mirror of
https://github.com/zitadel/zitadel.git
synced 2025-02-28 21:37:24 +00:00
docs(self-hosted): direct to the tested k8s example (#7201)
docs(self-hosted): direct to the tested example
This commit is contained in:
parent
3d3264eb8f
commit
86b118a4b8
@ -3,91 +3,6 @@ title: Set up ZITADEL on Kubernetes
|
|||||||
sidebar_label: Kubernetes
|
sidebar_label: Kubernetes
|
||||||
---
|
---
|
||||||
|
|
||||||
import Disclaimer from './_disclaimer.mdx'
|
For getting started with an easily testable insecure setup with Postgres, follow the [Insecure Postgres Example](https://github.com/zitadel/zitadel-charts/tree/main/examples/1-postgres-insecure).
|
||||||
import DefaultUser from './_defaultuser.mdx'
|
|
||||||
import Next from './_next.mdx'
|
|
||||||
import NoteInstanceNotFound from './troubleshooting/_note_instance_not_found.mdx';
|
|
||||||
|
|
||||||
|
For more information and configuration examples, go to the [ZITADEL charts repo](https://github.com/zitadel/zitadel-charts).
|
||||||
Installation and configuration details are described in the [open source ZITADEL charts repo](https://github.com/zitadel/zitadel-charts).
|
|
||||||
By default, the chart installs a secure and highly available ZITADEL instance.
|
|
||||||
For running an easily testable, insecure, non-HA ZITADEL instance, run the following commands.
|
|
||||||
|
|
||||||
|
|
||||||
## Add the Helm Repositories for CockroachDB and ZITADEL
|
|
||||||
|
|
||||||
```bash
|
|
||||||
helm repo add cockroachdb https://charts.cockroachdb.com/
|
|
||||||
helm repo add zitadel https://charts.zitadel.com
|
|
||||||
```
|
|
||||||
|
|
||||||
After you have your repositories added,
|
|
||||||
you can setup ZITADEL and either
|
|
||||||
- initialize an [IAM owner who is a human user](#setup-zitadel-and-a-human-admin) or
|
|
||||||
- initialize an [IAM owner who is a service account](#setup-zitadel-and-a-service-account-admin)
|
|
||||||
|
|
||||||
## Setup ZITADEL and a Human Admin
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Install CockroachDB
|
|
||||||
helm install crdb cockroachdb/cockroachdb \
|
|
||||||
--set fullnameOverride=crdb \
|
|
||||||
--set conf.single-node=true \
|
|
||||||
--set statefulset.replicas=1
|
|
||||||
|
|
||||||
# Install ZITADEL
|
|
||||||
helm install my-zitadel zitadel/zitadel \
|
|
||||||
--set zitadel.masterkey="MasterkeyNeedsToHave32Characters" \
|
|
||||||
--set zitadel.configmapConfig.ExternalSecure=false \
|
|
||||||
--set zitadel.configmapConfig.TLS.Enabled=false \
|
|
||||||
--set zitadel.secretConfig.Database.cockroach.User.Password="a-zitadel-db-user-password" \
|
|
||||||
--set replicaCount=1
|
|
||||||
|
|
||||||
# Make ZITADEL locally accessible
|
|
||||||
kubectl port-forward svc/my-zitadel 8080
|
|
||||||
```
|
|
||||||
|
|
||||||
<DefaultUser components={props.components} />
|
|
||||||
|
|
||||||
<NoteInstanceNotFound/>
|
|
||||||
|
|
||||||
## Setup ZITADEL and a Service Account Admin
|
|
||||||
|
|
||||||
With this setup, you don't create a human user that has the IAM_OWNER role.
|
|
||||||
Instead, you create a service account that has the IAM_OWNER role.
|
|
||||||
ZITADEL will also create a key for your, with which you can authenticate to the ZITADEL API.
|
|
||||||
For example, you can install ZITADEL and seemlessly provision ZITADEL resources after installation using [Terraform](/docs/guides/manage/terraform/basics.md).
|
|
||||||
|
|
||||||
:::caution
|
|
||||||
With this setup you only get a key for a service account. Logging in at ZITADEL using the login screen is not possible until you create a user with the ZITADEL API.
|
|
||||||
:::
|
|
||||||
|
|
||||||
```bash
|
|
||||||
# Install CockroachDB
|
|
||||||
helm install crdb cockroachdb/cockroachdb \
|
|
||||||
--set fullnameOverride=crdb \
|
|
||||||
--set conf.single-node=true \
|
|
||||||
--set statefulset.replicas=1
|
|
||||||
|
|
||||||
# Install ZITADEL
|
|
||||||
helm install my-zitadel zitadel/zitadel \
|
|
||||||
--set zitadel.masterkey="MasterkeyNeedsToHave32Characters" \
|
|
||||||
--set zitadel.configmapConfig.ExternalSecure=false \
|
|
||||||
--set zitadel.configmapConfig.TLS.Enabled=false \
|
|
||||||
--set zitadel.secretConfig.Database.cockroach.User.Password="a-zitadel-db-user-password" \
|
|
||||||
--set replicaCount=1 \
|
|
||||||
--set zitadel.configmapConfig.FirstInstance.Org.Machine.Machine.Username="zitadel-admin-sa" \
|
|
||||||
--set zitadel.configmapConfig.FirstInstance.Org.Machine.Machine.Name="Admin" \
|
|
||||||
--set zitadel.configmapConfig.FirstInstance.Org.Machine.MachineKey.Type=1
|
|
||||||
|
|
||||||
# Make ZITADEL locally accessible
|
|
||||||
kubectl port-forward svc/my-zitadel 8080
|
|
||||||
```
|
|
||||||
|
|
||||||
When Helm is done, you can print your service account key from a Kubernetes secret:
|
|
||||||
```bash
|
|
||||||
kubectl get secret zitadel-admin-sa -o jsonpath='{ .data.zitadel-admin-sa\.json }' | base64 --decode
|
|
||||||
```
|
|
||||||
|
|
||||||
<Next components={props.components} />
|
|
||||||
<Disclaimer components={props.components} />
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user