diff --git a/internal/outpost/proxyv2/handlers.go b/internal/outpost/proxyv2/handlers.go index 8b6a21931..1508d3369 100644 --- a/internal/outpost/proxyv2/handlers.go +++ b/internal/outpost/proxyv2/handlers.go @@ -50,7 +50,7 @@ func (ps *ProxyServer) lookupApp(r *http.Request) (*application.Application, str // Try to find application by directly looking up host first (proxy, forward_auth_single) a, ok := ps.apps[host] if ok { - ps.log.WithField("host", host).WithField("app", a.ProxyConfig().Name).Debug("Found app based direct host match") + ps.log.WithField("host", host).WithField("app", a.ProxyConfig().Name).Trace("Found app based direct host match") return a, host } // For forward_auth_domain, we don't have a direct app to domain relationship diff --git a/website/docs/outposts/integrations/docker.md b/website/docs/outposts/integrations/docker.md index 2badbec2b..4fe87984e 100644 --- a/website/docs/outposts/integrations/docker.md +++ b/website/docs/outposts/integrations/docker.md @@ -72,3 +72,9 @@ You'll end up with three files: Modify/create a new Docker integration, and set your _Docker URL_ to `ssh://hostname`, and select the keypair you created above as _TLS Authentication Certificate/SSH Keypair_. The _Docker URL_ field include a user, if none is specified authentik connects with the user `authentik`. + +#### Advanced SSH config + +With the above configuration, authentik will create and manage an `~/.ssh/config` file. If you need advanced configuration, for example SSH Certificates, you can mount a custom SSH Config file. + +Mount the config file into `/authentik/.ssh/config`, and mount any other relevant files into a directory under `/opt`. Afterwards, create an integration using `ssh://hostname`, and don't select a keypair.