Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

solve #751 by adding spec.port.0.appProtocol: "HTTPS" for compliance with GKE gateways #769

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dhardy92
Copy link

Description

As Operator deploy only HTTPS cluster this PR just add a static AppProtocol: "HTTPS" in port[0] of opensearch service (9200 default).
This properties let possible GKE gateway to now to use this backend with TLS protocol as described in https://cloud.google.com/kubernetes-engine/docs/how-to/secure-gateway#load-balancer-tls

Issues Resolved

solve issue #751

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.

@salyh
Copy link
Collaborator

salyh commented Mar 30, 2024

@dhardy92 Before we can get this PR merged, please refer to the PR guideline and add the mssing prerequisites. Thank you very much.

@dhardy92 dhardy92 force-pushed the dhardy92/751-AddService0AppProtocolHTTPS branch from 73c3db9 to 364ac09 Compare April 2, 2024 07:49
…h-project#751)

### Description
Adding `spec.port.0.appProtocol: "HTTPS"` for compliance with GKE gateways
cf : https://cloud.google.com/kubernetes-engine/docs/how-to/secure-gateway#load-balancer-tls

### Issues Resolved
Fixes opensearch-project#751

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and
signing off your commits, please check
[here](https://github.com/opensearch-project/OpenSearch/blob/main/CONTRIBUTING.md#developer-certificate-of-origin).

---------

Signed-off-by: Damien HARDY <dhardy@figarocms.fr>
Signed-off-by: dhardy <dhardy@figarocms.fr>
@dhardy92 dhardy92 force-pushed the dhardy92/751-AddService0AppProtocolHTTPS branch from 364ac09 to c63e628 Compare April 2, 2024 07:51
@dhardy92
Copy link
Author

dhardy92 commented Apr 8, 2024

Hello there.
I am not sure about what failed on Functionnal tests ? Can I ask for some help ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants