Closed jazmon closed 1 year ago
We currently use following annotations for ingress for AWS Load Balancer :
alb.ingress.kubernetes.io/healthcheck-path: '/v8/artifacts/status'
alb.ingress.kubernetes.io/success-codes: '200,400'
and on deployment.yaml
livenessProbe:
httpGet:
path: /v8/artifacts/status
port: http
httpHeaders:
- name: Authorization
value: {{ printf "Bearer %s" .Values.envs.turboToken }}
readinessProbe:
httpGet:
path: /v8/artifacts/status
port: http
httpHeaders:
- name: Authorization
value: {{ printf "Bearer %s" .Values.envs.turboToken }}
Indeed would be nice to have healthcheck not requiring auth
Hi! Thanks for pointing this out. Would you like to open a PR to implement it?
We can use this other tool https://github.com/ducktors/arecibo to create a /health route
@jazmon implemented now!
🚀 Feature Proposal
Create a (or modify the existing) health check endpoint that is not protected with the authorization header.
Motivation
Without this, it's not possible to scale the service behind an AWS ALB with a health check as ALB doesn't support passing headers.
Example
AWS ALB health checks