Post installation steps
Follow the post-installation steps after initial installation.
Step 1: Get the initial administrator credentials
When the installer job (in the default namespace) has finished you can obtain the initial administrator credentials and sign in to the Console.
Use the following command to get the logs of the installer job:
kubectl logs jobs/apl -n default -f
At the end of the logs you should see the following message:
########################################################################################################################################
#
# The App Platform console is available at https://console.${domainSuffix}
#
# Obtain login credentials by using the below commands:
# kubectl get secret platform-admin-initial-credentials -n keycloak -o jsonpath='{.data.username}' | base64 -d
# kubectl get secret platform-admin-initial-credentials -n keycloak -o jsonpath='{.data.password}' | base64 -d
#
########################################################################################################################################
Perform the 2 commands to get the initail credentails and use them to sign in to the Console. You will need to change your password at first login.
Step 2 (optional): Add the auto generated CA to your keychain
The generated CA is not trusted on your local machine when installed using Let's Encrypt staging
certificates. Here are some options to prevent you from clicking away lots of security warning in your browser:
- In the left menu of the console, click on "Download CA"
- Double click the downloaded CA.crt or add the CA to your keychain on Mac using the following command:
sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain ~/Downloads/ca.crt
On Windows, use PowerShell (running as Administrator) with the Certutil:
certutil.exe -addstore root <downloaded cert path>
Or:
Import-Certificate -FilePath "<downloaded cert path>" -CertStoreLocation Cert:\LocalMachine\Root
# Restart the browser
But you could also run Chrome in insecure mode:
alias chrome-insecure='/Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --ignore-certificate-errors --ignore-urlfetcher-cert-requests &> /dev/null'
Step 3 (Optional): Add the URL of the Kubernetes API
Adding the URL of the K8s cluster API is required by teams to be able to download the KUBECONFIG
-
Under
Platform
in the Console, click onSettings
. -
Click on
Cluster
. -
Add the full URL of the API server.
-
Click on
Submit
. -
Click on
Deploy Changes
.
Step 4 (optional): Configure Object Storage
If you're planning on activating apps that can use Object Storage (like Loki, Harbor, Tempo, Velero), then first configure Object Storage. Check the table in Step 6 to see which App requires Object Storage configured.
Velero requires Object Storage!
Creating Database backups requires Object Storage!
-
Under
Platform
in the Console, click onSettings
. -
Click on
Object Storage
. -
Select
Minio Local
orLinode
.
When Minio is selected (only for development), Minio App is enabled and all required buckets are automatically provisioned. When Linode is selected, create the buckets for the apps you are planning to use and fill in the region and the Access Key ID and Secret Access Key (with read/write access).
-
Click on
Submit
. -
Click on
Deploy Changes
.
Step 5 (Optional): Add a Linode Personal Access Token to backup Persistent Volumes (Linode only)
To use the self-service feature to create backups of Persistent Volumes in Linode, first create a new Personal Access Token with Read/Write access for Volumes:
-
Go to your profile on the top right.
-
Click on
API Tokens
. -
Click on
Create A Personal Access Token
. -
Add a
Label
. -
Select the desired
Expiry
. -
Select
No Access
for all. -
Select
Read/Write
forVolumes
. -
Click
Create Token
. -
Copy your Personal Access Token.
Then Add the Token:
-
Sign in to the Console as an admin.
-
In the left menu, click on Settings.
-
Click on
Backup
. -
Add the API Token in the
Backup persistent volumes
section.
When Object Storage is configured and an API Token is added, then activate the Velero App. You can now use the Backup self-service feature to create backup schedules to backup Persistent Volumes.
Step 6 (optional): Activate more Apps
App Platform for LKE is a composable platform. Activate more Apps based on the required platform capabilities:
Capability | App | Object storage |
---|---|---|
Log aggregation | Loki and Grafana | Optional |
Metric collection | Prometheus and Grafana | No |
Send Alerts | Prometheus and Alert manager | No |
Tracing | Tempo, OTEL, Loki and Grafana | Required |
Build images from source code | Harbor | Optional |
Scan running containers for vulnerabilities | Trivy | No |
Enforce security policies | Kyverno | No |
Database backups | CloudnativePG | Required |
Step 7: Create Teams
Create your first team. Follow the instructions here.
Step 8: Create users and add them to a Team
The option to create users and add them to Teams is not available when installed with OIDC.
Create Users and add them to a Team. Follow the instructions here