2012-07-23 15:06:55 +02:00
# Example sentinel.conf
2012-07-23 12:54:52 +02:00
2016-08-11 19:53:01 +02:00
# *** IMPORTANT ***
#
# By default Sentinel will not be reachable from interfaces different than
# localhost, either use the 'bind' directive to bind to a list of network
# interfaces, or disable protected mode with "protected-mode no" by
# adding it to this configuration file.
#
# Before doing that MAKE SURE the instance is protected from the outside
# world via firewalling or other means.
#
# For example you may use one of the following:
#
# bind 127.0.0.1 192.168.1.1
#
# protected-mode no
2012-07-25 09:52:26 -04:00
# port <sentinel-port>
# The port that this sentinel instance will run on
port 26379
2015-01-16 09:03:00 +00:00
# By default Redis Sentinel does not run as a daemon. Use 'yes' if you need it.
# Note that Redis will write a pid file in /var/run/redis-sentinel.pid when
# daemonized.
daemonize no
# When running daemonized, Redis Sentinel writes a pid file in
# /var/run/redis-sentinel.pid by default. You can specify a custom pid file
# location here.
pidfile /var/run/redis-sentinel.pid
# Specify the log file name. Also the empty string can be used to force
# Sentinel to log on the standard output. Note that if you use standard
# output for logging but daemonize, logs will be sent to /dev/null
logfile ""
