Skip to main content

Change the Domain of an Existing Installation

This section describes how to reconfigure an existing installation of Virtalis Hub to use a different domain. It assumes that you have already installed Virtalis Hub and your shell is in the directory containing the files that were downloaded during the installation. This is usually stored in the home directory, for example /home/root/Hub/k8s

Set Up Variables

Export the following variables:

export HUB_NAMESPACE=hub
export SKIP_MIGRATIONS=1
export HUB_VERSION=$(kubectl get secret hub-version -n $HUB_NAMESPACE -o json | jq ".data.version" -r | base64 -d)
export ACR_REGISTRY_NAME=$(kubectl get secret hub-install-config -n $HUB_NAMESPACE -o json | jq ".data.ACR_REGISTRY_NAME" -r | base64 -d)
export ACR_USERNAME=$(kubectl get secret hub-install-config -n $HUB_NAMESPACE -o json | jq ".data.ACR_USERNAME" -r | base64 -d)
export ACR_PASSWORD=$(kubectl get secret hub-install-config -n $HUB_NAMESPACE -o json | jq ".data.ACR_PASSWORD" -r | base64 -d)

Load previous configuration:

. ./load-install-config.sh

Substitute and export the following variables:

export HUB_DOMAIN=<new domain>

Apply Change

./deploy.sh

Applying Manual Changes in Keycloak Navigate to https://<new domain>/auth/admin in your browser and log in to access the Keycloak admin panel.

Navigate to https://<new domain>/auth/admin/master/console/#/realms/hub/clients

Open and edit the following clients from the list:

file-import
job-status
project-author
hub-client

Staying on the default Settings section, edit any fields that contain the old domain to reflect the new domain, ensuring to keep the protocol and any arguments in the field. For example, edit fields containing hub.local to a new domain, hubnew.local:

Press Save at the bottom of the individual client settings page.

Updating tls Certificates (Optional)

Depending on your configuration, if you provision a tls certificate for your ingress it will need to be updated with a new certificate signed for the new domain.

Delete old certificate:

kubectl delete secret "${TLS_SECRET_NAME}" -n "${HUB_NAMESPACE}"

Create new certificate:

kubectl create secret tls -n "${HUB_NAMESPACE}" \
"${TLS_SECRET_NAME}" --key="tls.key" --cert="tls.crt"