自动签发https证书工具 cert manager
- 2019 年 11 月 8 日
- 筆記
最近cert manager进行升级,不再支持0.11以下的版本了,所以进行升级。但是发现不能直接通过更改镜像版本来升级,在Apps里的版本也是旧版本,部署后发现不支持,于是自已动手,根据文档整理了一套部署cert manager的过程。
Steps 1. create namespace
kubectl create namespace cert-manager
2. install custome resource definition
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.11/deploy/manifests/00-crds.yaml
3. label cert-manager as disable-validation
kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true
4. add jetstack helm repos
helm repo add jetstack https://charts.jetstack.io
5. update local helm chart repository
helm repo update
6. install cert-manager with helm chart
helm install --name cert-manager --namespace cert-manager --version v0.11.0 jetstack/cert-manager
7. create a clusterissuer
kubectl apply -f issuer.yaml
# issuer.yaml apiVersion: v1 kind: ClusterIssuer metadata: name: letsencrypt-prod spec: acme: # You must replace this email address with your own. # Let's Encrypt will use this to contact you about expiring # certificates, and issues related to your account. email: [email protected] server: https://acme-v02.api.letsencrypt.org/directory privateKeySecretRef: # Secret resource used to store the account's private key. name: issuer-key # Add a single challenge solver, HTTP01 using nginx solvers: - http01: ingress: class: nginx
8. config annotation in your ingress
apiVersion: v1 kind: Ingress metadata: name: my-nginx annotations: # config the cluster issuer defined in issuer.yaml certmanager.k8s.io/cluster-issuer: letsencrypt-prod spec: rules: - host: test.nginx.com # dns for your ingress http: paths: - backend: serviceName: my-nginx servicePort: 443 path: / tls: #enable tls #secretName for this ingress,this will be stored in certificates - secretName: test-nginx-secret hosts: - test.nginx.com # dns for your ingress
Troubleshooting 1. serviceaccount Tiller not found
kubectl apply -f tiller.yaml
#tiller.yaml apiVersion: v1 kind: ServiceAccount metadata: name: tiller namespace: cert-manager --- apiVersion: v1 kind: ClusterRoleBinding metadata: name: tiller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - kind: ServiceAccount name: tiller namespace: cert-manager