Using the connector
This page describes how to use the connector to automate the certificate lifecycle on LoadMaster load balancers.
To view all available options, run |
Make sure that the command |
Enroll a certificate
You can enroll certificates individually or in batches—for all certificate profiles available in the profile path. Each certificate profile file provides enrollment information for one certificate.
You need to accept the EULA agreement when you use the connector for the first time. |
Verify SSL enablement
To verify that the certificate has been installed to the virtual server, navigate to
. The Certificate Installed column displays the certificate attached to the respective virtual IP address.To view the provisioned certificate(s) in the LoadMaster’s SSL management area, navigate to
.Renew a certificate
You can renew certificates individually or in batches—for all certificate profiles available in the profile path. Each certificate profile file provides renewal information for one certificate.
The |
Renew certificates for all profiles.
python3 main.py -a renew
Renew certificates for individual profiles.
python3 main.py -a renew -p <cert_profile_1.yaml> [,<cert_profile_2.yaml>]
Enable auto-renewal
You can create a cronjob that will invoke the script on a schedule (see crontab for cron schedule expressions) to check the certificate expiry status and renew it if expired:
-
Run
crontab -e
on the terminal. -
Add a cronjob that will trigger the script.
The following example will trigger
main.py
every week. -
Save the changes and exit.
Replace a certificate
You can replace certificates individually or in batches—for all certificate profiles available in the profile path. Each certificate profile file provides replacement information for one certificate.
Revoke a certificate
Certificate revocation is done manually in SCM. If a certificate is revoked in SCM, then during the next connector execution, the Sectigo CA server issues a new certificate, unless the certificate profile file has been removed.
List certificates
You can retrieve a list of provisioned certificates from LoadMaster.
Retrieve certificates for all Kemp profiles.
python3 main.py -a list
Retrieve certificates for individual Kemp profiles.
python3 main.py -a list -p <kemp_profile_1.yaml> [,<kemp_profile_2.yaml>]
[
{
"profile_name":"cert_profile_ecdsa1",
"exist":"True",
"csr_domain":"10112022_demoecdsa11.ccmqa.com",
"not_valid_before":"2022-10-11 15:32:17",
"not_valid_after":"2023-10-11 15:32:17",
"ocsp_status":"GOOD",
"ssl_cert_subject_alt_names":"san1.ccmqa.com,san2.ccmqa.com"
},
...
]
View the logs
The log files are stored in the location indicated in the log_path
parameter of the config.yaml
file.
By default, all events are recorded.
2023-01-31 15:44:55,444 - __main__ - INFO - --------------------------------------------------
2023-01-31 15:44:55,447 - config.models.CertificateProfile - INFO - Loading certificate profile : cert_profile_1.yaml
2023-01-31 15:44:55,450 - utils.yaml_encrypt - INFO - Encrypted property doesn't exist in the file. File: kemp_profile_1.yaml is not encrypted
2023-01-31 15:44:55,451 - utils.yaml_encrypt - INFO - Encrypted property doesn't exist in the file. File: scm.yaml is not encrypted
...
2023-01-31 15:44:58,528 - root - DEBUG - response code: 200, {"certId":"eyJpZCI6Mzg4NzgsInR5cGUiOiJTU0wifQ=="}
2023-01-31 15:44:58,529 - root - DEBUG - enrollment succeed