Fully translated + good linking
This commit is contained in:
		@@ -69,7 +69,7 @@ You can now access the tool via `http://yourserverip:3200`.
 | 
			
		||||
::alert{type="info"}
 | 
			
		||||
📋 __Before you begin:__ 
 | 
			
		||||
<br/><br/>
 | 
			
		||||
We assume you have the subdomain `stats.mydomain.com` with a `CNAME` pointing to `mydomain.com` in your [DNS zone](/generalites/dns). And of course, [unless you're using Cloudflare Zero Trust](/serveex/securite/cloudflare), port `443` of your router should point to port `443` of your server via [NAT rules](/generalites/nat).
 | 
			
		||||
We assume you have the subdomain `stats.mydomain.com` with a `CNAME` pointing to `mydomain.com` in your [DNS zone](/general/dns). And of course, [unless you're using Cloudflare Zero Trust](/serveex/securite/cloudflare), port `443` of your router should point to port `443` of your server via [NAT rules](/general/nat).
 | 
			
		||||
::
 | 
			
		||||
 | 
			
		||||
::alert{type="warning"}
 | 
			
		||||
@@ -178,7 +178,7 @@ You can protect this app with Authentik by opening `stats.subdomain.conf` and un
 | 
			
		||||
`include /config/nginx/authentik-server.conf;`  
 | 
			
		||||
and  
 | 
			
		||||
`include /config/nginx/authentik-location.conf;`.  
 | 
			
		||||
Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protéger-une-app-par-reverse-proxy). If you want the public stats page to be accessible without authentication:
 | 
			
		||||
Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy). If you want the public stats page to be accessible without authentication:
 | 
			
		||||
 | 
			
		||||
- Edit the Uptime-Kuma provider
 | 
			
		||||
- In *Advanced Protocol Settings > Authenticated Paths*, enter:
 | 
			
		||||
 
 | 
			
		||||
@@ -81,7 +81,7 @@ You may want to access Dozzle remotely and on all your devices. To do so, we’l
 | 
			
		||||
::alert{type="info"}
 | 
			
		||||
📋 __Before you begin:__
 | 
			
		||||
<br/><br/>
 | 
			
		||||
We assume you have created a subdomain like `dozzle.mydomain.com` in your [DNS zone](/generalites/dns) with a `CNAME` pointing to `mydomain.com` and that, [unless you're using Cloudflare Zero Trust](/serveex/securite/cloudflare), you’ve redirected port `443` from your router to port `443` on your server in your [NAT rules](/generalites/nat).
 | 
			
		||||
We assume you have created a subdomain like `dozzle.mydomain.com` in your [DNS zone](/general/dns) with a `CNAME` pointing to `mydomain.com` and that, [unless you're using Cloudflare Zero Trust](/serveex/securite/cloudflare), you’ve redirected port `443` from your router to port `443` on your server in your [NAT rules](/general/nat).
 | 
			
		||||
::
 | 
			
		||||
 | 
			
		||||
Go to Dockge and edit the SWAG compose file to add Dozzle’s network:
 | 
			
		||||
@@ -177,5 +177,5 @@ Press `Esc`, then save and exit by typing `:x` and pressing `Enter`.
 | 
			
		||||
And there you go, Dozzle is now exposed!
 | 
			
		||||
 | 
			
		||||
::alert{type="success"}
 | 
			
		||||
✨ You can protect this app with Authentik by opening `dozzle.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and a provider in Authentik](/serveex/securite/authentik#protéger-une-app-par-reverse-proxy).
 | 
			
		||||
✨ You can protect this app with Authentik by opening `dozzle.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and a provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
			
		||||
::
 | 
			
		||||
@@ -91,7 +91,7 @@ Deploy the container and go to `http://yourserverip:3225`. Log in with the accou
 | 
			
		||||
---
 | 
			
		||||
::alert{type="info"}
 | 
			
		||||
📋 **Prerequisites:**  
 | 
			
		||||
We assume that you've already created a subdomain like `speedtest.yourdomain.com` in your [DNS zone](/generalites/dns) with a `CNAME` pointing to `yourdomain.com`, and [unless you’re using Cloudflare Zero Trust](/serveex/securite/cloudflare), you've also forwarded port `443` from your router to port `443` of your server in your [NAT rules](/generalites/nat).
 | 
			
		||||
We assume that you've already created a subdomain like `speedtest.yourdomain.com` in your [DNS zone](/general/dns) with a `CNAME` pointing to `yourdomain.com`, and [unless you’re using Cloudflare Zero Trust](/serveex/securite/cloudflare), you've also forwarded port `443` from your router to port `443` of your server in your [NAT rules](/general/nat).
 | 
			
		||||
::
 | 
			
		||||
 | 
			
		||||
Now we want to expose Speedtest Tracker to the internet so you can access it remotely. We assume you've set up the DNS `CNAME` for `speedtest.yourdomain.com` pointing to `yourdomain.com`.
 | 
			
		||||
@@ -192,5 +192,5 @@ Wait a moment, then visit `https://speedtest.yourdomain.com` in your browser —
 | 
			
		||||
::alert{type="success"}
 | 
			
		||||
✨ You can protect this app with Authentik by opening `speedtest.subdomain.conf` and uncommenting  
 | 
			
		||||
`include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`.  
 | 
			
		||||
Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protéger-une-app-par-reverse-proxy).
 | 
			
		||||
Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
			
		||||
::
 | 
			
		||||
@@ -157,7 +157,7 @@ If you want to access Beszel remotely from all your devices, expose it using Swa
 | 
			
		||||
::alert{type="info"}
 | 
			
		||||
📋 __Prerequisite:__
 | 
			
		||||
<br/><br/>
 | 
			
		||||
You must have created a DNS subdomain like `beszel.mydomain.com` with a `CNAME` pointing to `mydomain.com`, and—unless you're using Cloudflare Zero Trust—you must have forwarded port `443` on your router to your server’s `443` port via [NAT rules](/generalites/nat).
 | 
			
		||||
You must have created a DNS subdomain like `beszel.mydomain.com` with a `CNAME` pointing to `mydomain.com`, and—unless you're using Cloudflare Zero Trust—you must have forwarded port `443` on your router to your server’s `443` port via [NAT rules](/general/nat).
 | 
			
		||||
::
 | 
			
		||||
 | 
			
		||||
In Dockge, edit Swag's compose file and add Beszel’s network:
 | 
			
		||||
@@ -247,5 +247,5 @@ Press `Esc`, type `:x`, and hit `Enter` to save and exit.
 | 
			
		||||
That’s it—Beszel is now exposed!
 | 
			
		||||
 | 
			
		||||
::alert{type="success"}
 | 
			
		||||
✨ You can protect this app with Authentik by opening `beszel.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protéger-une-app-par-reverse-proxy).
 | 
			
		||||
✨ You can protect this app with Authentik by opening `beszel.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;` and `include /config/nginx/authentik-location.conf;`. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
			
		||||
::
 | 
			
		||||
 
 | 
			
		||||
@@ -94,7 +94,7 @@ You may want to access it remotely from all your devices. To do so, we'll expose
 | 
			
		||||
::alert{type="info"}
 | 
			
		||||
📋 __Beforehand:__
 | 
			
		||||
<br/><br/>
 | 
			
		||||
We assume you've created a subdomain in your [DNS zone](/generalites/dns), such as `upsnap.yourdomain.com` with a `CNAME` to `yourdomain.com`. Also, unless you're using Cloudflare Zero Trust, you should have already forwarded port `443` from your router to port `443` on your server in your [NAT rules](/generalites/nat).
 | 
			
		||||
We assume you've created a subdomain in your [DNS zone](/general/dns), such as `upsnap.yourdomain.com` with a `CNAME` to `yourdomain.com`. Also, unless you're using Cloudflare Zero Trust, you should have already forwarded port `443` from your router to port `443` on your server in your [NAT rules](/general/nat).
 | 
			
		||||
::
 | 
			
		||||
 | 
			
		||||
Go to Dockge, and edit the SWAG compose by adding the UpSnap network:
 | 
			
		||||
@@ -190,5 +190,5 @@ Press `Escape`, then save and exit by typing `:x` and pressing `Enter`.
 | 
			
		||||
And that’s it — you’ve exposed UpSnap!
 | 
			
		||||
 | 
			
		||||
::alert{type="success"}
 | 
			
		||||
✨ You can protect this app with Authentik by opening `upsnap.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protéger-une-app-par-reverse-proxy).
 | 
			
		||||
✨ You can protect this app with Authentik by opening `upsnap.subdomain.conf` and removing the `#` in front of `include /config/nginx/authentik-server.conf;`{lang=nginx} and `include /config/nginx/authentik-location.conf;`{lang=nginx}. Don’t forget to [create an application and provider in Authentik](/serveex/securite/authentik#protecting-an-app-via-reverse-proxy).
 | 
			
		||||
::
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user