Configure SSL certificate by ACM on single instance tomcat on AWS - amazon-web-services

I have created a single instance web application on AWS with Elastic Beanstalk. Now I want to add ssl certificate to enable https access on it.
I created a ssl certificate using ACM and I was folowing this! link to add it to my web app in Elastic Beanstalk.
But I could not find and anywhere in acm.
How can i find them??

You can only use ACM with CloudFront or Elastic Load Balancers. Since you don't have an Elastic Load Balancer in a single instance Elastic Beanstalk environment, you can't use ACM, unless you want to put CloudFront in front of it.

Related

AWS ACM SSL on Single Instance beanstalk with Cloudfront

I am trying to add an SSL certificate through ACM with CloudFront on Elastic beanstalk. But I get redirected to beanstalk URL. I do not have an ELB for Beanstalk. It's a single instance environment. How can I fix the redirect issue?
Thanks

Multiple SSL Certificates on Elastic Beanstalk ALB

Is it possible to link more than 1 SSL certificate to an Elastic Beanstalk ALB?
I understand that one can create a bundle domain certificate in Certificate Manager, but I would ultimately want to give my clients the ability to add their own domain pointers pointing to the EB environment.
Yes, you can do this. Probably not from EB console, but you can deploy multiple SSL certs on ALB as explained in:
Application Load Balancers Now Support Multiple TLS Certificates With Smart Selection Using SNI
You would have to go to EC2 console -> Load balancers, and work with the ALB there. Obviously you could do the same things using AWS CLI or SDK if you want to automate things.

how to enable (https) SSL certificate AWS EC2 hosted site

So far i did below configuration.
I hosted my site on EC2 AWS machine. Public ip and public DNS.
I can access my website by ip as well as public DNS.
I purchased domain name from GoDaddy. www.xxtrasc.com
On AWS I created Hosted Zone then map www.app.xxtrasc.com successfully.
Now i access my website directly www.app.xxtrasc.com
Next want to enable https
On AWS Certificate Manager order certificate with domain name *.xxtrasc.com
Did everything to add CNAME and all. I can see status gree colored Issued on ACM.
Now how i can attached this certificate to my web site so that i can access https://www.app.xxtrasc.com
You cannot use ACM to directly install your ACM Certificate on your AWS based website or application
https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-install.html
You must use one of the following services:
Elastic Load Balancing
Amazon CloudFront
AWS Elastic Beanstalk
Amazon API Gateway
AWS CloudFormation
Please read the official doc : https://docs.aws.amazon.com/acm/latest/userguide/acm-services.html
So to install the certificate directly under apache2/nginx configuration you need to obtain the certificate from other third parties like Lets Encrypt, GoDaddy etc. you can read about that here - https://in.godaddy.com/help/manually-install-an-ssl-certificate-on-my-apache-server-centos-5238
On AWS I recommend using an ELB an placing your EC2 instances behind this ELB. This will allow you to select your ACM certificate from ELB itslef. Please read following doc to use classic load balancer with HTTPS https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/ssl-server-cert.html
If you want to enable SSL on your site, you need to purchase SSL certificate. You can purchase it with Godaddy and then setup it on AWS server. Without SSL certificate, your https site won't work.

Https on Elastic Beanstalk Without Load Balancer

I would like to decrease my AWS bill and deactivate load balancing on some of my elastic beanstalk applications.
I managed to setup https through AWS Certificate Manager with the free Amazon issued certificates.
When I remove the load balancing, I don't have the option to setup the SSL certificate. Any ways to add it somewhere else, like from the EC2 instant linked to EBS?
Thanks for your help,
You can't use ACM certificates without either a load balancer or a CloudFront distribution. If you don't have either of those, you will need to obtain an SSL certificate through some other means, and install it on your web server software running on the EC2 instance.

AWS Certificate Manager Certificate is not visible to AWS Beanstalk from Console

I am new to AWS and need help to select the AWS Certificate Manager provisioned Certificate from Elastic Beanstalk Loadbalancer using AWS Console.
Deployed my Java application on Linux instance using Elastic
Beanstalk and that worked fine with Http.
Provisioned a new wildcard certificate using AWS Certificate Manager.
Under Elastic Beanstalk Configuration - Network Tier - Load Balancing Settings gear Icon, I changed "Secure listener port" = 443 and "Protocol" =
HTTPS.
But the "SSL Certificate ID" does not list the certificate to pick.
Please suggest what is that I am missing here.
I have read many suggestions to do by CLI but I am not an CLI expert and wanted to use the console feature for simplicity.
EDIT-1:
I can see the certificate under EC2 - Load Balancer - Listener TAB if I try to add HTTPS, but not under Beanstalk. I am not sure if I shall add this listener under EC2 or not, but I think I need to add SSL to Beanstalk as My application get deployed using Beanstalk into EC2.
This will happen if you created your SSL Certificate on a different Region to your Elastic Beanstalk instance. An easy gotcha!
To setup a SSL certificate for your Elastic Beanstalk environment, please see Configuring Your Elastic Beanstalk Environment's Load Balancer to Terminate HTTPS
There is a console setup step as you describe in step 3, so that looks good. Also note you need to update the EB configuration as shown in the above document.
From AWS documentation:
For Classic Load Balancer and Application Load Balancer, if the
drop-down menu doesn't show any certificates, you should create or
upload a certificate for your custom domain name in AWS Certificate
Manager (ACM) (preferred). Alternatively, upload a certificate to IAM
with the AWS CLI.
I guess AWS CLI with IAM must be used as described here