Hello, how are you all doing?
Id like to seek some advice on how to deal with self signed certificates. here is the layout of my current environment:
on a simple and humble lenovo thinkcenter, im hosting a baremetal proxmox 9. i have a bunch of apps (technitium, stirlingpdf, convertx, gitlab, actual budget...)
all of these apps are in a debian LXC with each its own docker.
there is a global nginx proxy manager, and with the assistance of small step ca: each has an https endpoint.
it works well. however: i don have auto renewal. everything is running in an internal network, nothing is exposed. i can reach everything through tailscale; DNS and reverse proxy are joined to it; and with them, i can access everything without having to join every container to tailscale
so because of that, i cannot enjoy LetsEncrypt ease of use and its auto renewal
i came across this:
but to be honest, it requires more knowledge than i currently have... it appears to be well explained, but i get lost reading it
its the whole certificate matter that is just a bi confusing to me to be honest. for instance, another solution that would be okay for me, would be to have a wildcard one; *.lab. but even that i couldnt get it to work (browser was complaining the certificate didnt match). i get lost in between root, CA, "leaf", intermediate authority, secret, key...
but my goal, (is always the same: learn, improve my environment, "reach perfection" would be to have some kind of automatic process, to dispatch renewed certificates to my reverse proxy. smallstep-ca to nginx proxy manager
but of course i am all ears if there is a better approach to this.
thank you very much!