Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is:limo.net
I ran this command:# certbot renew --dry-run --authenticator cpanel --certbot-dns-cpanel:cpanel-credentials /etc/letsencrypt/credentials.ini
The problem wasn't that you didn't have that script. The problem was the kind of command you used. Please review @griffin post again
Apart from that, you already have a wildcard cert that includes the names *.limo.net and limo.net. Why can't you use that certificate for connections to vpn.limo.net ?
That is one of the advantages of a wildcard cert in that you can use it for other subdomains.
They are on a different server. And the server is cpanel and yes it does have a wild card that could be used I was leaning towards just letting this server run it's own cert renewals, vs having to push them from to the other. The wildcard will cover all hosts but the uisp.limo.net is not hosted on a cpanel server so it will never have it's own. And the uisp.limo.net is docker container and wants to reach out on port 80 for the authentication. Which is the real problem I'm trying to solve.
Maybe I misunderstand but is sounds like you have 3 different systems. If these are all on the same local network it seems much easier to keep the system getting your wildcard cert and distribute that to the others.
Certbot has a --deploy-hook option which can run a script you create for that. Or, develop your own way to copy the fullchain and privkey files to those systems.
You will need to regularly reload those other servers so they pickup any new cert.
That seems much easier than setting up 3 different methods for getting a cert and making sure they all work reliably.