fleet is no longer actively developed or maintained by CoreOS. CoreOS instead recommends Kubernetes for cluster orchestration.
fleet provides a command-line tool called
fleetctl. The commands provided by
fleetctl are analogous to those of systemd's CLI,
fleetctl communicates directly with an HTTP API hosted by the fleet cluster. Use the
--endpoint flag to override the default of
fleetctl --endpoint http://<IP:PORT> list-units
--endpoint can be provided through the
FLEETCTL_ENDPOINT environment variable:
FLEETCTL_ENDPOINT=http://<IP:[PORT]> fleetctl list-units
It is not recommended to listen fleet API TCP socket over public and even private networks. Fleet API socket doesn't support encryption and authorization so it could cause full root access to your machine. Please use ssh tunnel to access remote fleet API.
etcd cluster is configured with authentication enabled, set
etcd_password options in fleet.conf to provide credentials. It is not possible to provide credentials to the command-line tool.
It is not recommended to use Authentication without also using TLS Transport by also providing the
If you prefer to execute fleetctl from an external host (i.e. your laptop), the
--tunnel flag can be used to tunnel communication with your fleet cluster over SSH:
fleetctl --tunnel <IP[:PORT]> list-units
One can also provide
--tunnel through the environment variable
FLEETCTL_TUNNEL=<IP[:PORT]> fleetctl list-units
--endpoint together, it is important to note that all etcd requests will be made through the SSH tunnel.
The address in the
--endpoint flag must be routable from the server hosting the tunnel.
If the external host requires a username other than
--ssh-username flag can be used to set an alternative username.
fleetctl --ssh-username=elroy list-units
FLEETCTL_SSH_USERNAME=elroy fleetctl list-units
Note: Custom users are not by default part of the
systemd-journal group which will cause you to see
No journal files were found.
To use the
journal command please add your users to the
systemd-journal group or use the
--sudo flag with journal.
Be sure to install one of the tagged releases of
fleetctl that matches the version of fleet running on the machine.
Find the version on the server with:
See more about configuring remote access.
For information regarding the additional unit file parameters that modify fleet's behavior, see this documentation.
List all units in the fleet cluster with
$ fleetctl list-unit-files UNIT HASH DSTATE STATE TMACHINE goodbye.service d4c61bf launched launched 85c0c595.../172.17.8.102 hello.service e55c0ae launched launched 113f16a7.../172.17.8.103
fleetctl list-unit-files communicates what the desired state of a unit is, what its current state is, and where it is currently scheduled.
List the last-known state of fleet's active units (i.e. those loaded onto a machine) with
$ fleetctl list-units UNIT MACHINE ACTIVE SUB goodbye.service 85c0c595.../172.17.8.102 active running hello.service 113f16a7.../172.17.8.103 active running
Start and stop units with the
$ fleetctl start goodbye.service Unit goodbye.service launched on 85c0c595.../172.17.8.102 $ fleetctl stop goodbye.service Unit goodbye.service loaded on 85c0c595.../172.17.8.102
If the unit does not exist when calling
start, fleetctl will first search for a local unit file, submit it and schedule it.
fleetctl doesn't have a
restart subcommand. In many cases it is simple to use the
fleetctl ssh subcommand to execute
systemctl restart directly on the target host:
$ fleetctl ssh hello.service sudo systemctl restart hello.service
To schedule a unit into the cluster (i.e. load it on a machine) without starting it, call
$ fleetctl load hello.service Unit hello.service loaded on 113f16a7.../172.17.8.103
This will not call the equivalent of
systemctl start, so the loaded unit will be in an inactive state:
$ fleetctl list-units UNIT MACHINE ACTIVE SUB hello.service 113f16a7.../172.17.8.103 inactive dead
This is useful if you have another unit that will activate it at a later date, such as a path or timer.
Units can also be unscheduled, but remain in the cluster with
The unit will still be visible in
fleetctl list-unit-files, but will have no state reported in
$ fleetctl unload hello.service $ fleetctl list-unit-files UNIT HASH DSTATE STATE TMACHINE hello.service e55c0ae inactive inactive -
Getting units into the cluster is as simple as a call to
$ fleetctl submit examples/hello.service
You can also rely on your shell's path-expansion to conveniently submit a large set of unit files:
$ ls examples/ hello.service ping.service pong.service $ fleetctl submit examples/*
Submission of units to a fleet cluster does not cause them to be scheduled.
The unit will be visible in a
fleetctl list-unit-files command, but have no reported state in
A unit can be removed from a cluster with the
$ fleetctl destroy hello.service
destroy command does two things:
ExecStopoption in the unit file).
Once a unit is destroyed, state will continue to be reported for it in
Only once the unit has stopped will its state be removed.
The contents of a loaded unit file can be printed to stdout using the
fleetctl cat command:
$ fleetctl cat hello.service [Unit] Description=Hello World [Service] ExecStart=/bin/bash -c "while true; do echo \"Hello, world\"; sleep 1; done"
Once a unit has been started, fleet will publish its status. The systemd state fields 'LoadState', 'ActiveState', and 'SubState' can be retrieved with
fleetctl list-units. To get all of the unit's state information, the
fleetctl status command will actually call systemctl on the machine running a given unit over SSH:
$ fleetctl status hello.service hello.service - Hello World Loaded: loaded (/run/systemd/system/hello.service; enabled-runtime) Active: active (running) since Wed 2014-01-29 23:20:23 UTC; 1h 49min ago Main PID: 6973 (bash) CGroup: /system.slice/hello.1.service ├─ 6973 /bin/bash -c while true; do echo "Hello, world"; sleep 1; done └─20381 sleep 1 Jan 30 01:09:18 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:19 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:20 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:21 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:22 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:23 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:24 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:25 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:26 ip-172-31-5-250 bash: Hello, world Jan 30 01:09:27 ip-172-31-5-250 bash: Hello, world
fleetctl journal command can be used to interact directly with
journalctl on the machine running a given unit:
$ fleetctl journal hello.service -- Logs begin at Thu 2014-08-21 18:27:04 UTC, end at Thu 2014-08-21 19:07:38 UTC. -- Aug 21 19:07:38 core-03 bash: Hello, world
Describe all of the machines currently connected to the cluster with
$ fleetctl list-machines MACHINE IP METADATA 113f16a7... 172.17.8.103 az=us-west-1b 85c0c595... 172.17.8.102 az=us-west-1b e793afb9... 172.17.8.101 az=us-west-1a
fleetctl ssh command can be used to open a pseudo-terminal over SSH to a host in the fleet cluster.
The command will look up the IP address of a machine based on the provided machine ID:
$ fleetctl ssh 113f16a7
Alternatively, a unit name can be provided.
fleetctl ssh will connect to the machine to-which the given unit is scheduled:
$ fleetctl ssh hello.service
Fingerprints of machines accessed through fleetctl are stored in
$HOME/.fleetctl/known_hosts and used for the verification of machine identity.
If a machine presents a fingerprint that differs from that found in the known_hosts file, the SSH connection will be aborted.
Disable the storage of fingerprints with
--strict-host-key-checking=false, or change the location of your fingerprints with the
fleet does not yet have any custom authentication, so security of a given fleet cluster depends on a user's ability to access any host in that cluster. The suggested method of authentication is public SSH keys and ssh-agents. The
fleetctl command-line tool can assist in this by natively interacting with an ssh-agent to authenticate itself.
This requires two things:
Authorizing a user's SSH key within a cluster is up to the deployer. See the deployment doc for help doing this.
Running an ssh-agent is the responsibility of the user. Many unix-based distros conveniently provide the necessary tools on a base install, or in an ssh-related package. For example, Ubuntu provides the
ssh-add binaries in the
openssh-client package. If you cannot find the necessary binaries on your system, please consult your distro's documentation.
Assuming you have the tools installed, simply ensure ssh-agent has the necessary identity:
$ ssh-add ~/.ssh/id_rsa Identity added: id_rsa (~/.ssh/id_rsa) $ ssh-add -l 2048 31:c3:50:2b:44:f9:7f:28:6b:62:96:37:c7:c1:b5:c2 id_rsa (RSA)
To verify the ssh-agent and remote hosts are properly configured, simply connect directly to a host in the fleet cluster using
fleetctl to tunnel through that host by setting the
--tunnel flag or exporting the
FLEETCTL_TUNNEL environment variable:
$ fleetctl --tunnel 192.0.2.14:2222 list-units ... $ FLEETCTL_TUNNEL=192.0.2.14:2222 fleetctl list-units ...
Things get a bit more complicated when using vagrant, as access to your hosts is abstracted away from the user. This makes it a bit more complicated to run
fleetctl from your local laptop, but it's still relatively easy to configure.
First, find the identity file used by vagrant to authenticate access to your hosts. The
vagrant binary provides a convenient
ssh-config command to help do this. Running
vagrant ssh-config from a Vagrant project directory will produce something like this:
% vagrant ssh-config Host default HostName 127.0.0.1 User core Port 2222 UserKnownHostsFile /dev/null StrictHostKeyChecking no PasswordAuthentication no IdentityFile /Users/bcwaldon/.vagrant.d/insecure_private_key IdentitiesOnly yes LogLevel FATAL ForwardAgent yes
The output communicates exactly how the connection to a vagrant host is made when calling
vagrant ssh. Using the
IdentityFile options, we can bypass
vagrant ssh and connect directly:
$ ssh -p 2222 -i /Users/bcwaldon/.vagrant.d/insecure_private_key email@example.com Last login: Thu Feb 20 05:39:51 UTC 2014 from 10.0.2.2 on pts/1 CoreOS (alpha) core@localhost ~ $
Now, let's get
fleetctl working with these parameters:
$ vagrant ssh-config | sed -n "s/IdentityFile//gp" | xargs ssh-add Identity added: /Users/bcwaldon/.vagrant.d/insecure_private_key (/Users/bcwaldon/.vagrant.d/insecure_private_key) $ export FLEETCTL_TUNNEL="$(vagrant ssh-config | sed -n "s/[ ]*HostName[ ]*//gp"):$(vagrant ssh-config | sed -n "s/[ ]*Port[ ]*//gp")" $ echo $FLEETCTL_TUNNEL 127.0.0.1:2222 $ fleetctl list-machines ...
ssh-add command need only be run once for all Vagrant hosts. You will have to set
FLEETCTL_TUNNEL specifically for each vagrant host with which you interact.