An Azure service that provides a general-purpose, serverless container platform.
Container App custom domain on internal environment — TLS handshake returns no peer certificate
Hi,
I have an internal Container Apps Environment with a Container App that has a custom domain bound. The binding is SniEnabled and points at a CAE-level certificate that I imported from Key Vault (Let's Encrypt, RSA-2048). Both the certificate resource and the binding report Succeeded with the correct thumbprint, subject and SAN.
From a VM inside the peered VNet, a TLS handshake to the default CAE FQDN works fine and returns the Microsoft wildcard certificate. A TLS handshake to the bound custom hostname on the same IP returns "no peer certificate available" — the server closes the connection before presenting anything. Same behaviour persists after waiting 12+ hours, after restarting the container app revision, and after rebuilding the certificate resource on the latest GA API version.
Has anyone seen this on an internal CAE? Is there a known issue with the ingress not picking up KV-imported certificates for the custom hostname even when the binding looks correct?
Happy to provide more detail or specific resource IDs if useful.
Cheers, Simon