### where we are at (status-quo)
- we are not able to generate TLS certificate with letsencrypt. How does we handle that? with [CertManager](https://cert-manager.io/) - E.g: [doc](https://www.howtogeek.com/devops/how-to-install-kubernetes-cert-manager-and-configure-lets-encrypt/)
1. we use
- eks 1.24
- jetstack/cert-manager helm chart --version 1.5.3
- ingress-nginx/ingress-nginx 1.7.1
2. We have two ingressClasses:
2.1 - one **welance-develop** with the ELB [DEV](abb8fb0a1078041f38d76b51de9289c7-8e6adbf6767e08d6.elb.eu-central-1.amazonaws.com)
2.2 - one **welance-staging** with the ELB [STAGING](a291aa86e97624c20bf0e84774fa2639-5116e86c535841c7.elb.eu-central-1.amazonaws.com)
we registered dns in cloudflare as ELB hostname we got from EKS so
1. all *.dev.welance.com -> welance-develop nginx ingress controller [2.1]
2. all *.staging.welance.com -> welance-staging nginx ingress controller [2.2]
we deployed
- dev http [ingress](https://gitlab.com/welance/platform/infrastructure/welance-aws/-/blob/develop/kubernetes/test-ingress-generation/ingress_develop_http.yaml)
1) http://http.dev.welance.com/hello
- dev https [ingress](https://gitlab.com/welance/platform/infrastructure/welance-aws/-/blob/develop/kubernetes/test-ingress-generation/ingress_develop_tls.yaml)
1) https://https.dev.welance.com/hello
- staging http [ingress](https://gitlab.com/welance/platform/infrastructure/welance-aws/-/blob/develop/kubernetes/test-ingress-generation/ingress_staging_http.yaml)
1) http://http.staging.welance.com/hello
- staging https [ingress](https://gitlab.com/welance/platform/infrastructure/welance-aws/-/blob/develop/kubernetes/test-ingress-generation/ingress_staging_tls.yaml)
1) https://https.staging.welance.com/hello
**as you can see all http connections go fine - so DNL-LB and so on are ok - HTTPS not.**
### where we think the problem might be
The issue is with CertificateRequest created by CertManager operator which will not end successfully.
NAME APPROVED DENIED READY ISSUER REQUESTOR AGE
https-tls-secret-certificate-62fmw True False letsencrypt-develop system:serviceaccount:cert-manager:cert-manager 37m
https-tls-secret-staging-certificate-v5w7s True False letsencrypt-staging system:serviceaccount:cert-manager:cert-manager 36m
from the logs we noticed the order is created but the challenge to complete the certiicate issuing does not complete
```
amedeopalopoli@MacBook-Pro-di-Amedeo platform % kubectl get challenge
NAME STATE DOMAIN AGE
https-tls-secret-certificate-62fmw-522397194-1322428516 pending https.dev.welance.com 38m
https-tls-secret-staging-certificate-v5w7s-300742362-3816885166 pending https.staging.welance.com 38m
```
**this is the cause**
```
Reason: Waiting for HTTP-01 challenge propagation: failed to perform self check GET request 'http://https.dev.welance.com/.well-known/acme-challenge/IKi1Jdd2kA2ailCQjMkqx6Z27_fX_ulCEQ992wcPtKY': Get "http://https.dev.welance.com/.well-known/acme-challenge/IKi1Jdd2kA2ailCQjMkqx6Z27_fX_ulCEQ992wcPtKY": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
State: pending
```
### what we have already tried
- checking if possible with editing the certmanager dns to pointing out 8.8.8.8 nameserver as reported [here](https://stackoverflow.com/questions/73607837/cert-manager-did-not-get-expected-response-when-querying-endpoint-expected-tok) but did not work
- as reported in the [FAQ](https://cert-manager.io/docs/troubleshooting/webhook/#error-context-deadline-exceeded) from cert manager the issue seems to be related network trouble somehow but did not get the cause yet unfortunately