Skip to main content

AWS Route 53 health check

It monitors endpoints by sending HTTP requests at regular intervals. It marks the endpoint 'healthy' if the response is successful, 'unhealthy' otherwise. The endpoint will be marked 'unhealthy' if there is no response. In addition to endpoints, the Route 53 health checks can also be used to monitor other calculated health checks or cloudwatch alarms' state.

Question: what is monitoring other health checks?

You might want to make sure some minimum number of resources among multiple web servers are healthy.

Question: What does monitoring a cloudwatch alarm mean?

You could have created a CloudWatch alarm that monitors the number of targets running healthy in the load balancer's target group. The Route 53 health check could monitor such CloudWatch alarms.

You can specify the endpoint using an IP address or domain name (the domain name could be configured in Route 53). 

Example: The endpoint can be from an API Gateway which has a path parameter using which it queries a DynamoDB item.

The additional configuration will incur additional costs. You can check the cost by clicking the 'View pricing' link in the console.

You can create a CloudWatch alarm which will send you an SNS notification when the state of the Route 53 health check becomes unhealthy. You can either create a new SNS topic or use an existing SNS topic.

The Route 53 health check will not wait for the CloudWatch alarm to go into the alarm state. Both the Route 53 health check and the CloudWatch alarm will become unhealthy in nearly the same time.

Note: The CloudWatch alarm and the SNS topic should be in the same location.

Comments

Popular posts from this blog

AWS Route53 - Private Hosted Zone

AWS - Error - An error occurred (ExpiredToken) when calling the DescribeStacks operation: The security token included in the request is expired

Error:   An error occurred (ExpiredToken) when calling the DescribeStacks operation: The security token included in the request is expired. Reason: It occurred when I ran a MAKE command with a profile having expired token (security credentials) Fix: Generate new security credentials (aws sts assume-role) and run the command again

High availability (Multi-AZ) for Amazon RDS

There is something called failover technology in Amazon. AWS RDS's Multi-AZ deployment uses this technology. If you enable Multi-AZ for an RDS DB, say MySQL DB, RDS automatically creates a standby replica in a different AZ. If the primary DB instance is in AZ-1A, then RDS creates a standby replica in AZ-1B (for example). Suppose I add a new row to a table in the primary DB, then the same row is added, almost in the same time, in the standby replica. This is called as synchronous replication . Thus, standby replicas are useful during DB instance failure/ AZ disruption . How? Because, there is no need to create a backup later because the backup has already been created. This gives high availability during planned system maintenance. Normal backup  operation - I/O activities are blocked in the primary database  Automated backup operation (standby replica) - I/O activities are not blocked This standby replica is not similar to read replica (which is used for disaster recovery). S...