I have an existing website which uses let's encrypt to renew its certificates.
Recently I deployed a new kubernetes cluster along with one application. I'm now working to get let's encrypt working to renew its certs, so that I can transition over to the new server.
I essentially copied over the same let's encrypt ClusterIssuer configuration so I'm not sure why things aren't working.
Each steps seems to have worked up until the challenge step, which results in the error mentioned before.
I can use public web testing tools to access the website. If I watch the nginx log I can see the test connections coming in and making their way to the nginx controller.
The "cm-acme-http-solver-pzn8g" reports all is well:
$ k get clusterissuers.cert-manager.io
NAME READY AGE
cluster-letsencrypt-issuer True 2d20h
$ k get challenges.acme.cert-manager.io mailu-certificates-1-91564087-381687296
NAME STATE DOMAIN AGE
mailu-certificates-1-91564087-381687296 pending mail.aarr.xyz 12m
Since I appear to be able to browse all the way in from the outside, not sure where the problem is.
That's from cert-manager self test, not LE itself: "User-Agent":["cert-manager-challenges/v1.17.2 (linux/amd64) cert-manager/f3ffb86641f75d94d01e5a2606b9871ff89645ef"] "X-Real-Ip":["172.16.99.192"]
looks like it didn't seen any actual challenges traffic from LE?
call mail.aarr.xyz from outside and see where traffic routered: I hit by 308 redirect to https version than nginx 503 with Kubernetes Ingress Controller Fake Certificate
it will redirect unless you get the full path right, which is specified in the ingress, otherwise it uses another ingress to an application which isn't fully running yet, or in the case of an error returns a static image
I just went to browser.lol and put the url in there, and it worked from there; so which seems to verify that the request should be able to make it all the way in
i can delete the ingresses and let them recreate ... let me see if i can restart the processes
I think it creates the ingress on the fly whenever it needs one to renew, then it goes away, if I recall correctly. It was working before for years, no issue.
since i was able to do it via the virtual website, that makes this especially weird, i deleted a bunch of things and the were automatically recreated as i would have expected to perform the renewal
its definitely the cert-manager challenge failing the self-check as you say, just no idea why ... i can ssh into the worker node and do a curl and it works
I redeployed the ClusterIssuer to using the 'cert-manager' namespace and things started working. Given that its a Cluster resource, not sure why the namespace would matter, yet here we are ...