I have a domain I use for purely internal SSL certificates. The certificates are created automatically with DNS Auth (as they are not routable) with Letsencrypt ACME. Thet are then combined via a deploy hook to wem format (previously worked with Lighttpd.
I have set the domain in pihole to match the domain of the certificate. I did notice a couple of new web.* files appeared when I updated the domain name of the instance.
[edit]
Also found this - What about enabling HTTPS in Pi-hole v6? - #2 by Bucking_Horn. The link to section 5 of the announcement "with options to provide your own certificates or use auto-generated ones." The docs link 'appears' to still refer to the older interface, though I could be wrong. Doesn't really explain the 'autogenerated ones' bit
You can tell pihole the location of your certificates in settings -> click on 'basic' and it will toggle to 'expert'. Then go to All settings select the Webserver and API tab and scroll down to webserver.tls.cert
I've changed the domain name in the settings several times and the tls files don't seem to be updated. Is there a way to force regeneration of the locally generated certificates?
I have LetsEncrypt certificates for a domain. How do I get PiHole setup so I can access it, with HTTPS, via that domain name locally (IP address is associated with domain name) without a browser error.
I did exactly this - combined certificates (except I did not save as tls.pem) and added the domain the certificate was issued for. It didn't allow me to access Pi-hole via SSL and the domain name.
@robgill@rdwebdesign - is it expected behaviour that Edge thinks part of the 'site' are not secure even with a LetsEncrypt certificate in place on the server?
Are you trying to access it using pi.hole (as in your image above)? It would be expected to throw an error in that case (or via the ip) if you are using a certificate for another domain. It should not report it as insecure if you are accessing it via the domain name of the certificate.