DEV Community

Discussion on: Deploying a Microservice on Azure Kubernetes (with Let's Encrypt)

Collapse
 
ianknighton profile image
Ian Knighton

I don't know off the top of my head, but it looks like this may be something that's popped up recently with cert-manager dealing with ports. There seems to be a fix mentioned here, but I haven't had a chance to test anything with it.

Collapse
 
gowlar profile image
Stefan Gowlar

I am using AKS and cant find a solution to the above :/

Thread Thread
 
ianknighton profile image
Ian Knighton • Edited

I'm kind of winging it, but if you want to go on a trip with me...

  1. Launch the Kubernetes Web Dashboard: az aks browse --resource-group <resourcegroup> --name <clustername>
  2. On the sidebar, find Discovery and Load Balancing > Services
  3. Click on the service called Kubernetes

I believe this should give you the option to edit the YAML. I THINK you should just need to add the port there. Something similar to:

"ports": [
      {
        "name": "https",
        "protocol": "TCP",
        "port": 443,
        "targetPort": 443
      },
      {
        "name": "webhook",
        "protocol": "TCP",
        "port": 6443,
        "targetPort": 6443
      }
    ]

Maybe? This is just a hunch.

You may also be able to accomplish this through kubectl, but I'm not sure.

I'm working on updating my post to specify which version of Cert-Manager to use, since apparently this is an issue after version 0.6.0