Documentation Index
Fetch the complete documentation index at: https://mintlify.com/dokploy/dokploy/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Dokploy provides comprehensive domain and SSL certificate management through Traefik integration. You can configure custom domains with automatic SSL certificates via Let’s Encrypt, or bring your own certificates.Domain Configuration
Adding a Domain
Domains can be attached to applications, compose services, and preview deployments.Domain Types
Dokploy supports three domain types:- Application
- Compose
- Preview
Domains for standalone applications deployed through Dokploy.
Advanced Path Configuration
Dokploy supports advanced routing with path manipulation:Internal Path
Internal Path
The
internalPath field defines the path prefix forwarded to your container.Example: External request to /api/users can be forwarded to /users internally:Strip Path
Strip Path
When
stripPath is enabled, the path prefix is removed before forwarding to the container.Without stripPath: /api/users → container receives /api/usersWith stripPath: /api/users → container receives /usersTraefik.me Domains
Dokploy can auto-generate domains using thetraefik.me wildcard DNS service. This is useful for quick testing without configuring DNS.
Traefik.me domains automatically resolve to your server’s IP address using a pattern like:
appname-hash-1-2-3-4.traefik.me where 1-2-3-4 represents your server IP.SSL Certificate Management
Certificate Types
Dokploy supports three SSL certificate configuration methods:Let's Encrypt
Automatic SSL certificates with auto-renewal via ACME protocol.Best for: Production domains with valid DNS
Custom Certificate
Use your own SSL certificates from any Certificate Authority.Best for: Enterprise setups, wildcard certificates
None
HTTP only, no SSL encryption.Best for: Development, internal services behind VPN
Let’s Encrypt Configuration
Automatic SSL certificates are issued and renewed by Let’s Encrypt through Traefik.Let’s Encrypt certificates are stored in
/etc/dokploy/traefik/dynamic/acme.json and are automatically renewed before expiration.Let’s Encrypt Configuration Details
Traefik uses the HTTP-01 challenge method:Custom Certificates
Upload and manage your own SSL certificates for complete control.Prepare certificate files
You need:
- Certificate file (PEM format)
- Private key file (PEM format)
- Optional: CA bundle/intermediate certificates
Upload certificate
Navigate to Settings → Certificates and click Add Certificate:
- Name: Descriptive name for the certificate
- Certificate Data: Paste full certificate chain
- Private Key: Paste private key
- Auto Renew: Enable if using automated renewal
Certificate Storage
Custom certificates are stored securely in the database and mounted to Traefik:- Path:
/etc/dokploy/traefik/certificates/<certificate-name>.crt - Key Path:
/etc/dokploy/traefik/certificates/<certificate-name>.key - Permissions:
600(owner read/write only)
Wildcard Certificates
Use custom certificates for wildcard domain coverage:Domain Validation
Dokploy includes domain validation to verify DNS configuration before deployment.Validation Process
Validation Process
The validation checks:
- DNS Resolution: Domain resolves to the correct IP
- Port Accessibility: Target port is reachable
- Certificate Validity: SSL certificate matches the domain (if HTTPS)
Multi-Server Domains
For multi-server deployments, domains can be configured per server:Each server maintains its own Let’s Encrypt certificates and Traefik configuration.
Troubleshooting
SSL Certificate Not Issued
SSL Certificate Not Issued
Symptoms: Domain shows insecure or certificate errorsSolutions:
- Verify DNS points to correct server IP
- Check port 80 is accessible for HTTP-01 challenge
- Review Traefik logs:
docker logs dokploy-traefik - Verify
/etc/dokploy/traefik/dynamic/acme.jsonpermissions are600
Domain Not Routing
Domain Not Routing
Symptoms: 404 or connection refused errorsSolutions:
- Verify container is running and healthy
- Check port mapping matches domain configuration
- Inspect Traefik dashboard for routing rules
- Ensure no conflicting domain configurations
Certificate Renewal Failed
Certificate Renewal Failed
Symptoms: Expired certificate warningsSolutions:
- Check Traefik logs for renewal errors
- Verify server has outbound internet access
- Ensure DNS still points to correct IP
- Manual renewal: restart Traefik container
Best Practices
Use Let's Encrypt for Production
Automatic certificate management reduces operational overhead and ensures certificates stay current.
Wildcard Certs for Multiple Subdomains
If managing many subdomains, use a custom wildcard certificate to simplify configuration.
Test with Traefik.me First
Validate your application works with auto-generated domains before configuring custom DNS.
Enable stripPath for APIs
API gateways often expect paths without prefixes. Use
stripPath: true to remove routing prefixes.