Closed 86emanuele closed 2 months ago
This issue is currently awaiting triage.
If Ingress contributors determines this is a relevant issue, they will accept it by applying the triage/accepted
label and provide further guidance.
The triage/accepted
label can be added by org members by writing /triage accepted
in a comment.
/remove-kind bug
Please check if it is https://github.com/kubernetes/ingress-nginx/issues/9601#issuecomment-1454119887
Hi @longwuyuan thanks. I did some tests but i had to apply also this setting:
service: externalTrafficPolicy: Local
what are the difference with this configuration?
Regards
Thanks, i prefer to use externalTrafficPolicy: Cluster but in this way is not working. There are other config that we can do?
other than probe protocol change, I don't understand the problem. I showed that link because I thought that on AKS, you have to use a annottion to make probe work with https. I don't understand the relevance of externalTrafficPolicy here.
Your problem description is not formatted as per markdown so very difficult to make any sense out of what you posted originally.
It seems you have not answered any question that is asked in a new issue template but maybe I am wrong, not sure because the message text is very difficult to read as it is not formatted
This is stale, but we won't close it automatically, just bare in mind the maintainers may be busy with other tasks and will reach your issue ASAP. If you have any question or request to prioritize this, please reach #ingress-nginx-dev
on Kubernetes Slack.
There has been no activity on this for a long long time.
The probe related annotations for LB on AKS are documented on Azure.
There are many users using AKS with Azure LB so they can provide more live information.
As such there are no resources to follow up here and its better to use Kubernetes slack, in case required, as there are more users of AKS there.
There is no acton item here for the project but the issue is open and adding to tally of open issues with no action item. Hence closing this issue now as project needs to focus on security, Gateway-API and reduce work on features that are away from the Ingress-API or features that are not coded inside the controller.
/close
@longwuyuan: Closing this issue.
Hi,
after upgrade the azure kubernetes cluster to 1.24.9 version we got a problem with internal load balancer. The health probe on load balancer changed from tcp to https with /healthz probe. The problem is that when it switch to https the clusters stop to works.
We did the same update in development and we didn't got any problem. As i understand old clusters like ours use tcp as protocol, the new one http or https.
here our nginx configuration:
`
Source: ingress-nginx/templates/controller-serviceaccount.yaml
apiVersion: v1 kind: ServiceAccount metadata: labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: controller name: nginx-ingress-ingress-nginx namespace: ingress automountServiceAccountToken: true
Source: ingress-nginx/templates/controller-configmap-tcp.yaml
apiVersion: v1 kind: ConfigMap metadata: labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: controller name: nginx-ingress-ingress-nginx-tcp namespace: ingress data: "9300": observability/elasticsearch-client:9300
Source: ingress-nginx/templates/controller-configmap.yaml
apiVersion: v1 kind: ConfigMap metadata: labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: controller name: nginx-ingress-ingress-nginx-controller namespace: ingress data: allow-snippet-annotations: "true"
Source: ingress-nginx/templates/controller-service-webhook.yaml
apiVersion: v1 kind: Service metadata: labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: controller name: nginx-ingress-ingress-nginx-controller-admission namespace: ingress spec: type: ClusterIP ports:
name: https-webhook port: 443 targetPort: webhook appProtocol: https selector: app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/component: controller
Source: ingress-nginx/templates/controller-service.yaml
apiVersion: v1 kind: Service metadata: annotations: service.beta.kubernetes.io/azure-load-balancer-health-probe-request-path: "/healthz" service.beta.kubernetes.io/azure-load-balancer-internal: "true" labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: controller name: nginx-ingress-ingress-nginx-controller namespace: ingress spec: type: LoadBalancer ipFamilyPolicy: SingleStack ipFamilies:
name: 9300-tcp port: 9300 protocol: TCP targetPort: 9300-tcp selector: app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/component: controller
Source: ingress-nginx/templates/controller-deployment.yaml
apiVersion: apps/v1 kind: Deployment metadata: labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: controller name: nginx-ingress-ingress-nginx-controller namespace: ingress spec: selector: matchLabels: app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/component: controller replicas: 2 revisionHistoryLimit: 10 minReadySeconds: 0 template: metadata: labels: app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/component: controller spec: dnsPolicy: ClusterFirst containers:
name: webhook-cert secret: secretName: nginx-ingress-ingress-nginx-admission
Source: ingress-nginx/templates/controller-ingressclass.yaml
We don't support namespaced ingressClass yet
So a ClusterRole and a ClusterRoleBinding is required
apiVersion: networking.k8s.io/v1 kind: IngressClass metadata: labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: controller name: nginx spec: controller: k8s.io/ingress-nginx
Source: ingress-nginx/templates/admission-webhooks/validating-webhook.yaml
before changing this value, check the required kubernetes version
https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#prerequisites
apiVersion: admissionregistration.k8s.io/v1 kind: ValidatingWebhookConfiguration metadata: annotations: labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: admission-webhook name: nginx-ingress-ingress-nginx-admission webhooks:
v1 clientConfig: service: namespace: "ingress" name: nginx-ingress-ingress-nginx-controller-admission path: /networking/v1/ingresses
Source: ingress-nginx/templates/admission-webhooks/job-patch/serviceaccount.yaml
apiVersion: v1 kind: ServiceAccount metadata: name: nginx-ingress-ingress-nginx-admission namespace: ingress annotations: "helm.sh/hook": pre-install,pre-upgrade,post-install,post-upgrade "helm.sh/hook-delete-policy": before-hook-creation,hook-succeeded labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: admission-webhook
Source: ingress-nginx/templates/admission-webhooks/job-patch/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: nginx-ingress-ingress-nginx-admission annotations: "helm.sh/hook": pre-install,pre-upgrade,post-install,post-upgrade "helm.sh/hook-delete-policy": before-hook-creation,hook-succeeded labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: admission-webhook rules:
update
Source: ingress-nginx/templates/admission-webhooks/job-patch/job-createSecret.yaml
apiVersion: batch/v1 kind: Job metadata: name: nginx-ingress-ingress-nginx-admission-create namespace: ingress annotations: "helm.sh/hook": pre-install,pre-upgrade "helm.sh/hook-delete-policy": before-hook-creation,hook-succeeded labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: admission-webhook spec: template: metadata: name: nginx-ingress-ingress-nginx-admission-create labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: admission-webhook spec: containers:
name: POD_NAMESPACE valueFrom: fieldRef: fieldPath: metadata.namespace securityContext: allowPrivilegeEscalation: false restartPolicy: OnFailure serviceAccountName: nginx-ingress-ingress-nginx-admission nodeSelector: kubernetes.io/os: linux securityContext: fsGroup: 2000 runAsNonRoot: true runAsUser: 2000
Source: ingress-nginx/templates/admission-webhooks/job-patch/job-patchWebhook.yaml
apiVersion: batch/v1 kind: Job metadata: name: nginx-ingress-ingress-nginx-admission-patch namespace: ingress annotations: "helm.sh/hook": post-install,post-upgrade "helm.sh/hook-delete-policy": before-hook-creation,hook-succeeded labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: admission-webhook spec: template: metadata: name: nginx-ingress-ingress-nginx-admission-patch labels: helm.sh/chart: ingress-nginx-4.5.2 app.kubernetes.io/name: ingress-nginx app.kubernetes.io/instance: nginx-ingress app.kubernetes.io/version: "1.6.4" app.kubernetes.io/part-of: ingress-nginx app.kubernetes.io/managed-by: Helm app.kubernetes.io/component: admission-webhook spec: containers:
`
can you please help us to understand this behavior? if is possbile we want to fix it to use new probe with http or https.
Regards