Solver’s gets wrong class following instructions, need to manually set.
Here are my logs and solution from ChatGPT.
followed instructions on MicroK8s - Addon: cert-manager
but ended up with solvers with class .
I enabled all the required packages, and even rebooted the server.
my ClusterIssuer is as follows:
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: lets-encrypt # Changed to match MicroK8s instructions
spec:
acme:
email: john_grabner@hotmail.com # Your email address
server: https://acme-v02.api.letsencrypt.org/directory
privateKeySecretRef:
name: lets-encrypt-private-key # Corrected and matched name
solvers:
- http01:
ingress:
class: public
*** later you will see solver do not get class public but class . Not sure if this is an issue, but looks odd.
it is ready as can be seen here:
icrok8s kubectl get clusterissuer -o wide
NAME READY STATUS AGE
lets-encrypt True The ACME account was registered with the ACME server 23h
my service is running as can be seen here:
microk8s kubectl get pod,svc
NAME READY STATUS RESTARTS AGE
pod/cm-acme-http-solver-2dfxw 1/1 Running 2 (7m21s ago) 20h
pod/cm-acme-http-solver-9p244 1/1 Running 2 (7m21s ago) 20h
pod/express-deployment-7bc8645c58-kn6f4 1/1 Running 2 (7m21s ago) 21h
pod/mysql-deployment-59b74b59f9-4t8x8 2/2 Running 4 (7m21s ago) 41h
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/cm-acme-http-solver-cf2sq NodePort 10.152.183.29 <none> 8089:31437/TCP 20h
service/cm-acme-http-solver-dffrw NodePort 10.152.183.222 <none> 8089:30921/TCP 20h
service/express-service ClusterIP 10.152.183.208 <none> 3000/TCP,55001/TCP 21h
service/kubernetes ClusterIP 10.152.183.1 <none> 443/TCP 43h
service/mysql-service NodePort 10.152.183.189 <none> 3306:30306/TCP 41h
my ingress is as follows:
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ingress-before-ttl
annotations:
cert-manager.io/cluster-issuer: "lets-encrypt"
nginx.ingress.kubernetes.io/affinity: "cookie"
nginx.ingress.kubernetes.io/proxy-body-size: 16m
spec:
tls:
- hosts:
- ancient-script.org
- www.ancient-script.org
secretName: ancient-script-org-crt-secret
rules:
- host: ancient-script.org
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: express-service
port:
number: 3000
- host: www.ancient-script.org
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: express-service
port:
number: 3000
k describe ingress
Name: cm-acme-http-solver-rzl2p
Labels: acme.cert-manager.io/http-domain=1683425454
acme.cert-manager.io/http-token=829886008
acme.cert-manager.io/http01-solver=true
Namespace: default
Address: 127.0.0.1
Ingress Class: <none>
Default backend: <default>
Rules:
Host Path Backends
---- ---- --------
www.ancient-script.org
/.well-known/acme-challenge/6c1PhtRjg3Dz-MLKeDXe1mES-0YsZjtzN5NON17zwks cm-acme-http-solver-cf2sq:8089 (10.1.96.84:8089)
Annotations: kubernetes.io/ingress.class: public
nginx.ingress.kubernetes.io/whitelist-source-range: 0.0.0.0/0,::/0
Events: <none>
Name: cm-acme-http-solver-w4bdc
Labels: acme.cert-manager.io/http-domain=1134561051
acme.cert-manager.io/http-token=1348800303
acme.cert-manager.io/http01-solver=true
Namespace: default
Address: 127.0.0.1
Ingress Class: <none>
Default backend: <default>
Rules:
Host Path Backends
---- ---- --------
ancient-script.org
/.well-known/acme-challenge/WkTcEHzZlXlUo3mtd4E2KKLzhSzynnz5bh5e7N7Yw_Y cm-acme-http-solver-dffrw:8089 (10.1.96.93:8089)
Annotations: kubernetes.io/ingress.class: public
nginx.ingress.kubernetes.io/whitelist-source-range: 0.0.0.0/0,::/0
Events: <none>
Name: ingress-before-ttl
Labels: <none>
Namespace: default
Address: 127.0.0.1
Ingress Class: public
Default backend: <default>
TLS:
ancient-script-org-crt-secret terminates ancient-script.org,www.ancient-script.org
Rules:
Host Path Backends
---- ---- --------
ancient-script.org
/ express-service:3000 (10.1.96.96:3000)
www.ancient-script.org
/ express-service:3000 (10.1.96.96:3000)
Annotations: cert-manager.io/cluster-issuer: lets-encrypt
nginx.ingress.kubernetes.io/affinity: cookie
nginx.ingress.kubernetes.io/proxy-body-size: 16m
Events: <none>
k describe certificate
Name: ancient-script-org-crt-secret
Namespace: default
Labels: <none>
Annotations: <none>
API Version: cert-manager.io/v1
Kind: Certificate
Metadata:
Creation Timestamp: 2024-10-08T16:43:08Z
Generation: 1
Owner References:
API Version: networking.k8s.io/v1
Block Owner Deletion: true
Controller: true
Kind: Ingress
Name: ingress-before-ttl
UID: f065e265-d6ab-46a7-a5bd-507d0226329d
Resource Version: 237082
UID: 69adfc17-9572-4f90-a8b2-db0deaf6606b
Spec:
Dns Names:
ancient-script.org
www.ancient-script.org
Issuer Ref:
Group: cert-manager.io
Kind: ClusterIssuer
Name: lets-encrypt
Secret Name: ancient-script-org-crt-secret
Usages:
digital signature
key encipherment
Status:
Conditions:
Last Transition Time: 2024-10-08T16:43:08Z
Message: Issuing certificate as Secret does not exist
Observed Generation: 1
Reason: DoesNotExist
Status: False
Type: Ready
Last Transition Time: 2024-10-08T16:43:08Z
Message: Issuing certificate as Secret does not exist
Observed Generation: 1
Reason: DoesNotExist
Status: True
Type: Issuing
Next Private Key Secret Name: ancient-script-org-crt-secret-4k8wr
Events: <none>
k -n cert-manager logs cert-manager-cainjector-dc95f9d66-m449x
I1009 13:28:16.672686 1 start.go:126] "starting" version="v1.8.0" revision="e466a521bc5455def8c224599c6edcd37e86410c"
I1009 13:28:26.691560 1 leaderelection.go:248] attempting to acquire leader lease kube-system/cert-manager-cainjector-leader-election...
I1009 13:29:47.067146 1 leaderelection.go:258] successfully acquired lease kube-system/cert-manager-cainjector-leader-election
I1009 13:29:47.067324 1 recorder.go:103] cert-manager/events "msg"="Normal" "message"="cert-manager-cainjector-dc95f9d66-m449x_de1669f2-a803-4069-ac81-8f2c061ecf44 became leader" "object"={"kind":"Lease","namespace":"kube-system","name":"cert-manager-cainjector-leader-election","uid":"34db52f2-e5dc-4643-b33c-911f30212a0c","apiVersion":"coordination.k8s.io/v1","resourceVersion":"241297"} "reason"="LeaderElection"
I1009 13:29:47.168218 1 controller.go:178] cert-manager/certificate/mutatingwebhookconfiguration/controller/controller-for-certificate-mutatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.MutatingWebhookConfiguration=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} []}) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168226 1 controller.go:178] cert-manager/secret/customresourcedefinition/controller/controller-for-secret-customresourcedefinition "msg"="Starting EventSource" "source"="&{{%!s(*v1.CustomResourceDefinition=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} { { [] []} [] <nil> false} {[] { [] []} []}}) %!s(*cache.informerCache=&{0xc000720900}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168251 1 controller.go:178] cert-manager/certificate/mutatingwebhookconfiguration/controller/controller-for-certificate-mutatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.Certificate=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} {<nil> <nil> <nil> [] [] [] [] <nil> <nil> { } false [] <nil> <nil> <nil> []} {[] <nil> <nil> <nil> <nil> <nil> <nil> <nil>}}) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168258 1 controller.go:178] cert-manager/secret/customresourcedefinition/controller/controller-for-secret-customresourcedefinition "msg"="Starting EventSource" "source"="&{{%!s(*v1.Secret=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} <nil> map[] map[] }) %!s(*cache.informerCache=&{0xc000720900}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168271 1 controller.go:186] cert-manager/secret/customresourcedefinition/controller/controller-for-secret-customresourcedefinition "msg"="Starting Controller"
I1009 13:29:47.168273 1 controller.go:178] cert-manager/certificate/mutatingwebhookconfiguration/controller/controller-for-certificate-mutatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.Secret=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} <nil> map[] map[] }) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168291 1 controller.go:186] cert-manager/certificate/mutatingwebhookconfiguration/controller/controller-for-certificate-mutatingwebhookconfiguration "msg"="Starting Controller"
I1009 13:29:47.168321 1 controller.go:178] cert-manager/certificate/apiservice/controller/controller-for-certificate-apiservice "msg"="Starting EventSource" "source"="&{{%!s(*v1.APIService=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} {<nil> false [] 0 0} {[]}}) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168352 1 controller.go:178] cert-manager/certificate/apiservice/controller/controller-for-certificate-apiservice "msg"="Starting EventSource" "source"="&{{%!s(*v1.Certificate=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} {<nil> <nil> <nil> [] [] [] [] <nil> <nil> { } false [] <nil> <nil> <nil> []} {[] <nil> <nil> <nil> <nil> <nil> <nil> <nil>}}) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168370 1 controller.go:178] cert-manager/certificate/apiservice/controller/controller-for-certificate-apiservice "msg"="Starting EventSource" "source"="&{{%!s(*v1.Secret=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} <nil> map[] map[] }) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168377 1 controller.go:186] cert-manager/certificate/apiservice/controller/controller-for-certificate-apiservice "msg"="Starting Controller"
