Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

certs didn't get used by traefik until I upgraded cert-manager from v1.9.1 to v1.13.1 #41

Open
edoziw opened this issue Oct 10, 2023 · 1 comment

Comments

@edoziw
Copy link

edoziw commented Oct 10, 2023

launchpad/kubernetes/traefik-cert-manager

symptom

after following instructions for staging cert, traefik didn't use the cert

cause

unknown

resolution

upgrade cert-manager

How to upgrade

cert_manager_version='v1.13.1'
kubectl apply -f "https://github.com/cert-manager/cert-manager/releases/download/${cert_manager_version}/cert-manager.crds.yaml"
helm upgrade --version "${cert_manager_version}" cert-manager jetstack/cert-manager --namespace cert-manager
@emcniece
Copy link
Contributor

emcniece commented Nov 13, 2023

At what point did you discover this problem? Was it in the second half of https://www.youtube.com/watch?v=G4CmbYL9UPg when deploying the Nginx deployment+ingress+service?

I installed cert-manager v1.13.2 from the start, bypassing v1.9.1 entirely, and encountered a similar hiccup: the Nginx deployment, when accessed in browser, reported the TRAEFIK DEFAULT CERT instead of the staging cert.

This turned out to be a typo on my behalf that is hinted at 34:42: the tls: secretName value in nginx/ingress.yaml must match the secretName value in cert-manager/certificates/staging/local-example-com.yaml.

I have renamed several things in my own deployment. The fix for me was to rename the tls: secretName value in the Nginx ingress spec to match the secretName in the staging certificate spec, then apply. I am curious if you have renamed things in your own deploy, and perhaps it wasn't the version bump that fixed things but rather a fresh deploy with values that matched in all occurrences.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants