Replies: 9 comments 2 replies
-
any plans for this @asender ? |
Beta Was this translation helpful? Give feedback.
-
@davidjumani @weizhouapache can you advice how this would impact novnc? it seems not relevant to the type of console but i am not sure. |
Beta Was this translation helpful? Give feedback.
-
@DaanHoogland it provides a default certificate (like old realhostip.com) to systemvms. It is an enhancement . ajax/novnc console will not be impacted. |
Beta Was this translation helpful? Give feedback.
-
This is btw possible by using nginx proxy which is used for SSL termination. I've detailed how to do this here - https://markmail.org/message/ukueqxzrrv7g3nte |
Beta Was this translation helpful? Give feedback.
-
@rohityadavcloud this will not work for systemvms deployed to public network, which is advanced setup and 99% of use cases, why whould I spend $ for another IP for additional reverse proxy? honestly dont know why its not possible to deploy systemvms to "private" public network and use reverse proxy... afaik its not possible to create another public network assigned only for systemvm from lets say cloudbr2 bridge... |
Beta Was this translation helpful? Give feedback.
-
The email thread I've shared in fact saves you an IP address - typically how you can deploy a private ACS cloud behind a single public IP; you can deploy parts of the pod IP range in a private RFC1918 range (not public IP) and have the mgmt server and console proxy (maybe ssvm too) be LB'd by something like nginx in my example to do SSL termination. |
Beta Was this translation helpful? Give feedback.
-
But Systemvms will have always ( in advanced mode ) IPs assigned from the Public network and private IPs from the Management network, its not possible to change this behavior. One can only assign a dedicated range for Systemvms from Public and Management network, but thats all.. I dont understand from Your email, in mentioned email list how to do it exactly. Note: Thanks |
Beta Was this translation helpful? Give feedback.
-
My email/suggestion was to use RFC1918 networks for both public and management networks, of course this won't work for your use-case. You can use the traditional approach to setup/upload certificates (until something like this feature is fully automated). |
Beta Was this translation helpful? Give feedback.
-
Dear @asender, I’d like to apologise for having a different view on the certificate strategy for the Console Proxy (and System VMs in general). Since System VMs are ephemeral, they would request new certificates every time they are redeployed. This could quickly hit Let’s Encrypt rate limits (https://letsencrypt.org/docs/rate-limits/). A better approach is to use a dedicated instance (or even a container) to request certificates, for example a wildcard via DNS challenge, about 30 days before expiry. The instance can then push the certs to CloudStack for use by the System VMs. If you’re interested, I can also share how we set this up with HashiCorp Vault to securely store certificates and allow consumers to fetch only the ones they’re permitted to use. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
ISSUE TYPE
COMPONENT NAME
CLOUDSTACK VERSION
4.11.1+
CONFIGURATION
LetsEncrypt the Console Proxy
Many new applications are now integrating letsencrypt. This could replace the old retired realhostip.com DNS resolver . Noone would need to muck around with certs again on the console proxy.
SUMMARY
New Global Option For Letsencrypt enable on console proxy. Letsencrypt domain name option for letsencrypt ssl auto renew
Beta Was this translation helpful? Give feedback.
All reactions