mirror of
https://github.com/fosrl/docs-v2.git
synced 2026-03-05 02:06:50 +00:00
Merge pull request #66 from LaurenceJJones/docs/netcup-wildcard-dns-firewall
This commit is contained in:
@@ -255,6 +255,8 @@ Traefik supports most DNS providers. You can find a full list of supported provi
|
|||||||
- Check API token permissions and scope
|
- Check API token permissions and scope
|
||||||
- Ensure DNS propagation has completed
|
- Ensure DNS propagation has completed
|
||||||
- Review provider-specific configuration
|
- Review provider-specific configuration
|
||||||
|
- If your DNS provider has a firewall in place, ensure it allows incoming DNS traffic (typically UDP on port **53**). Adding an ingress rule to permit such traffic may help resolve the issue, especially if the firewall is stateless.
|
||||||
|
|
||||||
</Accordion>
|
</Accordion>
|
||||||
|
|
||||||
<Accordion title="Old certificates still being used">
|
<Accordion title="Old certificates still being used">
|
||||||
@@ -262,4 +264,4 @@ Traefik supports most DNS providers. You can find a full list of supported provi
|
|||||||
|
|
||||||
**Solution**: Delete the `acme.json` file to force new certificate generation.
|
**Solution**: Delete the `acme.json` file to force new certificate generation.
|
||||||
</Accordion>
|
</Accordion>
|
||||||
</AccordionGroup>
|
</AccordionGroup>
|
||||||
|
|||||||
Reference in New Issue
Block a user