Closed KDTEC closed 1 month ago
Please show your client reported error, especially like curl -sv -o /dev/null ...
results.
If your nginx error log has some information associated to SSL/verification, please post them here.
And also I think this might not be a kong problem if it is related to cert verification, you could create a minimal case to test your ceritifcate verfication problem, like using nginx: https://nginx.org/en/docs/http/configuring_https_servers.html
So the issue is resolved now. I can't say it was a certificate issue. What I did different this time is used the kong ingress controller. And 1 major change: inside the data-plane configuration yaml:
I changed the ports to 443 from 8005 and 8006 respectively.
This helps in establishing connection between dataplane and control plane nodes since I am running kong in hybrid mode.
"cluster_control_plane": "kong-cluster-dev-ksa-01.example.com:443",
"cluster_telemetry_endpoint": "kong-clustertelemetry-dev-ksa-01.example.com:443",
Is there an existing issue for this?
Kong version (
$ kong version
)3.7.1.2
Current Behavior
I have installed kong in hybrid mode in my Kubernetes cluster:
This is the control-plane.yaml:
flavor: helm_simple metadata: {} kind: helm provided: false disabled: false version: '0.1' spec: helm: namespace: default repository: 'https://charts.konghq.com' wait: false recreate_pods: false chart: kong values: ingressController: enabled: false image: repository: kong/kong-gateway tag: 3.7.1.2 secretVolumes:
This is my data-plane.yaml:
flavor: helm_simple metadata: {} kind: helm provided: false disabled: false version: '0.1' spec: helm: namespace: default repository: 'https://charts.konghq.com' wait: false recreate_pods: false chart: kong values: ingressController: enabled: false image: repository: kong/kong-gateway tag: 3.7.1.2 secretVolumes:
I have uploaded my CA-signed go daddy certificate as a Kubernetes secret. I could also see the certificates at /etc/secrets/kong-cluster-cert inside my pods. But Upon hitting my https://kong-proxy-dev-ksa-01.example.com/service/api-endpoint, I am getting self-signed notification in my postman, along with the correct api response. which means it is not referring to my CA-signed certificate and still using the self signed certificate.
My kong-admin API and kong-manager GUI are working perfectly fine Both my kong-control plane and kong-data-plane are in the same namespace “default” The CN of my CA-signed certificate is: *.example.com
What am I missing here. Please help!!!
Expected Behavior
No response
Steps To Reproduce
No response
Anything else?
No response