DNS & SSL Configuration
Configure DNS records and automatic TLS certificate management for ORISO Platform. TLS certificates are automatically managed by cert-manager with Let’s Encrypt.ORISO Platform v3.0.0 uses cert-manager for automatic TLS certificate management. No manual certificate installation is required.
Configure DNS Records
Point DNS records to your server IP for all required subdomains.Required DNS Records:In your DNS provider, create the following A records:
| Subdomain | Points To | Purpose |
|---|---|---|
api.oriso-dev.site | $SERVER_IP | Backend API |
app.oriso-dev.site | $SERVER_IP | Frontend application |
admin.oriso-dev.site | $SERVER_IP | Admin panel |
auth.oriso-dev.site | $SERVER_IP | Keycloak authentication |
matrix.oriso-dev.site | $SERVER_IP | Matrix Synapse |
element.oriso-dev.site | $SERVER_IP | Element.io client (optional) |
status.oriso.site | $SERVER_IP | Status page (optional) |
Replace
oriso-dev.site with your actual domain. DNS propagation may take a few minutes to hours.Verify DNS resolution:Both should return your server IP.
Verify Cert-Manager Setup
Ensure cert-manager and ClusterIssuer are configured.
- cert-manager pods should be
Running - ClusterIssuer should show
Ready=True
If ClusterIssuer is not configured, see Setup Kubernetes.
Deploy Ingress Resources
Deploy Ingress resources with TLS annotations. Certificates will be issued automatically.
When Ingress resources are created with
cert-manager.io/cluster-issuer: letsencrypt-prod annotation, cert-manager automatically:- Creates CertificateRequest
- Issues certificate via Let’s Encrypt HTTP-01 challenge
- Stores certificate in Kubernetes Secret
- Ingress uses certificate for TLS
After a few minutes, certificates should be issued:All certificates should show
Ready=True.TLS Certificate Management
Automatic Issuance
Cert-manager automatically issues certificates when:- Ingress resource is created with
cert-manager.io/cluster-issuerannotation - DNS records point to server IP
- HTTP-01 challenge can be completed (port 80 accessible)
Certificate Renewal
Certificates are automatically renewed by cert-manager before expiration:- Renewal: 30 days before expiration
- Automatic: No manual intervention required
- Monitoring: Check certificate status regularly
Certificate Status
Troubleshooting
DNS Not Resolving
Certificate Not Issued
Certificate Expired
HTTPS Not Working
DNS Configuration Examples
Cloudflare
- Add A records in Cloudflare DNS
- Set proxy status (orange cloud) if using Cloudflare proxy
- SSL/TLS mode: Full (strict) for HTTPS
Route53
- Create A records in Route53 hosted zone
- Point to server IP
- TTL: 300 seconds (5 minutes)
Other Providers
- Add A records pointing to server IP
- Wait for DNS propagation
- Verify with
digornslookup
Next Steps
- Post-Deployment - Verify complete deployment
- Verification Testing - Test HTTPS endpoints
- Security Hardening - Additional security measures