You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/load-balancer/troubleshooting/certificates.mdx
-8Lines changed: 0 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,11 +82,3 @@ Check the following documentation:
82
82
-[Setting up SSL bridging, offloading or passthrough](/load-balancer/reference-content/ssl-bridging-offloading-passthrough/)
83
83
-[Load Balancer API Documentation: Certificates](https://www.scaleway.com/en/developers/api/load-balancer/zoned-api/#path-certificate-get-an-ssltls-certificate)
Copy file name to clipboardExpand all lines: pages/load-balancer/troubleshooting/configuration.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,11 +87,11 @@ You may find that traffic is not being filtered as expected via your Load Balanc
87
87
88
88
### Cause
89
89
90
-
Instance Security Groups and/or Load Balancer ACLs are incorrectly configured.
90
+
Instance security groups and/or Load Balancer ACLs are incorrectly configured.
91
91
92
92
### Solution
93
93
94
-
Instance [Security Groups](instances/how-to/use-security-groups/) should still filter public traffic arriving on your backend server Instances, as long as that traffic is arriving over the public interface. This means the Instance in question must be attached to the Load Balancer via its public IP and not any private IP.
95
-
- Ensure that your Instance is attached via its public IP address. If your Instance behind a Load Balancer is attached via a private IP address, the Security Group rules will not be applied.
96
-
- Double check your [Security Group rules](/instances/how-to/use-security-groups/#how-to-choose-security-group-settings), to verify that they correspond to the required ports, protocols and IP addresses configured for your Load Balancer
94
+
Instance [security groups](instances/how-to/use-security-groups/) should still filter public traffic arriving on your backend server Instances, as long as that traffic is arriving over the public interface. This means the Instance in question must be attached to the Load Balancer via its public IP and not any private IP.
95
+
- Ensure that your Instance is attached via its public IP address. If your Instance behind a Load Balancer is attached via a private IP address, the security group rules will not be applied.
96
+
- Double check your [security group rules](/instances/how-to/use-security-groups/#how-to-choose-security-group-settings), to verify that they correspond to the required ports, protocols, and IP addresses configured for your Load Balancer
97
97
- To filter incoming traffic to your backend servers **as it passes through the Load Balancer**, use [Load Balancer ACLs](/load-balancer/how-to/create-manage-acls/).
Copy file name to clipboardExpand all lines: pages/load-balancer/troubleshooting/k8s-errors.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,11 +16,11 @@ categories:
16
16
If you are experiencing errors with your Kubernetes Kapsule Load Balancer. This page helps you find solutions to some of the most common problems.
17
17
18
18
<Messagetype="important">
19
-
You should **never** try to create or modify a Kubernetes Kapsule's Load Balancer via the Scaleway console, the API, or any other devtools.
19
+
You should **never** try to create or modify a Kubernetes Kapsule's Load Balancer via the Scaleway console, the API, or any other developer tools.
20
20
21
21
This leads to unexpected and unreliable behaviour, as the cluster's **C**loud **C**ontroller **M**anager is unaware of the Load Balancer and attempts to overwrite configurations made in the console.
22
22
23
-
Always provision and modify Kubernetes Load Balancers via the [CCM](/kubernetes/reference-content/kubernetes-load-balancer/#creating-a-load-balancer-for-your-cluster-overview). Use [annotations](/kubernetes/reference-content/kubernetes-load-balancer/#defining-your-load-balancers-configuration-via-annotations) to modify configure your cluster’s Load Balancer.
23
+
Always provision and modify Kubernetes Load Balancers via the [CCM](/kubernetes/reference-content/kubernetes-load-balancer/#creating-a-load-balancer-for-your-cluster-overview). Use [annotations](/kubernetes/reference-content/kubernetes-load-balancer/#defining-your-load-balancers-configuration-via-annotations) to configure your cluster’s Load Balancer.
24
24
</Message>
25
25
26
26
## I'm experiencing connectivity issues with my Kubernetes Load Balancer
@@ -33,10 +33,10 @@ A configuration issue is preventing successful communication between your Load B
33
33
34
34
### Solutions
35
35
36
-
- Ensure that you provisioned and configured your Load Balancer via Kubernetes nad not via the Scaleway console, which provokes unexpected behaviors and errors.
36
+
- Ensure that you provisioned and configured your Load Balancer via Kubernetes and not via the Scaleway console, which provokes unexpected behaviors and errors.
37
37
- Verify that the required service is running on all nodes. If it is missing from some nodes, this could be causing health checks to fail.
38
38
- Check your cluster's `externalTrafficPolicy` setting. If it is set to `Local` instead of `Cluster`, this could be causing the issue. Change the policy to `Cluster`.
39
-
- Try enabling or disabling Cloudflare's Proxy Mode, which may be affecting connectivity
39
+
- Try enabling or disabling Cloudflare's Proxy Mode, which may be affecting connectivity.
40
40
41
41
42
42
## My certificate is not being resolved when accessing my Kubernetes Load Balancer from within the cluster
0 commit comments