-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ssl certificate "<namespace/secret>" does not exist in local store #78
Comments
This is an old, known and annoying issue that happens when secret lister (from controller's internals) isn't in sync with in cluster secrets. This is easy to reproduce, your suggestion is quite valid and I'll try to address this in the current release. |
Great, thank. Is there any workaround that I could put in place until the fix is done? |
I just changed this behavior on 1222420 , now the default cert will be used if the custom one cannot be read or is invalid. I'm planning to update snapshot tag with this change in the following two or three days. I don't know a way to circumvent this without patching the code. |
Great. Thank you very much. I'll wait for that. |
Hello again. You said in one of your comments that the problem is realativelly easy to reproduce. Could you give me some instructions to reproduce it so I evaluate a workaround that I invented? Basically I need to make sure this doesn't happens in our production environment and I cannot wait until the 0.5 is released. Thanks |
Hi, you can remove the secret and leave it being referenced on ingress resource. Before the patch the controller will remove tls altogether, after the patch the default cert will be used instead. |
|
We got a very weird error while doing our load tests. Suddenly and apparently without any reasons the ingress controller stops routing the requests coming to the https port (443) and instead sending them to the default-backend. The request coming to the http port (80) were still being routed.
I inspected the cluster, the secret object containing the public certificate was indeed present in the namespace and the certificate file itself was also inside the container. But the /etc/haproxy.conf file didn't have any route configured for the https.
I assume that haproxy-ingress-controller was trying to refresh the certificate and since it was not able to get it the secret containing it, it decided to drop the rule associated to the same ingress controller where the certificate was refereed.
After some time, again apparently without any reason, the certificate was found and haproxy start routing request again on port 443
Here I have two questions/requests.
When Inspecting the logs I found the following.
The text was updated successfully, but these errors were encountered: