-
-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add PROXY Protocol support for TCP ingress rules #1200
Comments
Until unless, you are not deleting the ingress rule from UI, that backend block and changes will stay there regardless of other changes. P.S: If you delete all the ingress rule connected to that port of your application, then only that block will be removed. |
Why can't we test our deployment over the server IP until you added a domain ?. |
You can test deployment over server IP. There is no restriction. For HTTP 80/443 or HTTP ingress rule domain is required. Inbound proxy need to know about the domain to route it. Btw, If you need dummy domain, you can use swiftwave.xyz domains. For example, if your server ip is 1.2.3.4. You can use
CNAME should work. |
I have added my domain during installation, will swiftwave domain still work ?. management_node_address: to_my_domain. would yours still work ? |
Yeah, you can use for any deployed app as well |
Discussed in https://github.com/orgs/swiftwave-org/discussions/1199
Originally posted by sairus2k February 16, 2025
Problem
When services are deployed behind HAProxy, the original client IP address is lost and replaced with HAProxy's local address. This creates problems for services that depend on the client's real IP address, such as SMTP servers performing SPF checks.
Proposed solution
Implement PROXY protocol support for TCP ingress rules by:
Use proxy protocol
option when creating TCP ingress rulesFor detailed information about the PROXY protocol, refer to the HAProxy documentation.
Current workaround
While it's possible to manually add the
send-proxy
option to the backend of the application in/var/lib/swiftwave/haproxy/haproxy.cfg
, this is not ideal as the file is generated and so it may be overwritten during updates.Example logs
Without PROXY protocol
[2025-02-15 15:52:30] INFO [#77ly6prphqq4hjnt] Connection from swiftwave_haproxy.wxlgfc5ojgvee0gktdcnyco33.ir6mcm2iqm8a1ql4gv464jqll.swiftwave_network
With PROXY protocol enabled using the
send-proxy
optionAs shown in the logs, enabling the PROXY protocol helps maintain the original client information, which is crucial for proper service functionality.
The text was updated successfully, but these errors were encountered: