Support >
  About cloud server >
  Japanese Cloud Server Health Status Probe Configuration Practice Guide
Japanese Cloud Server Health Status Probe Configuration Practice Guide
Time : 2025-12-15 11:11:44
Edit : Jtti

When managing cloud servers located overseas, ensuring their continuous and stable operation is a core concern. Manual login checks are insufficient; configuring automated health probes is crucial. Like a regular sentinel, it continuously monitors the server's "heartbeat" and "status," notifying you immediately of any issues for rapid response.

Essentially, a health probe is an automated checking program that periodically attempts to access a service on the server or perform a check task at predefined intervals. Based on the returned results, it determines whether the server or service is healthy or experiencing a failure. This determination directly triggers subsequent actions, such as automatic alerts or, in more advanced configurations, allowing the load balancer to automatically switch traffic from failed servers to healthy ones, thus achieving high service availability.

You need to choose the appropriate probe based on the type of service running on the server. The most common types are HTTP/HTTPS probes, TCP probes, and custom script probes.

HTTP/HTTPS probes are the most frequently used, used to check the functionality of web servers (such as Nginx and Apache) or any application providing an HTTP interface. Its working principle is simple: send a GET request to the specified URL (e.g., `http://your server IP:port/health check path`). If the server returns an HTTP status code between 200 and 399, the check is usually considered successful and the service is healthy. In configuration, besides setting the check URL and interval (e.g., every 30 seconds), you can also set a "timeout," such as 5 seconds, meaning if no response is received within 5 seconds, it's considered a failure. Triggering an alert only after several consecutive failures (e.g., 2) avoids false alarms due to brief network fluctuations. Many monitoring tools, such as Prometheus' Blackbox Exporter and various cloud monitoring agents, natively support this probe.

TCP probes are suitable for services that don't provide HTTP services but have open network ports, such as databases (MySQL port 3306), Redis (port 6379), or custom TCP services. Its checking mechanism is more low-level: it simply attempts to establish a TCP connection with the specified port on the server. If the three-way handshake succeeds and the connection is established, the service on that port is considered alive; if the connection is rejected or times out, it is considered a failure. When configuring a TCP probe, the core parameters are the target server's IP address and port number, and the check interval and timeout also need to be configured. This type of probe is very lightweight and can quickly determine service connectability.

When the above two standard probes cannot meet your needs, you will need a custom script probe. This type of probe allows you to upload or write a shell script or Python script to the server, which the monitoring system executes periodically, and the health status is determined based on the script's exit code. For example, a script exit code of 0 indicates health, and a non-zero code indicates an error. You can use scripts to implement very complex check logic, such as checking if disk usage exceeds 90%, checking if a critical process exists, checking if a specific query in the database returns the correct result, or calling an internal health check API from within the server. The key to configuring this type of probe is ensuring that the monitoring system has permission to execute the script and correctly parses the script's output or exit code.

Since the server is located overseas, some additional factors need to be considered during configuration. Network latency and line quality are primary concerns. Network latency from your monitoring node (potentially located in China) to overseas servers is significantly higher than domestic latency. Therefore, you must set a longer probe timeout, such as 10-15 seconds instead of the usual 2-5 seconds, to avoid frequent false alarms due to normal cross-border network latency. Simultaneously, consider deploying a monitoring node in the same region as the overseas server or within the same cloud service provider to perform "overseas-to-overseas" checks. This allows for a more accurate determination of whether the problem lies with the server itself or the cross-border network link.

Access security is equally important. For HTTP probes, if checking sensitive interfaces such as management backends, never use real usernames and passwords. A separate, unauthenticated endpoint with extremely low privileges should be set up for health checks, or simply use an IP whitelist to restrict access to the monitoring node. For script probes, ensure the script itself does not contain sensitive information and strictly control its execution permissions to prevent malicious exploitation.

An effective monitoring strategy should be layered and multi-dimensional. Don't assume everything is fine just because you check ports 80 or 443 on the server. A complete monitoring system might include: checking SSH ports (22) with a TCP probe to ensure manageability; checking major web applications with an HTTP probe; checking disk space and CPU load with a custom script; and combining this with an "external probe" originating from different regions globally to detect potential geolocation-related issues encountered by users accessing your services from different regions. Centralizing all these probe alerts onto a single platform (such as Prometheus + Grafana with an alert manager, or directly using monitoring services provided by cloud service providers) and setting clear alert levels can help you quickly pinpoint the root cause of problems.

Finally, continuous optimization is essential. Regularly review alert logs, analyze which are false alarms (e.g., due to timeouts being set too short), and adjust probe parameters. Clean up checks that are no longer important. Whenever you deploy a new service, you should simultaneously design and deploy corresponding health status probes, making them a fixed part of the deployment process.

By properly configuring and continuously maintaining health status probes, you can establish an effective automated monitoring defense for your Japanese cloud servers. It frees you from reactive fault handling and allows you to shift to proactive state awareness and rapid response, thereby providing more stable protection for your managed services and businesses. 

Pre-sales consultation
JTTI-Selina
JTTI-Eom
JTTI-Ellis
JTTI-Defl
JTTI-Amano
JTTI-Coco
JTTI-Jean
Technical Support
JTTI-Noc
Title
Email Address
Type
Sales Issues
Sales Issues
System Problems
After-sales problems
Complaints and Suggestions
Marketing Cooperation
Information
Code
Submit