AWS AosEdge Health check strategies
EKS Kubernetes health check
All Aos Edge microservices had being configured to use health checks and readiness checks, we are using cloud native k8s approach to get those and restart if somehow those are failing.
The kubelet uses readiness probes to know when a container is ready to start accepting traffic. A Pod is considered ready when all of its containers are ready. One use of this signal is to control which Pods are used as backends for Services. When a Pod is not ready, it is removed from Service load balancers.
More information about readiness and livenness in k8s docs.
AWS Cloud Watch and route53 health check
Amazon Route 53 health checks monitor the health and performance of your web applications, web servers, and other resources. Each health check that you create can monitor one of the following:
- The health of a specified resource, such as a web server.
- The status of other health checks.
- The status of an Amazon CloudWatch alarm -> In aos Edge this will trigger an alarm and send to configured administrator emails.
More information in route53 health check docs.
AosEdge AWS Smoke Test
Disclaimer: There is no smoke test for the AosEdge yet, but testing full E2E.
- Check that the frontend it is reachable I.E. https://<myown.fqdn>/en/
- Check that port 10000 and 9000 are listening.
curl -kI https://<myown.fqdn>:9000
curl: (35) OpenSSL//1.1.1k: error:14094410:SSL routines:ssl3_read_bytes:sslv3 alert handshake failure curl -kI https://<myown.fqdn>:10000HTTP/2 200
server: -
End to end testing
It is highly recommended to start following the cookbooks to generate aos keys and vm's for testing.