 +00:00
|
|
|
This maps to the `/v1/event/list` API internally.
|
2014-08-29 00:22:56 +00:00
|
|
|
|
|
|
|
Here is an example configuration:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2014-10-19 23:40:10 +00:00
|
|
|
{
|
|
|
|
"type": "event",
|
|
|
|
"name": "web-deploy",
|
2019-11-06 04:34:46 +00:00
|
|
|
"args": ["/usr/bin/my-event-handler.sh", "-web-deploy"]
|
2014-10-19 23:40:10 +00:00
|
|
|
}
|
|
|
|
```
|
2014-08-29 00:22:56 +00:00
|
|
|
|
|
|
|
Or, using the watch command:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-09 00:09:01 +00:00
|
|
|
$ consul watch -type=event -name=web-deploy /usr/bin/my-event-handler.sh -web-deploy
|
|
|
|
```
|
2014-08-29 00:22:56 +00:00
|
|
|
|
|
|
|
An example of the output of this command:
|
|
|
|
|
2020-04-09 00:09:01 +00:00
|
|
|
```json
|
2014-10-19 23:40:10 +00:00
|
|
|
[
|
|
|
|
{
|
|
|
|
"ID": "f07f3fcc-4b7d-3a7c-6d1e-cf414039fcee",
|
|
|
|
"Name": "web-deploy",
|
|
|
|
"Payload": "MTYwOTAzMA==",
|
|
|
|
"NodeFilter": "",
|
|
|
|
"ServiceFilter": "",
|
|
|
|
"TagFilter": "",
|
|
|
|
"Version": 1,
|
|
|
|
"LTime": 18
|
|
|
|
},
|
|
|
|
...
|
|
|
|
]
|
|
|
|
```
|
2014-08-29 00:22:56 +00:00
|
|
|
|
|
|
|
To fire a new `web-deploy` event the following could be used:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2020-04-09 00:09:01 +00:00
|
|
|
$ consul event -name=web-deploy 1609030
|
|
|
|
```
|