traffic_ctl
Synopsis
traffic_ctl [OPTIONS] SUBCOMMAND [OPTIONS]
Note
traffic_ctl uses a JSONRPC protocol to communicate with traffic_server.
Description
traffic_ctl is used to display, manipulate and configure a running Traffic Server. traffic_ctl includes a number of subcommands that control different aspects of Traffic Server:
- traffic_ctl config
Manipulate and display configuration records
- traffic_ctl metric
Manipulate performance and status metrics
- traffic_ctl server
Examine the server
- traffic_ctl storage
Manipulate cache storage
- traffic_ctl plugin
Interact with plugins.
- traffic_ctl host
Manipulate host status.
- traffic_ctl hostdb
Manipulate HostDB status.
- traffic_ctl rpc
Interact directly with the JSONRPC 2.0 server in Traffic Server
Options
- --debug
Enable debugging output.
- -V, --version
Print version information and exit.
- -f, --format
Specify the output print style.
Options
Description
jsonIt will show the response message formatted to JSON. This is ideal if you want to redirect the stdout to a different source. It will only stream the json response, no other messages. This option only applies to the RPC request or response.
rpcShow the JSONRPC request and response + the default output. This option only applies to the RPC request or response.
In case of a record request(config)
--recordsoverrides this flag.Example:
$ traffic_ctl config get variable --format rpc --> {request} <-- {response} variable 1234$ traffic_ctl config get variable --format json {response}There will be no print out beside the json response. This is ideal to redirect to a file.
- --records
Option available only for records request.
- --run-root
Path to the runroot file.
Subcommands
traffic_ctl alarm
Warning
Option not available in the JSONRPC 2.0 version.
traffic_ctl config
Manipulate configuration records.
- --records
Display the config output in YAML format. This out can be used directly into ATS if needed.
- --default
Include the default value alonside with the current value. This can be used in combination with
--records$ traffic_ctl config match proxy.config.diags.debug --records --default records: diags: debug: client_ip: "null" # default: null enabled: 1 # default: 0 tags: quic # default: http|dns throttling_interval_msec: 0 # default: 0
- defaults [--records]
-
Display the default values for all configuration records. The
--recordsflag has the same behavior astraffic_ctl config get --records.
- describe RECORD [RECORD...]
-
Display all the known information about a configuration record. This includes the current and default values, the data type, the record class and syntax checking expression.
- diff [--records]
-
Display configuration records that have non-default values. The
--recordsflag has the same behavior astraffic_ctl config get --records.
- get [--records, --default] RECORD [RECORD...]
Display the current value of a configuration record.
- --records
If this flag is provided,
traffic_ctl config getwill emit results in internal ats variable format.The option –cold is available to get the values from a file.
- match [--records, --default] REGEX [REGEX...]
-
Display the current values of all configuration variables whose names match the given regular expression. The
--recordsflag has the same behavior as traffic_ctl config get –records.
- reload
-
Initiate a Traffic Server configuration reload. Use this command to update the running configuration after any configuration file modification. If no configuration files have been modified since the previous configuration load, this command is a no-op.
The reload is asynchronous: the command sends a JSONRPC request to Traffic Server and returns immediately — it does not block until every config handler finishes. The actual reload work runs on background threads (
ET_TASK), where each registered config handler loads its configuration and reports success or failure.Every reload is assigned a token — a unique identifier for the reload operation. The token is the handle you use to track, monitor, or query the reload after it starts. If no token is provided via
--token, the server generates one automatically using a timestamp (e.g.rldtk-1739808000000). You can supply a custom token via--token(e.g.-t deploy-v2.1) to tag reloads with meaningful labels for CI pipelines, deploy scripts, or post-mortem analysis.Use the token to:
Monitor a reload in real-time:
traffic_ctl config reload -t <token> -mQuery the final status:
traffic_ctl config status -t <token>Get detailed logs:
traffic_ctl config status -t <token> -l
The timestamp of the last reconfiguration event (in seconds since epoch) is published in the
proxy.process.proxy.reconfigure_timemetric.Behavior without options:
When called without
--monitoror--show-details, the command sends the reload request and immediately prints the assigned token along with suggested next-step commands:$ traffic_ctl config reload ✔ Reload scheduled [rldtk-1739808000000] Monitor : traffic_ctl config reload -t rldtk-1739808000000 -m Details : traffic_ctl config reload -t rldtk-1739808000000 -s -l
When a reload is already in progress:
Only one reload can be active at a time. If a reload is already running, the command does not start a new one. Instead, it reports the in-progress reload’s token and provides options to monitor it or force a new one:
$ traffic_ctl config reload ⟳ Reload in progress [rldtk-1739808000000] Monitor : traffic_ctl config reload -t rldtk-1739808000000 -m Details : traffic_ctl config status -t rldtk-1739808000000 Force : traffic_ctl config reload --force (may conflict with the running reload)
With
--monitor, it automatically switches to monitoring the in-progress reload instead of failing. With--show-details, it displays the current status of the in-progress reload.When a token already exists:
If the token provided via
--tokenwas already used by a previous reload (even a completed one), the command refuses to start a new reload to prevent ambiguity. Choose a different token or omit--tokento let the server generate a unique one:$ traffic_ctl config reload -t my-deploy ✗ Token 'my-deploy' already in use Status : traffic_ctl config status -t my-deploy Retry : traffic_ctl config reload
Supports the following options:
- --token, -t <token>
Assign a custom token to this reload. Tokens must be unique across the reload history — if a reload (active or completed) already has this token, the command is rejected. When omitted, the server generates a unique token automatically.
Custom tokens are useful for tagging reloads with deployment identifiers, ticket numbers, or other meaningful labels that make it easier to query status later.
$ traffic_ctl config reload -t deploy-v2.1 ✔ Reload scheduled [deploy-v2.1]
- --monitor, -m
Start the reload and monitor its progress with a live progress bar until completion. The progress bar updates in real-time showing the number of completed handlers, overall status, and elapsed time.
Polls the server at regular intervals controlled by
--refresh-int(default: every 0.5 seconds). Before the first poll, waits briefly (see--initial-wait) to allow the server time to dispatch work to all handlers.If a reload is already in progress,
--monitorautomatically attaches to that reload and monitors it instead of failing.If both
--monitorand--show-detailsare specified,--monitoris ignored and--show-detailstakes precedence.$ traffic_ctl config reload -t deploy-v2.1 -m ✔ Reload scheduled [deploy-v2.1] ✔ [deploy-v2.1] ████████████████████ 11/11 success (245ms)
Failed reload:
$ traffic_ctl config reload -t hotfix-cert -m ✔ Reload scheduled [hotfix-cert] ✗ [hotfix-cert] ██████████████░░░░░░ 9/11 fail (310ms) Details : traffic_ctl config status -t hotfix-cert
Note
During a reload, all subtasks are pre-registered shortly after file processing completes. However, the first file (typically
records.yaml) may briefly show as1/1 successbefore record-triggered handlers are reserved by the flush. The--initial-waitoption (default: 2s) delays the first poll to reduce the chance of observing this transient state.
- --show-details, -s
Start the reload and display a detailed status report. The command sends the reload request, waits for the configured initial wait (see
--initial-wait, default: 2 seconds) to allow handlers to start, then fetches and prints the full task tree with per-handler status and durations.If a reload is already in progress, shows the status of that reload immediately.
Combine with
--include-logsto also show per-handler log messages.$ traffic_ctl config reload -s -l ✔ Reload scheduled [rldtk-1739808000000]. Waiting for details... ✔ Reload [success] — rldtk-1739808000000 Started : 2025 Feb 17 12:00:00.123 Duration: 245ms Tasks: ✔ ip_allow.yaml ·························· 18ms ✔ logging.yaml ··························· 120ms ...
- --include-logs, -l
Include per-handler log messages in the output. Only meaningful together with
--show-details. Log messages are set by handlers viactx.log()andctx.fail()during the reload.
- --data, -d <source>
Supply inline YAML configuration content for the reload. The content is passed directly to config handlers at runtime and is not persisted to disk — a server restart will revert to the file-based configuration. A warning is printed after a successful inline reload to remind the operator.
Accepts the following formats:
@file.yaml— read content from a file@-— read content from stdin"yaml: content"— inline YAML stringMultiple
-darguments can be provided — their content is merged, with later values overriding earlier ones for the same key
The YAML content uses registry keys (e.g.
ip_allow,sni) as top-level keys. Each key maps to the full configuration content that the handler normally reads from its config file. A single file can target multiple handlers:# reload_rules.yaml # Each top-level key is a registry key. # The value is the config content (inner data, not the file's top-level wrapper). ip_allow: - apply: in ip_addrs: 0.0.0.0/0 action: allow sni: - fqdn: "*.example.com" verify_client: NONE
# Reload from file $ traffic_ctl config reload -d @reload_rules.yaml -t update-rules -m # Reload from stdin $ cat rules.yaml | traffic_ctl config reload -d @- -m
When used with
-d, only the handlers for the keys present in the YAML content are invoked — other config handlers are not triggered.Note
Inline YAML reload requires the target config handler to support
ConfigSource::FileAndRpc. Handlers that only supportConfigSource::FileOnlywill return an error for the corresponding key. The JSONRPC response will contain per-key error details.
- --force, -F
Force a new reload even if one is already in progress. Without this flag, the server rejects a new reload when one is active.
Warning
--forcedoes not stop or cancel the running reload. It starts a second reload alongside the first one. Handlers from both reloads may execute concurrently on separateET_TASKthreads. This can lead to unpredictable behavior if handlers are not designed for concurrent execution. Use this flag only for debugging or recovery situations.
- --refresh-int, -r <seconds>
Set the polling interval in seconds used with
--monitor. Accepts fractional values (e.g.0.5for 500ms). Controls how oftentraffic_ctlqueries the server for updated reload status. Default:0.5.
- --initial-wait, -w <seconds>
Initial wait in seconds before the first status poll. After scheduling a reload, the server needs a brief moment to dispatch work to all handlers. This delay avoids polling before any handler has started, which would show an empty or incomplete task tree. Accepts fractional values (e.g.
1.5). Default:2.
- --timeout, -T <duration>
Maximum time to wait for reload completion when using
--monitor. Accepts duration strings (e.g.30s,1m,500ms). If the reload does not reach a terminal state within the specified duration,traffic_ctlstops monitoring and exits withEX_TEMPFAIL(75). The reload itself continues on the server — usetraffic_ctl config status -t <token>to check its final status later. Default:0(no timeout — wait indefinitely until the reload completes or is interrupted). Requires--monitor.
Exit codes for config reload:
The
config reloadcommand sets the process exit code to reflect the outcome of the reload operation:0Success. The reload was scheduled (without
--monitor) or completed successfully (with--monitor).2Error. The reload reached a terminal failure state (
failortimeout), or an RPC communication error occurred.75Temporary failure (
EX_TEMPFAILfromsysexits.h). A reload is already in progress and the command could not start a new one, monitoring was interrupted (e.g. Ctrl+C) before the reload reached a terminal state, or the--timeoutduration was exceeded. The caller is invited to retry or monitor the operation later.
Example usage in scripts:
traffic_ctl config reload -m rc=$? case $rc in 0) echo "Reload completed successfully" ;; 2) echo "Reload failed" ;; 75) echo "Reload still in progress, retry later" ;; esac
- set RECORD VALUE
-
Set the named configuration record to the specified value. Refer to the
records.yamldocumentation for a list of the configuration variables you can specify. Note that this is not a synchronous operation.Supports the following options.
