{"id":37661,"date":"2024-03-14T10:12:20","date_gmt":"2024-03-14T09:12:20","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/troubleshooting\/"},"modified":"2024-12-04T05:39:17","modified_gmt":"2024-12-04T04:39:17","slug":"troubleshooting","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/ja\/knowledgebase\/requirements-and-installation\/configuration-of-the-virtual-appliance\/troubleshooting\/","title":{"rendered":"\u30c8\u30e9\u30d6\u30eb\u30b7\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0"},"content":{"rendered":"\n<p>1.\u30b9\u30c6\u30c3\u30d7 5 &#8211; \u30e9\u30a4\u30bb\u30f3\u30b9\u5951\u7d04\u300d\u3067\u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u3092\u69cb\u6210\u3059\u308b\u969b\u306b\u3001\u96fb\u5b50\u30e1\u30fc\u30eb\u3092\u53d7\u4fe1\u3057\u307e\u305b\u3093\u3067\u3057\u305f\uff1a  <\/p>\n\n<p>\u30b9\u30c6\u30c3\u30d73\u300c\u30b5\u30fc\u30d0\u30fc\u8a2d\u5b9a\u300d\u306e\u96fb\u5b50\u30e1\u30fc\u30eb\u8a2d\u5b9a\u304c\u6b63\u3057\u3044\u3053\u3068\u3092\u78ba\u8a8d\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u518d\u9001\u4fe1\u3059\u308b\u306b\u306f\u3001[\u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u8a2d\u5b9a]\u3092\u518d\u5ea6\u5b9f\u884c\u3059\u308b\u524d\u306b\u3001\u30b9\u30c6\u30c3 \u30d75 &#8211; \u30e9\u30a4\u30bb\u30f3\u30b9\u5951\u7d04\u306e[\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u30ea\u30bb\u30c3\u30c8\u3057\u3001\u542b\u307e\u308c\u308b\u3059\u3079\u3066\u306e\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u30e9\u30a4\u30bb\u30f3 \u30b9\u306b\u30a2\u30ab\u30a6\u30f3\u30c8\u4f5c\u6210\u30e1\u30fc\u30eb\u3092\u9001\u4fe1\u3059\u308b]\u3092\u30c1\u30a7\u30c3\u30af\u3057\u3066\u304f\u3060\u3055\u3044\u3002 <\/p>\n\n<p>2.\u30b9\u30c6\u30c3\u30d75\u300c\u30e9\u30a4\u30bb\u30f3\u30b9\u5951\u7d04\u300d\u306e\u8a2d\u5b9a\u4e2d\u306b\u3001Let&#8217;s Encrypt\u306b\u95a2\u3057\u3066\u30a8\u30e9\u30fc\u304c\u767a\u751f\u3057\u307e\u3057\u305f\uff1a  <\/p>\n\n<p>\u30a2\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u304c\u30dd\u30fc\u30c880\u306e\u30c9\u30e1\u30a4\u30f3\u540d\u3067\u5230\u9054\u53ef\u80fd\u3067\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3059\u308b\u3002Let&#8217;s encrypt\u306f\u300c\/var\/log\/letsencrypt\u300d\u306b\u30ed\u30b0\u3082\u66f8\u304d\u8fbc\u3080\u306e\u3067\u3001\u3055\u3089\u306a\u308b\u30c8\u30e9\u30d6\u30eb\u30b7\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306b\u5f79\u7acb\u3064\u304b\u3082\u3057\u308c\u306a\u3044\u3002 <\/p>\n","protected":false},"parent":37678,"menu_order":0,"template":"","class_list":["post-37661","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/ja\/wp-json\/wp\/v2\/knowledgebase\/37661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/ja\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/ja\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":2,"href":"https:\/\/kb.apptec360.com\/manual\/ja\/wp-json\/wp\/v2\/knowledgebase\/37661\/revisions"}],"predecessor-version":[{"id":38568,"href":"https:\/\/kb.apptec360.com\/manual\/ja\/wp-json\/wp\/v2\/knowledgebase\/37661\/revisions\/38568"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/ja\/wp-json\/wp\/v2\/knowledgebase\/37678"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/ja\/wp-json\/wp\/v2\/media?parent=37661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}