-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Help Wanted - I assume this is an easy question.. #2271
Comments
Thanks for the help on Slack, Joshua Van Leeuwen! Each ingress needs to have a unique
within the |
jasoncabot
added a commit
to jasoncabot/fallen
that referenced
this issue
Jan 29, 2020
cert-manager was unable to issue certificates for the backend ingress with error: 'certificate resource is not owned by this ingress' This was caused by a misunderstanding of `secretName` since it isn't a reference to an existing k8s secret that is read but instead where the TLS certificate is going to be written to See: cert-manager/cert-manager#2271
@jasoncabot and @oze4 Thanks so much for this issue! It really helped. Can we please clarify the documentation about the use of secrets in the ingress? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I am new to cert-manager and was wondering how exactly it works for multiple domains.. can I re-use the same
ClusterIssuer
for many certs? or is oneClusterIssuer
good for only one cert/secret?I am trying to use the same
ClusterIssuer
to create 2 certs for 2 different ingresses/domains.The first one works just fine, but when i try to create the second one
cert-manager
will only create the fake cert - and I get this error in the logs:...any idea what I'm doing wrong? Does each ingress resource need its own issuer?
The text was updated successfully, but these errors were encountered: