# Setting Up HTTPS for naval.lan with Traefik (Kubernetes) This guide explains how to set up HTTPS for your local domain `naval.lan` using Traefik in Kubernetes without certificate warnings on Windows and Linux clients. ## Overview To avoid self-signed certificate warnings, you need to: 1. Create your own Certificate Authority (CA) 2. Generate SSL certificates signed by your CA 3. Configure Traefik to use these certificates 4. Install the CA certificate on all client machines ## Part 1: Create Your Own Certificate Authority ### 1.1. Generate CA Private Key and Certificate On your Linux server or workstation: ```bash # Create a directory for certificates mkdir -p ~/certs/naval-ca cd ~/certs/naval-ca # Generate CA private key (4096-bit RSA) openssl genrsa -out ca-key.pem 4096 # Generate CA certificate (valid for 10 years) openssl req -new -x509 -days 3650 -key ca-key.pem -out ca-cert.pem \ -subj "/C=US/ST=State/L=City/O=Naval Local CA/OU=IT/CN=Naval Local Root CA" ``` **Important**: Keep `ca-key.pem` secure! This is your root CA private key. ## Part 2: Generate SSL Certificate for naval.lan ### 2.1. Create OpenSSL Configuration File Create a file named `naval-lan.conf`: ```bash cat > naval-lan.conf <