Skip to content

Commit af43b56

Browse files
authored
Merge pull request #3200 from replicatedhq/dropdown-bug
fixing issues with dropdown
2 parents d905af9 + f4883cb commit af43b56

File tree

411 files changed

+101976
-9
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

411 files changed

+101976
-9
lines changed

.gitignore

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@
88
.docusaurus
99
.cache-loader
1010
.history
11-
static/llms.txt
12-
static/llms-full.txt
13-
static/intro-kots.md
14-
static/intro-replicated.md
15-
static/intro.md
16-
static/enterprise/*
17-
static/reference/*
18-
static/release-notes/*
19-
static/vendor/*
11+
# static/llms.txt
12+
# static/llms-full.txt
13+
# static/intro-kots.md
14+
# static/intro-replicated.md
15+
# static/intro.md
16+
# static/enterprise/*
17+
# static/reference/*
18+
# static/release-notes/*
19+
# static/vendor/*
2020

2121
# Misc
2222
.DS_Store
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
# Change an Admin Console Password
2+
3+
When you install for the first time with Replicated kURL, the Replicated KOTS Admin Console is secured with a single shared password that is set automatically for all users. Replicated recommends that you change this to a new, unique password for security purposes as this automated password is displayed to the user in plain text.
4+
5+
The Admin Console password is salted and one-way hashed using bcrypt. The irreversible hash is stored in a Secret named `kotsadm-password`. The password is not retrievable if lost. If you lose your Admin Console password, reset your password to access the Admin Console.
6+
7+
For more information about bcrypt, see [bcrypt](https://en.wikipedia.org/wiki/Bcrypt) on Wikipedia.
8+
9+
:::note
10+
Users with Identity Provider (IDP) access cannot change their password using this procedure. If an attempt is made, IDP users receive a message in the user interface to contact the identity service provider to change their password. For more information about resetting an IDP user password, see [Resetting Authentication](auth-identity-provider#resetting-authentication) in _Use an Identity Provider for User Access (Beta)_.
11+
:::
12+
13+
To change your Admin Console password:
14+
15+
1. Log in to the Admin Console using your current password.
16+
1. In the drop-down in the top right of any page, click **Change password**.
17+
1. In the Change Admin Console Password dialog, edit the fields.
18+
19+
- The new password must be at least 6 characters and must not be the same as your current password.
20+
- The **New Password** and **Confirm New Password** fields must match each other.
21+
22+
1. Click **Change Password**.
23+
24+
If there are any issues with changing the password, an error message displays the specific problem.
25+
26+
When the password change succeeds, the current session closes and you are redirected to the Log In page.
27+
28+
1. Log in with the new password.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
# Configure Role-based Access Control (Beta)
2+
3+
You can regulate access to the Replicated KOTS Admin Console resources based on the roles of individual users within your organization.
4+
5+
To configure role based access control (RBAC) for the Admin Console:
6+
1. Go to the **Access** page. Under **Role Based Access Control Group Policy**, click **Add a group**.
7+
1. Enter a group name that matches one of the group names already established with your identity provider.
8+
1. Choose one of the pre-defined Admin Console roles to be assigned to that group. For a list of Admin Console roles, see [Admin Console roles](#admin-console-roles) below.
9+
1. Click **Add group**.
10+
11+
![Role Based Access Control](/images/identity-service-kotsadm-rbac.png)
12+
13+
## Admin Console Roles
14+
15+
The Admin Console comes with pre-defined identity service roles that can be assigned to groups when you configure RBAC for the Admin Console.
16+
17+
- **Read Access:** This role has read permissions to all resources.
18+
19+
- **Write Access:** This role has write permissions to all resources.
20+
21+
## Support Roles
22+
23+
- **Read Access:** This role has read permissions to all resources except the application's file tree.
24+
25+
- **Write Access:** This role has write permissions to the following resources:
26+
27+
* Support bundles
28+
* Preflight checks
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# Use an Identity Provider for User Access (Beta)
2+
3+
When you install an application for the first time, the Replicated KOTS Admin Console is secured with a single shared password for all users. It is possible to further configure the Admin Console to authenticate users with your organization's user management system. This feature is only available for licenses that have the Replicated identity service feature enabled.
4+
5+
Replicated KOTS leverages the open source project Dex as an intermediary to control access to the Admin Console. Dex implements an array of protocols for querying other user-management systems, known as connectors. For more information, see the [Dex documentation](https://dexidp.io/docs/).
6+
7+
The identity service has the following limitations:
8+
* Only available for installations in a cluster created by Replicated kURL.
9+
* Only available through the Admin Console.
10+
11+
## Prerequisite
12+
13+
When you are installing the Admin Console and setting up TLS certificates on the HTTPS page, you must configure the hostname to use to access the Admin Console. The hostname is required whether you are using the identity service with either a self-signed certificate or a custom certificate. For more information about configuring the hostname field, see [Install and Deploy the Application](installing-kurl#install-app) in _Online Installation with kURL_.
14+
15+
## Configuration
16+
17+
To begin, click the **Access** tab at the top of the Admin Console.
18+
Here you can configure access to the Admin Console, integrating with one of the supported identity providers.
19+
20+
![Configure Identity Provider](/images/access-identity.png)
21+
22+
## Supported Providers
23+
24+
**OpenID Connect:** For more information, see the [OpenID Connect documentation](https://openid.net/connect/).
25+
26+
## Resetting Authentication
27+
28+
When you enable identity provider access to the Admin Console, shared password authentication is disabled.
29+
If you want to re-enable the shared password authentication, run the `kubectl kots identity-service enable-shared-password --namespace [namespace]` command. For more information, see [identity-service enable-shared-password](/reference/kots-cli-identity-service-enable-shared-password/) in the KOTS CLI documentation.
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# Add Nodes to kURL Clusters
2+
3+
:::note
4+
Replicated kURL is available only for existing customers. If you are not an existing kURL user, use Replicated Embedded Cluster instead. For more information, see [Use Embedded Cluster](/vendor/embedded-overview).
5+
6+
kURL is a Generally Available (GA) product for existing customers. For more information about the Replicated product lifecycle phases, see [Support Lifecycle Policy](/vendor/policies-support-lifecycle).
7+
:::
8+
9+
This topic describes how to add primary and secondary nodes to a Replicated kURL cluster.
10+
11+
## Overview
12+
13+
You can generate commands in the Replicated KOTS Admin Console to join additional primary and secondary nodes to kURL clusters. Primary nodes run services that control the cluster. Secondary nodes run services that control the pods that host the application containers. Adding nodes can help manage resources to ensure that the application runs smoothly.
14+
15+
For high availability clusters, Kubernetes recommends using at least three primary nodes, and that you use an odd number of nodes to help with leader selection if machine or zone failure occurs. For more information, see [Creating Highly Available Clusters with kubeadm](https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/high-availability/) in the Kubernetes documentation.
16+
17+
## Join Primary and Secondary Nodes
18+
19+
You can join primary and secondary nodes on the Admin Console **Cluster management** page.
20+
21+
To add primary and secondary nodes:
22+
23+
1. (Air Gap Only) For air gapped environments, download and extract the `.tar.gz` bundle on the remote node before running the join command.
24+
1. In the Admin Console, click **Cluster Management > Add a node**.
25+
1. Copy the command that displays in the text box and run it on the node that you are joining to the cluster.
26+
27+
![Join node in Admin Console](/images/join-node.png)
28+
29+
[View a larger image](/images/join-node.png)
Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
# Delete the Admin Console and Remove Applications
2+
3+
This topic describes how to remove installed applications and delete the Replicated KOTS Admin Console. The information in this topic applies to existing cluster installations with KOTS.
4+
5+
## Remove an Application
6+
7+
The Replicated KOTS CLI `kots remove` command removes the reference to an installed application from the Admin Console. When you use `kots remove`, the Admin Console no longer manages the application because the record of that application’s installation is removed. This means that you can no longer manage the application through the Admin Console or through the KOTS CLI.
8+
9+
By default, `kots remove` does not delete any of the installed Kubernetes resources for the application from the cluster. To remove both the reference to an application from the Admin Console and remove any resources for the application from the cluster, you can run `kots remove` with the `--undeploy` flag.
10+
11+
It can be useful to remove only the reference to an application from the Admin Console if you want to reinstall the application, but you do not want to recreate the namespace or other Kubernetes resources. For example, if you installed an application using an incorrect license file and need to reinstall with the correct license.
12+
13+
To remove an application:
14+
15+
1. Run the following command to list the installed applications for a namespace:
16+
```
17+
kubectl kots get apps -n NAMESPACE
18+
```
19+
Replace `NAMESPACE` with the name of the namespace where the Admin Console is installed.
20+
21+
In the output of this command, note the slug for the application that you want to remove.
22+
23+
1. Run _one_ of the following commands:
24+
25+
* Remove only the reference to the application from the Admin Console:
26+
27+
```
28+
kubectl kots remove APP_SLUG -n NAMESPACE
29+
```
30+
Replace:
31+
* `APP_SLUG` with the slug for the application that you want to remove.
32+
* `NAMESPACE` with the name of the namespace where the Admin Console is installed.
33+
34+
* Remove the reference to the application from the Admin Console and remove its resources from the cluster:
35+
36+
```
37+
kubectl kots remove APP_SLUG -n NAMESPACE --undeploy
38+
```
39+
40+
:::note
41+
Optionally, use the `--force` flag to remove the application reference from the Admin Console when the application has already been deployed. The `--force` flag is implied when `--undeploy` is used. For more information, see [remove](/reference/kots-cli-remove) in _KOTS CLI_.
42+
:::
43+
44+
45+
## Delete the Admin Console
46+
47+
When you install an application, KOTS creates the Kubernetes resources for the Admin Console itself on the cluster. The Admin Console includes Deployments and Services, Secrets, and other resources such as StatefulSets and PersistentVolumeClaims.
48+
49+
By default, KOTS also creates Kubernetes ClusterRole and ClusterRoleBinding resources that grant permissions to the Admin Console on the cluster level. These `kotsadm-role` and `kotsadm-rolebinding` resources are managed outside of the namespace where the Admin Console is installed. Alternatively, when the Admin Console is installed with namespace-scoped access, KOTS creates Role and RoleBinding resources inside the namespace where the Admin Console is installed.
50+
51+
In existing cluster installations, if the Admin Console is not installed in the `default` namespace, then you delete the Admin Console by deleting the namespace where it is installed.
52+
53+
If you installed the Admin Console with namespace-scoped access, then the Admin Console Role and RoleBinding RBAC resources are also deleted when you delete the namespace. Alternatively, if you installed with the default cluster-scoped access, then you manually delete the Admin Console ClusterRole and ClusterRoleBindings resources from the cluster. For more information, see [supportMinimalRBACPrivileges](/reference/custom-resource-application#supportminimalrbacprivileges) and [requireMinimalRBACPrivileges](/reference/custom-resource-application#requireminimalrbacprivileges) in _Application_.
54+
55+
For more information about installing with cluster- or namespace-scoped access, see [RBAC Requirements](/enterprise/installing-general-requirements#rbac-requirements) in _Installation Requirements_.
56+
57+
To completely delete the Admin Console from an existing cluster:
58+
59+
1. Run the following command to delete the namespace where the Admin Console is installed:
60+
61+
:::important
62+
This command deletes everything inside the specified namespace, including the Admin Console Role and RoleBinding resources if you installed with namespace-scoped access.
63+
:::
64+
65+
```
66+
kubectl delete ns NAMESPACE
67+
```
68+
Replace `NAMESPACE` with the name of the namespace where the Admin Console is installed.
69+
70+
:::note
71+
You cannot delete the `default` namespace.
72+
:::
73+
74+
1. (Cluster-scoped Access Only) If you installed the Admin Console with the default cluster-scoped access, run the following commands to delete the Admin Console ClusterRole and ClusterRoleBinding from the cluster:
75+
76+
```
77+
kubectl delete clusterrole kotsadm-role
78+
```
79+
80+
```
81+
kubectl delete clusterrolebinding kotsadm-rolebinding
82+
```
83+
84+
1. (Optional) To uninstall the KOTS CLI, see [Uninstall](https://docs.replicated.com/reference/kots-cli-getting-started#uninstall) in _Installing the KOTS CLI_.

0 commit comments

Comments
 (0)