Add SSL Certificate for Cloudbreak UI
By default Cloudbreak has been configured with a self-signed certificate for access via HTTPS. This is sufficient for many deployments such as trials, development, testing, or staging. However, for production deployments, a trusted certificate is preferred and can be configured in the controller. Follow these steps to configure the cloud controller to use your own trusted certificate.
Prerequisites
To use your own certificate, you must have:
- A resolvable fully qualified domain name (FQDN) for the controller host IP address. For example, this can be set up in Amazon Route 53.
- A valid SSL certificate for this fully qualified domain name. The certificate can be obtained from a number of certificate providers.
Steps
-
SSH to the Cloudbreak host instance:
ssh -i mykeypair.pem cloudbreak@[CONTROLLER-IP-ADDRESS]
-
Make sure that the target fully qualified domain name (FQDN) which you plan to use for Cloudbreak is resolvable:
nslookup [TARGET-CONTROLLER-FQDN]
For example:
nslookup hdcloud.example.com
-
Browse to the Cloudbreak deployment directory and edit the
Profile
file:vi /var/lib/cloudbreak-deployment/Profile
-
Replace the value of the
PUBLIC_IP
variable with theTARGET-CONTROLLER-FQDN
value:PUBLIC_IP=[TARGET-CONTROLLER-FQDN]
-
Copy your private key and certificate files for the FQDN onto the Cloudbreak host. These files must be placed under
/var/lib/cloudbreak-deployment/certs/traefik/
directory.File permissions for the private key and certificate files can be set to 600.
File Example PRIV-KEY-LOCATION /var/lib/cloudbreak-deployment/certs/traefik/hdcloud.example.com.key CERT-LOCATION /var/lib/cloudbreak-deployment/certs/traefik/hdcloud.example.com.crt -
Configure TLS details in your
Profile
by adding the following line at the end of the file.Notice that
CERT-LOCATION
andPRIV-KEY-LOCATION
are file locations from Step 5, starting at the/certs/...
path.export CBD_TRAEFIK_TLS=”[CERT-LOCATION],[PRIV-KEY-LOCATION]”
For example:
export CBD_TRAEFIK_TLS="/certs/traefik/hdcloud.example.com.crt,/certs/traefik/hdcloud.example.com.key"
-
Restart Cloudbreak deployer:
cbd restart
-
Using your web browser, access the Cloudbreak UI using the new resolvable fully qualified domain name.
-
Confirm that the connection is SSL-protected and that the certificate used is the certificate that you provided to Cloudbreak.