-
Notifications
You must be signed in to change notification settings - Fork 422
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
What's a proper way to manage ssl certificates in app gw? #1239
Comments
I am unsure on what is best practice, however the way I do it is to create a TLS secret resource in the same namespace as the ingress. Here's what a sample YAML might look like: Ingress.yaml
Then you just create a TLS secret however you would like, making sure the name is the same as secretName and the namespace is the same as where your ingress is located. AGIC should automagically figure the rest out, though, YMMV. I hope this helps :) |
@fatpowaranga thanks for the response. a bit out of topic though) I'm asking about SSL certs on appgw itself (in such cases, appgw.ingress.kubernetes.io/appgw-ssl-certificate annotation is used) |
@rlevchenko Ah, yes, sorry for misunderstanding. I couldn't get those working when I first started using AGIC and never re-tried. |
@rlevchenko I suspect that you are using an older version of Az CLI which is missing a new "Hostnames" property introduced in the HTTP listener of the gateway config. That is causing the property to not serialize and fail with a validation error. |
Possibly. I don't have access to the env, so can't test right now. Will forward the suggestion to the team. Thanks. |
Resolved by upgrading the azure cli to the latest version. thanks @akshaysngupta |
after updating the cert, some of our listeners started to use the wrong cert. will check the ingress logs, keep this issue opened. |
I was doing some research on TLS termination using AGIC and came across this thread. I'm not sure if this will solve your issue, but I think "ingress.yaml" posted by @fatpowaranga is valid, and it will mean that TLS is terminated by the application gateway, not by the AKS cluster. To be specific, in the ingress yaml, I think both:
and
Mean that the application gateway is configured to do the TLS termination (it will then forward onto the cluster using standard HTTP). Please shout if you think I'm wrong! |
Describe the bug
I'm trying to update a ssl certificate by using this:
and getting the following error:
Possible workarounds:
What's the best solution in this case? Can we just update an existing certificate without extra actions?
Ingress Controller details
Ingress 1.4.0
Application Gateway in a private mode
k8s 1.19.11, private cluster
The text was updated successfully, but these errors were encountered: