Skip to main contentIBM Cloud Patterns

Deploying certificates to VPC Load Balancers

Deploying certificates to VPC Load Balancers

The Certificate Manager service provides support for deploying certificates to multiple IBM Cloud services. This section reviews how to configure access from the VPC Load Balancer service to the Certificate Manager service and add an HTTPS listener to a VPC Load Balancer.

The example will use the certificate ordered in the service setup section. The terraform code from IaC compute will be used to create the vpc, application and load balancer instance.

The code to manage the creation of the example can be found in the GitHub repository in the directory 14-certificate-management/vpc-lbaas-certificate.

Configure VPC Load Balancer HTTPS listener

The VPC Load Balancer service can terminate and offload processing of incoming SSL/TLS connections. In order to do this, a front-end listener pool is defined using the HTTPS protocol and the CRN of the desired certificate in the Certificate Manager. Access to the certificate and the associated private key requires a service authorization between the VPC Load Balancer service and the Certificate Manager service.

These actions can be performed from the web UI, or the IBM Cloud CLI, but in keeping with the example code that is being extended, terraform code to provide the service authorization and listener pool creation is provided in the file. This file has a placeholder for the CRN of the certificate to be used by the front-end listener. Update the placeholder with these steps.

Change to the 14-certificate-management/order-certificate directory and obtain the CRN of the ordered certificate:

CERT_CRN=$(terraform output ordered-certificate-id)

Change to the 14-certificate-management/vpc-lbaas-certificate directory and update the placeholder in the file.

sed -i.bak "s|CERT-CRN|${CERT_CRN}|" && rm

After running this command, the file will look like:

data "ibm_resource_instance" "cm" {
name = "iac-certificate-manager"
service = "cloudcerts"
variable "certificate_crn" {
default = "crn:v1:bluemix:public:cloudcerts:us-south:a/06788ee4fd5a4d779f236bbe43f09b4b:d6cad342-cf54-49d3-b5f9-42e842e43c40:certificate:df56720b1dab1db089f73d0fd8d6ad20"

Use this command from the IaC Compute section to add the public key used for SSH connections to the folder for use during the environment creation.

echo "public_key = \"$(cat ~/.ssh/\"" >

Now use terraform to create the environment with compute, load balancer and the HTTPS enabled front-end listener.

terraform init
terraform plan
terraform apply

When the code completes, a message will appear with the hostname of the VPC Load Balancer:

Apply complete! Resources: 29 added, 0 changed, 0 destroyed.
entrypoint =
lb_ip_address = [

Update the DNS domain name entry in the certificate with a CNAME record that direct to the hostname of the VPC Load Balancer. Once the CNAME is in place, you can access the deployed example application.

"id": "675",
"title": "Kagemusha",

Clean up

To cleanup all the resources created by the script, run the following:

terraform destroy

This will not delete the Certificate Manager instance or the imported or ordered certificates. Only delete the certificate manager instance if you will not be completing the “Certificates for Kubernetes” example.