terminal: probe + alerts after Traefik replica routing-table skew
User reported "site loads but failed to connect on the tmux session". Root
cause was a Traefik replica (traefik-db7696fbf-ktjjz) that came up missing
the kubernetes_ingress-derived router for terminal.viktorbarzin.me — only
the IngressRoute CRDs registered. About 1/3 of /token preflight requests
landed on that replica and got 404 with router="-", and WS upgrades
intermittently failed the same way, so the lobby iframe stayed stuck on
"Failed to connect. Retrying...". `kubectl delete pod` on the bad replica
restored the missing router and unblocked the user.
This commit adds the long-term mitigation:
stacks/terminal/main.tf
- kubernetes_cron_job_v1.webterminal_probe runs every 5min, hits
/token + /ws via Cloudflare and the in-cluster ttyd Service, pushes
4 gauges to Pushgateway (token_status, ws_status, ttyd_status,
last_success_timestamp). Verified the probe end-to-end:
token=302 ws=302 ttyd=200 ok=1
stacks/monitoring/modules/monitoring/prometheus_chart_values.tpl
- Webterminal group: WebterminalTokenDegraded (warning, 10m),
WebterminalWebsocketDegraded (critical, 10m),
WebterminalTtydUnreachable (critical, 10m),
WebterminalProbeStale (warning, 15m).
- Traefik Router Parity group: TraefikRouterCountSkew fires when any
Traefik replica's router count diverges from siblings for >10m —
catches the same class of issue cluster-wide, not just for terminal.
Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
This commit is contained in:
parent
d828b51670
commit
45c8e88e89
2 changed files with 231 additions and 1 deletions
|
|
@ -2696,6 +2696,84 @@ serverFiles:
|
|||
severity: warning
|
||||
annotations:
|
||||
summary: "{{ $value | printf \"%.0f\" }} stacks drifting — likely a systemic cause (new admission webhook, provider upgrade). Check the most recent drift-detection run in Woodpecker."
|
||||
# Webterminal availability. Metrics pushed by the webterminal-probe
|
||||
# CronJob in stacks/terminal/main.tf every 5 minutes. The probe targets
|
||||
# terminal.viktorbarzin.me via Cloudflare so any failure in the chain
|
||||
# (CDN → tunnel → Traefik → ttyd) lights up an alert.
|
||||
#
|
||||
# The 2026-05-17 incident that motivated these alerts: a Traefik replica
|
||||
# came up missing the kubernetes_ingress-derived router for
|
||||
# terminal.viktorbarzin.me, so ~70% of /token preflight requests routed
|
||||
# to that replica returned 404 with router="-". The WS upgrade failed
|
||||
# intermittently. Fix: `kubectl delete pod -n traefik <replica>`.
|
||||
- name: Webterminal
|
||||
rules:
|
||||
- alert: WebterminalTokenDegraded
|
||||
# /token via Cloudflare must redirect to Authentik (302). Any other
|
||||
# status (especially 404) means a Traefik replica is missing the
|
||||
# terminal Ingress route or ttyd is down.
|
||||
expr: webterminal_probe_token_status{job="webterminal-probe"} != 302 and on() (time() - process_start_time_seconds{job="prometheus"}) > 900
|
||||
for: 10m
|
||||
labels:
|
||||
severity: warning
|
||||
subsystem: webterminal
|
||||
annotations:
|
||||
summary: "Webterminal /token returning HTTP {{ $value }} via Cloudflare (expected 302). Likely a Traefik replica with a partial routing table — `kubectl get pods -n traefik` and delete the suspect replica."
|
||||
- alert: WebterminalWebsocketDegraded
|
||||
# WebSocket upgrade to /ws must also redirect (302). 404 here is
|
||||
# the user-visible "Failed to connect. Retrying..." in the lobby
|
||||
# iframe.
|
||||
expr: webterminal_probe_ws_status{job="webterminal-probe"} != 302 and on() (time() - process_start_time_seconds{job="prometheus"}) > 900
|
||||
for: 10m
|
||||
labels:
|
||||
severity: critical
|
||||
subsystem: webterminal
|
||||
annotations:
|
||||
summary: "Webterminal WebSocket /ws returning HTTP {{ $value }} via Cloudflare — users see 'Failed to connect' in the iframe. Check Traefik route parity across replicas."
