-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Nginx pod not handling the scenario when user is sending wrong ssl certificate #12233
Comments
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/remove-kind bug The data you have provided is limited to a few lines of log messages. That little data is not enough to reproduce the problem or analyze the problem to a possible cause. If users configure secret tls with certificates that does not meet the requirement of a configured ingress, its not a problem in the controller code so there is no action item there for the project. If the controller pod reboots, then the cause will be one of many many reasons and its does not mean that there is a problem to be solved in the controller code. Looking at the logs of the pod and the events in the cluster provides some hints on why the pod restarted. The controller code does not restart a pod just because a bad certificate was configured in the secret tls. You can help out by answering the questions that are asked in the issue template. That may potentially provide the data to readers for analysis and useful comments. |
Its hard to keep issues open if there is no action item as it adds to the tally of open issues. So I am closing this issue for now. Please feel free to reopen the issues, after you have posted the information asked in the template of a new bug report. And kindly post a procedure that readers can copy/paste from and reproduce the problem, using a kind cluster. /close |
@longwuyuan: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What happened:
Nginx pod not handling the scenario when user is sending wrong ssl certificate and pod is getting restarted. We saw this in the fuzz testing.
Error is following:
What you expected to happen:
pod should not go for restart and exit with proper error message.
NGINX Ingress controller version (exec into the pod and run nginx-ingress-controller --version.):
NGINX Ingress controller
Release: v1.10.1
Build: 4fb5aac
Repository: https://github.com/kubernetes/ingress-nginx
nginx version: nginx/1.25.3
Kubernetes version (use
kubectl version
):Environment:
Cloud provider or hardware configuration:
OS (e.g. from /etc/os-release):
Kernel (e.g.
uname -a
):Install tools:
Please mention how/where was the cluster created like kubeadm/kops/minikube/kind etc.
Basic cluster related info:
kubectl version
kubectl get nodes -o wide
How was the ingress-nginx-controller installed:
helm ls -A | grep -i ingress
helm -n <ingresscontrollernamespace> get values <helmreleasename>
Current State of the controller:
kubectl describe ingressclasses
kubectl -n <ingresscontrollernamespace> get all -A -o wide
kubectl -n <ingresscontrollernamespace> describe po <ingresscontrollerpodname>
kubectl -n <ingresscontrollernamespace> describe svc <ingresscontrollerservicename>
Current state of ingress object, if applicable:
kubectl -n <appnamespace> get all,ing -o wide
kubectl -n <appnamespace> describe ing <ingressname>
Others:
kubectl describe ...
of any custom configmap(s) created and in useHow to reproduce this issue:
Anything else we need to know:
The text was updated successfully, but these errors were encountered: