Signature Algorithm: sha256WithRSAEncryption Issuer: C = US, O = Let's Encrypt, CN = R3 Validity Not Before: Dec 2 07:41:11 2020 GMT Not After : Mar 2 07:41:11 2021 GMT Authority Information Access: OCSP - URI:http://r3.o.lencr.org CA Issuers - URI:http://r3.i.lencr.org/
failed port 443 protocol https with ssl options {verify: enable} and certificate valid > 28 days retry 3
SSL server certificate verification error: unable to get local issuer certificate
System Log shows entry from "php" with [...]"ssl_verify_result":20[...]
When you renew any Let's Encrypt certificates after January 2021
So all certs issued now are still with the old CA. It starts for certs which are renewed/issued in January 2021.So if you renew a cert at the the end of this month it will be running with the old ca for 3 months.
Look at GitHub issues, there is already a hotfix command available
...When doing this the certificate is referenced to the CA by using the caref attribute. However, this attribute is never updated. As a result applications like HAProxy will send an invalid certificate chain, effectively breaking SSL communication.