I1009 13:29:47.168418 1 controller.go:178] cert-manager/secret/validatingwebhookconfiguration/controller/controller-for-secret-validatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.ValidatingWebhookConfiguration=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} []}) %!s(*cache.informerCache=&{0xc000720900}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168446 1 controller.go:178] cert-manager/secret/validatingwebhookconfiguration/controller/controller-for-secret-validatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.Secret=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} <nil> map[] map[] }) %!s(*cache.informerCache=&{0xc000720900}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168459 1 controller.go:186] cert-manager/secret/validatingwebhookconfiguration/controller/controller-for-secret-validatingwebhookconfiguration "msg"="Starting Controller"
I1009 13:29:47.168580 1 controller.go:178] cert-manager/secret/mutatingwebhookconfiguration/controller/controller-for-secret-mutatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.MutatingWebhookConfiguration=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} []}) %!s(*cache.informerCache=&{0xc000720900}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168611 1 controller.go:178] cert-manager/secret/apiservice/controller/controller-for-secret-apiservice "msg"="Starting EventSource" "source"="&{{%!s(*v1.APIService=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} {<nil> false [] 0 0} {[]}}) %!s(*cache.informerCache=&{0xc000720900}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168642 1 controller.go:178] cert-manager/certificate/validatingwebhookconfiguration/controller/controller-for-certificate-validatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.ValidatingWebhookConfiguration=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} []}) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168646 1 controller.go:178] cert-manager/secret/apiservice/controller/controller-for-secret-apiservice "msg"="Starting EventSource" "source"="&{{%!s(*v1.Secret=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} <nil> map[] map[] }) %!s(*cache.informerCache=&{0xc000720900}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168661 1 controller.go:178] cert-manager/certificate/customresourcedefinition/controller/controller-for-certificate-customresourcedefinition "msg"="Starting EventSource" "source"="&{{%!s(*v1.CustomResourceDefinition=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} { { [] []} [] <nil> false} {[] { [] []} []}}) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168669 1 controller.go:178] cert-manager/certificate/validatingwebhookconfiguration/controller/controller-for-certificate-validatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.Certificate=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} {<nil> <nil> <nil> [] [] [] [] <nil> <nil> { } false [] <nil> <nil> <nil> []} {[] <nil> <nil> <nil> <nil> <nil> <nil> <nil>}}) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168667 1 controller.go:186] cert-manager/secret/apiservice/controller/controller-for-secret-apiservice "msg"="Starting Controller"
I1009 13:29:47.168690 1 controller.go:178] cert-manager/certificate/customresourcedefinition/controller/controller-for-certificate-customresourcedefinition "msg"="Starting EventSource" "source"="&{{%!s(*v1.Certificate=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} {<nil> <nil> <nil> [] [] [] [] <nil> <nil> { } false [] <nil> <nil> <nil> []} {[] <nil> <nil> <nil> <nil> <nil> <nil> <nil>}}) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168643 1 controller.go:178] cert-manager/secret/mutatingwebhookconfiguration/controller/controller-for-secret-mutatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.Secret=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} <nil> map[] map[] }) %!s(*cache.informerCache=&{0xc000720900}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168707 1 controller.go:178] cert-manager/certificate/customresourcedefinition/controller/controller-for-certificate-customresourcedefinition "msg"="Starting EventSource" "source"="&{{%!s(*v1.Secret=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} <nil> map[] map[] }) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168682 1 controller.go:178] cert-manager/certificate/validatingwebhookconfiguration/controller/controller-for-certificate-validatingwebhookconfiguration "msg"="Starting EventSource" "source"="&{{%!s(*v1.Secret=&{{ } { 0 {{0 0 <nil>}} <nil> <nil> map[] map[] [] [] []} <nil> map[] map[] }) %!s(*cache.informerCache=&{0xc00050e360}) %!s(chan error=<nil>) %!s(func()=<nil>)}}"
