How to replace the "Kubernetes fake certificate" with a wildcard certificate (on bare metal private cloud) Nginx Ingress and cert manager

Emenden1 picture Emenden1 · Apr 15, 2019 · Viewed 9.8k times · Source

We have setup a Kubernetes cluster on our bare metal server.

We deploy our application where each namespace is an application for the end customer. ie customer1.mydomain.com -> namespace: cust1

We keep on getting the Kubernetes Ingress Controller Fake Certificate.

We have purchased our own wildcard certificates *.mydomain.com

#kubectl create secret tls OUR-SECRET --key /path/private.key --cert /path/chain.crt -n ingress-nginx
#kubectl create secret tls OUR-SECRET --key /path/private.key --cert /path/chain.crt -n kube-system

ingress.yaml

apiVersion: certmanager.k8s.io/v1alpha1  
kind: Certificate  
metadata:  
  name: ourcloud
  namespace: cert-manager
spec:  
  secretName: oursecret
  issuerRef:
    name: letsencrypt-prod
  commonName: '*.mydomain.com'
  acme:
    config:
    - dns01:
        provider: cf-dns-prod
      domains:
      - '*.mydomain.com'

kubectl apply -f ingress.yaml
certificate.certmanager.k8s.io/ourcloud created

https://cust1.mydomain.com connects with Kubernetes Ingress Controller Fake Certificate

Answer

Emenden1 picture Emenden1 · Apr 15, 2019

I found the problem. I had the wrong filename in my yaml for the certificate files. Its allways good to look at the ingress logs

kubectl logs nginx-ingress-controller-689498bc7c-tf5 -n ingress-nginx   



kubectl get -o yaml  ingress --all-namespaces

Try to recreate the secrete from files and see if it works.

kubectl delete -n cust4 SECRETNAME

kubectl -n cust4 create secret tls SECRETENAME --key key.key --cert cert.crt