Replies: 1 comment 1 reply
-
I would probably take these questions to the traefik project. We just bundle the traefik directly from upstream; the only substantial change we make is to split the CRDs out into a separate helm chart. No-one on our team is going to be as qualified to answer questions about configuring Traefik as someone from that project. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Environmental Info:
K3s Version:
k3s version v1.23.6+k3s1
Node(s) CPU architecture, OS, and Version:
Linux instance 5.13.0-1030-oracle #35~20.04.1-Ubuntu SMP Wed May 25 23:19:48 UTC 2022 aarch64 aarch64 aarch64 GNU/Linux
Cluster Configuration:
Single master
Describe the bug:
Ingress host have certificate generated using cert-manager, but when checked in browser TRAEFIK DEFAULT CERT is used on domain.
Steps To Reproduce:
curl -sfL https://get.k3s.io/ | INSTALL_K3S_EXEC="--tls-san 130.61.84.XX --node-external-ip 130.61.84.XX" sh -s -
helm install cert-manager jetstack/cert-manager --namespace cert-manager --create-namespace --version v1.8.0
setup letsencrypt-prod ClusterIssuer with solvers:
-- Run app deployment, ingress looks like this:
Certificate is created:
Expected behavior:
When visiting api.example.dev let's encrypt cert should be used
Actual behavior:
When visiting api.example.dev self-signed TRAEFIK DEFAULT CERT is used.
When trying to call api from api.example.dev in postman I got 404.
When port-forward is done or called from host on Pod IP, api responds ..
Beta Was this translation helpful? Give feedback.
All reactions