Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
I've not actually managed to pick up Kubernetes myself, so you may need to wait for other people to help you and it may just be me not understanding, but I'm confused what part of the process here is trying to get a certificate? Is it something in that yml or other configuration that's trying? You said you were using acme.shin the other thread, so where does that get called, and what is its output?
I'm probably not going to be able to help you more myself, as I'm not familiar with the technologies you're using and I'm not understanding what you're trying to do to get a certificate, but there are plenty of other friendly people here; one of them might be able to assist.
i have diagnose error Failure Time: 2021-04-15T08:32:01Z
Reason: Failed to create Order: 400 urn:ietf:params:acme:error:malformed: Error creating new order :: Order cannot contain more than 100 DNS names
State: errored
Events:
If you provide us to upgrade our limit more then 100 Multi-domain (SAN) Certificates, its better for all new clients and also join with you more clients. although you charged for your service.
That isn't my decision, but I can't imagine any scenario where you really need more than 100 names on a cert. You just need to learn how to use your software properly.
There are some rate limits that you can apply to get extended, but I don't think names-per-certificate is one of them. My understanding is that doing even 100 at once taxes their server quite a bit as they need to validate each of the names and check CAA and so forth.
Pretty much any system working on that scale has a way to use a different certificate per name. This leads to shorter connection times for your users, too.