We got a notification email from LE mentioning it will expire in 19 days.
Figure this out asap! @digaponc@rvasek we can apply the required change next week but if you could already have a quick look of why it's failing (the cert-manager logs should be useful).
Designs
Child items
...
Show closed items
Linked items
0
Link issues together to show that they're related or that one is blocking others.
Learn more.
"message"="Renewing certificate as renewal was scheduled at 2023-10-29 04:38:29 +0000 UTC"
Operation cannot be fulfilled on certificaterequests.cert-manager.io \"harbor-harbor-ingress-vswn8\": the object has been modified; please apply your changes to the latest version and try again"
It was supposed to be renewed on October 29th, it tried 5 times with the error above.
The cluster is created with cert-manager disabled and then cert-manager is installed as a separate chart:
helm ls -A NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSIONcern-magnum kube-system 1 2023-08-25 10:07:45.464379991 +0000 UTC deployed cern-magnum-0.12.2 cert-manager kube-system 1 2023-09-19 13:08:38.2041699 +0200 CEST deployed cert-manager-v1.7.1 v1.7.1
We always deploy CRDs from dependencies, regardless of the enabled: true in cern-magnum's values.yaml. This then causes conflict when it's installed manually.
The secret is called cert-manager-webhook-ca instead of cern-magnum-cert-manager-webhook-ca. It's the same setup on staging.
Does this mean the certificate creation was never working on this clusters? The certificate was copied from cci-infra-002 as part of tls-secret-sync job) and the renewal was not checked?
So after investigating with Robert, this is our findings:
It seems that Diogo was decoupling cert-manager from cern-magnum. Cern-magnum is installed without cert-manager, as a result there are no cluster issuers. From his ticket for harbor upgrade: