The --dns-digitalocean plugin doesn't follow CNAMEs; it expects to find skalei.com in your DigitalOcean account.
I was afraid of that. But then how was the certificate successfully issued at all in the first place? I believe I had the CNAME record in place when I first requested the certificate, and the credentials in the credentials file were for the skalei-validation.com DigitalOcean account.
Where all of these certs issued via manually issued commands?
[or did they run via some job?]
If certbot was run manually, I would check the history of those commands.
[and also check the validity and the history of the credentials file] history | grep certbot
I saw that, too, and I was confused since I can clearly see the CNAME record in my DNS settings in DigitalOcean. Also, if I use a tool like https://dnschecker.org/#CNAME/_acme_challenge.skalei.com, the CNAME record shows up.
I am not sure, it doesn't seem possible to me. I would guess that you used the other credentials.
That's what I thought. But I just checked to make sure I was using the credentials from the skalei-validation.com DigitalOcean account. I even deleted the only API token in the skalei.com DigitalOcean account, so there are no valid credentials for that account.
I ran sudo cerbot delete to remove the certificate. When I tried to recreate the certificate, it succeeded! So if the DigitalOcean plugin doesn't follow CNAMEs, I'm not sure what's happening.
I suspect there is something imperfect in the DNS zone.
If DO permits you to setup secondary DNS servers, you can add your Internet IP to such a list.
From there you could request the entire zone.
Via something like:
nslookup
server ns1.digitalocean.com
set type=any
ls -d skalei.com. > local.filename.txt
exit
And then review the file for any abnormalities.
[and try not to get to high from the command - LOL]
[and don't forget to disable the secondary afterwards]