- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Depending on how you deployed the manifest, you might be using readiness probes. Azure AKS requires extra permissions in the Cluster Role in order for the health endpoint to be reachable.
On AKS, the default RBAC does not allow access to /healthz
for unauthenticated users. The following RBAC fixes that:
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: system:healthz
rules:
- nonResourceURLs:
- /healthz
verbs:
- get
---
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: system:healthz
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:healthz
subjects:
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: system:authenticated
- apiGroup: rbac.authorization.k8s.io
kind: Group
name: system:unauthenticated