Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: shafer.ca
I ran this command:grep '^pref_challs.tls-sni-01’ /etc/letsencrypt/renewal/
It produced this output:no oputput
My web server is (include version):Server version: Apache/2.4.18 (Ubuntu)
The operating system my web server runs on is (include version):Ubuntu 16.04.5 LTS
My hosting provider, if applicable, is: AWS Lightsail
I can login to a root shell on my machine (yes or no, or I don’t know):yes
I’m using a control panel to manage my site (no, or provide the name and version of the control panel):no
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you’re using Certbot):certbot 0.26.1
Sorry, one more quick question. I have 5 different domains on my server using virtual hosts. I have created certificates for each domain (each certificate includes the domain and the www.domain).
Is this the best way to do this, or should you include all domains on one certificate?
Personally, I prefer the same. Most of my customers use my own wildcard certificate *.server-daten.de. Some customers have their own domain, now with a Letsencrypt certificate. But I don't add this name to my own certificate, instead I create a new certificate with both names (www + non-www).
So it's easier to renew certificates, because the domains are separated.
But big organisations like Cloudflare often have 70 - 100 domain names from different domains in one certificate.