Yus*_*aan 3 ssl certificate kubernetes lets-encrypt cert-manager
我无法使用证书管理器创建通配符 ssl,我将我的域添加到 cloudflare 但证书管理器无法验证 ACME 帐户。我如何解决这个问题?
我想为我的域使用通配符 ssl 并使用任何部署,我该怎么办?
我发现错误,但我如何解决,错误是我的 k8s 无法解析 dns acme-v02.api.letsencrypt.org
错误是 k8s dns 找不到 我的 k8s 是
Server Version: version.Info{Major:"1", Minor:"14", GitVersion:"v1.14.3-k3s.1", GitCommit:"8343999292c55c807be4406fcaa9f047e8751ffd", GitTreeState:"clean", BuildDate:"2019-06-12T04:56+00:00Z", GoVersion:"go1.12.1", Compiler:"gc", Platform:"linux/amd64"}
Run Code Online (Sandbox Code Playgroud)
错误日志:
I0716 13:06:11.712878 1 controller.go:153] cert-manager/controller/issuers "level"=0 "msg"="syncing item" "key"="default/issuer-letsencrypt"
I0716 13:06:11.713218 1 setup.go:162] cert-manager/controller/issuers "level"=0 "msg"="ACME server URL host and ACME private key registration host differ. Re-checking ACME account registration" "related_resource_kind"="Secret" "related_resource_name"="issuer-letsencrypt" "related_resource_namespace"="default" "resource_kind"="Issuer" "resource_name"="issuer-letsencrypt" "resource_namespace"="default"
I0716 13:06:11.713245 1 logger.go:88] Calling GetAccount
E0716 13:06:16.714911 1 setup.go:172] cert-manager/controller/issuers "msg"="failed to verify ACME account" "error"="Get https://acme-v02.api.letsencrypt.org/directory: dial tcp: i/o timeout" "related_resource_kind"="Secret" "related_resource_name"="issuer-letsencrypt" "related_resource_namespace"="default" "resource_kind"="Issuer" "resource_name"="issuer-letsencrypt" "resource_namespace"="default"
I0716 13:06:16.715527 1 sync.go:76] cert-manager/controller/issuers "level"=0 "msg"="Error initializing issuer: Get https://acme-v02.api.letsencrypt.org/directory: dial tcp: i/o timeout" "resource_kind"="Issuer" "resource_name"="issuer-letsencrypt" "resource_namespace"="default"
E0716 13:06:16.715609 1 controller.go:155] cert-manager/controller/issuers "msg"="re-queuing item due to error processing" "error"="Get https://acme-v02.api.letsencrypt.org/directory: dial tcp: i/o timeout" "key"="default/issuer-letsencrypt"
Run Code Online (Sandbox Code Playgroud)
我的发行人
apiVersion: certmanager.k8s.io/v1alpha1
kind: Issuer
metadata:
name: issuer-letsencrypt
spec:
acme:
server: https://acme-v02.api.letsencrypt.org/directory
email: yusufkaan142@gmail.com
privateKeySecretRef:
name: issuer-letsencrypt
dns01:
providers:
- name: cf-dns
cloudflare:
email: mail@gmail.com
apiKeySecretRef:
name: cloudflare-api-key
key: api-key.txt
Run Code Online (Sandbox Code Playgroud)
秘密:
apiVersion: v1
kind: Secret
metadata:
name: cloudflare-api-key
namespace: cert-manager
type: Opaque
data:
api-key.txt: base64encoded
Run Code Online (Sandbox Code Playgroud)
我的证书:
apiVersion: certmanager.k8s.io/v1alpha1
kind: Certificate
metadata:
name: wilcard-theykk-net
namespace: cert-manager
spec:
secretName: wilcard-theykk-net
issuerRef:
name: issuer-letsencrypt
kind: Issuer
commonName: '*.example.net'
dnsNames:
- '*.example.net'
acme:
config:
- dns01:
provider: cf-dns
domains:
- '*.example.net'
- 'example.net'
Run Code Online (Sandbox Code Playgroud)
k8s 的 DNS
apiVersion: v1
kind: ConfigMap
metadata:
labels:
addonmanager.kubernetes.io/mode: EnsureExists
name: kube-dns
namespace: kube-system
data:
upstreamNameservers: |
["1.1.1.1","8.8.8.8"]
Run Code Online (Sandbox Code Playgroud)
我将从在您的 K8s 集群中调试 DNS 解析功能开始:
在板上使用基本网络工具启动一些容器:
kubectl run -i -t busybox --image=radial/busyboxplus:curl --restart=Never
从busybox
容器检查/etc/resolv.conf
文件中并确保您可以解析 Kubernetes DNS服务 kube-dns
:
$ cat /etc/resolv.conf
nameserver 10.96.0.10
search default.svc.cluster.local svc.cluster.local cluster.local c.org-int.internal google.internal
options ndots:5
Run Code Online (Sandbox Code Playgroud)
发出一个查找请求,kubernetes.default
该请求应该使用 DNS 名称服务器获得输出,没有任何问题:
$ nslookup kubernetes.default
Server: 10.96.0.10
Address 1: 10.96.0.10 kube-dns.kube-system.svc.cluster.local
Name: kubernetes.default
Address 1: 10.96.0.1 kubernetes.default.svc.cluster.local
Run Code Online (Sandbox Code Playgroud)
由于您已经upstreamNameservers
在相应的kube-dns
ConfigMap 中定义了这一事实,请检查您是否可以 ping 上游名称服务器:1.1.1.1
并且8.8.8.8
应该可以从 Pod 内访问。
验证每个容器(kubedns、dnsmasq、sidecar)的任何可疑事件的 DNS pod 日志:
kubectl logs --namespace=kube-system $(kubectl get pods --namespace=kube-system -l k8s-app=kube-dns -o name | head -1) -c kubedns
kubectl logs --namespace=kube-system $(kubectl get pods --namespace=kube-system -l k8s-app=kube-dns -o name | head -1) -c dnsmasq
kubectl logs --namespace=kube-system $(kubectl get pods --namespace=kube-system -l k8s-app=kube-dns -o name | head -1) -c sidecar
Run Code Online (Sandbox Code Playgroud)
如果您对所有先例步骤都满意,则 DNS 发现工作正常,因此您还可以检查Cloudflare DNS 防火墙配置以排除潜在限制。您可以在官方 K8s文档中找到有关解决 DNS 问题的更多相关信息。
归档时间: |
|
查看次数: |
3102 次 |
最近记录: |