Alfresco Content Services (ACS) is an Enterprise Content Management (ECM) system that is used for document and case management, project collaboration, web content publishing, and compliant records management. The flexible compute, storage, and database services that Kubernetes offers make it an ideal platform for Alfresco Content Services. This helm chart presents an enterprise-grade Alfresco Content Services configuration that you can adapt to virtually any scenario with the ability to scale up, down or out, depending on your use case.
The Helm chart in this repository supports deploying the Enterprise or Community Edition of ACS.
The Enterprise configuration will deploy the following system:
The Community configuration will deploy the following system:
Alfresco provides tested Helm charts as a "deployment template" for customers who want to take advantage of the container orchestration benefits of Kubernetes. These Helm charts are undergoing continual development and improvement, and should not be used "as is" for your production environments, but should help you save time and effort deploying Alfresco Content Services for your organisation.
The Helm charts in this repository provide a PostgreSQL database in a Docker container and do not configure any logging. This design has been chosen so that they can be installed in a Kubernetes cluster without changes and are still flexible to be adopted to your actual environment.
For your environment, you should use these charts as a starting point and modify them so that ACS integrates into your infrastructure. You typically want to remove the PostgreSQL container and connect the cs-repository directly to your database (might require custom images to get the required JDBC driver in the container).
Another typical change would be the integration of your company-wide monitoring and logging tools.
For the best results we recommend deploying ACS to AWS EKS. If you have a machine with at least 16GB of memory you can also deploy using Docker for Desktop.
There are also several examples showing how to deploy with various configurations:
- Deploy with AWS Services (S3, RDS and MQ)
- Deploy with Intelligence Services
- Deploy with Microsoft 365 Connector (Office Online Integration)
- Enable access to Search Services
- Enable Email Services
- Use a custom metadata keystore
The following table lists the configurable parameters of the ACS chart and their default values.
Parameter | Description | Default |
---|---|---|
repository.adminPassword |
Administrator password for ACS in md5 hash format | md5: 209c6174da490caeb422f3fa5a7ae634 (of string admin ) |
postgresql.enabled |
Enable the use of the postgres chart in the deployment | true |
postgresql.postgresUser |
Postgresql database user | alfresco |
postgresql.postgresPassword |
Postgresql database password | alfresco |
postgresql.postgresDatabase |
Postgresql database name | alfresco |
database.external |
Enable the use of an externally provisioned database | false |
database.driver |
External database driver | `` |
database.user |
External database user | `` |
database.password |
External database password | `` |
database.url |
External database jdbc url | `` |
alfresco-search.resources.requests.memory |
Alfresco Search Services requests memory | 250Mi |
alfresco-search.ingress.enabled |
Enable external access for Alfresco Search Services | false |
alfresco-search.ingress.basicAuth |
If alfresco-search.ingress.enabled is true , user needs to provide a base64 encoded htpasswd format user name & password (ex: echo -n "$(htpasswd -nbm solradmin somepassword)" where solradmin is username and somepassword is the password) |
None |
alfresco-search.ingress.whitelist_ips |
If alfresco-search.ingress.enabled is true , user can restrict /solr to a list of IP addresses of CIDR notation |
0.0.0.0/0 |
persistence.repository.enabled |
Enable Volume Persistence on repository. | true |
s3connector.enabled |
Switch this to true if you have access to the S3 Connector AMP |
false |
s3connector.config |
S3 configuration - see S3 Connector properties reference. Example: s3connector.config.bucketName: myS3Bucket |
{} |
s3connector.secrets |
S3 secrets configuration - see S3 Connector properties reference. Example: s3connector.secrets.accessKey: AJJJJJJJJ |
{} |
email.server.enabled |
Enables the email server - see Inbound SMTP configuration properties | false |
email.server.port |
Specifies the port number for the email server - see Inbound SMTP configuration properties | 1125 |
email.server.domain |
Specifies the name or the IP address of the network to bind the email server to - see Inbound SMTP configuration properties | |
email.server.enableTLS |
STARTTLS is an extension to plain text communication protocols - see Inbound SMTP Email Server Configuration | true |
email.server.hideTLS |
STARTTLS is an extension to plain text communication protocols - see Inbound SMTP Email Server Configuration | false |
email.server.requireTLS |
STARTTLS is an extension to plain text communication protocols - see Inbound SMTP Email Server Configuration | false |
email.server.auth.enabled |
Authentication is turned on by setting the following property - see Inbound SMTP configuration properties | true |
email.server.connections.max |
The maximum number of connections allowed. Increase this number to favour the email subsystem at the expense of the rest of alfresco - see Inbound SMTP configuration properties | 3 |
email.server.allowed.senders |
Provides a comma-separated list of email REGEX patterns of allowed senders - see Inbound SMTP configuration properties | |
email.server.blocked.senders |
Provides a comma-separated list of email REGEX patterns of blocked senders - see Inbound SMTP configuration properties | |
email.inbound.enabled |
Enable/Disable the inbound email service - see Inbound SMTP configuration properties | false |
email.inbound.unknownUser |
The username to authenticate with when the sender address is not recognised in alfresco - see Inbound SMTP configuration properties | anonymous |
email.inbound.emailContributorsAuthority |
Allow the email contributors to belong to an authority - see Inbound SMTP configuration properties | |
email.handler.folder.overwriteDuplicates |
Should duplicate messages to a folder overwrite each other or be named with a (number) - see Inbound SMTP configuration properties | true |
mail.encoding |
Specifies UTF-8 encoding for email - see Outbound SMTP configuration properties | UTF-8 |
mail.host |
Specifies the host name of the SMTP host, that is, the host name or IP address of the server to which email should be sent - see Outbound SMTP configuration properties | |
mail.port |
Specifies the port number on which the SMTP service runs (the default is 25) - see Outbound SMTP configuration properties | 25 |
mail.protocol |
Specifies which protocol to use for sending email - see Outbound SMTP configuration properties | smtps |
mail.username |
Specifies the user name of the account that connects to the smtp server - see Outbound SMTP configuration properties | |
mail.password |
Specifies the password for the user name used in mail.username - see Outbound SMTP configuration properties | |
mail.from.default |
Specifies the email address from which email notifications are sent - see Outbound SMTP configuration properties | |
mail.from.enabled |
If this property is set to false, then the value set in mail.from.default is always used - see Outbound SMTP configuration properties | |
mail.smtp.auth |
Specifies if authentication is required or not - see Outbound SMTP configuration properties | true |
mail.smtp.debug |
Specifies if debugging SMTP is required or not - see Outbound SMTP configuration properties | false |
mail.smtp.starttls.enable |
Specifies if the transport layer security needs to be enabled or not - see Outbound SMTP configuration properties | true |
mail.smtp.timeout |
Specifies the timeout in milliseconds for SMTP - see Outbound SMTP configuration properties | 20000 |
mail.smtps.auth |
Specifies if authentication for smtps is required or not - see Outbound SMTP configuration properties | true |
mail.smtps.starttls.enable |
Specifies if the transport layer security for smtps needs to be enabled or not - see Outbound SMTP configuration properties | true |
imap.server.enabled |
Enables or disables the IMAP subsystem - see Configuring the email client with IMAP | false |
imap.server.port |
IMAP has a reserved port number of 143 - see Configuring the email client with IMAP | 1143 |
imap.server.host |
Replace this value with the IP address (or corresponding DNS name) of your external IP interface - see Configuring the email client with IMAP | 0.0.0.0 |
imap.server.imap.enabled |
Enables or disables the IMAP subsystem - see Configuring the email client with IMAP | true |
imap.server.imaps.enabled |
Enables or disables the IMAP subsystem - see Configuring the email client with IMAP | true |
imap.server.imaps.port |
IMAP has a reserved port number of 143 - see Configuring the email client with IMAP | 1144 |
imap.mail.from.default |
Configuring the email client with IMAP - see Configuring the email client with IMAP | |
imap.mail.to.default |
Configuring the email client with IMAP - see Configuring the email client with IMAP |
NOTE: Due to protocol and ingress restrictions FTP is not exposed via the Helm chart.
To customise the Helm deployment, for example applying AMPs, we recommend following the best practice of creating your own custom Docker image(s). The Customisation Guide walks you through this process.
The easiest way to troubleshoot issues on a Kubernetes deployment is to use the Lens desktop application, which is available for Mac, Windows and Linux. Follow the getting started guide to configure your environment.
Alternatively, the traditional Kubernetes dashboard can also be used. Presuming you have deployed the dashboard in the cluster you can use the following steps to explore your deployment:
-
Retrieve the service account token with the following command:
kubectl -n kube-system describe secret $(kubectl -n kube-system get secret | grep eks-admin | awk '{print $1}')
-
Run the kubectl proxy:
kubectl proxy &
-
Open a browser and navigate to:
http://localhost:8001/api/v1/namespaces/kubernetes-dashboard/services/https:kubernetes-dashboard:/proxy/#/login
-
Select "Token", enter the token retrieved in step 1 and press the "Sign in" button
-
Select "alfresco" from the "Namespace" drop-down menu, click the "Pods" link and click on a pod name. To view the logs press the Menu icon in the toolbar as highlighted in the screenshot below:
This approach allows to connect to a specific application in the cluster. See kubernetes documentation for details.
Any component of the deployment that is not exposed via ingress rules can be accessed in this way, for example Alfresco Search, DB or individual transformers.
Log files for individual pods can also be viewed from the command line using the kubectl utility.
Retrieve the list of pods in the alfresco namespace by using the following command:
kubectl get pods -n alfresco
Then to retrieve the logs for a pod using the following command (replacing the pod name appropriately):
kubectl logs acs-alfresco-cs-repository-69545958df-6wzl6 -n alfresco
To continually follow the log file for a pod use the -f
options as follows:
kubectl logs -f acs-alfresco-cs-repository-69545958df-6wzl6 -n alfresco
If you wish to change the log levels for a specific Java package or class in a running content-repository these can be changed via the Admin Console. However, please be aware that the changes are applied only to one content-repository node, the one from which the Admin console is launched. Use the following URL to access the log settings page: https://<host>/alfresco/service/enterprise/admin/admin-log-settings
To add additional repository log statements across the whole cluster use the extraLogStatements
property via the values file as shown in the example below:
repository:
...
extraLogStatements:
org.alfresco.repo.content.transform.TransformerDebug: debug
org.alfresco.repo.security.authentication.identityservice: debug
NOTE: ACS deployment does not include any log aggregation tools. The logs generated by pods will be lost once the pods are terminated.
This tool allows you to download a ZIP file containing information useful for troubleshooting and supporting your system. Issue a GET request (Admin only) to: https://<host>/alfresco/service/api/admin/jmxdump