Zscaler Compatibility Issues
Troubleshoot common issues when using Gitpod with Zscaler security solutions
Organizations using Zscaler as their security gateway may encounter various compatibility issues with Gitpod services. This guide helps identify and resolve the most common problems.
Common Issues
HTTP/2 Protocol Downgrade
Symptoms:
- Gitpod CLI requests fail unexpectedly
- Connection timeouts or protocol errors
- Performance degradation in web requests
Root Cause: Zscaler downgrades HTTP/2 connections to HTTP/1.1 by default for encrypted traffic that undergoes SSL inspection, which can cause compatibility issues with Gitpod services that rely on HTTP/2.
Solutions:
- Enable HTTP/2 for SSL-Inspected Traffic (Recommended)
- Contact your Zscaler administrator
- Request enabling HTTP/2 support for encrypted traffic subject to SSL inspection
- This setting is under
Administration > Advanced Settings
- Enable the toggle for HTTP/2 support for SSL-inspected requests
- For more information see Zscaler’s documentation
SSL Certificate Verification Failures
Symptoms:
- VS Code extension fails to connect to Gitpod environments
- Certificate verification errors in application logs
- TLS handshake failures with “certificate verify failed” messages
- Applications showing “untrusted certificate” warnings
Root Cause: Zscaler performs SSL inspection by intercepting HTTPS traffic and presenting its own certificates instead of the original server certificates. Applications using custom certificate stores (like VS Code) may not trust these Zscaler-generated certificates.
Important Note: Gitpod does not implement certificate pinning, so SSL inspection should work once the Zscaler certificates are properly trusted by the system.
Identifying SSL Inspection: Run this command to check if Zscaler is intercepting certificates:
With Zscaler SSL Inspection:
Without SSL Inspection:
Solutions:
-
Disable SSL Inspection for Gitpod (Recommended)
- Contact your network security team
- Request adding
app.gitpod.io
to the SSL inspection exemption list - This ensures applications receive authentic Gitpod certificates
-
Configure VS Code to Use System Certificates
- Requirements: VS Code 1.97 or later
- Steps:
- Open VS Code
- Go to
File > Preferences > Settings
- Search for “System certificates” and ensure it’s enabled (default)
- Search for “Fetch Additional Support” and ensure it’s enabled (default)
- Restart VS Code and test connection
If issues persist, try these additional settings:
- Enable “Electron Fetch” setting
- Enable “System Certificates V2” setting
- Restart VS Code after each change
Runner Connection Issues
Symptoms:
- Gitpod runners cannot connect to the gateway
- Runner status not properly reported in dashboard
- OAuth authentication failures with external services (GitLab, GitHub)
- “Connection refused” or timeout errors in runner logs
Root Cause: Zscaler may block or interfere with specific IP ranges and protocols that Gitpod services need, particularly:
- Static IP addresses for Lighthouse connectivity
- OAuth callback URLs and authentication flows
- Runner-to-gateway communication protocols
Solutions:
-
Whitelist Gitpod IP Ranges
- Contact your network team to whitelist Gitpod’s static IP addresses
- This is particularly important for Lighthouse connectivity
- See Network Connectivity Requirements for the current IP ranges
-
Temporary Workaround: Use Personal Access Tokens
- While IP whitelisting is being configured, use Personal Access Tokens (PATs) instead of OAuth
- This bypasses some authentication flows that may be blocked
Configuration Checklist
Work with your network and security teams to implement these Zscaler configurations:
Phase 1: SSL Inspection Exemptions
- Add
app.gitpod.io
to SSL inspection bypass list - Test certificate verification with
curl -I -v https://app.gitpod.io
- Verify certificate issuer shows Amazon RSA (not Zscaler)
HTTP/2 Protocol Support
- Raise provisioning ticket with Zscaler support to enable HTTP/2 backend configuration
- Enable HTTP/2 in SSL inspection policy pages
- Enable HTTP/2 for encrypted traffic subject to SSL inspection in Advanced Settings
Network Access
- Whitelist Gitpod static IP ranges for runner connectivity
- Ensure WebSocket connections are allowed
- Verify GRPC traffic is not blocked
Testing Your Configuration
After implementing the above changes:
-
Test Certificate Trust
Verify the certificate issuer shows Amazon RSA (authentic) rather than Zscaler
-
Test Gateway Certificate (for AWS runners)
You can also verify the gateway certificate using SSL Labs
-
Test Protocol Support
Verify HTTP/2 protocol is maintained
-
Test Gitpod Services
- Try connecting with VS Code extension
- Test Gitpod CLI commands
- Verify runner connectivity if applicable
Getting Help
If issues persist after implementing these solutions:
- Collect diagnostic information:
- Output from
curl -I -vv https://app.gitpod.io
- VS Code and Gitpod extension logs
- Network configuration details
- Output from