Skip to content
This repository has been archived by the owner on Sep 30, 2020. It is now read-only.

Change API endpoint ELB health check to SSL:443 #604

Merged
merged 1 commit into from
Apr 28, 2017

Conversation

cheungpat
Copy link
Contributor

The API endpoint ELB health check is set to "TCP:443". This causes
"TLS handshake error" in apiserver logs. Changing it to "SSL:443" will
perform the proper SSL handshake and make the error disappear from the log.

I0427 03:57:55.059255       1 logs.go:41] http: TLS handshake error from 172.24.14.156:11370: EOF
I0427 03:57:55.059952       1 logs.go:41] http: TLS handshake error from 172.24.2.59:6348: EOF

The API endpoint ELB health check is set to "TCP:443". This causes
"TLS handshake error" in apiserver logs. Changing it to "SSL:443" will
perform the proper SSL handshake and make the error disappear from the log.
@codecov-io
Copy link

Codecov Report

Merging #604 into master will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #604   +/-   ##
=======================================
  Coverage   37.99%   37.99%           
=======================================
  Files          50       50           
  Lines        3277     3277           
=======================================
  Hits         1245     1245           
  Misses       1830     1830           
  Partials      202      202

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 2daa8dd...24a0f58. Read the comment docs.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Apr 27, 2017
@mumoshu
Copy link
Contributor

mumoshu commented Apr 28, 2017

This resolves #295

@mumoshu
Copy link
Contributor

mumoshu commented Apr 28, 2017

@cheungpat Wow, good to know ELB supports SSL healthchecks! It did work for me - the errors disappeared from apiserver logs.
Thanks for the great job 👍

@mumoshu mumoshu added this to the v0.9.6-rc.6 milestone Apr 28, 2017
@mumoshu mumoshu merged commit cb7c57d into kubernetes-retired:master Apr 28, 2017
@whereisaaron
Copy link
Contributor

Cool @cheungpat @mumoshu I didn't realise SSL health checks without the client certificate would work. I'll have to try this myself on the next deployment.

k8s-github-robot pushed a commit to kubernetes/kops that referenced this pull request Aug 11, 2017
Automatic merge from submit-queue

Use SSL in ELB API server health check

This switch causes the ELB to perform a SSL handshake and makes the
`I0427 03:57:55.059255       1 logs.go:41] http: TLS handshake error from IP:PORT: EOF`
disappear from the apiserver logs.

Tested manually and everything looks :white_check_mark: 

Inspiration from kubernetes-retired/kube-aws#604
pearj pushed a commit to pearj/openshift-ansible-contrib that referenced this pull request Oct 26, 2017
pearj pushed a commit to pearj/openshift-ansible-contrib that referenced this pull request Nov 3, 2017
pearj pushed a commit to pearj/openshift-ansible-contrib that referenced this pull request Jan 11, 2018
pearj pushed a commit to pearj/openshift-ansible-contrib that referenced this pull request Jan 31, 2018
kylehodgetts pushed a commit to HotelsDotCom/kube-aws that referenced this pull request Mar 27, 2018
Change API endpoint ELB health check to SSL:443
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
cncf-cla: yes Indicates the PR's author has signed the CNCF CLA.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants