I am trying to generate a certificate for an internal server using DNS records (TXT). However it fails and I am unable to see more specifics, this is with debug logging enabled:
time="2019-10-02T13:17:21Z" level=debug msg="No default certificate, generating one"
time="2019-10-02T13:17:21Z" level=info msg="Starting provider aggregator.ProviderAggregator {}"
time="2019-10-02T13:17:21Z" level=debug msg="Start TCP Server" entryPointName=traefik
time="2019-10-02T13:17:21Z" level=debug msg="Start TCP Server" entryPointName=web
time="2019-10-02T13:17:21Z" level=debug msg="Start TCP Server" entryPointName=web-secure
time="2019-10-02T13:17:21Z" level=info msg="Starting provider *docker.Provider {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":15000000000}"
time="2019-10-02T13:17:21Z" level=info msg="Starting provider *acme.Provider {\"email\":\"postmaster@example.com\",\"caServer\":\"https://acme-staging-v02.api.letsencrypt.org/directory\",\"storage\":\"acme.json\",\"keyType\":\"RSA4096\",\"dnsChallenge\":{\"provider\":\"gandiv5\",\"delayBeforeCheck\":900000000000},\"ResolverName\":\"corp\",\"store\":{},\"ChallengeStore\":{}}"
time="2019-10-02T13:17:21Z" level=info msg="Testing certificate renew..." providerName=corp.acme
time="2019-10-02T13:17:21Z" level=debug msg="Configuration received from provider corp.acme: {\"http\":{},\"tls\":{}}" providerName=corp.acme
time="2019-10-02T13:17:21Z" level=debug msg="No default certificate, generating one"
time="2019-10-02T13:17:21Z" level=debug msg="Provider connection established with docker 19.03.2 (API 1.40)" providerName=docker
time="2019-10-02T13:17:21Z" level=debug msg="Filtering disabled container" providerName=docker container=traefik-9e0f99de3f78d9d8762c548d511fd992101bc28e8980cfee1d4e1076807c3b19
time="2019-10-02T13:17:21Z" level=debug msg="Filtering disabled container" container=portainer-9d93a8141f7a5a5716bddf4697f0ee53fe7769e309a2aa70e5956304c133dbb2 providerName=docker
time="2019-10-02T13:17:21Z" level=debug msg="Configuration received from provider docker: {\"http\":{\"routers\":{\"pi-hole\":{\"service\":\"pi-hole\",\"rule\":\"Host(`pi-hole.docker-core.corp.example.com`)\",\"tls\":{\"certResolver\":\"corp\"}}},\"services\":{\"pi-hole\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://172.17.0.4:80\"}],\"passHostHeader\":true}}}},\"tcp\":{}}" providerName=docker
time="2019-10-02T13:17:22Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [web web-secure traefik]" routerName=pi-hole@docker
time="2019-10-02T13:17:22Z" level=debug msg="Creating middleware" entryPointName=web middlewareName=pipelining middlewareType=Pipelining routerName=pi-hole@docker serviceName=pi-hole
time="2019-10-02T13:17:22Z" level=debug msg="Creating load-balancer" entryPointName=web routerName=pi-hole@docker serviceName=pi-hole
time="2019-10-02T13:17:22Z" level=debug msg="Creating server 0 http://172.17.0.4:80" serviceName=pi-hole entryPointName=web serverName=0 routerName=pi-hole@docker
time="2019-10-02T13:17:22Z" level=debug msg="Added outgoing tracing middleware pi-hole" middlewareType=TracingForwarder routerName=pi-hole@docker entryPointName=web middlewareName=tracing
time="2019-10-02T13:17:22Z" level=debug msg="Creating middleware" entryPointName=web middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2019-10-02T13:17:22Z" level=debug msg="Creating middleware" entryPointName=web-secure middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2019-10-02T13:17:22Z" level=debug msg="Creating middleware" entryPointName=traefik middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2019-10-02T13:17:22Z" level=debug msg="No entryPoint defined for this router, using the default one(s) instead: [web web-secure traefik]" routerName=pi-hole@docker
time="2019-10-02T13:17:22Z" level=debug msg="No default certificate, generating one"
time="2019-10-02T13:17:22Z" level=debug msg="Try to challenge certificate for domain [pi-hole.docker-core.corp.example.com] founded in HostSNI rule" providerName=corp.acme routerName=pi-hole rule="Host(`pi-hole.docker-core.corp.example.com`)"
time="2019-10-02T13:17:22Z" level=debug msg="Looking for provided certificate(s) to validate [\"pi-hole.docker-core.corp.example.com\"]..." providerName=corp.acme routerName=pi-hole rule="Host(`pi-hole.docker-core.corp.example.com`)"
time="2019-10-02T13:17:22Z" level=debug msg="Domains [\"pi-hole.docker-core.corp.example.com\"] need ACME certificates generation for domains \"pi-hole.docker-core.corp.example.com\"." providerName=corp.acme routerName=pi-hole rule="Host(`pi-hole.docker-core.corp.example.com`)"
time="2019-10-02T13:17:22Z" level=debug msg="Loading ACME certificates [pi-hole.docker-core.corp.example.com]..." providerName=corp.acme routerName=pi-hole rule="Host(`pi-hole.docker-core.corp.example.com`)"
time="2019-10-02T13:17:22Z" level=debug msg="Building ACME client..." providerName=corp.acme
time="2019-10-02T13:17:22Z" level=debug msg="https://acme-staging-v02.api.letsencrypt.org/directory" providerName=corp.acme
time="2019-10-02T13:17:23Z" level=debug msg="Using DNS Challenge provider: gandiv5" providerName=corp.acme
time="2019-10-02T13:17:23Z" level=debug msg="legolog: [INFO] [pi-hole.docker-core.corp.example.com] acme: Obtaining bundled SAN certificate"
time="2019-10-02T13:17:23Z" level=debug msg="legolog: [INFO] [pi-hole.docker-core.corp.example.com] AuthURL: https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/12019173"
time="2019-10-02T13:17:23Z" level=debug msg="legolog: [INFO] [pi-hole.docker-core.corp.example.com] acme: Could not find solver for: tls-alpn-01"
time="2019-10-02T13:17:23Z" level=debug msg="legolog: [INFO] [pi-hole.docker-core.corp.example.com] acme: Could not find solver for: http-01"
time="2019-10-02T13:17:23Z" level=debug msg="legolog: [INFO] [pi-hole.docker-core.corp.example.com] acme: use dns-01 solver"
time="2019-10-02T13:17:23Z" level=debug msg="legolog: [INFO] [pi-hole.docker-core.corp.example.com] acme: Preparing to solve DNS-01"
time="2019-10-02T13:17:24Z" level=debug msg="legolog: [INFO] [pi-hole.docker-core.corp.example.com] acme: Cleaning DNS-01 challenge"
time="2019-10-02T13:17:25Z" level=error msg="Unable to obtain ACME certificate for domains \"pi-hole.docker-core.corp.example.com\": unable to generate a certificate for the domains [pi-hole.docker-core.corp.example.com]: acme: Error -> One or more domains had a problem:\n[pi-hole.docker-core.corp.example.com] [pi-hole.docker-core.corp.example.com] acme: error presenting token: unable to create TXT record for domain corp.example.com and name _acme-challenge.pi-hole.docker-core: 404 [Not Found] request failed: The resource could not be found.\n" rule="Host(`pi-hole.docker-core.corp.example.com`)" providerName=corp.acme routerName=pi-hole
What can I do to figure out why it failed?