-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Open
Labels
gateway-apikind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.
Description
Bug Description
Gateways of class gateway.k8s.aws/nlb whose listeners use protocol: TLS and tls.mode: Passthrough appear to build a TLS listener.
Steps to Reproduce
- Create a Gateway with
gatewayClassNamewhose manifest containscontrollerName: gateway.k8s.aws/nlb - Add a listener of with
protocol: TLSandtls.mode: Passthrough
Expected Behavior
I expected a TCP listener on the AWS NLB side because traffic/streams should proxy to backends without TLS termination (raw streams)
Actual Behavior
AWS LB Controller log outputs show a model with a TLS listener attempting to be built which fails due to no discoverable/matching certificates (required for AWS NLB TLS listeners).
Regression
Was the functionality working correctly in a previous version ? [No]
Current Workarounds
Environment
- AWS Load Balancer controller version: v3.0.0
- Kubernetes version: v1.34.1
- Using EKS (yes/no), if so version?: Platform version eks.9
- Using Service or Ingress:
Gateway - AWS region:
us-west-2 - How was the aws-load-balancer-controller installed:
- If helm was used then please show output of
helm ls -A | grep -i aws-load-balancer-controller - If helm was used then please show output of
helm -n <controllernamespace> get values <helmreleasename> - If helm was not used, then copy/paste the exact command used to install the controller, including flags and options.
- If helm was used then please show output of
- Current state of the Controller configuration:
kubectl -n <controllernamespace> describe deployment aws-load-balancer-controller
- Current state of the Ingress/Service configuration:
kubectl describe ingressclasseskubectl -n <appnamespace> describe ingress <ingressname>kubectl -n <appnamespace> describe svc <servicename>
Possible Solution (Optional)
Contribution Intention (Optional)
- Yes, I'm willing to submit a PR to fix this issue
- No, I cannot work on a PR at this time
Additional Context
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
gateway-apikind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.