Not sure what these requests are or where they are coming from. They are polluting our logs and keeping our machines alive (we have them configured as suspended).
Hm… The health checks use the 172.16.* private address range, or at least they have in the past. Could you log more of the request header (e.g., the user-agent)?
In general, internal traffic (apart from Flycast) won’t keep Machines awake, though. The Grafana metrics (“app concurrency”) should tell you what the Fly Proxy thinks your external traffic really is…
Also, it’s a good idea to post your entire fly.toml in this situation. (Feel free to * out any names that you consider sensitive, but show the full structure.)
The other thing is that my app is a python Fastapi and it is listening to port 8080 on 0.0.0.0 but every time I deploy I get this message, but the app is running just fine
WARNING The app is not listening on the expected address and will not be reachable by fly-proxy.596c25e78 reached started state
You can fix this by configuring your app to listen on the following addresses:
0.0.0.0:8080
Found these processes inside the machine with open listening sockets:
I’m still seeing the same thing. Out of the blue, a bunch of the exact same requests with 172.16…. GET HTTP/1.1 . All started about 30 minutes ago.
To me it seems like they’re messing around with the health checks and the new log doctor, because I’m seeing the exact same thing in a stg and a prod env, and I didn’t change anything.
Recorded headers and it’s “user-agent":"Consul Health Check”
Again, it’s attempting to get / route, but my health checks are configured for /health path. Even if I remove the health check section from my fly.toml, I still get these requests.
I’m pretty sure that’s purely in the dashboard UI (not the infrastructure), , but thanks for confirming the request pattern that @CostPal and @Bonadio were seeing!
It typically takes a bit of time for an initial investigation. (Which I believe may already be in progress, actually.)
Moreover, they officially only post global incidents on status.flyio.net, not ones that affect just a handful of hosts—although they’ve been relaxing that filter a little lately…
That would be the first guess, I think, given the User-Agent that @CostPal logged. (That specific “Consul Health Check” string has been cited a few times in the forum in the past.) But there are some other headers you could look at to get more information:
Hi all, apologies! This was a very eager doctor indeed, and these checks were being made while you (or someone in your org) had the dashboard on on your app.
We have disabled these checks from the system for now.