
Make sure you allow TCP/22 from your current location for the SSH connection, as well as TCP/443 from the location you wish to use to access from. If you would like to restrict traffic to your instance on AWS, you may now restrict the security groups.Note: Second (or more) domain is optional. letsencrypt-auto certonly -standalone -email -d -d (This will open a web server listening on port 80 to validate the server). If any processes are returned, kill them.Ĭhange to Let’s Encrypt repository location Confirm no applications are listening to port 80:.This will copy the letsencypt repository to /opt/letsencrypt (If it is available via a package manager, you may use that). Clone the letsencrypt repository from github.Ssh -i You may replace with domain name if your DNS has resolved.
#ROCKETCHAT HOSTING FREE#
Get an SSL certificate from Let’s Encrypt We will use letsencrypt to get a free & open-source SSL certificate

Allocate an Elastic IP In AWS Services, go to EC2 and Elastic IPs Choose an existing key pair or create a new one and Launch InstanceĢ.After this, you may remove that security group and restrict access to a specific IP range. Note: If you will be using letsencrypt in Step 4 to get an SSL certificate, you will need to allow traffic to the server on port 80 until your certificate is created. Create a new Security group if you would like to restrict traffic to a certain IP address range.Add a Value to the Name Key and click Next.Adjust the size, or add a second encrypted volume if needed and click Next.Leave as defaults or change if needed and click Next.

Launch an EC2 instance In AWS Services, go to EC2, Instances, and Launch Instance Get an SSL Certificate from Let’s Encryptġ.Securing your server with a free SSL certificate from Let’s Encrypt.Hosting a domain name with Amazon Route 53.Hosting rocket.chat on an Amazon EC2 instance.Deploying Rocket.Chat on Amazon Web Services
