hetzner-devops/incus-ui-final-setup.md

71 lines
1.9 KiB
Markdown

# Incus UI Final Setup - Certificate Fixed
## Status: ✅ COMPLETED
### ✅ Certificate Updated
- **New Certificate**: Generated for incus.nsntr.id
- **Valid Domains**: incus.nsntr.id, nsntr.id, localhost
- **Valid IPs**: 127.0.0.1, 148.251.14.221, ::1
### 🌐 Access Information
- **URL**: https://incus.nsntr.id
- **Backend**: 148.251.14.221:8443
- **Certificate**: Self-signed (need to add to browser)
### 🔧 Browser Setup Instructions
#### For Arc Browser (macOS):
1. **Download Certificate**:
```bash
# From your local machine, download the certificate
scp root@148.251.14.221:/var/lib/incus/server.crt incus-server.crt
```
2. **Install Certificate**:
- Open **Keychain Access** on macOS
- Go to **System** keychain
- Drag `incus-server.crt` to the keychain
- Double-click the certificate → **Trust****Always Trust**
3. **Access Incus UI**:
- Open https://incus.nsntr.id in Arc browser
- Should now work without certificate errors
#### For Chrome/Firefox:
1. **Download certificate** (same as above)
2. **Chrome**: Settings → Privacy and Security → Security → Manage Certificates → Import
3. **Firefox**: Settings → Privacy & Security → Certificates → View Certificates → Import
### 🔐 Authentication
- **Method**: TLS Client Certificate (if configured)
- **Alternative**: Direct access to Incus API
### 📡 Traefik Configuration
```yaml
tcp:
routers:
incus-tcp-router:
rule: "HostSNI(`incus.nsntr.id`)"
service: incus-tcp-service
entryPoints:
- websecure
tls:
passthrough: true
services:
incus-tcp-service:
loadBalancer:
servers:
- address: "148.251.14.221:8443"
```
### 🎯 Next Steps
1. Download and install certificate in browser
2. Access https://incus.nsntr.id
3. Should work without certificate warnings
---
**Date**: $(date)
**Status**: Ready for browser certificate installation
**Certificate**: Valid for incus.nsntr.id domain