-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTTP request to HTTPS port doesn't use PROXY Protocol information in logs #12359
Comments
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@MatteoManzoni First piece of info is that you need to install as per the docs https://kubernetes.github.io/ingress-nginx/deploy/ . If all goes well then you start adding custom configs one at a time. Right now, its not even clear as to where you want to terminate TLS. /remove-kind bug |
Hi @longwuyuan, the ingress controller is indeed installed following the documentation, moreover the ingress controller behave as expected in all other scenarios. The only scenario we have an issue with is when an HTTP request is sent to the HTTPS listener of the controller. TLS is terminated on the controller, as per ingress object below:
|
@MatteoManzoni then look at the template of a new bug report and then edit this issue description as per the template of a new bug report. Edit this issue description and answer the questions asked in the new bug report template. Make sure to use markdown format. make sure to answer all questions in details because other people can reproduce the issue based on this data. At the very least the data you provide from real world use like the description of the ingress, the description of the service, the curl command in full with -vi and its response, the logs of the controller pod, is used to analyze the problem. Right now there is nothing to analyze and nothing to reproduce. Since you are redacting information so much that the info is useless, you can actually reproduce the problem on a kind cluster. Then post all the small tiny details in a step by step guide. That way I will not need AWS to reproduce the problem. |
This is stale, but we won't close it automatically, just bare in mind the maintainers may be busy with other tasks and will reach your issue ASAP. If you have any question or request to prioritize this, please reach |
What happened:
Making an HTTP request to the HTTPS port of the controller generates a log containing the sNAT ip of the node serving the request on its NodePort, instead of the real ip coming from the proxy protocol header.
What you expected to happen:
The log generated by an HTTP request directed to the HTTPS port of the controller should have the real ip of the client gathered from the proxy protocol header.
NGINX Ingress controller version (exec into the pod and run nginx-ingress-controller --version.):
Kubernetes version (use
kubectl version
):v1.29.8-eks-a737599
Environment:
Cloud provider or hardware configuration: AWS
OS (e.g. from /etc/os-release):
cpe:2.3:o:amazon:amazon_linux:2
Kernel (e.g.
uname -a
):5.10.215-203.850.amzn2.x86_64
Install tools: AWS EKS
How was the ingress-nginx-controller installed:
How to reproduce this issue:
clientip
the sNAT IP of the Nodeport node serving the requestThe text was updated successfully, but these errors were encountered: