-
Notifications
You must be signed in to change notification settings - Fork 5.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Acme certificate requested on all TLS-Aware entrypoints #1399
Comments
Perhaps off topic (I would gladly open an enhancement request if confirmed) While at it. I know little or nothing about go, but by reading code I'm under the impression --acme.entrypoint is single value, and if right I wonder why? Would not a multivalue be more appropriate, allowing multiple entrypoints to become acme aware? |
We have two https entrypoints which serve https on two different ports (these are then accessed by two different LB, each of which has different access rules, one for public services, one for private). We would like to use LE certs for both. Since one of these is private, we are using route53 dns for provisioning. |
Fixed by #1401 |
What version of Traefik are you using (
traefik version
)?traefik:latest
Running traefik in a container with swarm as backend with the follwing acme configuration
What did you do?
I have several TLS-aware Entrypoints defined in my traefik configuration.
I've noticed every container I start regardless of TLS entrypoint used result in a acme certificate request.
Is this really the expected behavior ?
What did you expect to see?
Certificates requested only for containers using the entrypoint correlating to the one used for acme challenge
--acme.entrypoint='acme'
The text was updated successfully, but these errors were encountered: