-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS Network Load Balancer does not allow multiple certs albeit the functionality existing #12522
Comments
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/remove-kind bug Request that you answer all the questions asked in a new bug report template so readers have a lot more info to comment on. I am guessing that you are terminating TLS on the LB and not on the controller. If true, then the assumed related data is that the annotations used in the service object created by the controller, that work on the AWS resources, are not part of the controller code. So there is nothing we can do about it. You have to talk to the support team at AWS for multiple certs, configured on the NLB, when TLS is terminated on the NLB. For users who terminate TLS on the controller, the upstream K8S KEP Ingress-API as defined the spec for multiple certs. |
@longwuyuan: Those labels are not set on the issue: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Which cloud controller is installed in the cluster and what version? Ingress-nginx uses whatever cloud controller is available, I would check if that annotation is supported in the version being used. The 400 is either coming from AWS API or from the cloud controller. |
What happened:
What you expected to happen:
NGINX Ingress controller version (exec into the pod and run
/nginx-ingress-controller --version
):Helm Chart Version 4.11.3
Kubernetes version (use
kubectl version
):Environment:
Cloud provider or hardware configuration:
AWS EKS
How was the ingress-nginx-controller installed:
Kustomize:
How to reproduce this issue:
Use these annotations and add in your own certs
Error on svc description
The text was updated successfully, but these errors were encountered: