diff --git a/docs/akamai/quick-start/install/cli.mdx b/docs/akamai/quick-start/install/cli.mdx index e8bc8b5f..7c9485c0 100644 --- a/docs/akamai/quick-start/install/cli.mdx +++ b/docs/akamai/quick-start/install/cli.mdx @@ -38,29 +38,30 @@ export const TabLabel = ({ imgSrc, label, alt }) => ( }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` + - diff --git a/docs/aws/quick-start/install/cli.mdx b/docs/aws/quick-start/install/cli.mdx index 0849615d..154007af 100644 --- a/docs/aws/quick-start/install/cli.mdx +++ b/docs/aws/quick-start/install/cli.mdx @@ -37,51 +37,55 @@ export const TabLabel = ({ imgSrc, label, alt }) => ( }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` + - - }> + + }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` + - - + + diff --git a/docs/azure/quick-start/install/cli.mdx b/docs/azure/quick-start/install/cli.mdx index 04199624..d598abf0 100644 --- a/docs/azure/quick-start/install/cli.mdx +++ b/docs/azure/quick-start/install/cli.mdx @@ -27,48 +27,50 @@ import GitLabHandoffScreen from "../../../img/azure/gitlab/handoff-screen.png"; }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` diff --git a/docs/civo/quick-start/install/cli.mdx b/docs/civo/quick-start/install/cli.mdx index 69abd538..baff5cc0 100644 --- a/docs/civo/quick-start/install/cli.mdx +++ b/docs/civo/quick-start/install/cli.mdx @@ -45,18 +45,18 @@ We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certifi To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` @@ -64,29 +64,31 @@ brew install nss }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` + - - + + diff --git a/docs/do/quick-start/install/cli.mdx b/docs/do/quick-start/install/cli.mdx index a7ab5e35..0e4fc198 100644 --- a/docs/do/quick-start/install/cli.mdx +++ b/docs/do/quick-start/install/cli.mdx @@ -39,24 +39,25 @@ export const TabLabel = ({ imgSrc, label, alt }) => ( }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` @@ -64,24 +65,25 @@ brew install nss }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` diff --git a/docs/gcp/quick-start/install/cli.mdx b/docs/gcp/quick-start/install/cli.mdx index 565ca6bf..f66c47ea 100644 --- a/docs/gcp/quick-start/install/cli.mdx +++ b/docs/gcp/quick-start/install/cli.mdx @@ -38,53 +38,55 @@ export const TabLabel = ({ imgSrc, label, alt }) => ( }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` - - + + diff --git a/docs/k3s/quick-start/install/cli.mdx b/docs/k3s/quick-start/install/cli.mdx index e81bcd41..34e985f5 100644 --- a/docs/k3s/quick-start/install/cli.mdx +++ b/docs/k3s/quick-start/install/cli.mdx @@ -37,6 +37,7 @@ export const TabLabel = ({ imgSrc, label, alt }) => ( }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. @@ -52,14 +53,15 @@ This is not an optional step: the cluster creation will fail if you don't instal If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. @@ -78,6 +80,7 @@ If you are using Firefox, you have one more step: you need to install the [Netwo ```shell brew install nss ``` + diff --git a/docs/vultr/quick-start/install/cli.mdx b/docs/vultr/quick-start/install/cli.mdx index a3dee00a..f2c3abe5 100644 --- a/docs/vultr/quick-start/install/cli.mdx +++ b/docs/vultr/quick-start/install/cli.mdx @@ -38,53 +38,55 @@ export const TabLabel = ({ imgSrc, label, alt }) => ( }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` }> + ### Install the CA (Certificate Authority) of mkcert in your trusted store We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources. To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps: -```shell -brew install mkcert -mkcert -install -``` + ```shell + brew install mkcert + mkcert -install + ``` This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store. If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS): -```shell -brew install nss -``` + ```shell + brew install nss + ``` - - + +