2017-04-04 16:33:22 +00:00
|
|
|
---
|
|
|
|
layout: api
|
|
|
|
page_title: Service - Agent - HTTP API
|
|
|
|
sidebar_current: api-agent-service
|
|
|
|
description: |-
|
|
|
|
The /agent/service endpoints interact with services on the local agent in
|
|
|
|
Consul.
|
|
|
|
---
|
|
|
|
|
|
|
|
# Service - Agent HTTP API
|
|
|
|
|
|
|
|
The `/agent/service` endpoints interact with checks on the local agent in
|
|
|
|
Consul. These should not be confused with services in the catalog.
|
|
|
|
|
|
|
|
## List Services
|
|
|
|
|
|
|
|
This endpoint returns all the services that are registered with
|
|
|
|
the local agent. These services were either provided through configuration files
|
|
|
|
or added dynamically using the HTTP API.
|
|
|
|
|
|
|
|
It is important to note that the services known by the agent may be different
|
|
|
|
from those reported by the catalog. This is usually due to changes being made
|
|
|
|
while there is no leader elected. The agent performs active
|
|
|
|
[anti-entropy](/docs/internals/anti-entropy.html), so in most situations
|
|
|
|
everything will be in sync within a few seconds.
|
|
|
|
|
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ---------------------------- | -------------------------- |
|
|
|
|
| `GET` | `/agent/services` | `application/json` |
|
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
|
|
|
[blocking queries](/api/index.html#blocking-queries),
|
|
|
|
[consistency modes](/api/index.html#consistency-modes), and
|
|
|
|
[required ACLs](/api/index.html#acls).
|
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | ACL Required |
|
|
|
|
| ---------------- | ----------------- | -------------- |
|
|
|
|
| `NO` | `none` | `service:read` |
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
|
|
```text
|
|
|
|
$ curl \
|
|
|
|
https://consul.rocks/v1/agent/services
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
|
|
|
"redis": {
|
|
|
|
"ID": "redis",
|
|
|
|
"Service": "redis",
|
2017-11-23 21:16:42 +00:00
|
|
|
"Tags": [],
|
2017-04-04 16:33:22 +00:00
|
|
|
"Address": "",
|
2018-03-28 14:04:50 +00:00
|
|
|
"Meta": {
|
2018-02-11 13:12:41 +00:00
|
|
|
"redis_version": "4.0"
|
|
|
|
},
|
2017-04-04 16:33:22 +00:00
|
|
|
"Port": 8000
|
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Register Service
|
|
|
|
|
|
|
|
This endpoint adds a new service, with an optional health check, to the local
|
|
|
|
agent.
|
|
|
|
|
|
|
|
The agent is responsible for managing the status of its local services, and for
|
|
|
|
sending updates about its local services to the servers to keep the global
|
|
|
|
catalog in sync.
|
|
|
|
|
2018-05-29 21:07:40 +00:00
|
|
|
For "connect-proxy" kind services, the `service:write` ACL for the
|
|
|
|
`ProxyDestination` value is also required to register the service.
|
|
|
|
|
2017-04-04 16:33:22 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ---------------------------- | -------------------------- |
|
|
|
|
| `PUT` | `/agent/service/register` | `application/json` |
|
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
|
|
|
[blocking queries](/api/index.html#blocking-queries),
|
|
|
|
[consistency modes](/api/index.html#consistency-modes), and
|
|
|
|
[required ACLs](/api/index.html#acls).
|
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | ACL Required |
|
|
|
|
| ---------------- | ----------------- | --------------- |
|
|
|
|
| `NO` | `none` | `service:write` |
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
- `Name` `(string: <required>)` - Specifies the logical name of the service.
|
|
|
|
Many service instances may share the same logical service name.
|
|
|
|
|
|
|
|
- `ID` `(string: "")` - Specifies a unique ID for this service. This must be
|
|
|
|
unique per _agent_. This defaults to the `Name` parameter if not provided.
|
|
|
|
|
|
|
|
- `Tags` `(array<string>: nil)` - Specifies a list of tags to assign to the
|
|
|
|
service. These tags can be used for later filtering and are exposed via the
|
|
|
|
APIs.
|
|
|
|
|
|
|
|
- `Address` `(string: "")` - Specifies the address of the service. If not
|
|
|
|
provided, the agent's address is used as the address for the service during
|
|
|
|
DNS queries.
|
|
|
|
|
2018-03-28 14:04:50 +00:00
|
|
|
- `Meta` `(map<string|string>: nil)` - Specifies arbitrary KV metadata
|
2018-02-11 13:12:41 +00:00
|
|
|
linked to the service instance.
|
|
|
|
|
2017-12-31 16:40:35 +00:00
|
|
|
- `Port` `(int: 0)` - Specifies the port of the service.
|
|
|
|
|
2018-05-29 21:07:40 +00:00
|
|
|
- `Kind` `(string: "")` - The kind of service. Defaults to "" which is a
|
|
|
|
typical Consul service. This value may also be "connect-proxy" for
|
|
|
|
services that are [Connect-capable](/docs/connect/index.html)
|
|
|
|
proxies representing another service.
|
|
|
|
|
|
|
|
- `ProxyDestination` `(string: "")` - For "connect-proxy" `Kind` services,
|
|
|
|
this must be set to the name of the service that the proxy represents. This
|
|
|
|
service doesn't need to be registered, but the caller must have an ACL token
|
|
|
|
with permissions for this service.
|
|
|
|
|
2017-04-04 16:33:22 +00:00
|
|
|
- `Check` `(Check: nil)` - Specifies a check. Please see the
|
|
|
|
[check documentation](/api/agent/check.html) for more information about the
|
2017-05-15 19:49:13 +00:00
|
|
|
accepted fields. If you don't provide a name or id for the check then they
|
|
|
|
will be generated. To provide a custom id and/or name set the `CheckID`
|
|
|
|
and/or `Name` field.
|
2018-02-11 13:12:41 +00:00
|
|
|
|
2017-05-15 19:49:13 +00:00
|
|
|
- `Checks` `(array<Check>: nil`) - Specifies a list of checks. Please see the
|
|
|
|
[check documentation](/api/agent/check.html) for more information about the
|
|
|
|
accepted fields. If you don't provide a name or id for the check then they
|
|
|
|
will be generated. To provide a custom id and/or name set the `CheckID`
|
|
|
|
and/or `Name` field. The automatically generated `Name` and `CheckID` depend
|
|
|
|
on the position of the check within the array, so even though the behavior is
|
2017-05-17 18:22:00 +00:00
|
|
|
deterministic, it is recommended for all checks to either let consul set the
|
2017-05-15 19:49:13 +00:00
|
|
|
`CheckID` by leaving the field empty/omitting it or to provide a unique value.
|
2017-04-04 16:33:22 +00:00
|
|
|
|
|
|
|
- `EnableTagOverride` `(bool: false)` - Specifies to disable the anti-entropy
|
|
|
|
feature for this service's tags. If `EnableTagOverride` is set to `true` then
|
|
|
|
external agents can update this service in the [catalog](/api/catalog.html)
|
|
|
|
and modify the tags. Subsequent local sync operations by this agent will
|
|
|
|
ignore the updated tags. For instance, if an external agent modified both the
|
|
|
|
tags and the port for this service and `EnableTagOverride` was set to `true`
|
|
|
|
then after the next sync cycle the service's port would revert to the original
|
|
|
|
value but the tags would maintain the updated value. As a counter example, if
|
|
|
|
an external agent modified both the tags and port for this service and
|
|
|
|
`EnableTagOverride` was set to `false` then after the next sync cycle the
|
|
|
|
service's port _and_ the tags would revert to the original value and all
|
|
|
|
modifications would be lost.
|
|
|
|
|
|
|
|
It is important to note that this applies only to the locally registered
|
|
|
|
service. If you have multiple nodes all registering the same service their
|
|
|
|
`EnableTagOverride` configuration and all other service configuration items
|
|
|
|
are independent of one another. Updating the tags for the service registered
|
|
|
|
on one node is independent of the same service (by name) registered on
|
|
|
|
another node. If `EnableTagOverride` is not specified the default value is
|
|
|
|
`false`. See [anti-entropy syncs](/docs/internals/anti-entropy.html) for
|
|
|
|
more info.
