-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
problem: ingress health check always be processing #968
Comments
when use traefik as ingress controller, field u check is as below:
|
Custom health checks are not yet supported but we plan to work on it in next release. #911 |
|
@k8sedu according to traefik/traefik#3377, it seems the v1.7.X of Traefik (which is already released), supports this. Since the current version of Traefik has the desired behavior, I don't see the benefit of adding this, especially since the custom health assessment feature would immediately obsolete the config setting we add. |
For the record, Heptio's Contour ingress controller suffers the same problem: |
my installed traefik 1.7.6 has not worked correctly. that field is empty. |
@k8sedu this appears to be an option that needs to configured. See: https://docs.traefik.io/configuration/backends/kubernetes/ I think you need to use
|
@jessesuen ty |
it worked.but there are some wrong with traefik doc about this.:D step1. add config [kubernetes]
[kubernetes.ingressEndpoint]
hostname = "traefik" step2. update clusterrole apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: traefik-ingress-controller
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- secrets
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
- ingresses/status
verbs:
- get
- list
- watch
- update |
for anyone arriving here, the link is now : https://doc.traefik.io/traefik/providers/kubernetes-ingress/#publishedservice |
If anyone encounters this with Traefik ingress controller deployed via Helm, here's the providers:
kubernetesIngress:
publishedService:
enabled: true |
the apiGroups must now include networking.k8s.io
|
for Traefik users, if the "publishedService" option didn't work, just add the following annotation to your deployment: |
For me, what worked was to put this as a new arg on my Traefik container on its deloyment:
It then updated every ingresses controlled by it with a loadbalancer status with the right value. |
when i use traefik as ingress controller, it whill not update status.loadbalancer field, so as to argo-cd, the ingress object will be processing.See traefik/traefik#3377, they will fix it.
can we change the method for ingress health check, or expose it as a config
The text was updated successfully, but these errors were encountered: