Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Setting a default certificate in nginx ingress controller gets overridden #71

Open
MunierSaadeh opened this issue Jul 18, 2023 · 4 comments
Labels
enhancement New feature or request

Comments

@MunierSaadeh
Copy link

We deployed the Web Application Routing Add-on for AKS ingress solution, which enables a Managed Nginx Ingress Controller. While testing, we noticed that when reaching out the Public IP of the managed load balancer (without host headers), a default fake certificate is being created on the Ingress controller.

Kubernetes Fake Certificate

To avoid this, we instead relied on the Ingress controller’s Default SSL Certificate flag --default-ssl-certificate which contains the default ssl cert for “catch-all” scenario. However, this setting is always getting overridden (may be because it is managed, and there are settings that we cannot override). Wondering if there is a way to persist this setting?

@OliverMKing
Copy link
Collaborator

Hello @MunierSaadeh. Thank you for making this issue.

Like you said, Web App Routing doesn’t support this feature currently as this setting will get reconciled to the default managed NGINX Ingress Controller Deployment App Routing offers. The experience is in preview and features are actively being worked on and added. Soon we are adding ways to customize the NGINX experience further than what’s currently being offered. This request is a good candidate for a configuration option we could potentially add.

I've passed this ask on to @sabbour (the App Routing PM) so he's aware of the request.

@sabbour
Copy link

sabbour commented Jul 25, 2023

I added this to the backlog.

@sabbour sabbour added the enhancement New feature or request label Sep 22, 2023
@sabbour
Copy link

sabbour commented Jan 31, 2024

Related #160

@MXClyde
Copy link

MXClyde commented Dec 18, 2024

I believe this issue can be closed with the availability of #160 in all regions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants