Common Issues
HTTP/2 Protocol Downgrade
Symptoms:- Ona CLI requests fail unexpectedly
- Connection timeouts or protocol errors
- Performance degradation in web requests
- Enable HTTP/2 for SSL-Inspected Traffic (Recommended)
- Contact your Zscaler administrator
- Request enabling HTTP/2 support for encrypted traffic subject to SSL inspection
- This setting is under
Administration > Advanced Settings
- Enable the toggle for HTTP/2 support for SSL-inspected requests
- For more information see Zscaler’s documentation
SSL Certificate Verification Failures
Symptoms:- VS Code extension fails to connect to Gitpod environments
- Certificate verification errors in application logs
- TLS handshake failures with “certificate verify failed” messages
- Applications showing “untrusted certificate” warnings
-
Disable SSL Inspection for Ona (Recommended)
- Contact your network security team
- Request adding
app.gitpod.io
to the SSL inspection exemption list - This ensures applications receive authentic Ona certificates
-
Configure VS Code to Use System Certificates
- Requirements: VS Code 1.97 or later
- Steps:
- Open VS Code
- Go to
File > Preferences > Settings
- Search for “System certificates” and ensure it’s enabled (default)
- Search for “Fetch Additional Support” and ensure it’s enabled (default)
- Restart VS Code and test connection
- Enable “Electron Fetch” setting
- Enable “System Certificates V2” setting
- Restart VS Code after each change
Runner Connection Issues
Symptoms:- Ona runners cannot connect to the gateway
- Runner status not properly reported in dashboard
- OAuth authentication failures with external services (GitLab, GitHub)
- “Connection refused” or timeout errors in runner logs
- Static IP addresses for Lighthouse connectivity
- OAuth callback URLs and authentication flows
- Runner-to-gateway communication protocols
-
Whitelist Ona IP Ranges
- Contact your network team to whitelist Ona’s static IP addresses
- This is particularly important for Lighthouse connectivity
- See Network Connectivity Requirements for the current IP ranges
-
Temporary Workaround: Use Personal Access Tokens
- While IP whitelisting is being configured, use Personal Access Tokens (PATs) instead of OAuth
- This bypasses some authentication flows that may be blocked
Configuration Checklist
Work with your network and security teams to implement these Zscaler configurations:Phase 1: SSL Inspection Exemptions
- Add
app.gitpod.io
to SSL inspection bypass list - Test certificate verification with
curl -I -v https://app.gitpod.io
- Verify certificate issuer shows Amazon RSA (not Zscaler)
HTTP/2 Protocol Support
- Raise provisioning ticket with Zscaler support to enable HTTP/2 backend configuration
- Enable HTTP/2 in SSL inspection policy pages
- Enable HTTP/2 for encrypted traffic subject to SSL inspection in Advanced Settings
Network Access
- Whitelist Ona static IP ranges for runner connectivity
- Ensure WebSocket connections are allowed
- Verify GRPC traffic is not blocked
Testing Your Configuration
After implementing the above changes:-
Test Certificate Trust
Verify the certificate issuer shows Amazon RSA (authentic) rather than Zscaler
-
Test Gateway Certificate (for AWS runners)
You can also verify the gateway certificate using SSL Labs
-
Test Protocol Support
Verify HTTP/2 protocol is maintained
-
Test Ona Services
- Try connecting with VS Code extension
- Test Ona CLI commands
- Verify runner connectivity if applicable
Getting Help
If issues persist after implementing these solutions:- Collect diagnostic information:
- Output from
curl -I -vv https://app.gitpod.io
- VS Code and Ona extension logs
- Network configuration details
- Output from