- --cold, -c [filename]
This option indicates to traffic_ctl that the action should be performed on a configuration file instead of using the ATS RPC facility to store the new value. traffic_ctl will save the value in the passed filename, if no filename passed, then the sysconfig
records.yamlwill be attempted to be used.ATS supports parsing multiple documents from the same YAML stream, so if you attempt to set a variable on a document with none, one or multiple documents then a new document will be appended. In case you want to modify an existing field then -u option should be passed, so the latest(top to bottom) field will be modified, if there is no variable already set in any of the documents, then the new variable will be set in the latest document of the stream.
Specifying the file name is not needed as traffic_ctl will try to use the build(or the runroot if used) information to figure out the path to the records.yaml.
If the file exists and is empty a new document will be created. If a file does not exist, an attempt to create a new file will be done.
This option(only for the config file changes) lets you use the prefix proxy.config. or ts. for variable names, either would work. If different prefix name is prepend, then traffic_ctl will work away using the provided variable name, this may not be what is intended so, make sure you use the right prefixes.
Appending a new field in a records.yaml file.
$ traffic_ctl config set proxy.config.diags.debug.enabled 1 -c records.yaml $ cat records.yaml records: ... # Document modified by traffic_ctl Mon Feb 13 23:07:15 2023 # --- records: diags: debug: enabled: 1Note
The following options are only considered if
--cold, -cis used, ignored otherwise.
- --update -u
Update latest field present. If there is no variable already set in any of the documents, then the new variable will be set in the latest document.
- --type, -t int | float | str
Inject a tag information on the modified/new field, this is useful when you set a non registered record inside ATS.
$ traffic_ctl config set ts.some.plugin.config.max 100 -t int -c records.yaml $ cat records.yaml ... # Document modified by traffic_ctl Mon Feb 13 23:07:15 2023 # --- records: some: plugin: config: max: !<tag:yaml.org,2002:int> 100
- reset PATH [PATH ...]
Reset configuration record(s) to their default values. The PATH argument is used as a regex pattern to match against record names. Multiple paths at once can be provided.
records- Reset all configuration records to defaultsA partial path like
proxy.config.httporrecords.http- Reset all records matching the patternA full record name like
proxy.config.diags.debug.enabled- Reset a specific record
Path Format Support
Both record name format and YAML format are supported. Paths starting with
records.are automatically converted toproxy.config.before matching:YAML Format
Record Name Format
records.httpproxy.config.httprecords.diags.debug.enabledproxy.config.diags.debug.enabledrecords.cache.ram_cache.sizeproxy.config.cache.ram_cache.sizeThis allows you to use the same path style as in
records.yamlconfiguration files.Examples:
Reset all records to defaults:
$ traffic_ctl config reset records
Reset all HTTP configuration records (both formats are equivalent):
$ traffic_ctl config reset proxy.config.http $ traffic_ctl config reset records.http
Reset a specific record:
$ traffic_ctl config reset proxy.config.diags.debug.enabled
Using YAML-style path for the same record:
$ traffic_ctl config reset records.diags.debug.enabled
- status
-
Display the status of configuration reloads. This is a read-only command — it does not trigger a reload, it only queries the server for information about past or in-progress reloads.
Behavior without options:
When called without
--tokenor--count, shows the most recent reload:$ traffic_ctl config status ✔ Reload [success] — rldtk-1739808000000 Started : 2025 Feb 17 12:00:00.123 Finished: 2025 Feb 17 12:00:00.368 Duration: 245ms ✔ 11 success ◌ 0 in-progress ✗ 0 failed (11 total) Tasks: ✔ logging.yaml ··························· 120ms ✔ ip_allow.yaml ·························· 18ms ...
When no reloads have occurred:
If the server has not performed any reloads since startup, the command reports that no reload tasks were found.
Querying a specific reload:
Use
--tokento look up a specific reload by its token. If the token does not exist in the history, an error is returned:$ traffic_ctl config status -t nonexistent ✗ Token 'nonexistent' not found
Failed reload report:
When a reload has failed handlers, the output shows which handlers succeeded and which failed, along with durations for each:
$ traffic_ctl config status -t hotfix-cert ✗ Reload [fail] — hotfix-cert Started : 2025 Feb 17 14:30:10.500 Finished: 2025 Feb 17 14:30:10.810 Duration: 310ms ✔ 9 success ◌ 0 in-progress ✗ 2 failed (11 total) Tasks: ✔ ip_allow.yaml ·························· 18ms ✗ logging.yaml ·························· 120ms ✗ FAIL ✗ ssl_client_coordinator ················· 85ms ✗ FAIL ├─ ✔ sni.yaml ··························· 20ms └─ ✗ ssl_multicert.config ··············· 65ms ✗ FAIL ...
Supports the following options:
- --token, -t <token>
Show the status of a specific reload identified by its token. The token was either assigned by the server (e.g.
rldtk-<timestamp>) or provided by the operator viatraffic_ctl config reload --token.Returns an error if the token is not found in the reload history.
- --count, -c <N|all>
Show the last
Nreload records from the history. Useallto display every reload the server has recorded (up to the internal history limit).When
--countis provided,--tokenis ignored.# Show full history $ traffic_ctl config status -c all # Show last 5 reloads $ traffic_ctl config status -c 5
JSON output:
All
config statuscommands support the global--format jsonoption to output the raw JSONRPC response as JSON instead of the human-readable format. This is useful for automation, CI pipelines, monitoring tools, or any system that consumes structured output directly:$ traffic_ctl config status -t deploy-v2.1 --format json { "tasks": [ { "config_token": "deploy-v2.1", "status": "success", "description": "Main reload task - 2025 Feb 17 12:00:00", "sub_tasks": [ ...] } ] }
- registry
filemanager.get_files_registry
Display information about the registered files in Traffic Server. This includes the full file path, config record name, parent config (if any) if needs root access and if the file is required in Traffic Server.
- ssl-multicert show [--yaml | --json]
Display the current
ssl_multicert.yamlconfiguration. By default, output is in YAML format. Use--jsonor-jto output in JSON format.- --yaml, -y
Output in YAML format (default).
- --json, -j
Output in JSON format.
Example:
$ traffic_ctl config ssl-multicert show ssl_multicert: - ssl_cert_name: server.pem dest_ip: "*" ssl_key_name: server.key
$ traffic_ctl config ssl-multicert show --json {"ssl_multicert": [{"ssl_cert_name": "server.pem", "dest_ip": "*", "ssl_key_name": "server.key"}]}
traffic_ctl metric
- get METRIC [METRIC...]
-
Display the current value of the specified statistics.
- match REGEX [REGEX...]
-
Display the current values of all statistics whose names match the given regular expression.
- describe RECORD [RECORD...]
-
Display all the known information about a metric record.
- monitor [-i, -c] METRIC [METRIC...]
Display the current value of the specified metric(s) using an interval time and a count value. Use
-ito set the interval time between requests, and-cto set the number of requests the program will send in total per metric. The program will terminate execution after requesting <count> metrics. Ifcount=0is passed orcountis not specified then the program should be terminated by SIGINT. Note that the metric will display + or - depending on the value of the last metric and the current being shown, if current is greater, then + will be added beside the metric value, - if the last value is less than current, and no symbol is the same.Example:
$ traffic_ctl metric monitor proxy.process.eventloop.time.min.10s -i 2 -c 10 proxy.process.eventloop.time.min.10s: 4025085 proxy.process.eventloop.time.min.10s: 4025085 proxy.process.eventloop.time.min.10s: 4025085 proxy.process.eventloop.time.min.10s: 4025085 proxy.process.eventloop.time.min.10s: 4011194 - proxy.process.eventloop.time.min.10s: 4011194 proxy.process.eventloop.time.min.10s: 4011194 proxy.process.eventloop.time.min.10s: 4011194 proxy.process.eventloop.time.min.10s: 4011194 proxy.process.eventloop.time.min.10s: 4018669 + --- metric monitor statistics(10) --- ┌ proxy.process.eventloop.time.min.10s └─ min/avg/max = 4011194/4017498/4025085
traffic_ctl server
- drain
Enable graceful connection draining mode. When enabled, Traffic Server signals clients to close their connections gracefully by:
Adding
Connection: closeheaders to HTTP/1.1 responsesSending GOAWAY frames to HTTP/2 clients for graceful shutdown
This allows active connections to complete naturally while encouraging clients to establish new connections. Traffic Server continues accepting new connections while in drain mode.
Note
Drain mode does NOT close listening sockets or terminate existing connections. It only signals to clients that they should close their connections.
- --undo, -U
Disable drain mode and return to normal operation.
- --no-new-connection, -N
This option is accepted but not yet implemented. It has no effect in the current version.
Examples:
Enable drain mode:
$ traffic_ctl server drain
Disable drain mode:
$ traffic_ctl server drain --undo
Check drain status:
$ traffic_ctl server status | jq '.is_draining' "false"
For detailed information about drain behavior and best practices, see Graceful Shutdown.
See also:
admin_server_start_drain (JSONRPC API)
admin_server_stop_drain (JSONRPC API)
- status
Display basic Traffic Server internal running information.
Example:
$ traffic_ctl server status | jq { "initialized_done": "true", "is_ssl_handshaking_stopped": "false", "is_draining": "false", "is_event_system_shut_down": "false" }
- debug enable
Enables diagnostic messages at runtime. This is equivalent to manually setting the below records but this is done in one go.
Note that if you just set this to enable, the
proxy.config.diags.debug.enabledwill be set to1unless you specify the--client_ip,-coption.proxy.config.diags.debug.enabledproxy.config.diags.debug.client_ipEnables logging for diagnostic messages. See
proxy.config.diags.debug.enabledfor information.- --tags, -t tags
This string should contain an anchored regular expression that filters the messages based on the debug tag tag. Please refer to
proxy.config.diags.debug.tagsfor more information- --append, -a
Append the specified tags to the existing debug tags instead of replacing them. This option requires
--tagsto be specified. The new tags will be combined with existing tags using the|separator.- --client_ip, -c ip
Please see
proxy.config.diags.debug.client_ipfor information.
- debug disable
Disables logging for diagnostic messages. Equivalent to set
proxy.config.diags.debug.enabledto0.Examples:
# Set debug tags (replaces existing tags) $ traffic_ctl server debug enable --tags "quic|quiche" ■ TS Runtime debug set to »ON(1)« - tags »"quic|quiche"«, client_ip »unchanged« # Append debug tags to existing tags $ traffic_ctl server debug enable --tags "http" --append ■ TS Runtime debug set to »ON(1)« - tags »"quic|quiche|http"«, client_ip »unchanged« # Disable debug logging $ traffic_ctl server debug disable ■ TS Runtime debug set to »OFF(0)«
traffic_ctl storage
- offline PATH [PATH ...]
admin_storage_set_device_offline
Mark a cache storage device as offline. The storage is identified by PATH which must match exactly a path specified in
storage.config. This removes the storage from the cache and redirects requests that would have used this storage to other storage. This has exactly the same effect as a disk failure for that storage. This does not persist across restarts of the traffic_server process.
- status PATH [PATH ...]
admin_storage_get_device_status
Show the storage configuration status.
traffic_ctl plugin
- msg TAG DATA
-
Send a message to plugins. All plugins that have hooked the
TSLifecycleHookID::TS_LIFECYCLE_MSG_HOOKwill receive a callback for that hook. The TAG and DATA will be available to the plugin hook processing. It is expected that plugins will use TAG to select relevant messages and determine the format of the DATA.
traffic_ctl host
A record to track status is created for each host. The name is the host fqdn. The value of the record when retrieved, is a serialized string representation of the status. This contains the overall status and the status for each reason. The records may be viewed using the traffic_ctl host status command.
- --time count
Set the duration of an operation to
countseconds. A value of0means no duration, the condition persists until explicitly changed. The default is0if an operation requires a time and none is provided by this option.
- --reason active | local | manual
Sets the reason for the operation.
activeSet the active health check reason.
localSet the local health check reason.
manualSet the administrative reason. This is the default reason if a reason is needed and not provided by this option.
Internally the reason can be
self_detectifproxy.config.http.parent_proxy.self_detectis set to the value 2 (the default). This is used to prevent parent selection from creating a loop by selecting itself as the upstream by marking this reason as “down” in that case.Note
The up / down status values are independent, and a host is consider available if and only if all of the statuses are “up”.
- status HOSTNAME [HOSTNAME ...]
-
Get the current status of the specified hosts with respect to their use as targets for parent selection. If the HOSTNAME arguments are omitted, all host records available are returned.
- down HOSTNAME [HOSTNAME ...]
-
Marks the listed hosts as down so that they will not be chosen as a next hop parent. If
--timeis included the host is marked down for the specified number of seconds after which the host will automatically be marked up. A host is not marked up until all reason codes are cleared by marking up the host for the specified reason code.
- up HOSTNAME [HOSTNAME ...]
-
Marks the listed hosts as up so that they will be available for use as a next hop parent. Use
--reasonto mark the host reason code. The ‘self_detect’ is an internal reason code used by parent selection to mark down a parent when it is identified as itself andSupports
--reason.
traffic_ctl hostdb
- status [HOSTNAME]
-
Get the current status of HostDB.
If
HOSTNAMEis specified, the output is filtered to show only records whose names contain the given string.
traffic_ctl rpc
A mechanism to interact directly with the Traffic Server JSONRPC 2.0 endpoint. This means that this is not tied to any particular API but rather to the rpc endpoint, so you can directly send requests and receive responses from the server.
- file
Reads a file or a set of files from the disc, use the content of the files as message(s) to the JSONRPC 2.0 endpoint. All jsonrpc messages will be validated before sending them. If the file contains invalid json|yaml format the message will not be send, in case of a set of files, if a particular file is not a proper json/yaml format then that particular file will be skipped.
Example:
traffic_ctl rpc file jsonrpc_cmd1.json jsonrpc_cmd2.yaml
- get-api
-
Request the entire admin api. This will retrieve all the registered methods and notifications on the server side.
Example:
$ traffic_ctl rpc get-api Methods: - admin_host_set_status - admin_server_stop_drain - admin_server_start_drain - admin_plugin_send_basic_msg - admin_lookup_records - admin_config_set_records - admin_storage_get_device_status - admin_storage_set_device_offline - admin_config_reload - show_registered_handlers Notifications: - some_registered_notification_handler
- input
Input mode, traffic_ctl will provide a control input from a stream buffer. Once the content is written the terminal traffic_ctl will wait for the user to press Control-D to send the request to the rpc endpoint. This feature allows you to directly interact with the jsonrpc endpoint and test your API easily and without the need to know the low level implementation details of the transport layer. traffic_ctl will validate the input format, not the message content. The message content will be validated by the server. See example input_example_2.
- --raw, -r
No json/yaml parse validation will take place, the input content will be directly send to the server.
Example:
$ traffic_ctl rpc input >> Ctrl-D to fire the request { "id":"86e59b43-185b-4a0b-b1c1-babb1a3d5401", "jsonrpc":"2.0", "method":"admin_lookup_records", "params":[ { "record_name":"proxy.config.diags.debug.tags", "rec_types":[ "1", "16" ] } ] } <pressed Ctrl-D> <-- Server's response. { "jsonrpc":"2.0", "result":{ "recordList":[ { "record":{ "record_name":"proxy.config.diags.debug.tags", "record_type":"3", "version":"0", "raw_stat_block":"0", "order":"423", "config_meta":{ "access_type":"0", "update_status":"0", "update_type":"1", "checktype":"0", "source":"3", "check_expr":"null" }, "record_class":"1", "overridable":"false", "data_type":"STRING", "current_value":"rpc", "default_value":"http|dns" } } ] }, "id":"86e59b43-185b-4a0b-b1c1-babb1a3d5401" }
Example 2:
You can see a valid json
{}but an invalid JSONRPC 2.0 message. In this case the server is responding.$ traffic_ctl rpc input >> Ctrl-D to fire the request {} <pressed Ctrl-D> < -- Server's response { "jsonrpc":"2.0", "error":{ "code":-32600, "message":"Invalid Request" } }
- invoke
Invoke a remote call by using the method name as parameter. This could be a handy option if you are developing a new handler or you just don’t want to expose the method in traffic_ctl, for instance when implementing a custom handler inside a proprietary plugin.
- --params, -p
Parameters to be passed in the request, YAML or JSON format are accepted. If JSON is passed as param it should not be mixed with YAML. It’s important that you follow the JSONRPC 2.0 Protocol specs. If the passed param does not follows the specs the server will reject the request.
Example 1:
Call a jsonrpc method with no parameter.
$ traffic_ctl rpc invoke some_jsonrpc_handler --> {"id": "0dbab88d-b78f-4ebf-8aa3-f100031711a5", "jsonrpc": "2.0", "method": "some_jsonrpc_handler"} <-- { response }
Example 2:
Call a jsonrpc method with parameters.
$ traffic_ctl rpc invoke reload_files_from_folder --params 'filenames: ["file1", "file2"]' 'folder: "/path/to/folder"' --> {"id": "9ac68652-5133-4d5f-8260-421baca4c67f", "jsonrpc": "2.0", "method": "reload_files_from_folder", "params": {"filenames": ["file1", "file2"], "folder": "/path/to/folder"}} <-- { response }
Examples
Mark down a host with traffic_ctl and view the associated host stats:
.. code-block:: bash
# traffic_ctl host down cdn-cache-02.foo.com --reason manual
# traffic_ctl metric match host_status
proxy.process.host_status.cdn-cache-01.foo.com HOST_STATUS_DOWN,ACTIVE:UP:0:0,LOCAL:UP:0:0,MANUAL:DOWN:1556896844:0,SELF_DETECT:UP:0
proxy.process.host_status.cdn-cache-02.foo.com HOST_STATUS_UP,ACTIVE:UP:0:0,LOCAL:UP:0:0,MANUAL:UP:0:0,SELF_DETECT:UP:0
proxy.process.host_status.cdn-cache-origin-01.foo.com HOST_STATUS_UP,ACTIVE:UP:0:0,LOCAL:UP:0:0,MANUAL:UP:0:0,SELF_DETECT:UP:0
In the example above, ‘cdn-cache-01.foo.com’ is unavailable, HOST_STATUS_DOWN and was marked down for the manual reason, MANUAL:DOWN:1556896844:0, at the time indicated by the UNIX time stamp 1556896844. To make the host available, one would have to clear the manual reason using:
# traffic_ctl host up cdn-cache-01.foo.com --reason manual
Configure Traffic Server to insert Via header in the response to the client
# traffic_ctl config set proxy.config.http.insert_response_via_str 1 # traffic_ctl config reload
Autest
Runroot needs to be configured in order to let traffic_ctl know where to find the socket. This is done by default and there is no change you have to do to interact with it, but make sure that you are not overriding the dump_runroot=False when creating the ATS Process, otherwise the runroot.yaml will not be set.
Exit Codes
traffic_ctl uses the following exit codes:
0Success. The requested operation completed successfully.
2Error. The operation failed. This may be returned when:
The RPC communication with traffic_server failed (e.g. socket not found or connection refused).
The server response contains an error (e.g. invalid record name, malformed request).
3Unimplemented. The requested command is not yet implemented.
75Temporary failure (aligned with
EX_TEMPFAILfromsysexits.h). The caller is invited to retry later.
See also
records.yaml(5), storage.config(5), Configuration, JSONRPC 2.0 Protocol