This message was deleted.
# general
a
This message was deleted.
s
I just deployed a cert manager
I'd like to use the default autogenerate rancher certificate
h
and in
cattle-system
namespace do you have a secret with name
tls-rancher-ingress
?
s
yes
i don't use dns or ingress i just use IP of nodePort service
because my clusters only have access to IPs not DNS
the cert have in SAN a DNS i don't use
i just want the agent contacts the server using IP
Maybe i can just instead when installing the chart setting the hostname to the IP instead of the unused DNS ?
h
I have never tried to use IP address with
--set hostname
maybe someone else here can provide better insight on this
s
doesn't work btw
h
oh it says there "must be a DNS name"
s
it means it is mandatory to have a dns record ?
h
yeah or the ugly (and temporary use) set in /etc/hosts file on every machine
s
so if i contact server through dns instead of ip certificate chain would be valid ? For the hostname i provided
h
I would think so... I have done that several times (with using FQDN instead of IP) and have not had any issue although I am not sure if you will have to redeploy rancher with correct
--set hostname
s
Thx
You just followed these steps ?
nothing particular to do with cert manager or whatever
h
yep so just install cert-manager (as it shows in example in that doc):
Copy code
# Add the Jetstack Helm repository
helm repo add jetstack <https://charts.jetstack.io>

# Update your local Helm chart repository cache
helm repo update

# Install the cert-manager Helm chart
helm install cert-manager jetstack/cert-manager \
  --namespace cert-manager \
  --create-namespace \
  --set crds.enabled=true
then install rancher
Copy code
helm install rancher rancher-stable/rancher \
  --namespace cattle-system \
  --set hostname=<http://rancher.my.org|rancher.my.org> \
  --set bootstrapPassword=admin
s
For you should i use ingress with private IP, or nodePort and register node IP as DNS record ?
because this helm chart generates ingress
h
IP address of your node (or VM) should be a DNS record
s
okay so no use of ingress
i've got the same mistake using DNS
i checked in tls-rancher-ingress
the cert has the SAN of my DNS
as you can see on top right of the screen there is the DNS
Copy code
Issuer of last certificate found in chain (CN=dynamiclistener-ca @1733407945,O=dynamiclistener-org) does not match with CA certificate Issuer (CN=dynamiclistener-ca@1733407944,O=dynamiclistener-org).
looks like the issuer and the CA differs from 1
1733407944/1733407945