-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
basic auth on kubernetes - unexpected watch event object type #1596
Comments
We are also getting this same message filling up our log files. Using the same container image: |
@timoreimann I have submitted a fix for this issue ☝️ . This looks to be a minor typo, and resolves the error messages when running in Kubernetes. This error happens regardless of if basic auth is in use. I am not using basic auth and it still happens when the watchers are looking for changes. |
@kekoav I haven't tested the PR, but I have extensive logs from A/B tests that show the bug only triggering when basic auth is enabled, FWIW. It's very possible that alternate configurations (not just the basic auth feature, perhaps something else about your environment triggers it as well) can/will trigger the bug, but at least in my case, simply disabling kubernetes-backed basic auth prevents this bug from being triggered. Cheers for the potential fix 👍 |
@Eriner That is interesting, I never did anything to enable it, even with no Ingress objects this just started appearing in my logs after updating to 1.3.0. I was unaware of basic auth support until my logs started filling up and I found this issue 🤷♂️ . |
…ret watcher traefik#1596 This was likely just a copy-paste issue, the bug should be benign because the secret is cast to the correct type later, but the additional logging is a major annoyance, and is happening even if basic auth is not in use with Kubernetes.
…ret watcher #1596 This was likely just a copy-paste issue, the bug should be benign because the secret is cast to the correct type later, but the additional logging is a major annoyance, and is happening even if basic auth is not in use with Kubernetes.
I'll close this issue, because I think the question is answered, but feel free to continue the conversation. |
…ret watcher traefik#1596 This was likely just a copy-paste issue, the bug should be benign because the secret is cast to the correct type later, but the additional logging is a major annoyance, and is happening even if basic auth is not in use with Kubernetes.
Issue
When using basic auth on kubernetes (introduced by #1488), traefik produces some noisy logs due to glog (upstream kubernetes ref), in particular the following log:
At least in my case, it produces exactly 208 of these log entries per hour.
Mitigation
This bug does not impact the functionality of basic auth, only log production.
Disabling basic auth and redeploying the container ceases the production of this log entry.
Traefik version
Docker contianer:
traefik:v1.3.0-rc1-alpine
Configuration and Environment
There's nothing special about this environment, and the authentication is implemented per the PR referenced above, functions as expected, and fits the constraints mentioned in that PR.
Debugging
If it's helpful, I can redeploy the container with debugging.
The text was updated successfully, but these errors were encountered: