Issue#138 add probes and resource limits#139
Conversation
Add TCP socket readiness probe on webhook-server port (9443) for CloudGuard compliance and operational reliability. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
Add TCP socket liveness probe on webhook-server port (9443) for CloudGuard compliance and operational reliability. Ensures container restarts automatically if unhealthy. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
Add comments explaining readiness and liveness probe behavior for Cloud Guard compliance. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
|
Thank you @AkarshES for approving the changes, let me know what is further required to finalize this pull request! |
… server Replace TCP socket probes on webhook-server with HTTP GET endpoints (/healthz/ready for readiness, /healthz/live for liveness) that connect to the metrics server port. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
Signal to the health checker that all informer caches have been synced after setup, enabling readiness checks to report ready status. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
…racking Register /healthz/ready and /healthz/live HTTP endpoints on the metrics server and mark controllers as ready after initialization for proper health probe support. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
…iveness probes Implement HealthChecker with endpoints for tracking cache synchronization and controller readiness status. Provides /healthz/ready and /healthz/live handlers for Kubernetes probe support. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
d433363 to
0373bae
Compare
|
Hi @nirpai, @AkarshES, Helm Deployment TestController deployed from my branch image:
Health endpoints verified inside the pod
Ingress Functional Test
|
Document HTTP readiness and liveness endpoints on the metrics server. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
AkarshES
left a comment
There was a problem hiding this comment.
Thanks for adding the HTTP healthcheck as Niranjan requested
| # maxUnavailable: 1 | ||
|
|
||
| # The TCP port the Webhook server binds to. (default 9443) | ||
| # Health probes for operational reliability and Cloud Guard compliance |
There was a problem hiding this comment.
The comment is misplaced on webhook Port.
Relocate health probe documentation from webhookBindPort to the metrics section where the probes actually connect. Signed-off-by: Amaan Ul Haq Siddiqui <amaanulhaq.s@outlook.com>
|
We are doing some validation in OKE environment so that we can go ahead and merge this change. Thank you for your effort and patience on this |
|
@AkarshES Thank you for keeping me updated |
What this fixesCloud Guard was flagging the OCI Native Ingress Controller for missing readiness and liveness probes (Medium risk, Container Security). This affects both managed OKE add-on deployments and Helm-based ones. What changedInitial implementation (TCP probes) Added readiness and liveness probes to the Helm deployment template using TCP socket checks on the webhook server port (9443):
Moved to HTTP probes with dedicated health endpoints After reviewer feedback, replaced the TCP probes with proper HTTP health endpoints for more reliable checks:
Testing
Note on PR descriptionUpdating the description here for visibility and documentation - the initial PR body described the original TCP probe approach. Since then the implementation evolved significantly based on reviewer feedback, so this updated description reflects the full picture of what was done. @nirpai @AkarshES - the PR is already approved and from what I understand just pending your OKE environment validation. Could you share an update on where that stands? Happy to help with anything if needed. Once validation is good, would appreciate a merge when you get a chance. Thank you both for your time and feedback throughout this. Closes #138 |



Fix Cloud Guard Container Security Findings by Adding Health Probes
Subject
Resolve OCI Cloud Guard findings (missing health probes) in OCI Native Ingress Controller by adding readiness and liveness probes to the deployment template.
Problem Statement
Cloud Guard was flagging multiple Container Security findings against the OCI Native Ingress Controller deployed as an OKE managed add-on, specifically:
This issue persisted across our OCI environment and could not be resolved by end users since the controller is deployed as a managed add-on (Deployment spec cannot be safely modified). However, these same findings would affect Helm-based deployments as well.
Solution
Added TCP socket-based health probes to the Helm deployment template:
Readiness Probe:
Liveness Probe:
Implementation Details
Testing
Relates To
Closes #138
Commits