Can't Access a Kyma Endpoint (503 status code) ​
Symptom ​
You try to access a Kyma endpoint and receive the 503 status code.
Cause ​
This behavior might be caused by a configuration error in Istio Ingress Gateway. As a result, the endpoint you call is not exposed.
Solution ​
To fix this problem, restart the Pods of Istio Ingress Gateway.
List all available endpoints:
bashkubectl get virtualservice --all-namespacesTo trigger the recreation of their configuration, delete the Pods of Istio Ingress Gateway:
bashkubectl delete pod -l app=istio-ingressgateway -n istio-system
If the restart doesn't help, follow these steps:
kubectl ​
Check all ports used by Istio Ingress Gateway.
List all the Pods of Istio Ingress Gateway:
bashkubectl get pod -l app=istio-ingressgateway -n istio-system -o nameFor each of the listed Pods, replace
{ISTIO_INGRESS_GATEWAY_POD_NAME}with the Pods'a name and check the ports that theistio-proxycontainer uses:bashkubectl get -n istio-system {ISTIO_INGRESS_GATEWAY_POD_NAME} -o jsonpath='{.spec.containers[*].ports[*].containerPort}'
If the ports
80and443are not used, check the logs of theistio-proxycontainer for errors related to certificates.bashkubectl logs -n istio-system -l app=istio-ingressgateway -c istio-proxyTo make sure that a corrupted certificate is regenerated, verify if the spec.enableKymaGateway field of your APIGateway custom resource is set to
true. If you are running Kyma provisioned through Gardener, follow the Gardener troubleshooting guide instead.
Kyma Dashboard ​
Check all ports used by Istio Ingress Gateway:
- Go to the
istio-systemnamespace. - In the Workloads section, select Pods.
- Search for a Pod labeled with
app=istio-ingressgatewayand click on its name. - Scroll down to find the
Containerssection and check which ports theistio-proxycontainer uses.
- Go to the
If the ports
80and443are not used, check the logs of theistio-proxycontainer for errors related to certificates. To do this, click View Logs.To make sure that a corrupted certificate is regenerated, verify if the spec.enableKymaGateway field of your APIGateway custom resource is set to
true. If you are running Kyma provisioned through Gardener, follow the Gardener troubleshooting guide instead.