5.2 KiB
layout | page_title | sidebar_current | description |
---|---|---|---|
docs | Service Discovery | docs-jobspec-service-discovery | Learn how to add service discovery to jobs |
Service Discovery
Nomad schedules workloads of various types across a cluster of generic hosts. Because of this, placement is not known in advance and you will need to use service discovery to connect tasks to other services deployed across your cluster. Nomad integrates with Consul to provide service discovery and monitoring.
Note that in order to use Consul with Nomad, you will need to configure and install Consul on your nodes alongside Nomad, or schedule it as a system job. Nomad does not currently run Consul for you.
Configuration
To configure Consul integration please see the Agent's configuration here.
Service Definition Syntax
The service block in a Task definition defines a service which Nomad will register with Consul. Multiple service blocks are allowed in a Task definition, which allow registering multiple services for a Task that exposes multiple ports.
Example
A brief example of a service definition in a Task
group "database" {
task "mysql" {
driver = "docker"
service {
tags = ["master", "mysql"]
port = "db"
check {
type = "tcp"
interval = "10s"
timeout = "2s"
}
check {
type = "script"
name = "check_table"
command = "/usr/local/bin/check_mysql_table_status"
args = ["--verbose"]
interval = "60s"
timeout = "5s"
}
}
resources {
cpu = 500
memory = 1024
network {
mbits = 10
port "db" {}
}
}
}
}
-
name
: Nomad automatically determines the name of a Task. By default the name of a service is$(job-name)-$(task-group)-$(task-name)
. Users can explicitly name the service by specifying this option. If multiple services are defined for a Task then only one task can have the default name, all the services have to be explicitly named. Users can add the following to the service names:${JOB}
,${TASKGROUP}
,${TASK}
,${BASE}
. Nomad will replace them with the appropriate value of the Job, Task Group, and Task names while registering the Job.${BASE}
expands to${JOB}-${TASKGROUP}-${TASK}
. Names must be adhere to RFC-1123 §2.1 and are limited to alphanumeric and hyphen characters (i.e.[a-z0-9\-]
), and be less than 64 characters in length. -
tags
: A list of tags associated with this Service. String interpolation is supported in tags. -
port
:port
is optional and is used to associate the port with the service. If specified, the port label must match one defined in the resources block. This could be a label to either a dynamic or a static port. If an incorrect port label is specified, Nomad doesn't register the IP:Port with Consul. -
check
: A check block defines a health check associated with the service. Multiple check blocks are allowed for a service. Nomad supports thescript
,http
andtcp
Consul Checks. Script checks are not supported for the qemu driver since the Nomad client doesn't have access to the file system of a tasks using the Qemu driver.
Check Syntax
-
type
: This indicates the check types supported by Nomad. Valid options are currentlyscript
,http
andtcp
. -
name
: The name of the health check. -
interval
: This indicates the frequency of the health checks that Consul will perform. -
timeout
: This indicates how long Consul will wait for a health check query to succeed. -
path
: The path of the http endpoint which Consul will query to query the health of a service if the type of the check ishttp
. Nomad will add the IP of the service and the port, users are only required to add the relative URL of the health check endpoint. -
protocol
: This indicates the protocol for the http checks. Valid options arehttp
andhttps
. We default it tohttp
-
command
: This is the command that the Nomad client runs for doing script based health check. -
args
: Additional arguments to thecommand
for script based health checks.
Assumptions
-
Consul 0.6.4 or later is needed for using the Script checks.
-
Consul 0.6.0 or later is needed for using the TCP checks.
-
The service discovery feature in Nomad depends on operators making sure that the Nomad client can reach the Consul agent.
-
Nomad assumes that it controls the life cycle of all the externally discoverable services running on a host.
-
Tasks running inside Nomad also need to reach out to the Consul agent if they want to use any of the Consul APIs. Ex: A task running inside a docker container in the bridge mode won't be able to talk to a Consul Agent running on the loopback interface of the host since the container in the bridge mode has it's own network interface and doesn't see interfaces on the global network namespace of the host. There are a couple of ways to solve this, one way is to run the container in the host networking mode, or make the Consul agent listen on an interface in the network namespace of the container.