cert-manager/docs/examples/acme-cert.yaml

41 lines
1.0 KiB
YAML

## Example Certificate that uses multiple challenge mechanisms to obtain
## a SAN certificate for multiple domains from the letsencrypt-staging issuer.
apiVersion: certmanager.k8s.io/v1alpha1
kind: Certificate
metadata:
name: cm-http-nginx-k8s-group
spec:
secretName: cm-http-nginx-k8s-group
issuerRef:
name: letsencrypt-staging
dnsNames:
- cm-http-nginx.k8s.group
- cm-http-nginx2.k8s.group
- cm-http-gce.k8s.group
- cm-dns-clouddns.k8s.group
- cm-dns-cloudflare.k8s.group
- cm-dns-route53.k8s.group
acme:
config:
- http01:
ingressClass: nginx
domains:
- cm-http-nginx.k8s.group
- cm-http-nginx2.k8s.group
- http01:
ingress: my-gce-ingress
domains:
- cm-http-gce.k8s.group
- dns01:
provider: clouddns
domains:
- cm-dns-clouddns.k8s.group
- dns01:
provider: cloudflare
domains:
- cm-dns-cloudflare.k8s.group
- dns-01:
provider: route53
domains:
- cm-dns-route53.k8s.group