Below is an aggregation of solutions to some issues that cert-manager users may face:
- Troubleshooting issuing ACME certificates
- How to change the Cluster Resource Namespace
- How to sync secrets across namespaces
- Failing to create resources due to Webhook
Can I trigger a renewal from cert-manager at will?
This is a feature in cert-manager starting in
v0.16 using the kubectl plugin. More information can be found on the renew command’s page
How can I see all the historic events related to a certificate object ?
cert-manager publishes all events to the Kubernetes events mechanism, you can get the events for your specific resources using
kubectl describe <resource> <name>.
Due to the nature of the Kubernetes event mechanism these will be purged after a while. If you’re using a dedicated logging system it might be able or is already also storing Kubernetes events.
What happens if a renewal is doesn’t happen due to issues? Will it be tried again after sometime?
cert-manager makes use of exponential back off to retry any failures on requesting or renewing certificates. It will retry any failures unless the Issuer gave a fatal error that it marked as not retryable.
Is ECC (elliptic-curve cryptography) supported?
cert-manager supports ECDSA key pairs! You can set your certificate to use ECDSA in the
privateKey part of your Certificate resource.
apiVersion: cert-manager.io/v1 kind: Certificate metadata: name: ecdsa spec: secretName: ecdsa-cert isCA: false privateKey: algorithm: ECDSA size: 256 dnsNames: - ecdsa.example.com issuerRef: [...]
duration is not defined, what will be the default value?
cert-manager will default to a
duration of 30 days with a
renewBefore of 30 days.
duration it is recommended to also set
renewBefore is longer than
duration you will receive an error.
Kubernetes has a builtin
CertificateSigningRequest API. Why not use that?
Kubernetes has a Certificate Signing Requests API,
kubectl certificates command which allows you to approve certificate signing requests
and have them signed by the certificate authority (CA) of the Kubernetes cluster.
This API and CLI have occasionally been misused to sign certificates for use by non-control-plane Pods but this is a mistake. For the security of the Kubernetes cluster, it is important to limit access to the Kubernetes certificate authority, and it is important that you do not use that certificate authority to sign certificates which are used outside of the control-plane, because such certificates increase the opportunity for attacks on the Kubernetes API server.
In Kubernetes 1.19 the Certificate Signing Requests API has reached V1 and it can be used more generally by following (or automating) the Request Signing Process. There are plans for cert-manager make greater use of this API now that it is stable.