Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
31 commits
Select commit Hold shift + click to select a range
59a02a0
LUA-653 added support to check HTTP body content
lneto Mar 10, 2016
269fd61
Merge pull request #1 from zenedge/lua_653_check_body
lneto Mar 11, 2016
32d29ca
LUA-656 added support for ssl (e.g., HTTPS)
lneto May 3, 2016
b085ca1
Merge pull request #2 from zenedge/lua_656_https
lneto May 9, 2016
4224759
OPENRESTY-71 SSL healthchecks cleanup
kipras Feb 17, 2017
f81a903
Merge pull request #3 from zenedge/feature/openresty_71_ssl_healthche…
kipras Feb 20, 2017
2885ced
Check upstream name when peer data is restored from shared memory aft…
kipras Mar 3, 2017
da50d14
Merge pull request #4 from zenedge/feature/openresty_76_reload_check_…
kipras Nov 17, 2017
b91ba36
OPENRESTY-127 HTTPS healthchecks issue
DrakaGytis Apr 20, 2018
547968f
OPENRESTY-111 Configurable ssl healthcheck protocols
DrakaGytis May 9, 2018
6d64c79
OPENRESTY-111 Updated default ssl protocols
DrakaGytis May 9, 2018
9783c1f
Merge pull request #5 from zenedge/feature/OPENRESTY-127_https_health…
kipras Jul 20, 2018
40405e2
Fixes for check_interface test
kipras Jul 20, 2018
c0ab32e
Merge branch 'master' into feature/OPENRESTY-111_configurable_ssl_hea…
kipras Jul 20, 2018
a093d4e
Merge pull request #6 from zenedge/feature/OPENRESTY-111_configurable…
kipras Jul 20, 2018
366b5d5
Merge remote-tracking branch 'remotes/upstream/master' into upgrade_f…
kipras Aug 9, 2018
9c72911
OPENRESTY-130 SNI support for SSL HealthChecks
DrakaGytis Aug 17, 2018
1ec344c
OPENRESTY-130 SNI support for SSL HealthChecks
DrakaGytis Aug 17, 2018
4e490b0
OPENRESTY-144 TLS1.3 support for HealthChecks
DrakaGytis Aug 23, 2018
c01119f
If SNI is not supported by OpenSSL - throw a configuration error inst…
kipras Aug 27, 2018
1cd0b13
Add "check_http_body" to readme
kipras Aug 27, 2018
086d8e1
Merge branch 'master' into feature/OPENRESTY-130_sni_support_for_ssl_…
kipras Aug 27, 2018
c458125
Add "check_ssl_server_name" to readme
kipras Aug 27, 2018
3352f55
Add check type "https" to readme
kipras Aug 27, 2018
5b36811
Merge branch 'master' into feature/OPENRESTY-130_sni_support_for_ssl_…
kipras Aug 27, 2018
d69def2
Merge pull request #7 from zenedge/feature/OPENRESTY-130_sni_support_…
kipras Aug 27, 2018
5995051
Merge branch 'master' into upgrade/openresty-1.13.6.2
kipras Aug 28, 2018
9d8c1f8
Add "check_ssl_protocols" to readme
kipras Aug 28, 2018
42e0bca
Merge branch 'upgrade/openresty-1.13.6.2' into upgrade/openresty-1.13…
kipras Aug 28, 2018
eec8cee
Merge pull request #8 from zenedge/upgrade/openresty-1.13.6.2_update_…
kipras Aug 28, 2018
1821801
Merge branch 'upgrade/openresty-1.13.6.2'
kipras Aug 28, 2018
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
43 changes: 40 additions & 3 deletions README
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ Synopsis
#check interval=3000 rise=2 fall=5 timeout=1000 type=http;
#check_http_send "HEAD / HTTP/1.0\r\n\r\n";
#check_http_expect_alive http_2xx http_3xx;
#check_http_body "online";
}

server {
Expand Down Expand Up @@ -83,13 +84,16 @@ Directives
3. *http* sends a http request packet, receives and parses the http
response to diagnose if the upstream server is alive.

4. *mysql* connects to the mysql server, receives the greeting
4. *https* sends a https (SSL) request packet, receives and parses the https
response to diagnose if the upstream server is alive.

5. *ajp* sends a AJP Cping packet, receives and parses the AJP
5. *mysql* connects to the mysql server, receives the greeting
response to diagnose if the upstream server is alive.

6. *ajp* sends a AJP Cping packet, receives and parses the AJP
Cpong response to diagnose if the upstream server is alive.

6. *fastcgi* send a fastcgi request, receives and parses the
7. *fastcgi* send a fastcgi request, receives and parses the
fastcgi response to diagnose if the upstream server is alive.

check_http_send
Expand All @@ -113,6 +117,39 @@ Directives
description: These status codes indicate the upstream server's http
response is ok, the backend is alive.

check_http_body
syntax: *check_http_body body_substring*

default: *none*

context: *upstream*

description: If specified and check type is set to "http" - healthcheck will search for the
given substring in the response body and will fail if the substring is not found

check_ssl_server_name
syntax: *check_ssl_server_name server_name*

default: *none*

context: *upstream*

description: If specified and check type="http" and ssl=true - healthcheck will try to send the
configured server_name in SNI when making the SSL connection.
*NOTE*: for this to work - the OpenSSL library that Nginx is built against has to support
the SNI TLS extension (`SSL_set_tlsext_host_name()` function). If this function is not
supported - "check_ssl_server_name" parameter for healthchecks will not be available in the
built Nginx (you will get a configuration error if this directive is used).

check_ssl_protocols
syntax: *check_ssl_protocols protocols*

default: *SSLv2 SSLv3 TLSv1 TLSv1.1 TLSv1.2*

context: *upstream*

description: Configures allowed SSL protocols for https healthchecks

check_keepalive_requests
syntax: *check_keepalive_requests num*

Expand Down
Loading