Hosted Services

Route1 Healthchecks - Monitor Cron Jobs. Get Notified When Your Cron Jobs Fail
Cron Monitoring. Monitor nightly backups, weekly reports, cron jobs and background tasks. Receive alerts when your tasks don’t run on time.
Healthchecks - Simple and Effective Cron Job Monitoring
Jitsi Meet
Join a WebRTC video conference powered by the Jitsi Videobridge
Jitsi Meet - Instant Free Videoconferencing
Route1 NXC
The truth is out there. Anybody got the URL?
Nextcloud - the most deployed on-premises file share and collaboration platform

ACME DNS

A simplified DNS server with a RESTful HTTP API to provide a simple way to automate ACME DNS challenges. Have letsencrypt certificates issues from behind firewalls without the need for exposing services to the public internet.

Register an account:

user@client:~$ curl -X POST https://acme.route1.ph:8443/register 

Sample output (json):

{"username":"8fg7d929-5cdf-4a5e-8dc3-b19ba7044900","password":"NrW2BBsqEsh_mhj8lEno4HtJOOUELBZrrR8t7At4",
"fulldomain":"40686836-e17f-4bce-810d-c8c1657c8fe9.acme.route1.ph",
"subdomain":"40686896-e17f-4bce-810d-c8c1657c8fe9","allowfrom":[]}%

Take note of the username, password and subdomain! Each domain that you will be authenticating will need an _acme-challenge CNAME record added pointing at ${SUBDOMAIN}.acme.route1.ph.

_acme-challenge.mydomain.tld -> 40686896-e17f-4bce-810d-c8c1657c8fe9.acme.route1.ph
_acme-challenge.www.mydomain.tld -> 40686896-e17f-4bce-810d-c8c1657c8fe9.acme.route1.ph

Replace the target domain with the approriate subdomain that was provided during registration. You're all set! Here's a quick sample on how to use the acme.sh client to issue a certificate for mydomain.tld and www.mydomain.tld.

export ACMEDNS_UPDATE_URL="https://acme.route1.ph:8443/update"
export ACMEDNS_USERNAME="8fg7d929-5cdf-4a5e-8dc3-b19ba7044900"
export ACMEDNS_PASSWORD="NrW2BBsqEsh_mhj8lEno4HtJOOUELBZrrR8t7At4"
export ACMEDNS_SUBDOMAIN="40686896-e17f-4bce-810d-c8c1657c8fe9"

acme.sh --issue --dns dns_acmedns -d www.mydomain.tld -d mydomain.tld

The certificate can be found under .acme.h/${FQDN}.

root@server:~# find .acme.sh/www.mydomain.tld/
.acme.sh/www.mydomain.tld/
.acme.sh/www.mydomain.tld/www.mydomain.tld.conf
.acme.sh/www.mydomain.tld/www.mydomain.tld.key
.acme.sh/www.mydomain.tld/ca.cer
.acme.sh/www.mydomain.tld/www.mydomain.tld.csr
.acme.sh/www.mydomain.tld/www.mydomain.tld.cer
.acme.sh/www.mydomain.tld/www.mydomain.tld.csr.conf
.acme.sh/www.mydomain.tld/fullchain.cer

Also make sure to  have a look at pre-, post- and renew-hook parameters and deployment hooks to further automate the deployment of certificates.