I1009 13:29:47.168722 1 controller.go:186] cert-manager/certificate/customresourcedefinition/controller/controller-for-certificate-customresourcedefinition "msg"="Starting Controller"
I1009 13:29:47.168742 1 controller.go:186] cert-manager/secret/mutatingwebhookconfiguration/controller/controller-for-secret-mutatingwebhookconfiguration "msg"="Starting Controller"
I1009 13:29:47.168765 1 controller.go:186] cert-manager/certificate/validatingwebhookconfiguration/controller/controller-for-certificate-validatingwebhookconfiguration "msg"="Starting Controller"
I1009 13:29:47.269434 1 controller.go:220] cert-manager/certificate/mutatingwebhookconfiguration/controller/controller-for-certificate-mutatingwebhookconfiguration "msg"="Starting workers" "worker count"=1
I1009 13:29:47.269514 1 controller.go:220] cert-manager/secret/mutatingwebhookconfiguration/controller/controller-for-secret-mutatingwebhookconfiguration "msg"="Starting workers" "worker count"=1
I1009 13:29:47.269541 1 controller.go:220] cert-manager/certificate/validatingwebhookconfiguration/controller/controller-for-certificate-validatingwebhookconfiguration "msg"="Starting workers" "worker count"=1
I1009 13:29:47.269552 1 controller.go:220] cert-manager/secret/validatingwebhookconfiguration/controller/controller-for-secret-validatingwebhookconfiguration "msg"="Starting workers" "worker count"=1
I1009 13:29:47.269552 1 controller.go:220] cert-manager/certificate/customresourcedefinition/controller/controller-for-certificate-customresourcedefinition "msg"="Starting workers" "worker count"=1
I1009 13:29:47.269578 1 controller.go:220] cert-manager/certificate/apiservice/controller/controller-for-certificate-apiservice "msg"="Starting workers" "worker count"=1
I1009 13:29:47.269585 1 controller.go:220] cert-manager/secret/customresourcedefinition/controller/controller-for-secret-customresourcedefinition "msg"="Starting workers" "worker count"=1
I1009 13:29:47.269609 1 controller.go:220] cert-manager/secret/apiservice/controller/controller-for-secret-apiservice "msg"="Starting workers" "worker count"=1
I1009 13:29:47.274745 1 controller.go:178] cert-manager/secret/mutatingwebhookconfiguration/generic-inject-reconciler "msg"="updated object" "resource_kind"="MutatingWebhookConfiguration" "resource_name"="cert-manager-webhook" "resource_namespace"="" "resource_version"="v1"
I1009 13:29:47.274946 1 controller.go:178] cert-manager/secret/validatingwebhookconfiguration/generic-inject-reconciler "msg"="updated object" "resource_kind"="ValidatingWebhookConfiguration" "resource_name"="cert-manager-webhook" "resource_namespace"="" "resource_version"="v1"
I1009 13:29:47.277662 1 controller.go:178] cert-manager/secret/mutatingwebhookconfiguration/generic-inject-reconciler "msg"="updated object" "resource_kind"="MutatingWebhookConfiguration" "resource_name"="cert-manager-webhook" "resource_namespace"="" "resource_version"="v1"
I1009 13:29:47.320780 1 controller.go:178] cert-manager/secret/customresourcedefinition/generic-inject-reconciler "msg"="updated object" "resource_kind"="CustomResourceDefinition" "resource_name"="issuers.cert-manager.io" "resource_namespace"="" "resource_version"="v1"
I1009 13:29:47.329779 1 controller.go:178] cert-manager/secret/customresourcedefinition/generic-inject-reconciler "msg"="updated object" "resource_kind"="CustomResourceDefinition" "resource_name"="orders.acme.cert-manager.io" "resource_namespace"="" "resource_version"="v1"
k -n cert-manager logs cert-manager-d5fcf78bc-xbbjr
I1009 13:28:16.753875 1 start.go:75] cert-manager "msg"="starting controller" "git-commit"="e466a521bc5455def8c224599c6edcd37e86410c" "version"="v1.8.0"
I1009 13:28:16.753958 1 controller.go:242] cert-manager/controller/build-context "msg"="configured acme dns01 nameservers" "nameservers"=["10.152.183.10:53"]
W1009 13:28:16.754403 1 client_config.go:617] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.
I1009 13:28:16.759485 1 controller.go:70] cert-manager/controller "msg"="enabled controllers: [certificaterequests-approver certificaterequests-issuer-acme certificaterequests-issuer-ca certificaterequests-issuer-selfsigned certificaterequests-issuer-vault certificaterequests-issuer-venafi certificates-issuing certificates-key-manager certificates-metrics certificates-readiness certificates-request-manager certificates-revision-manager certificates-trigger challenges clusterissuers ingress-shim issuers orders]"
I1009 13:28:16.759893 1 controller.go:134] cert-manager/controller "msg"="starting leader election"
I1009 13:28:16.760044 1 controller.go:91] cert-manager/controller "msg"="starting metrics server" "address"={"IP":"::","Port":9402,"Zone":""}
I1009 13:28:16.761026 1 leaderelection.go:248] attempting to acquire leader lease kube-system/cert-manager-controller...
I1009 13:28:16.779671 1 leaderelection.go:258] successfully acquired lease kube-system/cert-manager-controller
I1009 13:28:16.780769 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificaterequests-issuer-acme"
I1009 13:28:16.785798 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificaterequests-issuer-ca"
I1009 13:28:16.786334 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificates-issuing"
I1009 13:28:16.786707 1 controller.go:182] cert-manager/controller "msg"="not starting controller as it's disabled" "controller"="certificatesigningrequests-issuer-ca"
I1009 13:28:16.786728 1 controller.go:182] cert-manager/controller "msg"="not starting controller as it's disabled" "controller"="certificatesigningrequests-issuer-selfsigned"
I1009 13:28:16.786752 1 controller.go:182] cert-manager/controller "msg"="not starting controller as it's disabled" "controller"="certificatesigningrequests-issuer-vault"
I1009 13:28:16.786795 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificates-revision-manager"
I1009 13:28:16.787342 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="orders"
I1009 13:28:16.787584 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="clusterissuers"
I1009 13:28:16.788110 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="issuers"
I1009 13:28:16.788357 1 controller.go:182] cert-manager/controller "msg"="not starting controller as it's disabled" "controller"="gateway-shim"
I1009 13:28:16.788433 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificaterequests-approver"
I1009 13:28:16.792251 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="ingress-shim"
I1009 13:28:16.792694 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificaterequests-issuer-selfsigned"
I1009 13:28:16.793091 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificaterequests-issuer-vault"
I1009 13:28:16.793312 1 controller.go:182] cert-manager/controller "msg"="not starting controller as it's disabled" "controller"="certificatesigningrequests-issuer-venafi"
I1009 13:28:16.793386 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificates-request-manager"
I1009 13:28:16.898058 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="challenges"
I1009 13:28:16.898561 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificates-key-manager"
I1009 13:28:16.898986 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificates-metrics"
I1009 13:28:16.899422 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificates-readiness"
I1009 13:28:16.899684 1 controller.go:182] cert-manager/controller "msg"="not starting controller as it's disabled" "controller"="certificatesigningrequests-issuer-acme"
I1009 13:28:16.899781 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificates-trigger"
I1009 13:28:16.900181 1 controller.go:205] cert-manager/controller "msg"="starting controller" "controller"="certificaterequests-issuer-venafi"
I1009 13:28:16.918352 1 util.go:84] cert-manager/controller/certificaterequests-issuer-acme/handleOwnedResource "msg"="owning resource not found in cache" "related_resource_kind"="CertificateRequest" "related_resource_name"="ancient-script-org-crt-secret-cczw9" "related_resource_namespace"="default" "resource_kind"="Order" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274" "resource_namespace"="default" "resource_version"="v1"
E1009 13:28:16.987548 1 controller.go:166] cert-manager/orders "msg"="re-queuing item due to error processing" "error"="ACME client for issuer not initialised/available" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274"
I1009 13:28:16.988641 1 setup.go:202] cert-manager/clusterissuers "msg"="skipping re-verifying ACME account as cached registration details look sufficient" "related_resource_kind"="Secret" "related_resource_name"="lets-encrypt-private-key" "related_resource_namespace"="cert-manager" "resource_kind"="ClusterIssuer" "resource_name"="lets-encrypt" "resource_namespace"="" "resource_version"="v1"
