After following tyk[.]io/blog/how-to-deploy-your-tyk-stack-in-kubernetes-on-aws/ to set up tyk in AWS, you will find that the /hello health check endpoint is also accessible publicly.
Is there a recommended way to block access to this, and furthermore protect access to the tyk API that runs at /tyk?
It’s important to make sure that K8s liveness and readyness checks are configured to access the /hello API or a user defined replacement if you want to use one.
Thanks Pete. I’ve read that page. Specifically, is it changing the control port number that allows you to block access to the healthchecks and the API?