I was deploying my Spring Boot app using AWS EC2 and S3 by running a jar file on a virtual machine. However, I'm facing a security issue when trying to fetch this url from the browser, which listens to port 8443: https://ec2-3-20-235-15.us-east-2.compute.amazonaws.com:8443/
However, I'm getting , which say NET::ERR_CERT_COMMON_NAME_INVALID. I've been trying to look into how to get SSL certificates for my EC2 instance, but have not found a way yet. I would really appreciate any help on how to properly set this up. I'm completely new to AWS...
Thank you.
Your ssl certificate has a custom domain name, but you are trying to access your ec2 using the default ec2 URI which use amazonaws.com domain, so you need to create a cname record in your custom domain to point ec2 URI.
Related
I had already running website. Due to some issue I have to terminate the environment in AWS. After terminating, I did rebuilt via elastic beans and created new environment. My website came back on. But I want this to again forward to my actual domain with godaddy. I used the existing acm certificate in new load balancer for https listener. But Still website getting opened on aws URL, but not with my godaddy domain.
Can you please let me know if I need to change add this certificate anywhere else as well?
Found the issue. I was doing all correct steps, Needed change the aws new link in godaddy domain.
Also needed to give fully qualified name of my domain in AWS ACM, for https to work.
I have an EC2, hosting a simple http server.
I want to make use of the HTTPS so to have my traffic hidden, but I made the mistake of buying a domain via AWS and to generate a certificate for it via AWS.
Mistake because it seems I cannot simply import that certificate in my EC2 (maybe because, if AWS gave me that cert as file, I could use it in any number of application of mine).
So, what I have to do in order to use it?
Move my web application to an elastic load balancer? Use a cointainer to host it?
What is the less expensive?
I have created a subdomain demo.mysite.com which is hosted over godaddy.com. I have successfully mapped the subdomain demo.mysite.com to my AWS elastic IP in the go daddy console
On my AWS EC2 instance my website is secured runing over HTTPS and I have deployed the certificates corresponding to demo.mysite.com on my AWS EC2 instance. Now the problem I am facing is
1 - When I access my subdomain it points to my EC2 instance and the URL in my web browser changes to my Elastic IP ie www.demo.mysite.com --->> https://201.12.34.58:8443/myApp , which must not happen and it must remain as https://demo.mysite.com
2 - And since my URL changes so I start getting the certificate error saying
The certificate is only valid for demo.mysite.com.
Error code: SSL_ERROR_BAD_CERT_DOMAIN
Can someone help in solving these two issues, I feel that if first issues gets solved the second issue will automatically get solved. I am not sure though
Guys I need your help
I suggest to manage your domain DNS with CloudFlare. Add a CNAME record for your subdomain demo which points to that IP. On CloudFlare Console go to Crypto > Origin Certificates. Create a new one with RSA, then import it to AWS Certificate Manager at us-east-1. For the certificate chain use this. Be sure that Always use HTTPS in Crypto tab is on. After some minutes you should be using your domain pointing to AWS with HTTPS working fine.
That's what I did to make a subdomain to work with an AWS API endpoint with SSL.
I am trying to generate a certificate for an ec2 instance so that Jenkins that run over HTTPS.
So far, I have tried:
http://tteckie.blogspot.ca/2013/02/how-to-install-jenkins-with-ssl-on.html
However, this does not yield the correct outcome. After executing the instructions, and amending the 127.0.0.1 *.mydomain.com to the domain name of the instance.
When I got to https://myinstance.com the page shows a:
NOT SECURE: Your connection is not private
When I go to http://mystance.com the url redirects to the https url.
Am I missing something related to generating the certificate? Should I generate one with AWS Certificate Manager, and add that one to my ec2 instance?
I have also tried, generating a certificate in AWS, and adding this to my domain, this did not work as AWS Certificate Manager does not work with ec2 instances. I have also tried let's encrypt, however the etc/letsencrypt/live/ directory was not created as expected in the steps.
I went on to trying CertBot (https://certbot.eff.org/lets-encrypt/ubuntutrusty-apache), but am having some issues with Apache services and starting the service due to errors: https://askubuntu.com/questions/1034295/issues-with-running-apache-certbot-due-to-port-already-used-for-httpd-bin
Has anyone successfully been able to run their ec2 server hosting Jenkins over HTTPS? I would like to know how any of the issues above were overcome to successfully implement the SSL.
I'm running a EC2 instance with Amazon Linux. My public URL is like :
my-url-prefix.us-west-2.compute.amazonaws.com
. I need SSL for a specific reason. My question is this:
Is there any way to add SSL for the domain "my-url-prefix.us-west-2.compute.amazonaws.com"? What is the process of doing so?
Like OpenShift.com, is there any way of getting a HTTPS for the ec2 instance? Like https://the-maevjay.rhcloud.com/
No.
Amazon owns the amazonaws.com domain. So you cannot obtain an SSL certificate for that URL. Doing so would defeat the purpose of the certificate authority.
As Matt Houser answered, you can't obtain an SSL certificate for the amazonaws.com domain. You need to obtain a domain and get the certificate for that.
Per the official docs:
"If you plan to use your EC2 instance to host a public web site, you need to register a domain name for your web server or transfer an existing domain name to your Amazon EC2 host."
If you have a domain, the process isn't exactly straightforward but is well documented. Assuming you are using Apache Web Server, you can follow the instructions from here:
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/SSL-on-an-instance.html