Expired certificate not renewed using ACME protocol - [Solved]

Hello everyone:

I am running into an issue with certificate renewal using ACME protocol. The initial certificate was generated with no issues, but now it has expired and Traefik does not detect the expired certificate and says "No ACME certificate renewal required"

I have been searching the forums and bug reports but all others I see that cannot renew gives and error, while this one just says all is ok. The certificate has a validity of 24 hours and it worked ok until today where it expired and even reloading Traefik does not seem to detect the expired cert.

Any suggestions?

Using:
Traefik 2.6.0-rc2
stepca as acme service

cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Try to challenge certificate for domain     [traefik.domain.lan] found in HostSNI rule" ACME CA="https://ca:9090/acme/acme/directory" rule="Host(`traefik.domain.lan`)" routerName=api@docker providerName=ca.acme
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Try to challenge certificate for domain [svc1.domain.lan www.svc1.domain.lan] found in HostSNI rule" rule="Host(`svc1.domain.lan`) || Host(`www.svc1.domain.lan`)" ACME CA="https://ca:9090/acme/acme/directory" providerName=ca.acme routerName=svc1-proxy-https@docker
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Try to challenge certificate for domain [svc2.domain.lan] found in HostSNI rule" rule="Host(`svc2.domain.lan`)" ACME CA="https://ca:9090/acme/acme/directory" providerName=ca.acme routerName=svc1-svc2-https@docker
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Try to challenge certificate for domain [svc3.domain.lan] found in HostSNI rule" rule="Host(`svc3.domain.lan`)" providerName=ca.acme ACME CA="https://ca:9090/acme/acme/directory" routerName=svc1-svc3-https@docker
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Try to challenge certificate for domain [svc4.domain.lan] found in HostSNI rule" ACME CA="https://ca:9090/acme/acme/directory" rule="Host(`svc4.domain.lan`)" routerName=svc1-svc4-https@docker providerName=ca.acme
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Looking for provided certificate(s) to validate [\"svc1.domain.lan\" \"www.svc1.domain.lan\"]..." rule="Host(`svc1.domain.lan`) || Host(`www.svc1.domain.lan`)" ACME CA="https://ca:9090/acme/acme/directory" providerName=ca.acme routerName=svc1-proxy-https@docker
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="No ACME certificate generation required for domains [\"svc1.domain.lan\" \"www.svc1.domain.lan\"]." rule="Host(`svc1.domain.lan`) || Host(`www.svc1.domain.lan`)" ACME CA="https://ca:9090/acme/acme/directory" providerName=ca.acme routerName=svc1-proxy-https@docker
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Looking for provided certificate(s) to validate [\"svc2.domain.lan\"]..." ACME CA="https://ca:9090/acme/acme/directory" providerName=ca.acme routerName=svc1-svc2-https@docker rule="Host(`svc2.domain.lan`)"
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="No ACME certificate generation required for domains [\"svc2.domain.lan\"]." ACME CA="https://ca:9090/acme/acme/directory" providerName=ca.acme routerName=svc1-svc2-https@docker rule="Host(`svc2.domain.lan`)"
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Looking for provided certificate(s) to validate [\"svc3.domain.lan\"]..." providerName=ca.acme ACME CA="https://ca:9090/acme/acme/directory" routerName=svc1-svc3-https@docker rule="Host(`svc3.domain.lan`)"
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="No ACME certificate generation required for domains [\"svc3.domain.lan\"]." routerName=svc1-svc3-https@docker rule="Host(`svc3.domain.lan`)" providerName=ca.acme ACME CA="https://ca:9090/acme/acme/directory"
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Looking for provided certificate(s) to validate [\"svc4.domain.lan\"]..." ACME CA="https://ca:9090/acme/acme/directory" rule="Host(`svc4.domain.lan`)" routerName=svc1-svc4-https@docker providerName=ca.acme
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="No ACME certificate generation required for domains [\"svc4.domain.lan\"]." rule="Host(`svc4.domain.lan`)" routerName=svc1-svc4- https@docker providerName=ca.acme ACME CA="https://ca:9090/acme/acme/directory"
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="Looking for provided certificate(s) to validate [\"traefik.domain.lan\"]..." rule="Host(`traefik.domain.lan`)" routerName=api@docker providerName=ca.acme ACME CA="https://ca:9090/acme/acme/directory"
cloud-lan    | time="2022-01-20T19:28:07Z" level=debug msg="No ACME certificate generation required for domains [\"traefik.domain.lan\"]." providerName=ca.acme ACME CA="https://ca:9090/acme/acme/directory" rule="Host(`traefik.domain.lan`)" routerName=api@docker

Found the issue.

The acme server port had to be changed due to a conflict with another service. It was updated in the traefik config, but traefik did not update it inside the acme.json file. I updated the file manually and restarted and all the certificates got renewed

Thanks!