I1009 13:28:16.999452 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-9p244" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:16.999454 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="www.ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-2dfxw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:16.999524 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-dffrw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:16.999546 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="www.ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-cf2sq" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:16.999572 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-w4bdc" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:16.999607 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="www.ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-rzl2p" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:28:27.000640 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="failed to perform self check GET request 'http://ancient-script.org/.well-known/acme-challenge/WkTcEHzZlXlUo3mtd4E2KKLzhSzynnz5bh5e7N7Yw_Y': Get \"http://ancient-script.org/.well-known/acme-challenge/WkTcEHzZlXlUo3mtd4E2KKLzhSzynnz5bh5e7N7Yw_Y\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" "dnsName"="ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:28:27.000662 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="failed to perform self check GET request 'http://www.ancient-script.org/.well-known/acme-challenge/6c1PhtRjg3Dz-MLKeDXe1mES-0YsZjtzN5NON17zwks': Get \"http://www.ancient-script.org/.well-known/acme-challenge/6c1PhtRjg3Dz-MLKeDXe1mES-0YsZjtzN5NON17zwks\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" "dnsName"="www.ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:28:31.990103 1 controller.go:166] cert-manager/orders "msg"="re-queuing item due to error processing" "error"="context deadline exceeded" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274"
E1009 13:28:37.006482 1 controller.go:166] cert-manager/challenges "msg"="re-queuing item due to error processing" "error"="Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/mutate?timeout=10s\": context deadline exceeded" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274-3325911860"
E1009 13:28:37.006486 1 controller.go:166] cert-manager/challenges "msg"="re-queuing item due to error processing" "error"="Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/mutate?timeout=10s\": context deadline exceeded" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274-1378496233"
I1009 13:28:37.006632 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-9p244" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:37.006702 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-dffrw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:37.006755 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="www.ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-2dfxw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:37.006764 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-w4bdc" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:37.006820 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="www.ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-cf2sq" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:37.006881 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="www.ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-rzl2p" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:28:47.007028 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="failed to perform self check GET request 'http://www.ancient-script.org/.well-known/acme-challenge/6c1PhtRjg3Dz-MLKeDXe1mES-0YsZjtzN5NON17zwks': Get \"http://www.ancient-script.org/.well-known/acme-challenge/6c1PhtRjg3Dz-MLKeDXe1mES-0YsZjtzN5NON17zwks\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" "dnsName"="www.ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:28:47.007059 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="failed to perform self check GET request 'http://ancient-script.org/.well-known/acme-challenge/WkTcEHzZlXlUo3mtd4E2KKLzhSzynnz5bh5e7N7Yw_Y': Get \"http://ancient-script.org/.well-known/acme-challenge/WkTcEHzZlXlUo3mtd4E2KKLzhSzynnz5bh5e7N7Yw_Y\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" "dnsName"="ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:28:51.991353 1 controller.go:166] cert-manager/orders "msg"="re-queuing item due to error processing" "error"="context deadline exceeded" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274"
E1009 13:28:57.011831 1 controller.go:166] cert-manager/challenges "msg"="re-queuing item due to error processing" "error"="Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/mutate?timeout=10s\": context deadline exceeded" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274-1378496233"
