-
Update: Discovered that OIDC seems to work locally but not externally. Was working before 1.0.150/1.0.149. Did not change anything about the OIDC configuration or the Platform URL. The URL throwing the Bad Gateway is: [app address]/api/global/auth/default/oidc/configs/[auth config id] |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 8 replies
-
After a few days of troubleshooting, I finally decided to check the Nginx logs (duh). Turns out, Nginx was throwing an error: "Nginx upstream sent too big header while reading response header from upstream" Added the following to the top of my Nginx reverse proxy config:
OIDC is now working again. |
Beta Was this translation helpful? Give feedback.
-
I'm seeing the same issue. Which file do I need to edit "Nginx reverse proxy config"? |
Beta Was this translation helpful? Give feedback.
-
Thank you for this! You saved me hours/days! |
Beta Was this translation helpful? Give feedback.
-
Not familiar with budibase, but this discussion was a top hit from Google search on microsoft oidc 502, so I thought I would leave a comment that the suggestion also fixed this issue that started happening in my Quarkus Java project following a dependency/version update. In our AKS build pipeline, the settings are made in Jenkinsfile like this: nginxAnnotations = [ |
Beta Was this translation helpful? Give feedback.
After a few days of troubleshooting, I finally decided to check the Nginx logs (duh). Turns out, Nginx was throwing an error: "Nginx upstream sent too big header while reading response header from upstream"
Added the following to the top of my Nginx reverse proxy config:
proxy_busy_buffers_size 512k; proxy_buffers 4 512k; proxy_buffer_size 256k;
OIDC is now working again.