Open thisispaulsmith opened 2 years ago
@thisispaulsmith can you also add host
in the rules as well. Example:
...
tls:
- hosts:
- testing.domain.com
secretName: testing-tls
rules:
- host: testing.domain.com
http:
paths:
- path: /testpath
pathType: ImplementationSpecific
backend:
...
@akshaysngupta Sorry that was my mistake in the original post. The host is there, I just missed it from the sample.
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: test-ingress
annotations:
appgw.ingress.kubernetes.io/ssl-redirect: 'true'
cert-manager.io/cluster-issuer: letsencrypt
kubernetes.io/ingress.class: azure/application-gateway
spec:
tls:
- hosts:
- testing.domain.com
secretName: testing-tls
rules:
host: testing.domain.com
http:
paths:
- path: /testpath
pathType: ImplementationSpecific
backend:
service:
name: test
port:
name: http
- path: /testpath/*
pathType: ImplementationSpecific
backend:
service:
name: test
port:
name: http
could lets encrypt an issue here? because the secret for TLS will be created delayed, we have the same issue right now.
If
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: test-ingress
annotations:
cert-manager.io/issue-temporary-certificate: 'true'
help to workaround this issue, it could be help.
I have the same issue, except that i am using the appgw.ingress.kubernetes.io/appgw-ssl-certificate
annotation with a certificate imported from Keyvault. Here is my ingress definition:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: service-a
namespace: default
annotations:
appgw.ingress.kubernetes.io/appgw-ssl-certificate: <cert imported from keyvault>
appgw.ingress.kubernetes.io/request-timeout: '60'
appgw.ingress.kubernetes.io/ssl-redirect: 'true'
kubernetes.io/ingress.class: azure/application-gateway
spec:
rules:
- host: teama.company.com
http:
paths:
- path: /service-a
pathType: Prefix
backend:
service:
name: service-a
port:
number: 80
I can see that this created a new listener on port 80 and a new rule attached to this listener, however, it doesn't use the Redirection
to my https listener, which is what is said in the documentation, but rather just straight forwarding to the Backend pool
. So it just ended up creating an unsecure http listener. See attachement:
I am using the following AGWIC image version: mcr.microsoft.com/azure-application-gateway/kubernetes-ingress:1.5.3
Same issue as @anthonynguyen394 - Anyone find a fix for this? Or are we stuck not being able to use AGIC if you want TLS and redirection?
Describe the bug When adding ingress with appgw.ingress.kubernetes.io/ssl-redirect: 'true' a redirect is not created. Instead ingress rules for https and http are created with no redirect. I've seen other issues that are similar but nothing with a resolution. We are using the latest version of AGWIC. The defined secret does exist. The logs refer to a
redirectConfigurations
that doesn't exist?To Reproduce Deploy the ingress.yaml
Ingress Controller details
Logs specfic to the problem