This guide provides steps for installing cert-manager and setting up various DNS providers with Let's Encrypt.
| Provider | Directory | Documentation |
|---|---|---|
| AWS Route53 | aws/ | Route53 DNS01 |
| Google Cloud DNS | gcp/ | Google CloudDNS |
| Cloudflare | cloudflare/ | Cloudflare DNS01 |
To fetch the latest version, consult the official cert-manager releases.
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/latest/download/cert-manager.yamlVerify installation:
kubectl get po -n cert-managerEach provider directory contains the following template files:
| File | Description |
|---|---|
*-secret.yaml |
Credentials secret for DNS provider |
clusterissuer.yaml |
ClusterIssuer with ACME DNS-01 solver |
certificate.yaml |
Certificate resource (90d duration, 30d renewal) |
ingress.yaml |
Ingress with TLS configuration |
Refer to each provider's README for detailed setup instructions.
The helm/ directory provides a reusable Helm chart with provider-specific values files.
# AWS Route53
helm install cert-manager-cert ./helm -f ./helm/values-aws.yaml
# Google Cloud DNS
helm install cert-manager-cert ./helm -f ./helm/values-gcp.yaml
# Cloudflare
helm install cert-manager-cert ./helm -f ./helm/values-cloudflare.yamlYou can also override values inline:
helm install cert-manager-cert ./helm -f ./helm/values-aws.yaml \
--set certificate.commonName=example.com \
--set clusterIssuer.email=admin@example.comThis project is licensed under the MIT License - see the LICENSE file for details.