Has AWS Discontinued CloudFront Location Headers?

0
12
Asked By TechyTraveler92 On

I set up two identical CloudFront distributions to front my API Gateway endpoints in both production and development environments. They were forwarding headers like CloudFront-Viewer-City, CloudFront-Viewer-Country, CloudFront-Viewer-Region, and geographical coordinates. Everything was running smoothly for over a year, but suddenly, two days ago, both distributions stopped sending most of these headers, only keeping the Country header. When I contacted AWS support, they informed me these headers aren't guaranteed and are provided on a 'best effort' basis, which I get, but it feels sneaky to not publicly communicate about this potential change. Has anyone else experienced this issue?

6 Answers

Answered By ServerSleuth90 On

As far as I know, AWS hasn't removed those headers—doing so would upset a lot of users. There might be something else going on with your setup.

Answered By CloudyNinja17 On

It sounds like there might be a configuration issue on your end. Check your CloudFront distribution settings, as these headers are typically reliable. AWS documentation suggests they should still work, so there could be something config-related that changed without you realizing it.

Answered By User1234 On

I’m having the same issue. It’s really puzzling! Glad to know I’m not alone.

Answered By CloudExpertX99 On

Could you share the distribution ID? I work with CloudFront and might help pinpoint the problem.

Answered By DevOpsGuru22 On

You should avoid relying on features that depend on vague documentation or specs. The fact that it was working for over a year could have been a bug that was finally caught. If it's not official, it might as well not exist!

WiseOldOwl85 -

Maybe review the documentation history to see if there were any updates that could explain this change.

TechyTraveler92 -

Right? It’s frustrating when things break like this.

Answered By InfraMaven77 On

This doesn’t sound like an AWS issue; it might be something on your end that's changed. Consider using Infrastructure as Code (like Terraform) to prevent unexpected alterations in your AWS configurations. It can be tough figuring out what changed when things stop working.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.