- Before you run the commands
- A simple sequence to follow
- Example command path
- What to ask while debugging
- Good next reads
One of the most frustrating stack failures happens when users only see one vague symptom — “the whole workflow is broken” — even though only one service is actually unhealthy.
The practical goal is to identify the failing component fast without restarting everything blindly.
A good operator sequence is simple: check status, narrow the failing service, read logs, verify dependencies, and only then decide whether restart or config work is justified.
Before you run the commands
If you do not have Stacker installed yet, the quickest path is the install script.
curl -fsSL https://raw.githubusercontent.com/trydirect/stacker/main/install.sh | bashGitHub repository and installation steps
If you prefer to explore Stacker with Docker first, you can also pull the image:
docker pull trydirect/stacker:latestIf your workflow also uses Status Panel locally or on a target server, start here too.
curl -sSfL https://raw.githubusercontent.com/trydirect/status/master/install.sh | shGitHub repository and installation steps for Status Panel
docker pull trydirect/status:latestA simple sequence to follow
- start with overall status
- check health for the service users are complaining about
- read logs before restarting anything
- ask which dependency that service needs to talk to
- restart only the affected part if the evidence supports it
Example command path
stacker agent statusstacker agent health --app n8nstacker agent logs n8n --lines 200stacker agent restart n8n
What to ask while debugging
- is the service itself unhealthy?
- is the database reachable?
- is the queue or cache reachable?
- did a config change break the dependency path?
- did the user-facing workflow fail because one support layer failed underneath?
Good next reads
If you want the broader monitoring flow, use the live stack debugging guide. If the root cause points to drift or settings, continue to the configuration guide. The Status Panel page also helps explain the runtime control layer behind these checks.