Replies: 1 comment
-
Hi @fsmoak , thanks for starting this discussion! |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I've been breaking my head over the following problem for some time now.
We have an nginx-reverse-proxy exposed to the internet with an let's encrypt wildcard-certificate,
and trying to proxy_pass to the internal k3d cluster with an exposed http port.
Nginx is configured with:
Everything is working fine, except that any ingress controller (i've tried treafik & nginx) rewrites the HTTP_X_FORWARDED_...-Headers.
HTTP_X_FORWARDED_PROTO=http
instead ofHTTP_X_FORWARDED_PROTO=https
as passed by nginx-reverse-proxy.For Treafik I tried to enable https://doc.traefik.io/traefik/v2.3/routing/entrypoints/#forwarded-headers using the provided HelmChartConfig and also by deploying Treafik-Ingress-Controller manually to be able to set "insecure" directly on the Pod. I would still think that should have worked - can anybody confirm or deny this ?
This is the HelmChartConfig I used:
These are the HTTP-Headers as passed to the Application by ingress:
Which makes sense because the ingress controller is working with http, but this breaks some things in the hosted applications, because they are relying on
HTTP_X_FORWARDED_PROTO=https
.Has anybody done something similar and can point me in the right direction?
Beta Was this translation helpful? Give feedback.
All reactions