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
|
|
|
"ID": "redis1",
|
|
|
|
"Name": "redis",
|
|
|
|
"Tags": [
|
|
|
|
"primary",
|
|
|
|
"v1"
|
|
|
|
],
|
|
|
|
"Address": "127.0.0.1",
|
|
|
|
"Port": 8000,
|
2018-03-28 14:04:50 +00:00
|
|
|
"Meta": {
|
2018-02-11 13:12:41 +00:00
|
|
|
"redis_version": "4.0"
|
|
|
|
},
|
2017-04-04 16:33:22 +00:00
|
|
|
"EnableTagOverride": false,
|
|
|
|
"Check": {
|
|
|
|
"DeregisterCriticalServiceAfter": "90m",
|
2017-10-10 23:37:08 +00:00
|
|
|
"Args": ["/usr/local/bin/check_redis.py"],
|
2017-04-04 16:33:22 +00:00
|
|
|
"HTTP": "http://localhost:5000/health",
|
|
|
|
"Interval": "10s",
|
|
|
|
"TTL": "15s"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
|
|
```text
|
|
|
|
$ curl \
|
|
|
|
--request PUT \
|
|
|
|
--data @payload.json \
|
|
|
|
https://consul.rocks/v1/agent/service/register
|
|
|
|
```
|
|
|
|
|
|
|
|
## Deregister Service
|
|
|
|
|
|
|
|
This endpoint removes a service from the local agent. If the service does not
|
|
|
|
exist, no action is taken.
|
|
|
|
|
|
|
|
The agent will take care of deregistering the service with the catalog. If there
|
|
|
|
is an associated check, that is also deregistered.
|
|
|
|
|
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ---------------------------- | -------------------------- |
|
|
|
|
| `PUT` | `/agent/service/deregister/:service_id` | `application/json` |
|
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
|
|
|
[blocking queries](/api/index.html#blocking-queries),
|
|
|
|
[consistency modes](/api/index.html#consistency-modes), and
|
|
|
|
[required ACLs](/api/index.html#acls).
|
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | ACL Required |
|
|
|
|
| ---------------- | ----------------- | --------------- |
|
|
|
|
| `NO` | `none` | `service:write` |
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
- `service_id` `(string: <required>)` - Specifies the ID of the service to
|
|
|
|
deregister. This is specified as part of the URL.
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
|
|
```text
|
|
|
|
$ curl \
|
|
|
|
--request PUT \
|
|
|
|
https://consul.rocks/v1/agent/service/deregister/my-service-id
|
|
|
|
```
|
|
|
|
|
|
|
|
## Enable Maintenance Mode
|
|
|
|
|
|
|
|
This endpoint places a given service into "maintenance mode". During maintenance
|
|
|
|
mode, the service will be marked as unavailable and will not be present in DNS
|
|
|
|
or API queries. This API call is idempotent. Maintenance mode is persistent and
|
|
|
|
will be automatically restored on agent restart.
|
|
|
|
|
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ---------------------------- | -------------------------- |
|
|
|
|
| `PUT` | `/agent/service/maintenance/:service_id` | `application/json` |
|
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
|
|
|
[blocking queries](/api/index.html#blocking-queries),
|
|
|
|
[consistency modes](/api/index.html#consistency-modes), and
|
|
|
|
[required ACLs](/api/index.html#acls).
|
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | ACL Required |
|
|
|
|
| ---------------- | ----------------- | --------------- |
|
|
|
|
| `NO` | `none` | `service:write` |
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
- `service_id` `(string: <required>)` - Specifies the ID of the service to put
|
|
|
|
in maintenance mode. This is specified as part of the URL.
|
|
|
|
|
|
|
|
- `enable` `(bool: <required>)` - Specifies whether to enable or disable
|
|
|
|
maintenance mode. This is specified as part of the URL as a query string
|
|
|
|
parameter.
|
|
|
|
|
|
|
|
- `reason` `(string: "")` - Specifies a text string explaining the reason for
|
|
|
|
placing the node into maintenance mode. This is simply to aid human operators.
|
|
|
|
If no reason is provided, a default value will be used instead. This is
|
|
|
|
specified as part of the URL as a query string parameter, and, as such, must
|
|
|
|
be URI-encoded.
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
|
|
```text
|
|
|
|
$ curl \
|
|
|
|
--request PUT \
|
|
|
|
https://consul.rocks/v1/agent/service/maintenance/my-service-id?enable=true&reason=For+the+docs
|
|
|
|
```
|