E1009 13:28:57.011936 1 controller.go:166] cert-manager/challenges "msg"="re-queuing item due to error processing" "error"="Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/mutate?timeout=10s\": context deadline exceeded" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274-3325911860"
I1009 13:28:57.012031 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="www.ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-2dfxw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:57.012099 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="www.ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-cf2sq" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:57.012119 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-9p244" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:57.012160 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="www.ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-rzl2p" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:57.012187 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-dffrw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:28:57.012242 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-w4bdc" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:29:07.012540 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="failed to perform self check GET request 'http://ancient-script.org/.well-known/acme-challenge/WkTcEHzZlXlUo3mtd4E2KKLzhSzynnz5bh5e7N7Yw_Y': Get \"http://ancient-script.org/.well-known/acme-challenge/WkTcEHzZlXlUo3mtd4E2KKLzhSzynnz5bh5e7N7Yw_Y\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" "dnsName"="ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:29:07.012571 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="failed to perform self check GET request 'http://www.ancient-script.org/.well-known/acme-challenge/6c1PhtRjg3Dz-MLKeDXe1mES-0YsZjtzN5NON17zwks': Get \"http://www.ancient-script.org/.well-known/acme-challenge/6c1PhtRjg3Dz-MLKeDXe1mES-0YsZjtzN5NON17zwks\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" "dnsName"="www.ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:29:17.018327 1 controller.go:166] cert-manager/challenges "msg"="re-queuing item due to error processing" "error"="Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/mutate?timeout=10s\": context deadline exceeded" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274-1378496233"
E1009 13:29:17.018330 1 controller.go:166] cert-manager/challenges "msg"="re-queuing item due to error processing" "error"="Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/mutate?timeout=10s\": context deadline exceeded" "key"="default/ancient-script-org-crt-secret-cczw9-2481331274-3325911860"
I1009 13:29:17.018531 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-9p244" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:17.018570 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="www.ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-2dfxw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:17.018616 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-dffrw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:17.018665 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="www.ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-cf2sq" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:17.018705 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-w4bdc" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:17.018760 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="www.ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-rzl2p" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:29:17.130108 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="wrong status code '404', expected '200'" "dnsName"="www.ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:29:17.222102 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="wrong status code '404', expected '200'" "dnsName"="ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:27.130744 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="www.ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-2dfxw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:27.130812 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="www.ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-cf2sq" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:27.130863 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="www.ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-rzl2p" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:29:27.143235 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="wrong status code '404', expected '200'" "dnsName"="www.ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:27.222713 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-9p244" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:27.222784 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-dffrw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:27.222849 1 ingress.go:99] cert-manager/challenges/http01/selfCheck/http01/ensureIngress "msg"="found one existing HTTP01 solver ingress" "dnsName"="ancient-script.org" "related_resource_kind"="Ingress" "related_resource_name"="cm-acme-http-solver-w4bdc" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
E1009 13:29:27.233812 1 sync.go:186] cert-manager/challenges "msg"="propagation check failed" "error"="wrong status code '404', expected '200'" "dnsName"="ancient-script.org" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-3325911860" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:37.143602 1 pod.go:59] cert-manager/challenges/http01/selfCheck/http01/ensurePod "msg"="found one existing HTTP01 solver pod" "dnsName"="www.ancient-script.org" "related_resource_kind"="Pod" "related_resource_name"="cm-acme-http-solver-2dfxw" "related_resource_namespace"="default" "related_resource_version"="v1" "resource_kind"="Challenge" "resource_name"="ancient-script-org-crt-secret-cczw9-2481331274-1378496233" "resource_namespace"="default" "resource_version"="v1" "type"="HTTP-01"
I1009 13:29:37.143678 1 service.go:43] cert-manager/challenges/http01/selfCheck/http01/ensureService "msg"="found one existing HTTP01 solver Service for challenge resource" "dnsName"="www.ancient-script.org" "related_resource_kind"="Service" "related_resource_name"="cm-acme-http-solver-cf2sq" "related_resource_namespace"="default" "related_resource_version"="v1"
k get ingress -w
NAME CLASS HOSTS ADDRESS PORTS AGE
cm-acme-http-solver-rzl2p <none> www.ancient-script.org 127.0.0.1 80 21h
cm-acme-http-solver-w4bdc <none> ancient-script.org 127.0.0.1 80 21h
ingress-before-ttl public ancient-script.org,www.ancient-script.org 127.0.0.1 80, 443 21h
**** notice the class for the solvers are while the ingress is public. Not sure if this is an issue, but looks strange.
**** nodejs server does get ancient-script.org/.well-known/acme-challenge and returns a 404 since nodejs does not implement this. Further implying that the solver are not properly hooked in.
I can access my website with HTTP://ancient-script.org from the cloud. i.e. DNS is fine and routing to server is fine.
chatgpt recommended:
Since the HTTP solver ingresses don’t have the public class, you can manually patch the ingresses for the solver to include it.
To patch the solver ingress, use the following command:
bash
Copy code
microk8s kubectl patch ingress cm-acme-http-solver-nf7ld -p '{"spec": {"ingressClassName": "public"}}'
microk8s kubectl patch ingress cm-acme-http-solver-s4fh6 -p '{"spec": {"ingressClassName": "public"}}'
This will update the solver ingresses to use the correct ingress class, ensuring that traffic for the ACME challenge paths is routed to the solver pods instead of your application.
k describe certificate
Name: ancient-script-org-crt-secret
Namespace: default
Labels: <none>
Annotations: <none>
API Version: cert-manager.io/v1
Kind: Certificate
Metadata:
Creation Timestamp: 2024-10-09T14:07:17Z
Generation: 1
Owner References:
API Version: networking.k8s.io/v1
Block Owner Deletion: true
Controller: true
Kind: Ingress
Name: ingress-before-ttl
UID: 1f65fec2-e3e2-4bfd-b5ae-f69f4235c3f2
Resource Version: 248239
UID: 8de68bd1-fe9f-4824-a0b3-3a7455b56770
Spec:
Dns Names:
ancient-script.org
www.ancient-script.org
Issuer Ref:
Group: cert-manager.io
Kind: ClusterIssuer
Name: lets-encrypt
Secret Name: ancient-script-org-crt-secret
Usages:
digital signature
key encipherment
Status:
Conditions:
Last Transition Time: 2024-10-09T14:07:17Z
Message: Issuing certificate as Secret does not exist
Observed Generation: 1
Reason: DoesNotExist
Status: True
Type: Issuing
Last Transition Time: 2024-10-09T14:07:17Z
Message: Issuing certificate as Secret does not exist
Observed Generation: 1
Reason: DoesNotExist
Status: False
Type: Ready
Next Private Key Secret Name: ancient-script-org-crt-secret-m727d
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal Issuing 2m53s cert-manager-certificates-trigger Issuing certificate as Secret does not exist
Normal Generated 2m53s cert-manager-certificates-key-manager Stored new private key in temporary Secret resource "ancient-script-org-crt-secret-m727d"
Normal Requested 2m53s cert-manager-certificates-request-manager Created new CertificateRequest resource "ancient-script-org-crt-secret-p6mm4"
still have issues, so not full solution.