You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the process of upgrading contour/envoy from v0.15.3/v1.11.2 to v1.0.1/v1.12.2, we are seeing TLS related issues for a TCP proxy with TLS passthrough enabled (defined via IngressRoute or HTTPProxy)
The proxy appears to be working, but the TLS negotiation between a GRPC client and server service are failing with messages:
Client:
transport: authentication handshake failed: tls: first record does not look like a TLS handshake
Server:
transport: http2Server.HandleStreams received bogus greeting from client
When reverting our deployment back to Contour 0.15.3, the service resumes connectivity again.
Without any changes being made to the IngressRoute/HTTPProxy, I'd expect the services to connect without TLS errors as they did prior to the upgrade.
Anything else you would like to add:
FWIW, the connection is being routed through a AWS NLB:
Client service --> NLB --> Envoy/Contour --> Server service
As far as I can see, the only related changes since 0.15.3 were made in #1450 - Thinking something there may have changed the behavior and possibly the issue we are seeing.
Environment:
Contour version: 1.0.1
Envoy version: 1.12.2
Kubernetes version: 1.16.4
Kubernetes installer & version: kubeadm
Cloud provider or hardware configuration: AWS
The text was updated successfully, but these errors were encountered:
After looking into this further, our service had an older annotation to define the upstream protocol. This was rather updated to reflect the new projectcontour domain and correct protocol. Closing this for now
What steps did you take and what happened:
In the process of upgrading contour/envoy from v0.15.3/v1.11.2 to v1.0.1/v1.12.2, we are seeing TLS related issues for a TCP proxy with TLS passthrough enabled (defined via
IngressRoute
orHTTPProxy
)The proxy appears to be working, but the TLS negotiation between a GRPC client and server service are failing with messages:
Client:
Server:
When reverting our deployment back to Contour 0.15.3, the service resumes connectivity again.
Below is an example of the
HTTPProxy
:What did you expect to happen:
Without any changes being made to the IngressRoute/HTTPProxy, I'd expect the services to connect without TLS errors as they did prior to the upgrade.
Anything else you would like to add:
FWIW, the connection is being routed through a AWS NLB:
Client service --> NLB --> Envoy/Contour --> Server service
As far as I can see, the only related changes since 0.15.3 were made in #1450 - Thinking something there may have changed the behavior and possibly the issue we are seeing.
Environment:
The text was updated successfully, but these errors were encountered: