How to secure console proxy use nginx reverse Self-Signed SSL Certificate ? #9013
-
I have succesfully install CloudStack 4.18.1.0 I need to secure console proxy use nginx reverse Self-Signed SSL Certificate, anyone here can help me ? |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments
-
Did you configure the SSL setting in the Webgui? What does your nginx file looks like (just curious). |
Beta Was this translation helpful? Give feedback.
-
Here's what you can do: Let's assume you've a single public IP (usually your WAN), then you can setup port forwarding such as: WAN port 80 (or 443) -> ACS mgmt server IP port 8080 Then you can create domain/DNS records such as: A record for example.com -> WAN IP ACS global settings can be tuned as: (restarting mgmt server required) You can write nginx reverse proxy for the management server API/UI service on port 8080. Here's example of how you can secure console proxy's port 8080 (here 192.168.1.20 is the CPVM public IP):
You may adapt/test this as necessary. Refer: |
Beta Was this translation helpful? Give feedback.
-
Closing as answered, pl re-open if you've further issues. Usually nginx-reverse proxy setup is outside of CloudStack and this is highly environment-specific. Some people using haproxy with letsencrypt too. |
Beta Was this translation helpful? Give feedback.
Here's what you can do:
Let's assume you've a single public IP (usually your WAN), then you can setup port forwarding such as:
WAN port 80 (or 443) -> ACS mgmt server IP port 8080
WAN port 8080 -> CPVM public IP port 8080
Then you can create domain/DNS records such as:
A record for example.com -> WAN IP
A record for console.example.com -> WAN IP
ACS global settings can be tuned as: (restarting mgmt server required)
consoleproxy.sslEnabled -> true
consoleproxy.url.domain -> console.example.com
You can write nginx reverse proxy for the management server API/UI service on port 8080.
Here's example of how you can secure console proxy's port 8080 (here 192.168.1.20 is the CPVM public IP):