This instruction will help you to install SSL certificate on your server using Certbot
1. Create an elastic IP for the EC2 instance you are integrating.
- Click Allocate new address in the Elastic IPs page.
- Then, click Allocate in the next page.
- Right-click the row of the newly created elastic IP, and click Associate address.
- Choose the EC2 instance you are integrating.
2. Create a DNS record for the domain you are integrating (GoDaddy in this example).
In this article I assume that you already have bought your domain.
- Go to the DNS Management page.
- Click Add in the Records section.
- Choose A for Type.
- Enter @ for Host.
- Enter the elastic IP you just created for Points to.
- Click Save.
- Wait for changes to reflect (This takes at least 600 seconds to reflect, depending on the TTL you specified).
3. Connect to the EC2 instance you are integrating.
3.1. Update Operating System
sudo apt update && sudo apt upgrade -y
3.2. Install Nginx
sudo apt install nginx
Verify that Nginx is running
sudo systemctl status nginx
Output:
nginx.service - A high performance web server and a reverse proxy server
Loaded: loaded (/lib/systemd/system/nginx.service; enabled; vendor preset: enabled)
Active: active (running)
Docs: man:nginx(8)
Process: 30128 ExecStartPre=/usr/sbin/nginx -t -q -g daemon on; master_process on; (code=exited, status=0/SUCCESS)
Process: 30129 ExecStart=/usr/sbin/nginx -g daemon on; master_process on; (code=exited, status=0/SUCCESS)
Main PID: 30218 (nginx)
Tasks: 2 (limit: 2196)
Memory: 10.1M
CPU: 77ms
CGroup: /system.slice/nginx.service
├─30218 "nginx: master process /usr/sbin/nginx -g daemon on; master_process on;"
└─30221 "nginx: worker process"
3.3. Install Certbot
sudo apt install certbot python3-certbot-nginx
Verify that Certbot is installed by running the following command:
certbot --version
Output:
certbot 1.21.0
3.4. Configure Nginx Server
Navigate to /etc/nginx/sites-available directory and run the following command to create a configuration file for your installation:
sudo nano /etc/nginx/sites-available/your-domain.com.conf
Add the following lines to the file:
server {
listen 80;
server_name your-domain.com www.your-domain.com;
location / {
proxy_pass http://your-elastic-ip; # Replace with your elastic IP
include proxy_params;
}
location ~ /.well-known/acme-challenge {
allow all;
root /var/www/html;
}
error_log /var/log/nginx/your-domain.com.error;
access_log /var/log/nginx/your-domain.com.access;
}
Remember to replace your-domain.com with the domain name of your server.
Save and exit the configuration file.
Enable the new configuration file:
sudo ln -s /etc/nginx/sites-available/your-domain.com.conf /etc/nginx/sites-enabled/your-domain.com.conf
Check Nginx syntax:
sudo nginx -t
Output:
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful
Restart Nginx:
sudo systemctl restart nginx
3.5. Obtain SSL Certificate
Run the following command to obtain SSL certificate:
sudo certbot --nginx
You will be prompted to enter your email address and agree to the terms of service. Then, you will be asked if you want to redirect HTTP traffic to HTTPS. Choose your option and press Enter.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Enter email address (used for urgent renewal and security notices)
(Enter 'c' to cancel): admin@your-domain.com
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Please read the Terms of Service at
https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf. You must
agree in order to register with the ACME server. Do you agree?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
(Y)es/(N)o: Y
Then you will be asked if you want to share your email address with the Electronic Frontier Foundation. Choose your option and press Enter.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Would you be willing, once your first certificate is successfully issued, to
share your email address with the Electronic Frontier Foundation, a founding
partner of the Let's Encrypt project and the non-profit organization that
develops Certbot? We'd like to send you email about our work encrypting the web,
EFF news, campaigns, and ways to support digital freedom.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
(Y)es/(N)o: N
Next, you will be asked to select the domain on which you want to install the Let’s Encrypt SSL:
Which names would you like to activate HTTPS for?
Account registered.
Which names would you like to activate HTTPS for?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
1: your-domain.com
2: www.your-domain.com
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Select the appropriate numbers separated by commas and/or spaces, or leave input
blank to select all options shown (Enter 'c' to cancel):
Enter the number corresponding to your domain name and press Enter.
If the SSL certificate is successfully obtained, certbot displays a message to show the configuration was successful:
IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/your-domain.com.com/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/your-domain.com/privkey.pem
Your cert will expire on 2024-08-12. To obtain a new or tweaked
version of this certificate in the future, simply run certbot
again. To non-interactively renew *all* of your certificates, run
"certbot renew"
- Your account credentials have been saved in your Certbot
configuration directory at /etc/letsencrypt. You should make a
secure backup of this folder now. This configuration directory will
also contain certificates and private keys obtained by Certbot so
making regular backups of this folder is ideal.
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
You can now open your website using https://, and you’ll notice a green lock icon.
3.6. Verifying Certbot Auto-Renewal
The Certbot logs are the best place to start when verifying auto-renewal. The logs will contain information about any renewal attempts and any errors that may have occurred. You can access the Certbot logs by running the following command:
sudo cat /var/log/letsencrypt/letsencrypt.log'
You can test the renewal process by manually running the Certbot renewal command. To do this, run the following command:
sudo certbot renew --dry-run
This will simulate a renewal attempt and will provide you with information about the outcome. If the renewal was successful, you should see a message indicating that the certificates were successfully renewed.
Check the Certificate Expiration Date.
Finally, you can check the expiration date of your certificate to ensure that it has been renewed. You can do this by visiting your website and checking the certificate information in your browser’s security settings.
If you encounter any issues with the auto-renewal process, it is recommended that you reach out to the Let’s Encrypt community or consult the Certbot documentation for assistance.
Revoking Let’s Encrypt certificates
To revoke a Let’s Encrypt SSL certificate, you can use the certbot revoke command.
First, stop your Nginx web server:
sudo systemctl stop nginx
Run the certbot revoke command, specifying the certificate you want to revoke:
sudo certbot revoke --cert-path /etc/letsencrypt/live/your-domain.com/fullchain.pem
You’ll need to replace /etc/letsencrypt/live/your-domain.com/fullchain.pem with the actual path to your certificate file.
Start your web server again:
systemctl start nginx
After revoking the certificate, the certificate will no longer be trusted by browsers and will no longer work for encrypting your website traffic.
This is useful if, for example, you need to transfer the domain to another owner or if you suspect that your private key has been compromised.
Top comments (0)