fix(k8s): persist Caddy TLS certificates with PVC #981
No reviewers
Labels
No Label
bug
documentation
duplicate
enhancement
feature
good first issue
help wanted
in progress
invalid
question
wontfix
Copied from Github
Kind/Breaking
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Security
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Status
Abandoned
Status
Blocked
Status
Need More Info
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: cerc-io/stack-orchestrator#981
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "caddy-pvc-persistence"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Caddy ingress was using emptyDir for /data storage, causing TLS
certificates to be lost on pod restarts or cluster recreations.
This led to Let's Encrypt rate limit issues from repeatedly
requesting new certificates.
Add a PersistentVolumeClaim for Caddy's data directory to persist
ACME certificates across redeployments.
Co-Authored-By: Claude Opus 4.5 noreply@anthropic.com
Makes kind deployments use the same volume pattern as Docker Compose: ./data/{volume-name} relative to deployment directory. Changes: - Allow relative paths for kind (single host, like Docker Compose) - Default kind volumes to ./data/ instead of provisioner-managed PVCs - Update Caddy manifest to use hostPath /mnt/caddy-data - Add caddy-data infrastructure volume support in kind mounts This enables Caddy certificate persistence across cluster recreation without requiring system-level directories like /opt/caddy-data. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>Mount /var/lib/etcd and /etc/kubernetes/pki to host filesystem so cluster state is preserved for offline recovery. Each deployment gets its own backup directory keyed by deployment ID. Directory structure: data/cluster-backups/{deployment_id}/etcd/ data/cluster-backups/{deployment_id}/pki/ This enables extracting secrets from etcd backups using etcdctl with the preserved PKI certificates. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>3ff4ac6185to1b9204da98Checkout
From your project repository, check out a new branch and test the changes.