--- title: Health Checking of Istio Services description: Shows how to do health checking for Istio services. weight: 50 aliases: - /docs/tasks/traffic-management/app-health-check/ - /docs/ops/security/health-checks-and-mtls/ - /help/ops/setup/app-health-check - /help/ops/app-health-check - /docs/ops/app-health-check - /docs/ops/setup/app-health-check keywords: [security,health-check] owner: istio/wg-user-experience-maintainers test: yes --- [Kubernetes liveness and readiness probes](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/) describes several ways to configure liveness and readiness probes including: 1. [Command](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#define-a-liveness-command) 1. [HTTP request](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#define-a-liveness-http-request) 1. [TCP Probes](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/#define-a-tcp-liveness-probe) The command approach works with Istio regardless of whether or not mutual TLS is enabled. The HTTP request approach, on the other hand, requires special Istio configuration when mutual TLS is enabled. This is because the health check requests to the `liveness-http` service are sent by Kubelet, which does not have an Istio issued certificate. Therefore when mutual TLS is enabled, the health check requests will fail. Istio solves this problem by rewriting the application `PodSpec` readiness/liveness probe, so that the probe request is sent to the [sidecar agent](/docs/reference/commands/pilot-agent/). The sidecar agent then redirects the request to the application, strips the response body, only returning the response code. This feature is enabled by default in all built-in Istio [configuration profiles](/docs/setup/additional-setup/config-profiles/) but can be disabled as described below. ## Liveness and readiness probes using the command approach Istio provides a [liveness sample]({{< github_file >}}/samples/health-check/liveness-command.yaml) that implements this approach. To demonstrate it working with mutual TLS enabled, first create a namespace for the example: {{< text bash >}} $ kubectl create ns istio-io-health {{< /text >}} To configure strict mutual TLS, run: {{< text bash >}} $ kubectl apply -f - <}} Next, run the following command to deploy the sample service: {{< text bash >}} $ kubectl -n istio-io-health apply -f <(istioctl kube-inject -f @samples/health-check/liveness-command.yaml@) {{< /text >}} To confirm that the liveness probes are working, check the status of the sample pod to verify that it is running. {{< text bash >}} $ kubectl -n istio-io-health get pod NAME READY STATUS RESTARTS AGE liveness-6857c8775f-zdv9r 2/2 Running 0 4m {{< /text >}} ## Liveness and readiness probes using the HTTP request approach As stated previously, Istio uses probe rewrite to implement HTTP probes by default. You can disable this feature either for specific pods, or globally. ### Disable the HTTP probe rewrite for a pod You can [annotate the pod](/docs/reference/config/annotations/) with `sidecar.istio.io/rewriteAppHTTPProbers: "false"` to disable the probe rewrite option. Make sure you add the annotation to the [pod resource](https://kubernetes.io/docs/concepts/workloads/pods/pod-overview/) because it will be ignored anywhere else (for example, on an enclosing deployment resource). {{< text yaml >}} kubectl apply -f - <}} This approach allows you to disable the health check probe rewrite gradually on individual deployments, without reinstalling Istio. ### Disable the probe rewrite globally [Install Istio](/docs/setup/install/istioctl/) using `--set values.sidecarInjectorWebhook.rewriteAppHTTPProbe=false` to disable the probe rewrite globally. **Alternatively**, update the configuration map for the Istio sidecar injector: {{< text bash >}} $ kubectl get cm istio-sidecar-injector -n istio-system -o yaml | sed -e 's/"rewriteAppHTTPProbe": true/"rewriteAppHTTPProbe": false/' | kubectl apply -f - {{< /text >}} ## Liveness probes using the TCP socket A third type of liveness probe uses a TCP socket. {{< text yaml >}} kubectl apply -f - <}} ## Cleanup Remove the namespace used for the examples: {{< text bash >}} $ kubectl delete ns istio-io-health {{< /text >}}