Score:0

Cert-manager letsencrypt pending with cert-manager and traefik

de flag

i have a cluster on AKS, that is using traefik to serve a simple http service. I'm trying to use letsencrypt, the DNS is setted up and resolves to aks public ip address correctly but all certificate requests becomes stuck and pending, below my configuration (i also have a web route, same as websecure):

---
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
  name: service-ingress-secure
spec:
  entryPoints:
    - websecure
  routes:
  - match: Host(`service.domain.io`)
    kind: Rule
    services:
    - name: microbot-service
      port: 443
  tls:
    certResolver: myresolver
---
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
  name: service-cert
  namespace: default
spec:
  acme:
    server: https://acme-v02.api.letsencrypt.org/directory
    email: [email protected]
    privateKeySecretRef:
      name: service-cert
    solvers:
    - http01:
        ingress:
          class: traefik
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: service.domain.io
  namespace: default
spec:
  secretName: service.domain.io-tls
  issuerRef:
    name: pistolino-cert
    kind: ClusterIssuer
  commonName: service.domain.io
  dnsNames:
  - service.domain.io
in flag
Hi Rolling Coders welcome to S.F. You'll want to inspect the logs of the cert-manager Pod(s), as it usually logs any errors that come from LetsEncrypt. Good luck
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.