-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
To support access to milvus via ingress which take https:443 as the middle layer. #449
Comments
file path: server/src/milvus/milvus.service.ts |
@haorenfsa can you help for this? I am not the expert of networking. |
by the way, what do you mean hardcodes ssl to false? and what's the version of your attu? |
Hi @shanghaikid, my attu version is v2.3.8. There is a parameter passed to MilvusClient constructor named clientOptions, in which ssl could be set to false or true, but current version does not customize it and just use the default value(false).
|
I think it depends on the address right now, if it starts with |
I've read the node sdk code. in your case, I guess you add the Here is the basic tested docker command, you can add these env to your k8s yaml. |
Thank you! Will try it. |
Describe the feature:
Currently, attu does not support access milvus if k8s ingress is deployed as a load balancer, for attu hardcodes ssl to false which will cause error like below.
Error: 13 INTERNAL: Received RST_STREAM with code 2 triggered by internal client error: Protocol error
Describe a specific use case for the feature:
If we use aws ingress as load balancer to distribute GRPC traffic, HTTPS will be treated as the access layer and 443 is used for listening the traffic. But attu could not support it as the reason (ssl setting) described above.
The text was updated successfully, but these errors were encountered: