You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
I have configured ClientTrafficPolicy with optional mTLS to allow two dev and prod cluster certificates.
When each one of these is configured alone everything works as expected. But when both are defined at the same time certificate verification only works for one of them.
Is it intended behavior? In docs I see:
A single reference to a Kubernetes ConfigMap or a Kubernetes Secret,
with the CA certificate in a key named ca.crt is currently supported.
So I assume yes - that's a bit weird because the contract that allows the list is misleading.
Description:
I have configured ClientTrafficPolicy with optional mTLS to allow two dev and prod cluster certificates.
When each one of these is configured alone everything works as expected. But when both are defined at the same time certificate verification only works for one of them.
Is it intended behavior? In docs I see:
So I assume yes - that's a bit weird because the contract that allows the list is misleading.
Is there any workaround for my case?
Here is an example of my Client Traffic Policy:
The text was updated successfully, but these errors were encountered: