Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Probing always fails when HTTP fallback is disabled in config-network #423

Closed
dprotaso opened this issue Feb 11, 2021 · 9 comments
Closed
Assignees
Labels
lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. triage/accepted Issues which should be fixed (post-triage)

Comments

@dprotaso
Copy link
Contributor

When HTTP fallback is disabled probing will set an https scheme and a port of 443

https://github.com/knative-sandbox/net-contour/blob/50b263c04bb6ff46398f9a2baa06cd9f13cc0ba3/pkg/reconciler/contour/lister.go#L48-L52

Contour targets Pod IPs for probing which doesn't do TLS termination so the endpoints will never be ready.

@github-actions
Copy link

This issue is stale because it has been open for 90 days with no
activity. It will automatically close after 30 more days of
inactivity. Reopen the issue with /reopen. Mark the issue as
fresh by adding the comment /remove-lifecycle stale.

@github-actions github-actions bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label May 13, 2021
@dprotaso
Copy link
Contributor Author

/lifecycle frozen

@knative-prow-robot knative-prow-robot added lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels May 14, 2021
@dprotaso dprotaso added the triage/accepted Issues which should be fixed (post-triage) label May 20, 2021
@nak3
Copy link
Contributor

nak3 commented May 23, 2021

/assign

I will work on this.

@dprotaso
Copy link
Contributor Author

/unassign @nak3
/assign @kvmware

@knative-prow-robot knative-prow-robot assigned krsna-m and unassigned nak3 May 27, 2021
@dprotaso
Copy link
Contributor Author

dprotaso commented Sep 9, 2021

Note this issue changes slightly when #610 lands

Since we'll want to configure the spec.HTTPOption now

@krsna-m
Copy link
Contributor

krsna-m commented Sep 23, 2021

When using kubectl apply -f https://github.com/knative/net-contour/releases/download/v0.25.0/contour.yaml and kubectl apply -f https://github.com/knative/net-contour/releases/download/v0.25.0/net-contour.yaml a service is created kn service create hello --image gcr.io/knative-samples/helloworld-go --port 8080 --env TARGET=New_World --revision-name=new_world which results in:

$ kubectl get ksvc

NAME    URL                                           LATESTCREATED   LATESTREADY   READY     REASON
hello   https://hello.default.34.71.36.176.sslip.io   hello-world     hello-world   Unknown   EndpointsNotReady

$ kubectl describe ksvc hello

...
Status:
  Address:
    URL:  http://hello.default.svc.cluster.local
  Conditions:
    Last Transition Time:        2021-09-23T19:05:43Z
    Status:                      True
    Type:                        ConfigurationsReady
    Last Transition Time:        2021-09-23T19:05:44Z
    Message:                     Waiting for Envoys to receive Endpoints data.
    Reason:                      EndpointsNotReady
    Status:                      Unknown
    Type:                        Ready
    Last Transition Time:        2021-09-23T19:05:44Z
    Message:                     Waiting for Envoys to receive Endpoints data.
    Reason:                      EndpointsNotReady
    Status:                      Unknown
    Type:                        RoutesReady
  Latest Created Revision Name:  hello-world
  Latest Ready Revision Name:    hello-world
  Observed Generation:           1
  Traffic:
    Latest Revision:  true
    Percent:          100
    Revision Name:    hello-world
  URL:                https://hello.default.34.71.36.176.sslip.io
...

Changing this to use kubectl apply -f https://github.com/knative/net-contour/releases/download/v0.26.0/contour.yaml and kubectl apply -f https://github.com/knative/net-contour/releases/download/v0.26.0/net-contour.yaml which includes the changes from #610 the result is thus:

$ kubectl get ksvc

NAME    URL                                           LATESTCREATED   LATESTREADY   READY     REASON
hello   https://hello.default.34.71.36.176.sslip.io   hello-world     hello-world   True

$ kubectl describe ksvc hello

...
Status:
  Address:
    URL:  http://hello.default.svc.cluster.local
  Conditions:
    Last Transition Time:        2021-09-23T19:05:43Z
    Status:                      True
    Type:                        ConfigurationsReady
    Last Transition Time:        2021-09-23T19:24:51Z
    Status:                      True
    Type:                        Ready
    Last Transition Time:        2021-09-23T19:24:51Z
    Status:                      True
    Type:                        RoutesReady
  Latest Created Revision Name:  hello-world
  Latest Ready Revision Name:    hello-world
  Observed Generation:           1
  Traffic:
    Latest Revision:  true
    Percent:          100
    Revision Name:    hello-world
  URL:                https://hello.default.34.71.36.176.sslip.io
...

$ curl https://hello.default.34.71.36.176.sslip.io

Hello World!

@nak3
Copy link
Contributor

nak3 commented Sep 27, 2021

Yes, I believe #610 solved this issue as well. @kvmware Thank you for the confirmation. And I'm sorry if you wanted to tackle this issue 😰

@dprotaso
Copy link
Contributor Author

dprotaso commented Sep 27, 2021 via email

@knative-prow-robot
Copy link
Contributor

@dprotaso: Closing this issue.

In response to this:

/close

On Mon, Sep 27, 2021 at 05:31 Kenjiro Nakayama @.***>
wrote:

Yes, I believe #610
#610 solved this
issue as well. @kvmware https://github.com/kvmware Thank you for the
confirmation. And I'm sorry if you wanted to tackle this issue 😰


You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
#423 (comment),
or unsubscribe
https://github.com/notifications/unsubscribe-auth/AAAERAWOQXJSRQCVSC5GBFDUEA2X5ANCNFSM4XPGGLHQ
.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lifecycle/frozen Indicates that an issue or PR should not be auto-closed due to staleness. triage/accepted Issues which should be fixed (post-triage)
Projects
None yet
Development

No branches or pull requests

4 participants