Accessing the system

Note

These instructions assume IncusOS deployed with the Incus application.

When using it with Operations Center or Migration Manager, use their respective command line client or web UI instead.

Getting the IP address

The first step in accessing an IncusOS system is by finding its IP address. This can be done by looking at the bottom of the screen on the running system.

IncusOS running screen

The documentation below uses 192.0.2.100 as the IP address of the IncusOS system.

From the command line

After the install completes, you will be shown a list of IP addresses in the network configuration footer. Pick one and add IncusOS as a remote Incus server:

$ incus remote add IncusOS 192.0.2.100
Certificate fingerprint: 80d569e9244a421f3a3d60d46631eb717f8a0a480f2f23ee729a4c1c016875f7
ok (y/n/[fingerprint])? y

$ incus remote list
+-----------------+------------------------------------+---------------+-------------+--------+--------+--------+
|      NAME       |                URL                 |   PROTOCOL    |  AUTH TYPE  | PUBLIC | STATIC | GLOBAL |
+-----------------+------------------------------------+---------------+-------------+--------+--------+--------+
| IncusOS         | https://10.234.136.23:8443         | incus         | tls         | NO     | NO     | NO     |
+-----------------+------------------------------------+---------------+-------------+--------+--------+--------+
| images          | https://images.linuxcontainers.org | simplestreams | none        | YES    | NO     | NO     |
+-----------------+------------------------------------+---------------+-------------+--------+--------+--------+
| local (current) | unix://                            | incus         | file access | NO     | YES    | NO     |
+-----------------+------------------------------------+---------------+-------------+--------+--------+--------+

Once the remote is added, you can interact with it like any other Incus server:

$ incus launch images:debian/trixie IncusOS:trixie
Launching trixie

$ incus list
+---------------+---------+------------------------+--------------------------------------------------+-----------------+-----------+
|     NAME      |  STATE  |          IPV4          |                       IPV6                       |      TYPE       | SNAPSHOTS |
+---------------+---------+------------------------+--------------------------------------------------+-----------------+-----------+
| test-incus-os | RUNNING | 10.25.170.1 (incusbr0) | fd42:612d:f700:5f6e::1 (incusbr0)                | VIRTUAL-MACHINE | 0         |
|               |         | 10.234.136.23 (enp5s0) | fd42:3cfb:8972:3990:1266:6aff:feab:9439 (enp5s0) |                 |           |
+---------------+---------+------------------------+--------------------------------------------------+-----------------+-----------+

$ incus list IncusOS:
+--------+---------+----------------------+------------------------------------------------+-----------+-----------+
|  NAME  |  STATE  |         IPV4         |                      IPV6                      |   TYPE    | SNAPSHOTS |
+--------+---------+----------------------+------------------------------------------------+-----------+-----------+
| trixie | RUNNING | 10.25.170.218 (eth0) | fd42:612d:f700:5f6e:1266:6aff:fe39:d31f (eth0) | CONTAINER | 0         |
+--------+---------+----------------------+------------------------------------------------+-----------+-----------+

From the web

The Incus UI is also available for web access.

For this to work, the client certificate provided at image creation time must be imported as a user certificate in your web browser.

The exact process to do this varies between browsers and operating systems, but generally involves generating a PKCS#12 certificate from the separate client.crt and client.key, then importing that in the web browser’s certificate store.

Once this is done, you can access the UI at https://192.0.2.100:8443

Incus UI with running instances

Fetching the encryption recovery key

IncusOS will warn you if you haven’t retrieved the encryption recovery key. You can do so with the following command. Make sure to store the key someplace safe!

Note

This step is currently only possible through the command line client.

$ incus query IncusOS:/os/1.0/system/security
{
        "config": {
                "encryption_recovery_keys": [
                        "fkrjjenn-tbtjbjgh-jtvvchjr-ctienevu-crknfkvi-vjlvblhl-kbneribu-htjtldch"
                ]
        },
        "state": {
                "encrypted_volumes": [
                        {
                                "state": "unlocked (TPM)",
                                "volume": "root"
                        },
                        {
                                "state": "unlocked (TPM)",
                                "volume": "swap"
                        }
                ],
                "encryption_recovery_keys_retrieved": true,
                "pool_recovery_keys": {
                        "local": "F7zrtdHEaivKqofZbVFs2EeANyK77DbLi6Z8sqYVhr0="
                },
                "secure_boot_certificates": [
                        {
                                "fingerprint": "26dce4dbb3de2d72bd16ae91a85cfeda84535317d3ee77e0d4b2d65e714cf111",
                                "issuer": "CN=Incus OS - Secure Boot E1,O=Linux Containers",
                                "subject": "CN=Incus OS - Secure Boot PK R1,O=Linux Containers",
                                "type": "PK"
                        },
                        {
                                "fingerprint": "9a42866f496834bde7e1b26a862b1e1b6dea7b78b91a948aecfc4e6ef79ea6c1",
                                "issuer": "CN=Incus OS - Secure Boot E1,O=Linux Containers",
                                "subject": "CN=Incus OS - Secure Boot KEK R1,O=Linux Containers",
                                "type": "KEK"
                        },
                        {
                                "fingerprint": "21b6f423cf80fe6c436dfea0683460312f276debe2a14285bfdc22da2d00fc20",
                                "issuer": "CN=Incus OS - Secure Boot E1,O=Linux Containers",
                                "subject": "CN=Incus OS - Secure Boot 2025 R1,O=Linux Containers",
                                "type": "db"
                        }
                ],
                "secure_boot_enabled": true,
                "tpm_status": "ok"
        }
}