-
Notifications
You must be signed in to change notification settings - Fork 303
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[GLBC] Surface event when front-end not created #41
Comments
From @tonglil on May 8, 2017 21:50 Ok, so there are a few things here that result in you seeing what you see. Firstly, kube-lego needs to be install in your cluster for the Secondly, because there is no cert in the cluster (from kube-lego) AND http is disabled, then no front-end will be created. Once you allow http by setting @nicksardo if you are comfortable, I would like to contribute to this repository by labeling issues nginx or gce. |
From @nicksardo on May 8, 2017 22:6 @tonglil Correct me if I'm wrong, but I believe for labeling power you must be an org member and get write permission for the repo. With the start of the governance, I think all org changes are frozen for the time being. |
From @tonglil on May 8, 2017 22:14 Gotcha, no worries. Happy to apply again another time. |
From @pijusn on May 9, 2017 4:33 @tonglil I actually used a self-signed certificate. See (you can also find it in the Shell script I pasted earlier):
I would expect Kubernetes not to depend on kube-lego. To be specific, I would expect it to create an HTTPS frontend with the provided certificate even if it's not trusted, is issued for a different domain or whatever. I now know that kube-lego does not support it but (correct me if I'm wrong) ACME server ignores certificate when using HTTPS. That's a nice way to kick-start LB setup. To achieve it, ingress controller should support such scenarios. |
From @tonglil on May 9, 2017 5:12 @pijusn oops, sorry I missed that part. What happens if you do this: spec:
tls:
- - hosts:
- - echo.pijusn.eu
- secretName: echoserver-tls
+ - secretName: echoserver-tls You can also see if there are any events emitted by the Ingress with |
From @nicksardo on May 9, 2017 5:37 I'm betting you're creating the secret in the |
From @pijusn on May 9, 2017 6:10 @nicksardo I think you are right. That would certainly make sense. I will verify it some time this week. Thank you for pointing it out. |
From @nicksardo on May 10, 2017 17:16 Let's use this issue to track surfacing an event when cert lookup fails. In the future, stack overflow would be a better medium for this question. |
From @sebbov on September 15, 2017 16:54 +1 I also hit this issue and was at a loss to find out what the issue was. The target proxy and global forwarding rule would just not be created. Users should have visibility into any errors in ingress => GCP object creation pipeline. FWIW, in my case, the TLS secret did exist in the correct namespace, but because of the way I had created it, a botched attempt at copying it from another cluster's secret, it was in an incorrect state. |
Issues go stale after 90d of inactivity. Prevent issues from auto-closing with an If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/close |
From @pijusn on May 4, 2017 11:2
I recently ran following Shell script with given Kubernetes definitions and after some time, GLBC was created but it did not get any front-end created.
Here are all YAML files merged into one:
I expected HTTPS front-end to be created. It was a fresh project, fresh cluster so no quotes were kicking in.
After I removed
kubernetes.io/ingress.allow-http: "false"
it did create an HTTP front-end but still did not create HTTPS one.This seems like an issue. Also, if you have ideas where to look for an error message or something (why it failed to create it) - please share.
Copied from original issue: kubernetes/ingress-nginx#686
The text was updated successfully, but these errors were encountered: