2015-11-18 20:14:28 +00:00
|
|
|
---
|
|
|
|
layout: "docs"
|
|
|
|
page_title: "Service Discovery in Nomad"
|
2015-11-18 21:35:16 +00:00
|
|
|
sidebar_current: "docs-jobspec-service-discovery"
|
2015-11-18 20:14:28 +00:00
|
|
|
description: |-
|
|
|
|
Learn how to add service discovery to jobs
|
2015-11-18 22:11:23 +00:00
|
|
|
---
|
2015-11-18 20:14:28 +00:00
|
|
|
|
|
|
|
# Service Discovery
|
|
|
|
|
2015-11-18 21:15:47 +00:00
|
|
|
Nomad schedules workloads of various types across a cluster of generic hosts.
|
|
|
|
Because of this, placement is not known in advance and you will need to use
|
|
|
|
service discovery to connect tasks to other services deployed across your
|
|
|
|
cluster. Nomad integrates with [Consul](https://consul.io) to provide service
|
|
|
|
discovery and monitoring.
|
|
|
|
|
|
|
|
Note that in order to use Consul with Nomad, you will need to configure and
|
|
|
|
install Consul on your nodes alongside Nomad, or schedule it as a system job.
|
|
|
|
Nomad does not currently run Consul for you.
|
2015-11-18 20:14:28 +00:00
|
|
|
|
|
|
|
## Configuration
|
|
|
|
|
2015-11-18 21:20:23 +00:00
|
|
|
* `consul.address`: This is a Nomad client configuration which can be used to
|
|
|
|
override the default Consul Agent HTTP port that Nomad uses to connect to
|
|
|
|
Consul. The default for this is `127.0.0.1:8500`.
|
2015-11-18 20:14:28 +00:00
|
|
|
|
2015-11-25 21:58:11 +00:00
|
|
|
* `consul.token`: Token is used to provide a per-request ACL token.This options
|
|
|
|
overrides the agent's default token
|
|
|
|
|
|
|
|
* `consul.auth`: The auth information to use for http access to the Consul
|
|
|
|
Agent.
|
|
|
|
|
2015-11-25 21:49:31 +00:00
|
|
|
* `consul.ssl`: This boolean option sets the transport scheme to talk to the Consul
|
|
|
|
Agent as `https`. This option is unset by default and so the default transport
|
|
|
|
scheme for the consul api client is `http`.
|
|
|
|
|
2015-11-29 01:33:34 +00:00
|
|
|
* `consul.verifyssl`: This option enables SSL verification when the transport
|
2015-11-25 21:49:31 +00:00
|
|
|
scheme for the Consul API client is `https`. This is set to true by default.
|
|
|
|
|
|
|
|
|
2015-11-18 21:15:47 +00:00
|
|
|
## Service Definition Syntax
|
2015-11-18 20:14:28 +00:00
|
|
|
|
|
|
|
The service blocks in a Task definition defines a service which Nomad will
|
2015-11-18 20:19:20 +00:00
|
|
|
register with Consul. Multiple Service blocks are allowed in a Task definition,
|
2015-11-18 21:20:23 +00:00
|
|
|
which allow registering multiple services for a task that exposes multiple
|
|
|
|
ports.
|
2015-11-18 20:14:28 +00:00
|
|
|
|
2015-11-18 21:20:23 +00:00
|
|
|
### Example
|
2015-11-18 20:14:28 +00:00
|
|
|
|
|
|
|
A brief example of a service definition in a Task
|
2015-11-18 22:22:42 +00:00
|
|
|
|
2015-11-18 20:14:28 +00:00
|
|
|
```
|
|
|
|
group "database" {
|
|
|
|
task "mysql" {
|
|
|
|
driver = "docker"
|
|
|
|
service {
|
|
|
|
tags = ["master", "mysql"]
|
|
|
|
port = "db"
|
|
|
|
check {
|
|
|
|
type = "tcp"
|
|
|
|
delay = "10s"
|
|
|
|
timeout = "2s"
|
|
|
|
}
|
|
|
|
}
|
2015-11-18 21:15:47 +00:00
|
|
|
resources {
|
2015-11-18 20:14:28 +00:00
|
|
|
cpu = 500
|
|
|
|
memory = 1024
|
|
|
|
network {
|
|
|
|
mbits = 10
|
|
|
|
port "db" {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2015-11-18 21:20:23 +00:00
|
|
|
* `name`: Nomad automatically determines the name of a Task. By default the
|
|
|
|
name of a service is $(job-name)-$(task-group)-$(task-name). Users can
|
|
|
|
explicitly name the service by specifying this option. If multiple services
|
|
|
|
are defined for a Task then only one task can have the default name, all the
|
2015-11-27 03:37:52 +00:00
|
|
|
services have to be explicitly named. Users can add the following to the
|
|
|
|
service names: ```${JOB}```, ```${TASKGROUP}```, ```${TASK}```, ```${BASE}```.
|
|
|
|
Nomad will replace them with the appropriate value of the Job, Task Group and
|
2015-11-27 03:45:16 +00:00
|
|
|
Task names while registering the Job. ```${BASE}``` expands to ${JOB}-${TASKGROUP}-${TASK}
|
2015-11-18 20:14:28 +00:00
|
|
|
|
|
|
|
* `tags`: A list of tags associated with this Service.
|
|
|
|
|
2015-11-18 20:19:20 +00:00
|
|
|
* `port`: The port indicates the port associated with the Service. Users are
|
2015-11-18 21:15:47 +00:00
|
|
|
required to specify a valid port label here which they have defined in the
|
2015-11-18 21:20:23 +00:00
|
|
|
resources block. This could be a label to either a dynamic or a static port.
|
|
|
|
If an incorrect port label is specified, Nomad doesn't register the service
|
|
|
|
with Consul.
|
2015-11-18 20:14:28 +00:00
|
|
|
|
|
|
|
* `check`: A check block defines a health check associated with the service.
|
2015-11-18 21:20:23 +00:00
|
|
|
Multiple check blocks are allowed for a service. Nomad currently supports
|
|
|
|
only the `http` and `tcp` Consul Checks.
|
|
|
|
|
|
|
|
### Check Syntax
|
2015-11-18 20:14:28 +00:00
|
|
|
|
|
|
|
* `type`: This indicates the check types supported by Nomad. Valid options are
|
|
|
|
currently `http` and `tcp`. In the future Nomad will add support for more
|
|
|
|
Consul checks.
|
|
|
|
|
|
|
|
* `delay`: This indicates the frequency of the health checks that Consul with
|
|
|
|
perform.
|
|
|
|
|
|
|
|
* `timeout`: This indicates how long Consul will wait for a health check query
|
|
|
|
to succeed.
|
|
|
|
|
|
|
|
* `path`: The path of the http endpoint which Consul will query to query the
|
|
|
|
health of a service if the type of the check is `http`. Nomad will add the ip
|
|
|
|
of the service and the port, users are only required to add the relative url
|
|
|
|
of the health check endpoint.
|
|
|
|
|
2015-11-18 21:20:23 +00:00
|
|
|
* `protocol`: This indicates the protocol for the http checks. Valid options
|
2015-11-18 22:31:56 +00:00
|
|
|
are `http` and `https`. We default it to `http`
|
2015-11-18 20:14:28 +00:00
|
|
|
|
2015-11-18 21:20:23 +00:00
|
|
|
## Assumptions
|
2015-11-18 20:14:28 +00:00
|
|
|
|
2015-11-18 20:22:48 +00:00
|
|
|
* Consul 0.6 is needed for using the TCP checks.
|
|
|
|
|
2015-11-18 21:20:23 +00:00
|
|
|
* The Service Discovery feature in Nomad depends on Operators making sure that
|
|
|
|
the Nomad client can reach the consul agent.
|
2015-11-18 20:14:28 +00:00
|
|
|
|
|
|
|
* Nomad assumes that it controls the life cycle of all the externally
|
|
|
|
discoverable services running on a host.
|
|
|
|
|
2015-11-18 21:20:23 +00:00
|
|
|
* Tasks running inside Nomad also needs to reach out to the Consul agent if
|
|
|
|
they want to use any of the Consul APIs. Ex: A task running inside a docker
|
|
|
|
container in the bridge mode won't be able to talk to a Consul Agent running
|
|
|
|
on the loopback interface of the host since the container in the bridge mode
|
|
|
|
has it's own network interface and doesn't see interfaces on the global
|
|
|
|
network namespace of the host. There are a couple of ways to solve this, one
|
|
|
|
way is to run the container in the host networking mode, or make the Consul
|
|
|
|
agent listen on an interface on the network namespace of the container.
|