diff --git a/faqs/certificates.rst b/faqs/certificates.rst new file mode 100644 index 0000000..bb9dfde --- /dev/null +++ b/faqs/certificates.rst @@ -0,0 +1,22 @@ +.. index:: Resetting TLS/SSL Certificates + +Resetting TLS/SSL Certificates +------------------------------ + +**Q: How can I reset TLS/SSL Certificates?** + +The Analysis Cockpit ships with a self-signed certificate for its web interface +that expires after 182 days. If you do not use your own CA +infrastructure and want to renew the certificate or want to revert +from a broken state, you can recreate a self-signed certificate. +To do so log in using SSH and execute: + +.. code-block:: console + + nextron@asgard:~$ sudo openssl req -new -newkey rsa:4096 -days 182 -nodes -x509 -subj "/O=Nextron Systems GmbH/CN=$(hostname --fqdn)" -keyout /etc/asgard-analysis-cockpit/http.key -out /etc/asgard-analysis-cockpit/http.pem + +You need to restart the Analysis Cockpit in order for the changes to take effect. + +.. code-block:: console + + nextron@asgard:~$ sudo systemctl restart asgard-analysis-cockpit.service diff --git a/faqs/index.rst b/faqs/index.rst index 8cd3ea2..d35a342 100644 --- a/faqs/index.rst +++ b/faqs/index.rst @@ -21,3 +21,4 @@ right after. iexplorer admin-pass 2fa + certificates diff --git a/images/esxi_new_vm_guest_os.png b/images/esxi_new_vm_guest_os.png index 46c11ec..eb1ee91 100644 Binary files a/images/esxi_new_vm_guest_os.png and b/images/esxi_new_vm_guest_os.png differ diff --git a/setup/esxi.rst b/setup/esxi.rst index d7d4962..810a5b9 100644 --- a/setup/esxi.rst +++ b/setup/esxi.rst @@ -7,7 +7,7 @@ Create a new VM with your virtualization software. In this case, we will use VMWare ESX managed through a VMWare VCenter. The new VM must be configured with a Linux base system and Debian -GNU/Linux 10 (64 bits) as target version. It is recommended to upload +GNU/Linux 12 (64 bits) as target version. It is recommended to upload the Nextron Universal Installer ISO to an accessible datastore and mount the same to your newly created VM.