2014-09-04 11:30:08 +02:00
# sentinel announce-ip <ip>
# sentinel announce-port <port>
#
# The above two configuration directives are useful in environments where,
# because of NAT, Sentinel is reachable from outside via a non-local address.
#
# When announce-ip is provided, the Sentinel will claim the specified IP address
# in HELLO messages used to gossip its presence, instead of auto-detecting the
# local address as it usually does.
#
# Similarly when announce-port is provided and is valid and non-zero, Sentinel
# will announce the specified TCP port.
#
# The two options don't need to be used together, if only announce-ip is
# provided, the Sentinel will announce the specified IP and the server port
# as specified by the "port" option. If only announce-port is provided, the
# Sentinel will announce the auto-detected local IP and the specified port.
2014-07-29 10:49:56 -07:00
#
# Example:
#
2014-09-04 11:30:08 +02:00
# sentinel announce-ip 1.2.3.4
2014-07-29 10:49:56 -07:00
2014-05-12 10:46:25 +02:00
# dir <working-directory>
# Every long running process should have a well-defined working directory.
# For Redis Sentinel to chdir to /tmp at startup is the simplest thing
2014-05-12 11:20:46 +02:00
# for the process to don't interfere with administrative tasks such as
2014-05-12 10:46:25 +02:00
# unmounting filesystems.
dir /tmp
2012-07-25 16:33:37 +02:00
# sentinel monitor <master-name> <ip> <redis-port> <quorum>
#
2013-11-30 14:14:28 +08:00
# Tells Sentinel to monitor this master, and to consider it in O_DOWN
2012-07-25 09:52:26 -04:00
# (Objectively Down) state only if at least <quorum> sentinels agree.
2012-07-23 12:54:52 +02:00
#
2013-11-21 17:07:00 +01:00
# Note that whatever is the ODOWN quorum, a Sentinel will require to
# be elected by the majority of the known Sentinels in order to
# start a failover, so no failover can be performed in minority.
#
2018-09-11 11:30:46 +02:00
# Replicas are auto-discovered, so you don't need to specify replicas in
2014-05-26 10:17:12 +02:00
# any way. Sentinel itself will rewrite this configuration file adding
2018-09-10 17:55:34 +02:00
# the replicas using additional configuration options.
2014-05-26 10:17:12 +02:00
# Also note that the configuration file is rewritten when a
2018-09-10 17:55:34 +02:00
# replica is promoted to master.
2014-05-26 10:17:12 +02:00
#
2012-07-23 12:54:52 +02:00
# Note: master name should not include special characters or spaces.
# The valid charset is A-z 0-9 and the three characters ".-_".
sentinel monitor mymaster 127.0.0.1 6379 2
2012-09-26 18:59:54 +02:00
# sentinel auth-pass <master-name> <password>
#
2018-09-10 17:55:34 +02:00
# Set the password to use to authenticate with the master and replicas.
2012-09-26 18:59:54 +02:00
# Useful if there is a password set in the Redis instances to monitor.
#
2018-09-10 17:55:34 +02:00
# Note that the master password is also used for replicas, so it is not
# possible to set a different password in masters and replicas instances
2012-09-26 18:59:54 +02:00
# if you want to be able to monitor these instances with Sentinel.
#
# However you can have Redis instances without the authentication enabled
# mixed with Redis instances requiring the authentication (as long as the
# password set is the same for all the instances requiring the password) as
# the AUTH command will have no effect in Redis instances with authentication
# switched off.
#
# Example:
#
# sentinel auth-pass mymaster MySUPER--secret-0123passw0rd
2020-03-16 17:11:43 +01:00
# sentinel auth-user <master-name> <username>
#
# This is useful in order to authenticate to instances having ACL capabilities,
# that is, running Redis 6.0 or greater. When just auth-pass is provided the
# Sentinel instance will authenticate to Redis using the old "AUTH <pass>"
# method. When also an username is provided, it will use "AUTH <user> <pass>".
# In the Redis servers side, the ACL to provide just minimal access to
# Sentinel instances, should be configured along the following lines:
#
# user sentinel-user >somepassword +client +subscribe +publish \
# +ping +info +multi +slaveof +config +client +exec on
2012-07-25 16:33:37 +02:00
# sentinel down-after-milliseconds <master-name> <milliseconds>
#
2018-09-10 17:55:34 +02:00
# Number of milliseconds the master (or any attached replica or sentinel) should
2012-07-23 12:54:52 +02:00
# be unreachable (as in, not acceptable reply to PING, continuously, for the
# specified period) in order to consider it in S_DOWN state (Subjectively
# Down).
#
# Default is 30 seconds.
sentinel down-after-milliseconds mymaster 30000
2020-03-16 13:48:29 +01:00
# requirepass <password>
#
# You can configure Sentinel itself to require a password, however when doing
# so Sentinel will try to authenticate with the same password to all the
# other Sentinels. So you need to configure all your Sentinels in a given
# group with the same "requirepass" password. Check the following documentation
# for more info: https://redis.io/topics/sentinel
2018-09-10 17:55:34 +02:00
# sentinel parallel-syncs <master-name> <numreplicas>
2012-07-25 16:33:37 +02:00
#
2018-09-10 17:55:34 +02:00
# How many replicas we can reconfigure to point to the new replica simultaneously
# during the failover. Use a low number if you use the replicas to serve query
# to avoid that all the replicas will be unreachable at about the same
2012-07-23 12:54:52 +02:00
# time while performing the synchronization with the master.
sentinel parallel-syncs mymaster 1
2012-07-25 16:33:37 +02:00
# sentinel failover-timeout <master-name> <milliseconds>
#
2013-11-21 17:07:00 +01:00
# Specifies the failover timeout in milliseconds. It is used in many ways:
#
# - The time needed to re-start a failover after a previous failover was
# already tried against the same master by a given Sentinel, is two
# times the failover timeout.
#
2018-09-10 17:55:34 +02:00
# - The time needed for a replica replicating to a wrong master according
2013-11-30 14:14:28 +08:00
# to a Sentinel current configuration, to be forced to replicate
2013-11-21 17:07:00 +01:00
# with the right master, is exactly the failover timeout (counting since
# the moment a Sentinel detected the misconfiguration).
2012-07-23 12:54:52 +02:00
#
2013-11-21 17:07:00 +01:00
# - The time needed to cancel a failover that is already in progress but
# did not produced any configuration change (SLAVEOF NO ONE yet not
2018-09-10 17:55:34 +02:00
# acknowledged by the promoted replica).
2012-07-23 12:54:52 +02:00
#
2018-09-10 17:55:34 +02:00
# - The maximum time a failover in progress waits for all the replicas to be
# reconfigured as replicas of the new master. However even after this time
# the replicas will be reconfigured by the Sentinels anyway, but not with
2013-11-21 17:07:00 +01:00
# the exact parallel-syncs progression as specified.
#
# Default is 3 minutes.
sentinel failover-timeout mymaster 180000
2012-07-23 12:54:52 +02:00
2013-01-17 01:00:20 +08:00
# SCRIPTS EXECUTION
2012-07-31 11:05:21 +02:00
#
# sentinel notification-script and sentinel reconfig-script are used in order
# to configure scripts that are called to notify the system administrator
# or to reconfigure clients after a failover. The scripts are executed
# with the following rules for error handling:
#
2014-03-07 18:03:51 +01:00
# If script exits with "1" the execution is retried later (up to a maximum
2012-07-31 11:05:21 +02:00
# number of times currently set to 10).
#
2014-03-07 18:03:51 +01:00
# If script exits with "2" (or an higher value) the script execution is
2012-07-31 11:05:21 +02:00
# not retried.
#
# If script terminates because it receives a signal the behavior is the same
# as exit code 1.
#
# A script has a maximum running time of 60 seconds. After this limit is
# reached the script is terminated with a SIGKILL and the execution retried.
# NOTIFICATION SCRIPT
#
2012-07-25 16:33:37 +02:00
# sentinel notification-script <master-name> <script-path>
#
2013-11-30 14:14:28 +08:00
# Call the specified notification script for any sentinel event that is
2012-07-25 16:33:37 +02:00
# generated in the WARNING level (for instance -sdown, -odown, and so forth).
# This script should notify the system administrator via email, SMS, or any
# other messaging system, that there is something wrong with the monitored
# Redis systems.
#
# The script is called with just two arguments: the first is the event type
# and the second the event description.
#
2012-07-25 08:29:11 -07:00
# The script must exist and be executable in order for sentinel to start if
2012-07-25 16:33:37 +02:00
# this option is provided.
#
# Example:
#
# sentinel notification-script mymaster /var/redis/notify.sh
2012-08-02 18:40:30 +02:00
# CLIENTS RECONFIGURATION SCRIPT
#
# sentinel client-reconfig-script <master-name> <script-path>
#
2013-11-21 17:07:00 +01:00
# When the master changed because of a failover a script can be called in
2012-08-02 18:40:30 +02:00
# order to perform application-specific tasks to notify the clients that the
# configuration has changed and the master is at a different address.
#
# The following arguments are passed to the script:
#
# <master-name> <role> <state> <from-ip> <from-port> <to-ip> <to-port>
#
2013-11-21 17:07:00 +01:00
# <state> is currently always "failover"
2012-08-02 18:40:30 +02:00
# <role> is either "leader" or "observer"
#
# The arguments from-ip, from-port, to-ip, to-port are used to communicate
2018-09-10 17:55:34 +02:00
# the old address of the master and the new address of the elected replica
2013-11-21 17:07:00 +01:00
# (now a master).
2012-08-02 18:40:30 +02:00
#
# This script should be resistant to multiple invocations.
#
# Example:
#
# sentinel client-reconfig-script mymaster /var/redis/reconfig.sh
2018-06-14 18:57:58 +02:00
# SECURITY
#
# By default SENTINEL SET will not be able to change the notification-script
# and client-reconfig-script at runtime. This avoids a trivial security issue
# where clients can set the script to anything and trigger a failover in order
# to get the program executed.
sentinel deny-scripts-reconfig yes
2018-06-25 17:45:01 +02:00
# REDIS COMMANDS RENAMING
#
# Sometimes the Redis server has certain commands, that are needed for Sentinel
# to work correctly, renamed to unguessable strings. This is often the case
# of CONFIG and SLAVEOF in the context of providers that provide Redis as
# a service, and don't want the customers to reconfigure the instances outside
# of the administration console.
#
# In such case it is possible to tell Sentinel to use different command names
# instead of the normal ones. For example if the master "mymaster", and the
2018-09-10 17:55:34 +02:00
# associated replicas, have "CONFIG" all renamed to "GUESSME", I could use:
2018-06-25 17:45:01 +02:00
#
2018-09-17 15:29:01 +02:00
# SENTINEL rename-command mymaster CONFIG GUESSME
2018-06-25 17:45:01 +02:00
#
# After such configuration is set, every time Sentinel would use CONFIG it will
# use GUESSME instead. Note that there is no actual need to respect the command
# case, so writing "config guessme" is the same in the example above.
#
# SENTINEL SET can also be used in order to perform this configuration at runtime.
2018-09-17 15:29:01 +02:00
#
# In order to set a command back to its original name (undo the renaming), it
# is possible to just rename a command to itsef:
#
# SENTINEL rename-command mymaster CONFIG CONFIG