You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When I create an ingress with an ACME issued TLS certificate, it's not being applied and instead the ALB is using the default ACM generated certificate on the HTTPS listener for the domain instead.
What annotations need to be set or configuration applied when deploying the load balancer controller to prevent this behaviour and use the ACME certificate?
The text was updated successfully, but these errors were encountered:
@junglie85
We don't support certificate in tls field. You have to create a ACM certificate in AWS, and specify the certificate ARN via annotation. (or we auto-discover a matching certificate by domain name from ACM).
Thanks for the info @M00nF1sh. Is support for this on the roadmap?
I don't really want users to need to know low-level details such as having to create a certificate in AWS and providing its ARN. cert-manager abstracts this away and enables automated certificate creation, but it does not support ACM. Even if using certificate discovery, it still seems that there is no way to automate the certificate creation and deletion from within k8s. Is there a tool I am missing that enables this?
When I create an ingress with an ACME issued TLS certificate, it's not being applied and instead the ALB is using the default ACM generated certificate on the HTTPS listener for the domain instead.
What annotations need to be set or configuration applied when deploying the load balancer controller to prevent this behaviour and use the ACME certificate?
The text was updated successfully, but these errors were encountered: