내용으로 건너뛰기

Why am I not able to add a custom SSL for my Domain? I tried with 2 separate services. Details in description.

0

I am facing this problem in relation 2 two services.

  1. When I was trying to add a Amplify managed SSL Certificate for my Custom Domain in AWS Amplify, the SSL Verification goes on & on and then eventually times out saying that it could not verify the Domain even when the said domain is in AWS Route 53
  2. When I was trying to do the same thing as above, but through a lambda application via AWS SAM Template/CloudFormation. The Certification Manager is taking a lot of time.
2개 답변
0
수락된 답변

Hello.

Has a CNAME record for verifying the SSL certificate been created in the hosted zone?
If so, can you resolve the name using the "dig" command or similar?
https://docs.aws.amazon.com/amplify/latest/userguide/using-certificates.html

By the way, can you use the hosted zone hosted on Route53 normally?
Please check that NS records etc. can be resolved normally.

전문가
답변함 8달 전
AWS
전문가
검토됨 8달 전
  • Has a CNAME record for verifying the SSL certificate been created in the hosted zone? Yes, Got created automatically can you resolve the name using the "dig" command or similar? 2 A Records coming, no CNAME Records coming can you use the hosted zone hosted on Route53 normally? My Domain is hosted on Route 53

  • Finally Checked the NS Records !! According to the docs, The NS Records of the domain must be modified to match the ones from the Hosted Zone. This fixed it.

0

There are several reasons why you might be experiencing difficulties adding a custom SSL certificate for your domain, both through AWS Amplify and AWS Certificate Manager (ACM) via Lambda/SAM:

  1. DNS Propagation Delay: DNS changes can take up to 24-48 hours to propagate globally. This means it might take some time for the internet to recognize your new DNS records pointing to the ACM certificate.

  2. Incorrect DNS Configuration: Double-check that your DNS records (CNAME and A records) are correctly set up in Route 53. Ensure that the NS (Name Server) records in your domain registrar match the ones in the Route 53 hosted zone. Any mismatch can cause SSL configuration to fail.

  3. Region Mismatch: Make sure the ACM certificate you're creating is in the correct AWS region. For services like CloudFront, certificates must be in the us-east-1 (N. Virginia) region.

  4. Permissions Issues: Verify that you have the necessary IAM permissions to create records in your Route 53 hosted zone and to manage ACM certificates.

  5. Conflicting Records: Look for any conflicting DNS records (e.g., duplicate CNAMEs or A records) that might interfere with the SSL configuration.

  6. CAA Records: Ensure there are no Certification Authority Authorization (CAA) records blocking certificate issuance for your domain.

To resolve these issues:

  1. Wait for DNS propagation to complete before retrying.
  2. Manually validate the domain by adding the required CNAME record to your DNS settings in Route 53.
  3. If using Amplify, try removing and re-adding the domain after ensuring DNS propagation is complete.
  4. For ACM via Lambda/SAM, make sure your Lambda function has the necessary permissions and is configured correctly.
  5. Use tools like dig or nslookup to verify your DNS configuration.

If problems persist after trying these steps, you may need to contact AWS Support for further assistance.

Sources
Amplify fails on SSL Configuration | AWS re:Post
Unable to request a Certificate in AWS | AWS re:Post

답변함 8달 전
  • My Domain is hosted in AWS Route 53 directly. I will wait for 24 hrs then

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

관련 콘텐츠