-
Notifications
You must be signed in to change notification settings - Fork 247
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow optionally specifying a range of acceptable response codes #142
Comments
I’m not convinced of the use case. At some point if you’re largly ignoring the http response, you might as well just use a TCP checker. If you don’t have explicit control to check against a single response code status, the test is too broad. I even added support to accept 200-204 reluctantly. If anything, an array of status codes is preferable to a min/max range. |
The PR allowed a good bit of flexibility in the config, but I think my use case (the target) would be rather common: Right now, I'm monitoring ~300 services. My dashboard shows critical, mostly because of nginx and varnish proxies returning 304 cache headers. Also, 301 and 302 are certainly up and need no action. I'm evaluating checkup as a tool for a) crisis response and b) sla reporting/compliance. For the most part, it's AMAZING for that - except the rigidity in the acceptable codes. I'm with you, really. Rather than code-in the map of acceptables, though, allowing ranges passes the decision on the the end user. |
Seconded. I'm monitoring a service that requires an authentication. I'm expecting to see the |
Oops, never mind, I apparently missed |
It's quite common for a 301 or 302 response code to be considered "up". Similarly, someone asserting the a resource is permanently away would "pass" for anything above 400. And testing for public access should look for 401-403.
To allow these cases, we should be able to specify a range of acceptable status codes in our config.
Something along the lines of:
The text was updated successfully, but these errors were encountered: