Running Traefik 1.7.18
in Kubernetes via official Helm chart.
For awhile all my ingress endpoints worked great using Let's Encrypt. However, now all my ingress endpoints are serving the default example.com SSL certificate because Traefik failed to renew the SSL certificates. Looking at the pod logs I see:
{"level":"info","msg":"legolog: [INFO] [de-novo.simplyagree.dev] acme: Trying renewal with 718 hours remaining","time":"2019-12-02T20:31:24Z"}
{"level":"info","msg":"legolog: [INFO] [de-novo.simplyagree.dev] acme: Obtaining bundled SAN certificate","time":"2019-12-02T20:31:24Z"}
{"level":"info","msg":"legolog: [INFO] [de-novo.simplyagree.dev] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/1517133705","time":"2019-12-02T20:31:25Z"}
{"level":"info","msg":"legolog: [INFO] [de-novo.simplyagree.dev] acme: Could not find solver for: tls-alpn-01","time":"2019-12-02T20:31:25Z"}
{"level":"info","msg":"legolog: [INFO] [de-novo.simplyagree.dev] acme: use http-01 solver","time":"2019-12-02T20:31:25Z"}
{"level":"info","msg":"legolog: [INFO] [de-novo.simplyagree.dev] acme: Trying to solve HTTP-01","time":"2019-12-02T20:31:25Z"}
{"level":"info","msg":"legolog: [INFO] [de-novo.simplyagree.dev] acme: Validations succeeded; requesting certificates","time":"2019-12-02T20:31:32Z"}
That seems to indicate that HTTP-01 validation worked and generated a new certificate. How can I further debug this? All my ingress domains, there are three of them are serving example.com.
I deleted an ingress and created it again, and confirm I see Traefik reloading the config. However nothing is printed to the log related to ACME or Let's Encrypt renewal.
{"level":"info","msg":"Server configuration reloaded on :80","time":"2019-12-05T22:03:31Z"}
{"level":"info","msg":"Server configuration reloaded on :443","time":"2019-12-05T22:03:31Z"}
{"level":"info","msg":"Server configuration reloaded on :8080","time":"2019-12-05T22:03:31Z"}
{"level":"info","msg":"Server configuration reloaded on :80","time":"2019-12-05T22:03:42Z"}
{"level":"info","msg":"Server configuration reloaded on :443","time":"2019-12-05T22:03:42Z"}
{"level":"info","msg":"Server configuration reloaded on :8080","time":"2019-12-05T22:03:42Z"}
Using Consul as the kvprovider
here are relevant configs in my Helm chart:
kvprovider:
storeAcme: true
acmeStorageLocation: traefik/acme/account
importAcme: false
consul:
endpoint: consul:8500
watch: true
prefix: traefik
...
acme:
persistence:
enabled: false
...