-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Nginx ingress controller listening port changed to 442 after adding enable-ssl-passthrough: "" in helm for nginx ingress. #12265
Comments
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/remove-kind bug Duplicate of #12262 @kmarimuthu90 once again unfortunate that its not working for you. Please consider these facts
So please wait for other comments as well. And in the meanwhile, in case you want to help out the readers more, then follow the instructions in the new bug report template, and copy/paste the commands and their outputs, in the issue description of this issue, in markdown format. But there is shortage of resources, so if its urgent, then you can take this discussion to kubernetes.slack.com in the ingres-nginx-users channel, because there are mnay many more experts and users there, round the clock. thanks. |
hi @kmarimuthu90 , Keeping this issue open with its data means the details are unknown. But the fact that the project knows the port 442 and that you have not even copy/pasted the command that shows port 442 in this issue, does not help add to the list of action items pending on the project. So I will close this issue for now. After you have posted the data as suggested and changed the title to not reflect port 442, you can reopen the issue to continue discussion about what error you are getting in response to your request sent to the ingress. To be clear one more time. Port 442 is the implementation of the ssl-passthrough and its not a focus of discussion as a problem to be solved by the project. /close |
@longwuyuan: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
duplicate of #12262 |
What happened:
We have to support IPv6 clients, but APIM is IPv4 only. So, we plan to use a dual-stack Nginx ingress controller to support both IPv4 and IPv6 and forward the traffic to the IPv4 backend ( APIM ).
How it works usually :
The devices connect with APIM by sending requests and client certificates for the handshake. We have configured the policy like below in API to verify the client's certification in the request.
TLS termination is handled at the APIM custom domain. Flow is Client device -> APIM DNS ( Cloud Flare ) -> APIM
What you expected to happen:
New dual stack setup:
We have deployed a dual-stack ingress controller on the AKS cluster and it is exposed to the 443. And ingress route to forward the traffic to the backend external service ( APIM ). But I see 442 alone available to access after we enabled the SSL passthrough.
We want to forward client requests and cert to backend APIM where we handle the TLS termination client cert validation
NGINX Ingress controller version (exec into the pod and run nginx-ingress-controller --version.):
Helm chart:ingress-nginx-4.11.3
App version 1.11.3
Kubernetes version
1.29.X
Environment:
Cloud provider or hardware configuration: Azure
OS (e.g. from /etc/os-release): Ubuntu
Kernel (e.g.
uname -a
): Linux nginx-ingress-ingress-nginx-controller-78b7467cf7-9lspz 5.15.0-1073-azure Fix incorrect X-Forwarded-Port for TLS #82-Ubuntu SMP Mon Sep 2 11:36:34 UTC 2024 x86_64 LinuxInstall tools:
Helm chart used to install ingress on AKS cluster.
Basic cluster related info: AKS cluster
kubectl version - 1.29.x
NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME
aks-emqx00-16705065-vmss000000 Ready 16h v1.29.8 10.1.0.7 Ubuntu 22.04.5 LTS 5.15.0-1073-azure containerd://1.7.22-1
aks-nodepool1-52744880-vmss000000 Ready 17h v1.29.8 10.1.0.5 Ubuntu 22.04.5 LTS 5.15.0-1073-azure containerd://1.7.22-1
aks-nodepool1-52744880-vmss000001 Ready 17h v1.29.8 10.1.0.6 Ubuntu 22.04.5 LTS 5.15.0-1073-azure containerd://1.7.22-1
aks-nodepool1-52744880-vmss000002 Ready 17h v1.29.8 10.1.0.4 Ubuntu 22.04.5 LTS 5.15.0-1073-azure containerd://1.7.22-1`
How was the ingress-nginx-controller installed:
helm list -ningress NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION nginx-ingress ingress 33 2024-10-29 08:20:13.0357821 -0700 PDT deployed ingress-nginx-4.11.3 1.11.3
Pls find the attachment for below,
How to reproduce issue:
AKS cluster 1.29 ( dual stack )
Deploy dual stack nginx ingress and enable ssl passthrough
create ingress to forward traffic to backend
backend service to connect APIM
Check the listening ports in ingresss controller pod, it is opened for 442 and 80
We wanted to connect 443
https://api-dev.insg-pegasus.com -> CF -> ingress ipv4 IP:443 -> ingress -> backend 443 ( APIM )
backend-svc.txt
ingress.txt
pod-ingress-controller.txt
values.txt
svc.-ingress-controller.txt
The text was updated successfully, but these errors were encountered: