Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Cloud Stackland
  • What's new
  • Installation
    • All tutorials
    • Installing Stackland on Yandex BareMetal
    • Setting up external access to a pod in a cluster
    • All guides
    • Projects
    • Resource model
      • Overview
      • Certificate Manager
      • DNS
      • IAM
      • Logging Stack
      • Managed Service for Apache Kafka®
      • Managed Service for PostgreSQL
      • Managed Service for ClickHouse®
      • DataLens
      • Monitoring
      • Object Storage
      • Disk subsystem
      • NVIDIA® GPU support
      • Policy Manager
      • Secrets Store
      • SpeechSense
  • Access management
  • Pricing policy
  • Diagnostics and troubleshooting

In this article:

  • Default CA Issuer
  • Let's Encrypt HTTP01
  • Issuing a certificate
  1. Concepts
  2. Components
  3. Certificate Manager

Certificate Manager

Written by
Yandex Cloud
Updated at April 8, 2026
  • Default CA Issuer
  • Let's Encrypt HTTP01
  • Issuing a certificate

Certificate Manager is a component to manage certificates used in cross-service interaction. There are two global issuers (kind: ClusterIssuer) available for certificate management: Default CA Issuer (stackland-default) and Let's Encrypt HTTP01 (stackland-letsencrypt). Both issuers are based on the open-source cert-manager project.

Default CA IssuerDefault CA Issuer

This issuer is enabled by default and cannot be additionally configured. If you specified an intermediate CA during Stackland installation (see Getting started), it will certify the generated certificates. Otherwise, self-signed certificates are generated.

Let's Encrypt HTTP01Let's Encrypt HTTP01

The certificate from the Let's Encrypt certificate authority (CA) is recognized as trusted by all modern browsers; therefore, this option is suitable for services that are expected to receive connections from outside the organization.

Let's Encrypt supports various methods for verifying domain ownership. Certificate Manager supports the most common one: HTTP01. All required communication with the certificate authority is handled automatically, eliminating the need for the Stackland cluster administrator to intervene.

The Let's Encrypt HTTP01 issuer is disabled by default and requires additional configuration. To do this, you need to edit the global CertificateManagerConfig resource and make changes to the clusterIssuers section, which should look as follows:

clusterIssuers:
  letsencryptHttp01:
    enabled: true                              # Enabling Let's Encrypt HTTP01 support
    email: your-email@example.com              # Valid email address to which you expect the Let's Encrypt notifications to be delivered.

During the configuration process, a private key for working with Let's Encrypt will be automatically saved in the stackland-certificate-manager namespace in the letsencrypt-private-key secret. If you lose this key, it will be impossible to revoke the certificate issued by Certificate Manager for the domain.

Issuing a certificateIssuing a certificate

To issue a certificate, create the Certificate resource specifying the issuer type: stackland-default for the Default CA Issuer or stackland-letsencrypt for Let's Encrypt HTTP01. You also need to specify the domain the certificate is issued for.

apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: my-public-cert
  namespace: default
spec:
  secretName: my-public-tls      # the secret where the generated private key will be stored
  issuerRef:
    name: stackland-letsencrypt  # or stackland-default
    kind: ClusterIssuer
  dnsNames:
  - app.example.com              # the domain for which the certificate is issued

If you are using Let's Encrypt HTTP01, the domain must be external, i.e., allowed outside the organization network.

You can also automatically issue a certificate for a service (Ingress) by using annotations:

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: my-app
  annotations:
    cert-manager.io/cluster-issuer: stackland-letsencrypt  # or `stackland-default`
spec:
  tls:
  - hosts:
    - app.example.com       # the domain for which the certificate is issued
    secretName: my-app-tls  # the secret where the generated private key will be stored
  rules:
  - host: app.example.com
    http:
      paths:
      - path: /
        pathType: Prefix
        backend:
          service:
            name: my-app
            port:
              number: 80

Was the article helpful?

Previous
Overview
Next
DNS
© 2026 Direct Cursus Technology L.L.C.