Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
It produced this output:
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/welooop.com/fullchain.pem
Key is saved at: /etc/letsencrypt/live/welooop.com/privkey.pem
This certificate expires on 2023-07-05.
My web server is (include version): Oracle Apex in OCI
The operating system my web server runs on is (include version): N/A
My hosting provider, if applicable, is: Oracle Cloud Infrastructure (OCI)
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): No
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): certbot 2.5.0
Yesterday I renewed my certificate with the cmd above and it succeeded.
I created a new OCI load balancer with the new/renewed certificate but I got "The certificate chain in the configuration details of the certificate is invalid." my old load balancer and original certificate were deleted and can't be recovered (sorry).
I received 4 files:
cert1.pem
chain1.pem
fullchain1.pem
privkey1.pem
and I used 3 of them to upload:
cert1.pem
chain1.pem
privkey1.pem
But after it failed, I tried basically all different combination, but none worked.
I googled, some mentioned that it needs to include ROOT certificate, my renewed certificate didn't include ROOT certificate?
How do I verify the certificate is valid? or How do I make it work?
You should use the symlinks in the /live/ folder.
Not the files in the /archive/ folder.
Because when cert1.pem is renewed, it will become cert2.pem and you will have to manually reenter it.
Whereas the symlink will always point to the latest file.
Also, I think you may be able to use just fullchain and privkey [instead of cert, chain, and privkey].
the symlinks in live folder points to archive, I used root to issue the certbot command, I copied the 4 files in archive folder to /home/ubuntu and chown to ubuntu, so I could winscp as ubuntu to download the files.
In OCI, there are 3 fields and all are mandatory, so I have to use cert , chain , and privatekey, any other ways?
Sorry, it didn't work, I removed the second/last block in chain.pem, still the same error:
The certificate chain in the configuration details of the certificate is invalid.
Once thing I need to mention:
2.5 months ago, I issued:
-d welooop.com,*.welooop.com
to get the certificate, and it actually worked on my site.
As mentioned in the previous thread: Not Secure after certificate was issued - #10 by Osiris
I was told I don't need the wild card, so just let it expire. Yesterday I just issue the command with:
-d welooop.com
Does this make any difference?