When creating a new certificate, make sure you create one on a named namespace. It will be verified by cert-manager even if it exists on a different namespace since we are referring to a ClusterIssuer.
Create a namespaced X.509 certificate
Replace traefik NAMESPACE with the namespace of your choise and kub.techlabnews with your domaine
Check certificate status is Issued :
Check that secret MY_DOMAIN-com-cert-secret was created successfully :
Sometimes it is necessary to use secret values from outside the Kubernetes cluster. One such example is setting the cert_file as a trusted certificate on a client machine (laptop or desktop), especially when using a self-signed certificate.
Create a local destination folder :
Export the certificate secrets
**cert_file ** : client certificate path used for authentication:
key_file : client key path used for authentication
ca_file : CA certificate path used to verify the remote server cert file
Check that secrets exported successfully
Next (In soon)
Access our kubernetes dashboard with Ingress Controller
Conclusion
We generated a certificate and exported in files the secret values to allow a client machine to access from outside the Kubernetes cluster.
We will use this certificate to expose the access to the Traefik dashboard.