You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Related to #294. We had an invalid certificate pointed to by an ingress leading to an event "Error 400: The SSL certificate could not be parsed." shown on all ingresses.
When creating a new ingress in this state everything would be done properly except adapting the firewall rule to add the new port. This lead to failing health checks for the backend and the ingress not being usable.
In the logs of that firewall rule, the events with subtype compute.firewalls.update would no longer be seen.
Two things can be done here:
if there's an invalid certificate pointed to by an (unrelated) ingress, the firewall rule should still be adapted for new ingresses.
if the update of the firewall rule fails for some reason, this should be shown somewhere on the ingress.
We discovered the issue on gke 1.8. The issue persisted after an update to 1.9.7-gke.1.
When the invalid certificate was fixed, the firewall rules are being updated again.
The text was updated successfully, but these errors were encountered:
Related to #294. We had an invalid certificate pointed to by an ingress leading to an event "Error 400: The SSL certificate could not be parsed." shown on all ingresses.
When creating a new ingress in this state everything would be done properly except adapting the firewall rule to add the new port. This lead to failing health checks for the backend and the ingress not being usable.
In the logs of that firewall rule, the events with subtype compute.firewalls.update would no longer be seen.
Two things can be done here:
We discovered the issue on gke 1.8. The issue persisted after an update to 1.9.7-gke.1.
When the invalid certificate was fixed, the firewall rules are being updated again.
The text was updated successfully, but these errors were encountered: