update k8s health checks page

pull/15455/head
Iryna Shustava 2022-11-17 17:01:03 -07:00
parent 18fb766e9b
commit 36bc043649
No known key found for this signature in database
GPG Key ID: 5971648779A5A8A4
1 changed files with 10 additions and 7 deletions

View File

@ -2,7 +2,7 @@
layout: docs layout: docs
page_title: Configure Health Checks for Consul on Kubernetes page_title: Configure Health Checks for Consul on Kubernetes
description: >- description: >-
Kubernetes has built-in health probes you can sync with Consul's health checks to ensure service mesh traffic is routed to healthy pods. Learn how to register a TTL Health check and use mutating webhooks to redirect k8s liveness, readiness, and startup probes through Envoy proxies. Kubernetes has built-in health probes you can sync with Consul's health checks to ensure service mesh traffic is routed to healthy pods.
--- ---
# Configure Health Checks for Consul on Kubernetes # Configure Health Checks for Consul on Kubernetes
@ -14,14 +14,17 @@ Health check synchronization with Consul is done automatically whenever `connect
For each Kubernetes pod that is connect-injected the following will be configured: For each Kubernetes pod that is connect-injected the following will be configured:
1. A [TTL health check](/docs/discovery/checks#ttl) is registered within Consul. 1. A [Consul health check](/consul/api-docs/catalog#register-entity) is registered within Consul catalog.
The Consul health check's state will reflect the pod's readiness status, The Consul health check's state will reflect the pod's readiness status.
which is the combination of all Kubernetes probes registered with the pod.
1. If the pod is utilizing [Transparent Proxy](/docs/connect/transparent-proxy) mode, the mutating webhook will mutate all `http` based Startup, Liveness, and Readiness probes in the pod to redirect through the Envoy proxy. 1. If the pod is using [Transparent Proxy](/docs/connect/transparent-proxy) mode,
This is done with [`ExposePaths` configuration](/docs/connect/registration/service-registration#expose-paths-configuration-reference) for each probe so that kubelet can access the endpoint through the Envoy proxy. the mutating webhook will mutate all `http` based Startup, Liveness, and Readiness probes in the pod to redirect through the Envoy proxy.
This is done with
[`ExposePaths` configuration](/docs/connect/registration/service-registration#expose-paths-configuration-reference)
for each probe so that kubelet can access the endpoint through the Envoy proxy.
~> The mutation behavior can be disabled by either setting the `consul.hashicorp.com/transparent-proxy-overwrite-probes` pod annotation to `false` or the `connectInject.defaultOverwriteProbes` Helm value to `false`. ~> The mutation behavior can be disabled by either setting the `consul.hashicorp.com/transparent-proxy-overwrite-probes`
pod annotation to `false` or the `connectInject.defaultOverwriteProbes` Helm value to `false`.
When readiness probes are set for a pod, the status of the pod will be reflected within Consul and will cause Consul to redirect service When readiness probes are set for a pod, the status of the pod will be reflected within Consul and will cause Consul to redirect service
mesh traffic to the pod based on the pod's health. If the pod has failing health checks, Consul will no longer use mesh traffic to the pod based on the pod's health. If the pod has failing health checks, Consul will no longer use