|
||||
- alert: WebterminalTtydUnreachable
|
||||
# In-cluster probe to ttyd Service. Bypasses Cloudflare/Traefik/
|
||||
# Authentik, so non-200 means ttyd itself is down on the DevVM.
|
||||
expr: webterminal_probe_ttyd_status{job="webterminal-probe"} != 200 and on() (time() - process_start_time_seconds{job="prometheus"}) > 900
|
||||
for: 10m
|
||||
labels:
|
||||
severity: critical
|
||||
subsystem: webterminal
|
||||
annotations:
|
||||
summary: "ttyd in-cluster probe got HTTP {{ $value }} (expected 200) — ttyd on the DevVM (10.0.10.10:7681) is down. `systemctl status ttyd` on devvm."
|
||||
- alert: WebterminalProbeStale
|
||||
# No probe push for >20m means the CronJob isn't running. Either
|
||||
# the kubelet that owns the namespace can't schedule it or the
|
||||
# job is failing before the push step.
|
||||
expr: (time() - max(webterminal_probe_last_success_timestamp{job="webterminal-probe"})) > 1200
|
||||
for: 15m
|
||||
labels:
|
||||
severity: warning
|
||||
subsystem: webterminal
|
||||
annotations:
|
||||
summary: "Webterminal probe hasn't reported a successful run in {{ $value | humanizeDuration }} — `kubectl get cronjob -n terminal webterminal-probe` and inspect recent Jobs."
|
||||
# Traefik router parity — detects the root cause of the webterminal
|
||||
# outage. When a Traefik replica's Kubernetes Ingress provider fails to
|
||||
# sync, its router table will diverge from siblings. Catches the issue
|
||||
# cluster-wide (not just terminal.viktorbarzin.me) since the same race
|
||||
# can happen for any kubernetes_ingress-managed hostname.
|
||||
- name: Traefik Router Parity
|
||||
rules:
|
||||
- alert: TraefikRouterCountSkew
|
||||
# Each Traefik replica should report the same number of routers.
|
||||
# If max-min across instances is >0 for 10m, one replica is stuck
|
||||
# and should be restarted.
|
||||
expr: |
|
||||
(
|
||||
max(count by (instance) (traefik_router_open_connections))
|
||||
-
|
||||
min(count by (instance) (traefik_router_open_connections))
|
||||
) > 0
|
||||
for: 10m
|
||||
labels:
|
||||
severity: warning
|
||||
subsystem: traefik
|
||||
annotations:
|
||||
summary: "Traefik replicas have diverging router counts (skew={{ $value | printf \"%.0f\" }}). Restart the laggard pod: `kubectl get pods -n traefik` and delete the one with fewer routers."
|
||||
|
||||
extraScrapeConfigs: |
|
||||
# The `mailserver-dovecot` scrape job was retired in code-1ik together
|
||||
|
|
|
|||
|
|
@ -8,7 +8,7 @@ resource "kubernetes_namespace" "terminal" {
|
|||
name = "terminal"
|
||||
labels = {
|
||||
"istio-injection" : "disabled"
|
||||
tier = local.tiers.aux
|
||||
tier = local.tiers.aux
|
||||
"keel.sh/enrolled" = "true"
|
||||
}
|
||||
}
|
||||
|
|
@ -328,5 +328,157 @@ resource "kubernetes_manifest" "tmux_api_strip_prefix" {
|
|||
}
|
||||
}
|
||||
|
||||
# =============================================================================
|
||||
# Webterminal probe (added 2026-05-17 after a Traefik replica came up with a
|
||||
# partial routing table — only the IngressRoute CRDs registered; the
|
||||
# kubernetes_ingress for terminal.viktorbarzin.me was missing, so ~70% of
|
||||
# /token requests routed to that replica returned 404 with router="-". The
|
||||
# lobby's WebSocket retry loop kept the user stuck on "Failed to connect.
|
||||
# Retrying..." because Cloudflare → that replica → 404 broke /token and the
|
||||
# /ws upgrade intermittently.
|
||||
#
|
||||
# The probe exercises the full external path (Cloudflare → Traefik → ttyd
|
||||
# Service) every 5 minutes and pushes 4 gauges to Pushgateway:
|
||||
# webterminal_probe_token_status — HTTP status of GET /token (want 302)
|
||||
# webterminal_probe_ws_status — HTTP status of WS upgrade /ws (want 302)
|
||||
# webterminal_probe_ttyd_status — In-cluster ttyd /token (want 200)
|
||||
# webterminal_probe_last_success_timestamp — Unix ts of last fully-OK run
|
||||
#
|
||||
# Alerts live in monitoring/prometheus_chart_values.tpl group "Webterminal".
|
||||
# =============================================================================
|
||||
|
||||
resource "kubernetes_cron_job_v1" "webterminal_probe" {
|
||||
metadata {
|
||||
name = "webterminal-probe"
|
||||
namespace = kubernetes_namespace.terminal.metadata[0].name
|
||||
}
|
||||
spec {
|
||||
concurrency_policy = "Forbid"
|
||||
failed_jobs_history_limit = 3
|
||||
successful_jobs_history_limit = 1
|
||||
schedule = "*/5 * * * *"
|
||||
job_template {
|
||||
metadata {}
|
||||
spec {
|
||||
backoff_limit = 1
|
||||
ttl_seconds_after_finished = 600
|
||||
template {
|
||||
metadata {
|
||||
labels = {
|
||||
app = "webterminal-probe"
|
||||
}
|
||||
}
|
||||
spec {
|
||||
restart_policy = "OnFailure"
|
||||
container {
|
||||
name = "probe"
|
||||
image = "docker.io/library/alpine:3.20"
|
||||
image_pull_policy = "IfNotPresent"
|
||||
resources {
|
||||
requests = {
|
||||
cpu = "10m"
|
||||
memory = "32Mi"
|
||||
}
|
||||
limits = {
|
||||
memory = "96Mi"
|
||||
}
|
||||
}
|
||||
env {
|
||||
name = "TARGET_HOST"
|
||||
value = "terminal.viktorbarzin.me"
|
||||
}
|
||||
env {
|
||||
name = "PUSHGATEWAY"
|
||||
value = "http://prometheus-prometheus-pushgateway.monitoring:9091/metrics/job/webterminal-probe"
|
||||
}
|
||||
command = ["/bin/sh", "-c", <<-EOT
|
||||
set -u
|
||||
apk add --no-cache curl python3 >/dev/null 2>&1
|
||||
|
||||
# Probe 1 — HTTP GET /token (Cloudflare → Traefik → ttyd).
|
||||
# Without an Authentik cookie the response MUST be 302
|
||||
# (forward-auth redirect). 404 means a Traefik router is
|
||||
# missing on the replica that received the request.
|
||||
TOKEN_STATUS=$(curl -sk -o /dev/null -w "%%{http_code}" \
|
||||
--max-time 10 \
|
||||
"https://$${TARGET_HOST}/token?arg=probe" || echo 0)
|
||||
|
||||
# Probe 2 — WebSocket upgrade to /ws. Same expectation: 302.
|
||||
# 404 here is what produced "Failed to connect" in the lobby
|
||||
# iframe. Use Python for a true Upgrade request — curl's
|
||||
# synthetic upgrade headers don't always trigger the WS path
|
||||
# through every Cloudflare POP.
|
||||
WS_STATUS=$(python3 - <<'PYEOF' 2>/dev/null || echo 0
|
||||
import ssl, socket, base64, os
|
||||
try:
|
||||
ctx = ssl.create_default_context()
|
||||
ctx.check_hostname = False
|
||||
ctx.verify_mode = ssl.CERT_NONE
|
||||
ctx.set_alpn_protocols(["http/1.1"])
|
||||
sock = socket.create_connection((os.environ["TARGET_HOST"], 443), timeout=10)
|
||||
ssock = ctx.wrap_socket(sock, server_hostname=os.environ["TARGET_HOST"])
|
||||
key = base64.b64encode(os.urandom(16)).decode()
|
||||
req = (
|
||||
"GET /ws?arg=probe HTTP/1.1\r\n"
|
||||
f"Host: {os.environ['TARGET_HOST']}\r\n"
|
||||
"Upgrade: websocket\r\n"
|
||||
"Connection: Upgrade\r\n"
|
||||
f"Sec-WebSocket-Key: {key}\r\n"
|
||||
"Sec-WebSocket-Version: 13\r\n"
|
||||
"Sec-WebSocket-Protocol: tty\r\n"
|
||||
f"Origin: https://{os.environ['TARGET_HOST']}\r\n"
|
||||
"\r\n"
|
||||
)
|
||||
ssock.sendall(req.encode())
|
||||
ssock.settimeout(5)
|
||||
data = ssock.recv(2048)
|
||||
ssock.close()
|
||||
first = data.split(b"\r\n")[0].decode("ascii", "ignore")
|
||||
parts = first.split()
|
||||
print(parts[1] if len(parts) >= 2 and parts[1].isdigit() else 0)
|
||||
except Exception:
|
||||
print(0)
|
||||
PYEOF
|
||||
)
|
||||
|
||||
# Probe 3 — ttyd Service ClusterIP. Bypasses Cloudflare /
|
||||
# Traefik / Authentik so we can tell whether the failure mode
|
||||
# is "ttyd down" vs "edge proxy misrouting".
|
||||
TTYD_STATUS=$(curl -s -o /dev/null -w "%%{http_code}" \
|
||||
--max-time 5 -H "X-authentik-username: probe" \
|
||||
"http://terminal.terminal.svc.cluster.local/token" || echo 0)
|
||||
|
||||
OK=0
|
||||
if [ "$$TOKEN_STATUS" = "302" ] && [ "$$WS_STATUS" = "302" ] && [ "$$TTYD_STATUS" = "200" ]; then
|
||||
OK=1
|
||||
fi
|
||||
NOW=$(date +%s)
|
||||
|
||||
cat <<METRICS | curl -sf --max-time 10 --data-binary @- "$$PUSHGATEWAY" >/dev/null 2>&1 || true
|
||||
# HELP webterminal_probe_token_status HTTP status from GET /token via Cloudflare.
|
||||
# TYPE webterminal_probe_token_status gauge
|
||||
webterminal_probe_token_status $${TOKEN_STATUS:-0}
|
||||
# HELP webterminal_probe_ws_status HTTP status from WebSocket upgrade /ws via Cloudflare.
|
||||
# TYPE webterminal_probe_ws_status gauge
|
||||
webterminal_probe_ws_status $${WS_STATUS:-0}
|
||||
# HELP webterminal_probe_ttyd_status HTTP status from in-cluster ttyd /token.
|
||||
# TYPE webterminal_probe_ttyd_status gauge
|
||||
webterminal_probe_ttyd_status $${TTYD_STATUS:-0}
|
||||
# HELP webterminal_probe_last_success_timestamp Unix ts of last fully-OK probe.
|
||||
# TYPE webterminal_probe_last_success_timestamp gauge
|
||||
webterminal_probe_last_success_timestamp $$([ "$$OK" = "1" ] && echo "$$NOW" || echo 0)
|
||||
METRICS
|
||||
|
||||
echo "probe: token=$${TOKEN_STATUS} ws=$${WS_STATUS} ttyd=$${TTYD_STATUS} ok=$${OK}"
|
||||
EOT
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
# CI retrigger 2026-05-16T13:42:57+00:00 — bulk enrollment apply (pipeline #689 killed)
|
||||
# CI retrigger v2 2026-05-16T13:46:35+00:00
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue