Skip to content

Instantly share code, notes, and snippets.

@navicore
Forked from Gangareddy/cert-managers
Last active April 8, 2019 20:48
Show Gist options
  • Save navicore/3b4e6af52c0cf72cd42ba78a25af6ab9 to your computer and use it in GitHub Desktop.
Save navicore/3b4e6af52c0cf72cd42ba78a25af6ab9 to your computer and use it in GitHub Desktop.
Step 1) Apply CRDS
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.6/deploy/manifests/00-crds.yaml
Step 2) Label namespace
kubectl create namespace cert-manager
kubectl label namespace cert-manager certmanager.k8s.io/disable-validation="true"
Step 3) Create Helm Chart
helm install --name cert-manager \
stable/cert-manager \
--namespace cert-manager \
--set ingressShim.defaultIssuerName=letsencrypt-prod \
--set ingressShim.defaultIssuerKind=ClusterIssuer
Step 4) Create ClusterIssuers
kubectl create --edit -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.7/docs/tutorials/acme/quick-start/example/production-issuer.yaml
(Modify Issuer to ClusterIssuer)
Step 5) Verify ClusterIssuers
k get clusterissuers.certmanager.k8s.io
// Make sure port 80 is open for letsEncrypt to communicate while issuing a cert
Step 6) Create DNS and add the following to your ingress annotations (WHEN YOU CREATE INGRESS)
certmanager.k8s.io/cluster-issuer: letsencrypt-prod
helm install --name ng-ingress stable/nginx-ingress --namespace kube-system --set rbac.create=true --set controller.stats.enabled=true --set controller.metrics.enabled=true
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment