In lab systems, it is often useful to generate an SSL certificate via a provider such as Let's Encrypt or ZeroSSL. Integrating these providers with NetWitness is made easier via the usage of acme.sh, an open source shell script which manages certificate issuance, renewal, and installation for a variety of ACME providers and verification methods.
curl https://get.acme.sh | sh -s email=webmaster.contact@example.com
source /root/.bashrc
0 0 * * * "/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
acme.sh --issue --nginx -d netwitness.example.com
export CF_Token="xxxxxxxxxxxxx"
export CF_Account_ID="xxxxxxxxxxxxx"
acme.sh --issue --dns dns_cf -d netwitness.example.com
export AWS_ACCESS_KEY_ID="xxxxxxxxxxxxx"
export AWS_SECRET_ACCESS_KEY="xxxxxxxxxxxxx"
acme.sh --issue --dns dns_aws -d netwitness.example.com
acme.sh --install-cert -d netwitness.example.com \
--key-file /etc/pki/nw/web/web-server-key.pem \
--fullchain-file /etc/pki/nw/web/web-server-cert.pem \
--reloadcmd "systemctl reload nginx"
curl https://get.acme.sh | sh -s email=webmaster.contact@example.com
source /root/.bashrc
0 0 * * * "/root/.acme.sh"/acme.sh --cron --home "/root/.acme.sh" > /dev/null
acme.sh --issue --standalone -d vlc.example.com
export CF_Token="xxxxxxxxxxxxx"
export CF_Account_ID="xxxxxxxxxxxxx"
acme.sh --issue --dns dns_cf -d vlc.example.com
export AWS_ACCESS_KEY_ID="xxxxxxxxxxxxx"
export AWS_SECRET_ACCESS_KEY="xxxxxxxxxxxxx"
acme.sh --issue --dns dns_aws -d vlc.example.com
mkdir -p /var/netwitness/logcollector/customcerts
acme.sh --install-cert -d vlc.example.com \
--key-file /var/netwitness/logcollector/customcerts/logcollector_key.pem \
--fullchain-file /var/netwitness/logcollector/customcerts/logcollector_cert.pem \
--reloadcmd "NwConsole -q -c tlogin server=127.0.0.1 port=56001 username=admin group=Administrators cert=/etc/pki/nw/node/node.pem -c send /logcollection/syslog restart"
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.