Releases: dolph/connectivity
v1.7.6
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
The routability of each address is evaluated. Failures in routability are non-fatal; that is, the attempt to determine a viable route is only useful for producing robust logging upon failure, but does not indicate a failure in the actual routability from the host.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.7.5
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.7.4
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.7.3
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.7.2
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.7.1
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.7.0
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.6.1
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.6.0
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.
Configuration
connectivity
looks for a configuration file in the following three locations, and uses the first one it finds:
./connectivity.yml
~/.connectivity.yml
/etc/connectivity.yml
Without a configuration file, you might use connectivity
to validate multiple types of connectivity to one or more destinations:
connectivity [check|wait|monitor] icmp://example.com tcp://example.com:443/ udp://example.com:53 http://example.com/health https://example.com/health
With a YAML configuration file, you can simply invoke connectivity
using connectivity [check|wait|monitor]
. Configuration uses arbitrary key-value pairs, where the key is used as a label for logging purposes (instead of logging the entire URL), and the value is the URL to be validated (which would otherwise be passed on the command line).
---
Ping: icmp://example.com
TCP: tcp://example.com:443
UDP: udp://example.com:53
HTTP: http://example.com/health
HTTPS: https://example.com/health
Supported schemes
connectivity
can be used to validate connectivity at various different layers of the OSI model.
OSI Layer 3 (Network):
icmp://
: Validate the destination by pinging it (ICMP). You must not specify a port. Response time metrics are emitted via statsd.
OSI Layer 4 (Transport):
tcp://
: Simply dial the host at the specified port and hangup (a port is required). This is useful for validating raw connectivity (similar tonetcat
) without validating anything futher about the connection. Layer 7 firewalls may allow this check to succeed, but deny the application-specific traffic, such as TLS negotiation.udp://
: Simply dial the host at the specified port (a port is required). It is impossible to guarantee the destination was actually reached, only that packets can be sent.
OSI Layer 7 (Application):
http://
: Make an HTTPGET
request to the destination. AnHTTP 2xx
response is expected.https://
: Make an HTTPSGET
connection, including TLS validation. AnHTTP 2xx
response is expected.
v1.5.3
connectivity
connectivity
is a tool for validating network connectivity requirements.
Given a set of URLs, connectivity attempts to validate each one as thoroughly as possible, step by step.
-
The URL is parsed for validity, and to understand what the destination port should be. For example,
https://
URLs assume an implicit port 443. The protocol and port of the intended destination are logged asconnectivity
interprets them. -
If a URL contains a hostname, it is resolved.
-
Each address returned by DNS is validated for routability.
-
Each address returned by DNS is dialed to validate the network path (or pinged, in the case of URLs like
icmp://<host>
. -
Supported schemes are then validated at the application-level (attempting to make real HTTP requests in the case of
http://
orhttps://
, for example).
If any step in the validation process fails, relevant debugging information is logged.