Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Recently , I have same issue on both clusters.... #801

Closed
stinger-forever opened this issue Jul 22, 2019 · 6 comments
Closed

Recently , I have same issue on both clusters.... #801

stinger-forever opened this issue Jul 22, 2019 · 6 comments

Comments

@stinger-forever
Copy link

Recently , I have same issue on both clusters....
I have some GCE ingresses and have several nginx.class ingresses on the same cluster.
Now when I create new nginx class controller, service implementing successfully, get proper IP address, but the nginx class annotaion is ignored during deploy and new L7 balancer is creating.

Originally posted by @stinger-forever in #476 (comment)

@bowei
Copy link
Member

bowei commented Jul 22, 2019

Which L7 is being provisioned? (ingress-gce or nginx)

@bowei
Copy link
Member

bowei commented Jul 22, 2019

@rramkumar1

@stinger-forever
Copy link
Author

stinger-forever commented Jul 22, 2019

Yes definitely it's a ingress-gce L7, as it creates 3 rules
Load balancer:
k8s-um-default-reducted-5a9cf192f8bf54dd
Target proxy
k8s-tp-default-0-reducted--5a9cf192f8bf54dd
Forwarding rule
k8s-fw-default-0-reducted--5a9cf192f8bf54dd
Besides, during deployment I noticed that at some moment it attached IP from the other nginx class for about 5 seconds and later proceed with absolutely new IP and load balancer, later I noticed that ingress behavior works like I do not provided annotation for ingress type.
This is how my typical Ingress rule look like.
Maybe this could be helpful. My configs were working for sure on Kubernetes 1.12, maybe problem is related to 1.13 version?

`apiVersion: extensions/v1beta1
kind: Ingress
metadata:
name: 0-company_name
annotations:
kubernetes.io/ingress.class: nginx-company_name
certmanager.k8s.io/cluster-issuer: letsencrypt-prod
kubernetes.io/tls-acme: true
certmanager.k8s.io/acme-http01-edit-in-place: "true"
nginx.ingress.kubernetes.io/ssl-redirect: "false"
nginx.ingress.kubernetes.io/limit-rps: "20"
nginx.ingress.kubernetes.io/configuration-snippet: |
proxy_set_header X-Project "company_name";
spec:
rules:

  • host:
    http:
    paths:
    • backend:
      serviceName: testing5-service
      servicePort: 80
      `

@stinger-forever
Copy link
Author

I have found resolutition:
The cause of Ingresses classes conflict was below annotation
kubernetes.io/tls-acme: true
It was added by my colleague and I didn't noticed it at first glance.
But is it normal behavior?

@rramkumar1
Copy link
Contributor

@stinger-forever FWIW, Ingress-GCE does not respect the kubernetes.io/tls-acme annotation.

Did this happen recently? Can you send me an email with your GCP project ID, cluster name and cluster location?

@stinger-forever
Copy link
Author

Thank you, already sent, check email from Armen Gasparyan.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants