Open RiddlerKnight opened 1 year ago
Is the NLB terminating and sending plaintext upstream, or terminating and reencrypting? I think you want the latter--I'm not sure if we actually support plaintext HTTP/2 even though grpc
is a protocol option in addition to grpcs
.
Do you see anything in the proxy error log or have a client that will dump the 400 response (I'm unsure why grpcurl appears to be indicating that it couldn't connect at all, since the 400 in logs suggests it got something back)? That should give a clearer indication of what's being mangled when passing through the NLB.
Is there an existing issue for this?
Current Behavior
I tested by using this setting and work with using RESTApi request.
KIC helm configuration
Service
Ingress for api
Ingress for grpc
Expected Behavior
Need to proxy grpc protocal through AWS NLB -> Kong ingress controller
Steps To Reproduce
but it's not work when using grpc through 443 which tls terminating on NLB.
I have tested call the svc in the k8s cluster, it's work as well.
The log in proxy container shown.
Kong Ingress Controller version
Kubernetes version