-
Notifications
You must be signed in to change notification settings - Fork 0
GitHub Enterprise Server

- need 64GB of RAM in hyper-v
- try https://github.devopsabcs.com
- will take a very long time
- again
- then
- such as
- as
- such as orgs
- standard actions source code
- in the other organization
- to connect onprem to GEC
- disks
- on azure storage
- packages will be stored here:
- on windows
- register the runner
fatal: unable to access 'https://github.devopsabcs.com/devopsabcs-ges/first-on-prem-repo/': SSL certificate problem: self-signed certificate

- as
ssh -p 122 admin@github.devopsabcs.com
- should work
- can try https://docs.github.com/en/enterprise-server@3.17/admin/configuring-settings/hardening-security-for-your-enterprise/configuring-tls
- may need to fix firewall
- request tls cert
- like with Digicert
- pipes now green
- all later runs are green
- as seen in management console
https://docs.github.com/en/enterprise-server@3.17/packages/quickstart https://community.letsencrypt.org/t/hostname-ip-does-not-match-certificates-altnames/210780
To create a Let's Encrypt wildcard certificate, you’ll need to use the DNS-01 challenge method, which proves domain ownership by adding a specific DNS record. Here's a step-by-step guide tailored to your role as a Senior Cloud Solution Architect, incorporating both internal resources and best practices from the web:
From internal documentation like Creating wildcard certificates 1, the process typically involves:
-
Using Certbot with DNS Plugins:
- For AWS Route 53, the command might look like:
sudo certbot certonly \ --server https://acme-v02.api.letsencrypt.org/directory \ --dns-route53 \ -d "*.yourdomain.com" - This command requests a wildcard certificate for
*.yourdomain.comusing the DNS-01 challenge via Route 53.
- For AWS Route 53, the command might look like:
-
Certificate Storage:
- Certificates are stored under
/etc/letsencrypt/archive/yourdomain.com/. - You can copy them out using:
sudo cp -r /etc/letsencrypt/archive/yourdomain.com ./certs
- Certificates are stored under
-
Wildcard Scope:
- Wildcard certificates only cover one subdomain level (e.g.,
*.example.comcoversapp.example.combut notapi.dev.example.com).
- Wildcard certificates only cover one subdomain level (e.g.,
According to [DigitalOcean's tutorial](https://www.digitalocean.com/community/tutorials/how-to-create-let-s-encrypt-wildcard-certificates-with-certbot) [2](https://www.digitalocean.com/community/tutorials/how-to-create-let-s-encrypt-wildcard-certificates-with-certbot):
-
DNS Setup:
- Ensure a wildcard DNS record exists:
*.example.com. 3600 IN A 203.0.113.1
- Ensure a wildcard DNS record exists:
-
Install Certbot:
- On Ubuntu:
sudo snap install core; sudo snap refresh core sudo snap install --classic certbot sudo ln -s /snap/bin/certbot /usr/bin/certbot
- On Ubuntu:
-
Run Certbot with DNS Plugin:
- For manual DNS:
sudo certbot -d "*.example.com" --manual --preferred-challenges dns certonly
- For manual DNS:
In our case what works
sudo certbot certonly --manual --preferred-challenges dns --key-type rsa -d github.devopsabcs.com -d "*.github.devopsabcs.com"
- You’ll be prompted to add a TXT record to your DNS.

-
Automation:
- For production, automate renewals using DNS plugins or scripts (e.g.,
certbot-dns-route53,certbot-dns-cloudflare, orposh-ACMEfor PowerShell).
- For production, automate renewals using DNS plugins or scripts (e.g.,
the cert

SAN with wildcard
