@@ -89,13 +89,11 @@ Then, associate this route to it:
89
89
90
90
## Kubernetes
91
91
92
- Head off to the [ Kubernetes deployment configuration] ( kubernetes ) for examples, using a Kubernetes service
93
- plus either a [ deployment (deprecated)] ( kubernetes/certbot-cron.yml ) , or a [ kubernetes cronjob] ( kubernetes/certbot-cronjob.yml ) .
92
+ Here's a [ kubernetes cronjob example] ( kubernetes/certbot-cronjob.yml ) .
94
93
95
- Note that the cron deployment is legacy stuff, from before Kubernetes had ` CronJob ` (pre 1.4). Please use a proper kubernetes
96
- ` CronJob ` object for scheduling.
94
+ ### Note
97
95
98
- Note: your k8s service will always time out since there's nothing listening on HTTP except for when certbot itself is
96
+ Your k8s service SHOULD always time out since there's nothing listening on HTTP except for when certbot itself is
99
97
running and requesting certs from LE.
100
98
101
99
## Command line tool
@@ -127,12 +125,13 @@ docker run -it --rm phpdockerio/kong-certbot-agent \
127
125
128
126
You can give the agent a pretty big list of domains to acquire certificates for (100), but bear in mind it will be one certificate
129
127
shared among all of them. You might want to set up different cronjobs for different sets of certificates, grouped in a manner
130
- that makes sense to you.
128
+ that makes sense to you. Also, if one of the domains you're getting a certificate from fails the HTTP challenge, cert acquisition
129
+ for the whole group fails.
131
130
132
131
### How about wildcard certs?
133
132
134
133
Unfortunately, certbot does not support http challenges on wildcard certs, needing to resort to other types (like DNS).
135
- Due to the way certbot agent works, this will never be supported by the agent.
134
+ Due to the way certbot agent works, this will never be supported by the agent.
136
135
137
136
### Any considerations on a first time set up?
138
137
0 commit comments