I have around 100+ websites running on my server. For eg:
abc.staging-smart.com.au
xyz.staging-smart.com.au
.
.
. and so on.
I want to issue wildcard certificate to the sites with auto-renewal in place.
Currently server is being already using Apache as Authenticator for cert renewal of some individual sites.
Can I use to issue wildcard certificate and auto-renewal?
No. The Apache authenticator uses HTTP-01 validation, and a wildcard cert requires that you use DNS validation. If you have a DNS host with a compatible API, you can still issue and automatically renew the cert, but it won't be done using the Apache authenticator.
Thanks for clarifying.
As per your above comment, I won't be able to use Apache Authenticator.
I did some research for plugin native to aws, and I found that I can use certbot-dns-route53 plugin for DNS Validation.
So, now my question is - Is it ok, if I use certbot-dns-route53 plugin for wildcard certs?
considering the apache-authenticator plugin would still be there on server to serve existing sites.
Hope installing certbot-dns-route53 plugin won't impact the current confiugration.
Please confirm.
Thank you Bruce.
I am referred same document, but now while performing the testing it is giving me error:
Failed to renew certificate staging-smart.com.au-0001 with error: urn:ietf:params:acme:error:rateLimited :: There were too many requests of a given type :: Service busy; retry later.
Failed to renew certificate staging-smart.com.au-0002 with error: urn:ietf:params:acme:error:rateLimited :: There were too many requests of a given type :: Service busy; retry later.
Failed to renew certificate staging-smart.com.au with error: <Response [503]>
Usually, anything "-000x" is an indication of some misunderstanding between the users' requested intention and certbot action taken.
Can we see?: certbot certificates
Your ancient apt-installed Certbot version isn't very good in checking existing certificates and expanding a previously issued cert. It easily makes duplicates as shown already. Please see the Certbot instructions above by Rudy to upgrade your apt-installed Certbot to the most recent one using snap. See the "wildcard" tab after selecting your webserver and browser for the guide which includes installing the DNS plugin.
Then you could continu getting a wildcard certificate using the certbot-dns-route53 authenticator plugin. Note that you can combine an authenticator plugin with an installer plugin. E.g., you could run sudo certbot -a dns-route53 -i apache (and after that the rest of your command) to combine both plugins at the same time.
By not editing the configuration files manually. Please see the Managing Certificates section of the Certbot documentation.
When upgrading to the latest Certbot version using snap, everything should be exactly the same as before, including the redundant certificates.
If you wish to get a wildcard certificate, my advice is to get one, preferably by overwriging an existing certificate, make sure all your webservers (and/or any other service using the certificates) are using that wildcard certificate and afterwards remove the certs that are not in used.
Please read the posts more carefully. Using apt is NOT how you update Certbot to the latest version using snap. Snap is a different method of installing applications and does not use apt (except maybe for snap itself? I dunno, I don't use snap.)