怎么样分配公网证书基于负载均衡-Keepalived-Haproxy
admin
2023-03-13 16:21:06
0

下文给大家带来怎么样分配公网证书基于负载均衡-Keepalived-Haproxy,希望能够给大家在实际运用中带来一定的帮助,负载均衡涉及的东西比较多,理论也不多,网上有很多书籍,今天我们就用在行业内累计的经验来做一个解答。

241-HaproxyKA01

242-HaproxyKA02

同样配置。

// 0. 删除文件

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

//删除旧证书:

ll certificates/

rm -f certificates/*.* //删除所有

ll certificates/

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

//删除证书

ll /etc/ssl/certs/

rm -f /etc/ssl/certs/exchange_certificate_and_key_nopassword.pem //删除此文件

ll /etc/ssl/certs/

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 1.下载 CA 证书(根证书)

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

root_i-x-Cloud.cer

上传到 /root/

ls *.cer -l

mv *.cer certificates/

cd certificates

ll

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

[root@241-HaproxyKA01 ~]# ll

total 1660

-rw-------. 1 root root 1030 Dec 13 2015 anaconda-ks.cfg

drwxr-xr-x 2 root root 6 Feb 24 17:18 certificates

drwxrwxr-x 9 root root 4096 Oct 6 2016 haproxy-1.5.4

-rw-r--r-- 1 root root 1336140 May 12 2016 haproxy-1.5.4.tar.gz

drwxr-xr-x 7 1000 1000 4096 Oct 7 2016 keepalived-1.2.13

-rw-r--r-- 1 root root 341956 May 13 2014 keepalived-1.2.13.tar.gz

-rw-r--r-- 1 root root 1174 Feb 24 16:02 root_i_x_Cloud.cer

[root@241-HaproxyKA01 ~]# mv *.cer certificates/

[root@241-HaproxyKA01 ~]# cd certificates/

[root@241-HaproxyKA01 certificates]# ll

total 4

-rw-r--r-- 1 root root 1174 Feb 24 16:02 root_i_x_Cloud.cer

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 2. 将cer转为pem (根证书)

openssl x509 -in root_i-x-Cloud.cer -inform der -outform pem -out root_i-x-Cloud.pem

ll

[root@241-HaproxyKA01 certificates]# openssl x509 -in root_i-x-Cloud.cer -inform der -outform pem -out root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]# ll

total 8

-rw-r--r-- 1 root root 1174 Feb 24 16:02 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1647 Feb 24 17:21 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 3. 重新生成hash

[root@241-HaproxyKA01 certificates]# c_rehash .

Doing .

root_i-x-Cloud.pem => 2e5ac55d.0

[root@241-HaproxyKA01 certificates]# ll

total 8

lrwxrwxrwx 1 root root 18 Mar 1 20:23 2e5ac55d.0 -> root_i-x-Cloud.pem

-rw-r--r-- 1 root root 846 Mar 1 12:48 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1200 Mar 1 20:19 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]# ll /etc/pki/tls/certs/

total 12

lrwxrwxrwx 1 root root 49 May 10 2016 ca-bundle.crt -> /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem

lrwxrwxrwx 1 root root 55 May 10 2016 ca-bundle.trust.crt -> /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt

-rwxr-xr-x 1 root root 610 May 9 2016 make-dummy-cert

-rw-r--r-- 1 root root 2388 May 9 2016 Makefile

-rwxr-xr-x 1 root root 829 May 9 2016 renew-dummy-cert

[root@241-HaproxyKA01 certificates]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 4. 导出证书(设置密码:Aa123456)//密码不能为1.

i-x-Cloud.com.pfx

上传证书:/root/certificates/

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

[root@241-HaproxyKA01 certificates]# ll

total 12

lrwxrwxrwx 1 root root 18 Mar 1 20:23 2e5ac55d.0 -> root_i-x-Cloud.pem

-rw-r--r-- 1 root root 3869 Feb 28 22:33 i-x-Cloud.com.pfx

-rw-r--r-- 1 root root 846 Mar 1 12:48 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1200 Mar 1 20:19 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 5. 将pfx转为pem

openssl pkcs12 -in i-x-Cloud.com.pfx -nocerts -out exchange_private_key_passwordprotected.pem

Aa123456

[root@241-HaproxyKA01 certificates]# ll

total 12

lrwxrwxrwx 1 root root 18 Mar 1 20:23 2e5ac55d.0 -> root_i-x-Cloud.pem

-rw-r--r-- 1 root root 3869 Feb 28 22:33 i-x-Cloud.com.pfx

-rw-r--r-- 1 root root 846 Mar 1 12:48 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1200 Mar 1 20:19 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]# openssl pkcs12 -in i-x-Cloud.com.pfx -nocerts -out exchange_private_key_passwordprotected.pem

Enter Import Password:

MAC verified OK

Enter PEM pass phrase:

Verifying - Enter PEM pass phrase:

[root@241-HaproxyKA01 certificates]# ll

total 16

lrwxrwxrwx 1 root root 18 Mar 1 20:23 2e5ac55d.0 -> root_i-x-Cloud.pem

-rw-r--r-- 1 root root 2088 Mar 1 20:34 exchange_private_key_passwordprotected.pem

-rw-r--r-- 1 root root 3913 Mar 1 20:33 i-x-Cloud.com.pfx

-rw-r--r-- 1 root root 846 Mar 1 12:48 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1200 Mar 1 20:19 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 6. 移出密码保护

openssl rsa -in exchange_private_key_passwordprotected.pem -out exchange_private_key_nopassword.pem

[root@241-HaproxyKA01 certificates]# openssl rsa -in exchange_private_key_passwordprotected.pem -out exchange_private_key_nopassword.pem

Enter pass phrase for exchange_private_key_passwordprotected.pem:

writing RSA key

[root@241-HaproxyKA01 certificates]# ll

total 20

lrwxrwxrwx 1 root root 18 Mar 1 20:23 2e5ac55d.0 -> root_i-x-Cloud.pem

-rw-r--r-- 1 root root 1679 Mar 1 20:36 exchange_private_key_nopassword.pem

-rw-r--r-- 1 root root 2088 Mar 1 20:34 exchange_private_key_passwordprotected.pem

-rw-r--r-- 1 root root 3913 Mar 1 20:33 i-x-Cloud.com.pfx

-rw-r--r-- 1 root root 846 Mar 1 12:48 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1200 Mar 1 20:19 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]#

// 7. 解压这个pfx文件,我们需要提供凭证。

openssl pkcs12 -in i-x-Cloud.com.pfx -clcerts -nokeys -out exchange_certificate.pem

ll

[root@241-HaproxyKA01 certificates]# openssl pkcs12 -in i-x-Cloud.com.pfx -clcerts -nokeys -out exchange_certificate.pem

Enter Import Password:

MAC verified OK

[root@241-HaproxyKA01 certificates]# ll

total 24

lrwxrwxrwx 1 root root 18 Mar 1 20:23 2e5ac55d.0 -> root_i-x-Cloud.pem

-rw-r--r-- 1 root root 3040 Mar 1 20:38 exchange_certificate.pem

-rw-r--r-- 1 root root 1679 Mar 1 20:36 exchange_private_key_nopassword.pem

-rw-r--r-- 1 root root 2088 Mar 1 20:34 exchange_private_key_passwordprotected.pem

-rw-r--r-- 1 root root 3913 Mar 1 20:33 i-x-Cloud.com.pfx

-rw-r--r-- 1 root root 846 Mar 1 12:48 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1200 Mar 1 20:19 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 8. 通过将exchange_certificate.pem和exchange_private_key_nopassword.pem产生exchange_certificate_and_key_nopassword.pem。

cat exchange_certificate.pem exchange_private_key_nopassword.pem > exchange_certificate_and_key_nopassword.pem

ll

[root@241-HaproxyKA01 certificates]# cat exchange_certificate.pem exchange_private_key_nopassword.pem > exchange_certificate_and_key_nopassword.pem

[root@241-HaproxyKA01 certificates]# ll

total 32

lrwxrwxrwx 1 root root 18 Mar 1 20:23 2e5ac55d.0 -> root_i-x-Cloud.pem

-rw-r--r-- 1 root root 4719 Mar 1 20:40 exchange_certificate_and_key_nopassword.pem

-rw-r--r-- 1 root root 3040 Mar 1 20:38 exchange_certificate.pem

-rw-r--r-- 1 root root 1679 Mar 1 20:36 exchange_private_key_nopassword.pem

-rw-r--r-- 1 root root 2088 Mar 1 20:34 exchange_private_key_passwordprotected.pem

-rw-r--r-- 1 root root 3913 Mar 1 20:33 i-x-Cloud.com.pfx

-rw-r--r-- 1 root root 846 Mar 1 12:48 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1200 Mar 1 20:19 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 9. 复制到文件夹中

ll /etc/ssl/certs/

rm -f /etc/ssl/certs/exchange_certificate_and_key_nopassword.pem

mv exchange_certificate_and_key_nopassword.pem /etc/ssl/certs/

ll /etc/ssl/certs/

ll

[root@241-HaproxyKA01 certificates]# ll /etc/ssl/certs/

total 12

lrwxrwxrwx 1 root root 49 May 10 2016 ca-bundle.crt -> /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem

lrwxrwxrwx 1 root root 55 May 10 2016 ca-bundle.trust.crt -> /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt

-rwxr-xr-x 1 root root 610 May 9 2016 make-dummy-cert

-rw-r--r-- 1 root root 2388 May 9 2016 Makefile

-rwxr-xr-x 1 root root 829 May 9 2016 renew-dummy-cert

[root@241-HaproxyKA01 certificates]# mv exchange_certificate_and_key_nopassword.pem /etc/ssl/certs/

[root@241-HaproxyKA01 certificates]# ll /etc/ssl/certs/

total 20

lrwxrwxrwx 1 root root 49 May 10 2016 ca-bundle.crt -> /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem

lrwxrwxrwx 1 root root 55 May 10 2016 ca-bundle.trust.crt -> /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt

-rw-r--r-- 1 root root 4719 Mar 1 20:40 exchange_certificate_and_key_nopassword.pem

-rwxr-xr-x 1 root root 610 May 9 2016 make-dummy-cert

-rw-r--r-- 1 root root 2388 May 9 2016 Makefile

-rwxr-xr-x 1 root root 829 May 9 2016 renew-dummy-cert

[root@241-HaproxyKA01 certificates]# ll

total 24

lrwxrwxrwx 1 root root 18 Mar 1 20:23 2e5ac55d.0 -> root_i-x-Cloud.pem

-rw-r--r-- 1 root root 3040 Mar 1 20:38 exchange_certificate.pem

-rw-r--r-- 1 root root 1679 Mar 1 20:36 exchange_private_key_nopassword.pem

-rw-r--r-- 1 root root 2088 Mar 1 20:34 exchange_private_key_passwordprotected.pem

-rw-r--r-- 1 root root 3913 Mar 1 20:33 i-x-Cloud.com.pfx

-rw-r--r-- 1 root root 846 Mar 1 12:48 root_i-x-Cloud.cer

-rw-r--r-- 1 root root 1200 Mar 1 20:19 root_i-x-Cloud.pem

[root@241-HaproxyKA01 certificates]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

// 10. 测试

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

[root@241-HaproxyKA01 ~]# ip a | grep "inet 10"

inet 10.1.1.241/24 brd 10.1.1.255 scope global eth0

inet 10.1.1.135/32 scope global eth0

inet 10.1.1.150/32 scope global eth0

inet 10.1.1.120/32 scope global eth0

[root@241-HaproxyKA01 ~]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

[root@242-HaproxyKA02 ~]# ip a | grep "inet 10"

inet 10.1.1.242/24 brd 10.1.1.255 scope global eth0

[root@242-HaproxyKA02 ~]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

[root@241-HaproxyKA01 ~]# ip a | grep "inet 10"

inet 10.1.1.241/24 brd 10.1.1.255 scope global eth0

[root@241-HaproxyKA01 ~]#

怎么样分配公网证书基于负载均衡-Keepalived-Haproxy

[root@242-HaproxyKA02 ~]# ip a | grep "inet 10"

inet 10.1.1.242/24 brd 10.1.1.255 scope global eth0

[root@242-HaproxyKA02 ~]# ip a | grep "inet 10"

inet 10.1.1.242/24 brd 10.1.1.255 scope global eth0

inet 10.1.1.135/32 scope global eth0

inet 10.1.1.150/32 scope global eth0

inet 10.1.1.120/32 scope global eth0

[root@242-HaproxyKA02 ~]#


看了以上关于怎么样分配公网证书基于负载均衡-Keepalived-Haproxy,如果大家还有什么地方需要了解的可以在行业资讯里查找自己感兴趣的或者找我们的专业技术工程师解答的,技术工程师在行业内拥有十几年的经验了。官网链接www.yisu.com

 

相关内容

热门资讯

媒体:精神病院成十大股东,不该... 近日,一则“精神病院现身A股公司前十大股东”的消息引发广泛关注。有投资者发现,盛通股份2026年一季...
原创 美... 最近有个消息,可能不少人都刷到了。工信部正式批了一个6G试验的频率使用许可,支持在部分地区先搞一搞6...
昆仑数智申请资源信息获取方法专... 国家知识产权局信息显示,昆仑数智科技有限责任公司、中国石油天然气集团有限公司申请一项名为“资源信息获...
小雨智造与中建科工智能科技达成... 来源:滚动播报 (来源:北京商报) 北京商报讯(记者 和岳)5月9日,北京商报记者获悉,在 “人工智...
2026年5月工作手机管控系统... 2026 年 5 月,企业对工作手机管控系统的需求,已从基础行为规范升级为全链路安全防护 + AI ...
蚂蚁百灵新万亿级大模型开放一周... IT之家 5 月 9 日消息,蚂蚁集团旗下百灵大模型今天发布万亿级旗舰思考模型 Ring-2.6-1...
星座战争的下半场,从链接卫星的... 西昌与文昌的发射架依旧繁忙,多批低轨试验卫星密集入轨,我国卫星互联网组网已正式步入“规模化应用”的快...
苹果赔偿17亿!但中国用户一分... 苹果永远在准备中,但迟迟不上线的“高智商Siri”终于被制裁了?! 事情大概是这样的。 苹果同意拿出...
拉普拉斯获得发明专利授权:“内... 证券之星消息,根据天眼查APP数据显示拉普拉斯(688726)新获得一项发明专利授权,专利名为“内炉...
盲人女孩称在盲道被电动车撞,实... 5月8日,在短视频平台拥有超百万粉丝的视障网友@抱抱盲兔发布视频称,其在北京一处盲道上行走时,被一辆...