Tags | kubernetes |
Hard Prerequisites | |
IMPORTANT: Please review these prerequisites, they include important information that will help you with this content. | |
|
|
Soft Prerequisites |
|
To be able to get a TLS certificate for HTTPS we will install certbot and run in certonly mode where it will generate the certificates. Take note of the paths it spits out where it stores the certificate, it should something like:
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/<your-domain>/fullchain.pem
Key is saved at: /etc/letsencrypt/live/<your-domain>/privkey.pem
# updates the package manager
sudo apt update
# installs the certbot
sudo apt install certbot -y
# initiates interactive certbot process
# choose `1: Spin up a temporary webserver (standalone)`
# enter the domain given to you by Umuzi and your email address
sudo certbot certonly
# generates the DH key to be used by NGINX
# this might take a while
sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048
What just happened?
Certbot facilitates the acquisition of SSL/TLS certificates by creating a temporary web server on the user’s system. When initiated, Certbot responds to challenges from the Let’s Encrypt Certificate Authority to verify domain ownership. The process involves the exchange of specific tokens, demonstrating control over the specified domains. Once validated, Let’s Encrypt issues the certificates, and Certbot can automatically configure popular web servers for HTTPS. Certbot’s automation extends to periodic certificate renewal, ensuring ongoing security. In essence, Certbot streamlines the complex process of obtaining and managing SSL/TLS certificates by automating the required tasks, making it user-friendly for implementing secure connections on websites.