Homelab PKI: Caddy CA + HashiCorp Vault + cert-manager on Kubernetes
This post documents how to set up a proper PKI for a homelab environment by importing an existing Caddy CA into HashiCorp Vault, and wiring it up with cert-manager on Kubernetes so that services automatically get trusted TLS certificates. Overview The trust chain we’re building: Caddy Root CA → Vault PKI → cert-manager → Kubernetes Secret (tls.crt / tls.key) Assumptions: Caddy is running as a reverse proxy and already has an internal CA Caddy is running outside the Kubernetes cluster on a dedicated host Vault is running outside the Kubernetes cluster (e.g. in Docker) cert-manager is installed in the Kubernetes cluster Internal domain is fritz.box, my public domain is dannihome.de Step 1: Locate Caddy’s CA Certificate and Key Caddy stores its internal CA here by default: ...