We use cookies to make your experience better.
Learn how to use cert-manager to set up SSL certificates using Route 53 for DNS01 challenges.
cert-manager allows you to enable HTTPS on your Coder installation, regardless of whether you're using Let's Encrypt or you have your own certificate authority.
This guide will show you how to install cert-manager v1.0.1 and set up your cluster to issue Let's Encrypt certificates for your Coder installation so that you can enable HTTPS on your Coder deployment. It will also show you how to configure your Coder hostname and Dev URLs.
We recommend reviewing the official cert-manager documentation if you encounter any issues or if you want info on using a different certificate issuer.
You must have:
You should also:
Install cert-manager:
kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.2.0/cert-manager.yaml
Check that cert-manager installs correctly by running
kubectl get CustomResourceDefinition | grep cert-manager
You should see certificates, certificate requests, challenges, cluster issuers, issuers, and orders.
Next, check that your services are running in the cert-manager namespace
kubectl get all -n cert-manager
Because Coder dynamically generates domains (specifically the Dev URLs), your certificates need to be approved and challenged. The follow steps will show you how to use Route 53 for DNS01 challenges.
Log in to AWS Route 53. On the Dashboard, click Hosted Zone.
Click Create Hosted Zone. In the configuration screen, provide the
Domain name that you'll use for Coder (e.g., coder.exampleCo.com
) and
make sure that you've selected Public hosted zone. Click Create hosted
zone to proceed.
When your list of hosted zones refreshes, you'll see that your new records includes multiple values under Value/Route traffic to.
Log in to your DNS provider so that you can edit your NS records.
Edit your NS record to delegate your zones to AWS by sending each of the
values under Value/Route traffic to to your domain name (i.e., delegate
ns-X.awsdns-32.net
to coder.exampleCo.com
).
clusterIssuer
To make sure that your clusterIssuer
can change your DNS settings,
create the required IAM role
Using the text editor of your choice, create a new
configuration file
called letsencrypt.yaml
(you can name it whatever you'd like) that includes
your newly created IAM role:
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: letsencrypt
spec:
acme:
email: user@example.com
preferredChain: ""
privateKeySecretRef:
name: example-issuer-account-key
server: https://acme-staging-v02.api.letsencrypt.org/directory
solvers:
- dns01:
route53:
accessKeyID: your-access-key-ID #secret with IAM Role
region: your-region
secretAccessKeySecretRef:
key: secret-access-key
name: route53-credentials
selector:
dnsZones:
- yourDomain.com
Apply your configuration changes
kubectl apply -f letsencrypt.yaml
If successful, you'll see a response similar to
clusterissuer.cert-manager.io/letsencrupt-alt created
At this point, you're ready to install Coder.
However, to use all of the functionality you set up in this tutorial, use the
following helm install
command instead:
helm install coder coder/coder --namespace coder \
--version=<CODER_VERSION> \
--set devurls.host="*.exampleCo.com" \
--set ingress.host="coder.exampleCo.com" \
--set ingress.tls.enable=true \
--set ingress.tls.devUrlsHostSecretName=devUlrCertificate \
--set ingress.tls.hostSecretName=hostCertificate \
--set \
"ingress.additionalAnnotations[0]=cert-manager.io/cluster-issuer:letsencrypt" \
--wait
There are also a few additional steps to make sure that your hostname and Dev URLs work.
Check the contents of your namespace:
kubectl get all -n <your_namespace> -o wide
Find the service/ingress-nginx line and copy its external IP value.
Return to Route53 and go to Hosted Zone.
Create a new record for your hostname; provide coder
as the record name and
paste the external IP as the value
. Save.
Create another record for your Dev URLs: set it to *.dev.exampleCo
or
similar and use the same external IP as the previous step for value
. Save.
At this point, you can return to step 6 of the installation guide to obtain the admin credentials you need to log in.
Our docs are open source. See something wrong or unclear? Make an edit.