Description of problem: The ingress operator's canary controller periodically probes the canary endpoint over HTTP. The canary route is an edge terminated route that redirects insecure traffic. Some customers, such as one mentioned in https://bugzilla.redhat.com/show_bug.cgi?id=1932401, expose the default ingress controller via an external load balancer that drops _all_ traffic to port 80, thus making an http -> https redirect impossible for the canary route. The canary route should send probe requests over https only to mitigate this issue.
verified with 4.8.0-0.nightly-2021-03-06-055252 and passed. $ oc version Client Version: 4.8.0-0.nightly-2021-03-04-014703 Server Version: 4.8.0-0.nightly-2021-03-06-055252 Kubernetes Version: v1.20.0+aa519d9 checked the operator pod logs and found message below: ...Get \"https://canary-openshift-ingress-canary.apps.hongli-pxy.qe.devcluster.openshift.com\":
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.8.2 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:2438