Replies: 2 comments
-
@silandrew Even though you have 2 secret provider classes, you're only referencing one in the pod volume mount. So only the sync secret specified in
If both secrets are being fetched from same keyvault, I would recommend (1) as it reduces the scope for runtime (volume mount) failures. |
Beta Was this translation helpful? Give feedback.
-
this works only with 2 ingress controllers because in ingress helm has been specifying secretProviderClass: "ingress-tls", working ingress helm config helm install ingress-nginx/ingress-nginx --generate-name --namespace=a --set controller.ingressClass=ingress-a --set controller.ingressClassResource.name=ingress-a --set controller.replicaCount=2 --set controller.nodeSelector."beta.kubernetes.io/os"=linux --set defaultBackend.nodeSelector."beta.kubernetes.io/os"=linux --set controller.service.annotations."service.beta.kubernetes.io/azure-load-balancer-health-probe-request-path"=/healthz --set controller.podLabels.aadpodidbinding=mi-aksxxx-f - <<EOF extraVolumeMounts: |
Beta Was this translation helpful? Give feedback.
-
I want to create a secrets for multiple SSL certificates with one Ingress controller, this is working with one domain ssl certificate config but deosent cretate secrets with 2
#domain A secret class
#domain B secret class
####helm config
and this is the config for ingress config
Beta Was this translation helpful? Give feedback.
All reactions