Running authz-service health checks
Learn how to run authz_service health checks in Cloud Identity Plane (CIP). This document describes internal service APIs intended to be used by developers, for example, to write a monitoring script that reports the system status.
Prerequisites
-
CIP is up and running.
-
Access to service configuration data (for example a docker-compose file) or information about the service domain from other sources.
authz_service
Send a request to the /status
endpoint of authz_service. Use the service name and port configured
for your deployment.
curl -v http://authz_service-host:9050/status
The response can be either 200 OK
if all services are up:
{
"kafka": "UP",
"hazelcast": "UP"
}
or 503 Service Unavailable
if one or more services are down:
{
"kafka": "UP",
"hazelcast": "DOWN"
}
All of the following components are checked by default:
Component | Description |
---|---|
kafka | Kafka message broker used by the service |
hazelcast | Storage for token information, authentication and authorization sessions, authentication events, shared data caches, and more |
You can disable the health check on any components from the above list. For more information, read Configuring health checks for authz_service.