Expose /health internally

Hi guys,

Being a newbie to Traefik, I'm not quite sure how to approach this.
I'd like to expose http(s)://192.168.0.254:8083/health so that I can get Traefik to work with Netdata (https://learn.netdata.cloud/docs/agent/collectors/python.d.plugin/traefik).

I've got my current docker compose here:

 #Traefik 2 - Reverse Proxy
  traefik:
    container_name: Traefik
    hostname: Traefik
    image: traefik:chevrotin # the chevrotin tag refers to v2.2.x
    environment:
      - CF_API_EMAIL=$CLOUDFLARE_EMAIL
      - CF_API_KEY=$CLOUDFLARE_API_KEY
      #- PUID=$PUID
      #- PGID=$PGID
    command: # CLI arguments
      - --global.checkNewVersion=true
      - --global.sendAnonymousUsage=false
      - --entryPoints.http.address=:80
      - --entryPoints.https.address=:443
        # Allow these IPs to set the X-Forwarded-* headers - Cloudflare IPs: https://www.cloudflare.com/ips/
      - --entrypoints.https.forwardedHeaders.trustedIPs=173.245.48.0/20,103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,141.101.64.0/18,108.162.192.0/18,190.93.240.0/20,188.114.96.0/20,197.234.240.0/22,198.41.128.0/17,162.158.0.0/15,104.16.0.0/12,172.64.0.0/13,131.0.72.0/22
      - --entryPoints.traefik.address=:8080
      - --entryPoints.ping.address=:8081
      - --api=true
      - --api.dashboard=true
      - --ping=true
#      - --api.insecure=true
#      - --serversTransport.insecureSkipVerify=true
      - --log=true
      - --log.level=INFO # (Default: error) DEBUG, INFO, WARN, ERROR, FATAL, PANIC
      - --accessLog=true
      - --accessLog.filePath=/traefik.log
      - --accessLog.bufferingSize=100 #Configuring a buffer of 100 lines
      - --accessLog.filters.statusCodes=400-499
      - --providers.docker=true
      - --providers.docker.endpoint=unix:///var/run/docker.sock
      - --providers.docker.defaultrule=Host(`{{ index .Labels "com.docker.compose.service" }}.$DOMAINNAME`)
      - --providers.docker.exposedByDefault=false
      # - --entrypoints.https.http.middlewares=chain-authelia@file
      # Add dns-cloudflare as default certresolver for all services. Also enables TLS and no need to specify on individual services.
      - --entrypoints.https.http.tls.certresolver=dns-cloudflare
      - --entrypoints.https.http.tls.domains[0].main=$DOMAINNAME
      - --entrypoints.https.http.tls.domains[0].sans=*.$DOMAINNAME
      # - --entrypoints.https.http.tls.domains[1].main=$DOMAIN # Pulls main cert for second domain
      # - --entrypoints.https.http.tls.domains[1].sans=*.$DOMAIN # Pulls wildcard cert for second domain
      - --providers.docker.network=hda_pihole
      - --providers.docker.swarmMode=false
      - --providers.file.directory=/rules # Load dynamic configuration from one or more .toml or .yml files in a directory.
#     - --providers.file.filename=/path/to/file' # Load dynamic configuration from a file.
      - --providers.file.watch=true # Only works on top level files in the rules folder
#      - --certificatesResolvers.dns-cloudflare.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory # LetsEncrypt Staging Server - uncomment when testing
      - --certificatesResolvers.dns-cloudflare.acme.email=$CLOUDFLARE_EMAIL
      - --certificatesResolvers.dns-cloudflare.acme.storage=/acme.json
      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.provider=cloudflare
      - --certificatesResolvers.dns-cloudflare.acme.dnsChallenge.resolvers=1.1.1.1:53,1.0.0.1:53
    networks:
      pihole:
        ipv4_address: '172.22.0.114'
      # docker-macvlan: 
        # ipv4_address: '192.168.0.6'
    ports:
      - 81:80
      - 444:443
      - 8081:8080
      - 8082:8081 # Ping
    labels:
      #- autoheal=true
      - traefik.enable=true
      # HTTP-to-HTTPS Redirect
      - traefik.http.routers.http-catchall.entrypoints=http
      - traefik.http.routers.http-catchall.rule=HostRegexp(`{host:.+}`)
      - traefik.http.routers.http-catchall.middlewares=redirect-to-https
      - traefik.http.middlewares.redirect-to-https.redirectscheme.scheme=https
      # HTTP Routers
      - traefik.http.routers.traefik-rtr.entrypoints=https
      - traefik.http.routers.traefik-rtr.rule=Host(`traefik.$DOMAINNAME`) 
      ## Services - API
      - traefik.http.routers.traefik-rtr.service=api@internal
      ## Healthcheck/ping
      - "traefik.http.routers.ping.rule=Host(`traefik.$DOMAINNAME`) && Path(`/ping`)"
      - "traefik.http.routers.ping.tls=true"
      - "traefik.http.routers.ping.service=ping@internal"
      ## Middlewares
      - traefik.http.routers.traefik-rtr.middlewares=chain-oauth@file
      # - traefik.http.routers.traefik-rtr.middlewares=chain-no-auth@file
    security_opt:
      - no-new-privileges:true
    depends_on: 
      - pihole
    volumes:
      - $USERDIR/Traefik/rules:/rules 
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - $USERDIR/Traefik/acme/acme.json:/acme.json 
      - $USERDIR/Traefik/traefik.log:/traefik.log 
      - $USERDIR/Shared:/shared
    restart: unless-stopped

I've managed to get /ping working, but I'm at a loss at the api/health side of things, I've read the documentation, but I think I might have a case of the dumb.

If anyone has managed to get netdata working nicely with traefik, I'd be much obliged for any assistance you can give!

Thanks!

That might have been written up for v1.7

Ah pants!

Is there a alternative method where I can get metrics over the API to netdata (and/or get a similar dashboard readout as https://docs.traefik.io/v1.5/img/traefik-health.png)?

If it's not available yet, then so be it, absolutely understand, I know v2 is constantly improving!