Monitoring in AWS

Health Check

There are multiple factors that can result in failure of the system, some of them are AWS related (AZ fault, hardware fault) or application fault. Depending on the use case, each customer defines differently what application failed is.

Starting v5.2.0 is available the "/readyz" endpoint that helps to fetch the current health check status of MetaDefender Core server

Health Check for EC2 instance deployment

For generic hardware or AZ fault, we recommend to deploy MetaDefender always a distributed environment as defined in AMI - Distributed MetaDefender Deployment with Autoscaling. By deploying MetaDefender in different Availability Zones with a load balancer in front of them, you will always be sure that no hardware fault will result in service interruption.

Health Check for EKS deployment

Deploying MetaDefender Core in a Kubernetes cluster offer a high availability within the cluster thanks to the configured health check at the container level that use the "/readyz" endpoint and the auto-healing feature provide by Kubernetes

How to use the health check

  1. If you have an ELB in front of MetaDefender Core, configure it to do the health checks using the engines status.

  2. In case you are not using an ELB or you would like to have a more advanced health check, our recommendation would be to setup a Lambda function to check on each MetaDefender instance. In case of the health check monitored via Lambda, you will have the flexibility to actually adapt based on the REST API response provided by MetaDefender. One of the following should apply:

    • If all engines are healthy, the instance is considered healthy
    • If some of the engines are not up to date or failing, based on the internal policy you might invalidate this MetaDefender instance.
    • If the REST API response is an error, the instance should be considered down
  3. An even more advanced check can be considered actually submitting a file to be analyzed using a Lambda function. Note that depending on the file size and complexity, workflow configurations and the number of files in the queue, it might result in timing out the Lambda execution.

    • Submit always the same file to MetaDefender through the REST API
    • Compare the response with a baseline

Licensing

To check the status of your MetaDefender Core license, please review the Check Your License__Details section on License Activation page. In case of monitoring the license information there is available an API endpoint to get the license information

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard