Common Issues
HTTP/2 Protocol Downgrade
Symptoms:- Ona CLI requests fail unexpectedly
- Connection timeouts or protocol errors
- Performance degradation in web requests
- Enable HTTP/2 for SSL-Inspected Traffic (Recommended)
- Contact your Zscaler administrator
- Request enabling HTTP/2 support for encrypted traffic subject to SSL inspection
- This setting is under Administration > Advanced Settings
- Enable the toggle for HTTP/2 support for SSL-inspected requests
- For more information see Zscaler’s documentation
 
SSL Certificate Verification Failures
Symptoms:- VS Code extension fails to connect to Gitpod environments
- Certificate verification errors in application logs
- TLS handshake failures with “certificate verify failed” messages
- Applications showing “untrusted certificate” warnings
Linux/macOS:
Windows:
- 
Disable SSL Inspection for Ona (Recommended)
- Contact your network security team
- Request adding app.gitpod.ioto the SSL inspection exemption list
- This ensures applications receive authentic Ona certificates
 
- 
Configure VS Code to Use System Certificates
- Requirements: VS Code 1.97 or later
- Steps:
- Open VS Code
- Go to File > Preferences > Settings
- Search for “System certificates” and ensure it’s enabled (default)
- Search for “Fetch Additional Support” and ensure it’s enabled (default)
- Restart VS Code and test connection
 
 - Enable “Electron Fetch” setting
- Enable “System Certificates V2” setting
- Restart VS Code after each change
 
Runner Connection Issues
Symptoms:- Ona runners cannot connect to the gateway
- Runner status not properly reported in dashboard
- OAuth authentication failures with external services (GitLab, GitHub)
- “Connection refused” or timeout errors in runner logs
- Static IP addresses for Lighthouse connectivity
- OAuth callback URLs and authentication flows
- Runner-to-gateway communication protocols
- 
Whitelist Ona IP Ranges
- Contact your network team to whitelist Ona’s static IP addresses
- This is particularly important for Lighthouse connectivity
- See Network Connectivity Requirements for the current IP ranges
 
- 
Temporary Workaround: Use Personal Access Tokens
- While IP whitelisting is being configured, use Personal Access Tokens (PATs) instead of OAuth
- This bypasses some authentication flows that may be blocked
 
Configuration Checklist
Work with your network and security teams to implement these Zscaler configurations:Phase 1: SSL Inspection Exemptions
-  Add app.gitpod.ioto SSL inspection bypass list
-  Test certificate verification with curl -I -v https://app.gitpod.io(Linux/macOS) orcurl.exe -I -v -w '\n%{certs}\n' https://app.gitpod.io(Windows)
- Verify certificate issuer shows Amazon RSA (not Zscaler)
HTTP/2 Protocol Support
- Raise provisioning ticket with Zscaler support to enable HTTP/2 backend configuration
- Enable HTTP/2 in SSL inspection policy pages
- Enable HTTP/2 for encrypted traffic subject to SSL inspection in Advanced Settings
Network Access
- Whitelist Ona static IP ranges for runner connectivity
- Ensure WebSocket connections are allowed
- Verify GRPC traffic is not blocked
Testing Your Configuration
After implementing the above changes:- 
Test Certificate Trust
Linux/macOS:Windows:Verify the certificate issuer shows Amazon RSA (authentic) rather than Zscaler
- 
Test Gateway Certificate (for AWS runners)
Linux/macOS:Windows:You can also verify the gateway certificate using SSL Labs
- 
Test Protocol Support
Verify HTTP/2 protocol is maintained
- 
Test Ona Services
- Try connecting with VS Code extension
- Test Ona CLI commands
- Verify runner connectivity if applicable
 
Getting Help
If issues persist after implementing these solutions:- Collect diagnostic information:
- Output from curl -I -v https://app.gitpod.io(Linux/macOS) orcurl.exe -I -v -w '\n%{certs}\n' https://app.gitpod.io(Windows)
- VS Code and Ona extension logs
- Network configuration details
 
- Output from