You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current healthchecks, which look like this: curl --cacert $CERTS_DIR/ca/ca.crt -s https://localhost:9200 >/dev/null; if [[ $$? == 52 ]]; then echo 0; else echo 1; fi, pass even if a node is exposed on a port other than 9200, or if the node is not accessible for some reason. The echo commands both return a response code of 0.
Getting rid of the if statement fixes this, but we could also add logic to the healthcheck based on the http response code.
The text was updated successfully, but these errors were encountered:
@lcawl, I'm currently updating these instructions in #1888. I'll be updating the section for Docker Compose with TLS in a separate PR, which will be the only Docker Compose option.
The healthcheck in question is in elastic-docker-tls.yml, which would need to change with security enabled by default. Something like:
@ryanhockstad, I think that the same issue might persist with this command. Can you help with the logic for implementing a healthcheck based on the HTTP response code?
The current healthchecks, which look like this:
curl --cacert $CERTS_DIR/ca/ca.crt -s https://localhost:9200 >/dev/null; if [[ $$? == 52 ]]; then echo 0; else echo 1; fi
, pass even if a node is exposed on a port other than 9200, or if the node is not accessible for some reason. The echo commands both return a response code of 0.Getting rid of the if statement fixes this, but we could also add logic to the healthcheck based on the http response code.
The text was updated successfully, but these errors were encountered: