Skip to content

IanKulin/vitals-glimpse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

vitals-glimpse

vitals-glimpse is a simple endpoint that exposes a Linux host's (or container's) memory, disk, and CPU usage as percentages.

The JSON returned also has status keywords for the memory, disk, and CPU which makes it a good candidate for simple monitoring tools such as Uptime Kuma which can monitor a binary up/down response based on the presence or absence of a keyword. The thresholds for these have defaults that can be overwritten with command line flags.

To access the endpoint in a browser, visit <server name>:10321/vitals

Output

A sample response might be:

{
	"title": "vitals-glimpse",
	"version": 0.4,
	"mem_status": "mem_okay",
	"mem_percent": 37,
	"disk_status": "disk_okay",
	"disk_percent": 15,
	"cpu_status":"cpu_okay",
	"cpu_percent":2
}

or if the thresholds are exceeded:

{
	"title": "vitals-glimpse",
	"version": 0.4,
	"mem_status": "mem_fail",
	"mem_percent": 91,
	"disk_status": "disk_fail",
	"disk_percent": 81,
	"cpu_status":"cpu_fail",
	"cpu_percent":92
}

The disk usage is based on the / root mount point.

The default thresholds for the status keywords are:

  • mem_okay - below 90% memory usage
  • disk_okay - below 80% disk usage
  • cpu_okay - below 90% cpu usage

Command-Line Flags

Flag Default Description
-mem 90 Memory usage threshold (percent)
-disk 80 Disk usage threshold (percent)
-cpu 90 CPU usage threshold (percent)
-port 10321 Server port
-bind 0.0.0.0 Address to bind to
-key (none) API key required via X-API-Key request header
-allow (none) Comma-separated CIDR allowlist; requests from other IPs are rejected with 403
-ratelimit 60 Max requests per IP per minute (0 to disable); allowlisted IPs are exempt

Example:

./vitals-glimpse -mem 85 -disk 70 -cpu 95 -port 8080

Security

v0.4 adds several hardening options for deployments exposed beyond a trusted network.

API Key Authentication

Require callers to supply a secret key in the X-API-Key header:

./vitals-glimpse -key mysecretkey
curl -H "X-API-Key: mysecretkey" http://<server>:10321/vitals

Requests without the correct key receive 401 Unauthorized. Key comparison uses constant-time comparison to prevent timing attacks.

IP Allowlisting

Restrict access to specific IP addresses or CIDR ranges. Plain IPs are accepted as well as CIDR notation:

./vitals-glimpse -allow "10.0.0.0/24,192.168.1.50"

Requests from addresses outside the allowlist receive 403 Forbidden.

Rate Limiting

By default, each client IP is limited to 60 requests per minute. Allowlisted IPs (via -allow) are exempt from the rate limit. Set to 0 to disable entirely:

./vitals-glimpse -ratelimit 120   # 120 req/min
./vitals-glimpse -ratelimit 0     # no limit

Requests exceeding the limit receive 429 Too Many Requests.

Combining Options

./vitals-glimpse -key mysecretkey -allow "10.0.0.0/8" -ratelimit 30 -bind 127.0.0.1

Development

Building on MacBook

  • GOARCH=amd64 GOOS=linux go build
  • GOARCH=amd64 GOOS=linux go build -ldflags="-s -w" for distribution

The -s -w flags strip debug info and symbol tables, reducing binary size by ~20-30%.

Testing on Debian LXC

  • scp vitals-glimpse ian@ct390-test:vitals-glimpse
  • ssh ian@ct390-test 'chmod +x vitals-glimpse'
  • ssh ian@ct390-test 'nohup ./vitals-glimpse > output.log 2>&1 & echo $! > vitals-glimpse.pid'
  • http://ct390-test:10321/vitals
  • ssh ian@ct390-test 'kill $(cat vitals-glimpse.pid)'

Versions

  • 0.2 MVP
  • 0.3 Container detection for CPU, flags for thresholds
  • 0.4 Security (API key auth, IP allowlisting, rate limiting, HTTP timeouts)

About

Endpoint to expose simple machine statistics for uptime monitoring

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors