Skip to main content

Post-deploy configuration

This guide takes you through setting up your MintPress instance and configuring the administrator user.

Setting up your MintPress instance

Once the MintPress instance is deployed, you can proceed with setting up your MintPress instance.

Creating your first MintPress user

kubectl context

For the next steps, we recommend switching your kubectl default context to the configured MintPress namespace. You can achieve that by running:

kubectl config set-context --current --namespace=${KUBERNETES_NAMESPACE}

The OpsChain API server requires a valid username and password for users to interact with its data.

MintPress supports two authentication modes, but only one can be active at any given moment. See the authentication strategy setting reference for more information.

With that in mind, please ensure you follow the next step only for the currently configured OPSCHAIN_AUTH_STRATEGY variable in your values.yaml.

Creating an LDAP authenticated user

To create a user that is authenticated via the configured LDAP, execute:

kubectl exec -n ${KUBERNETES_NAMESPACE} deploy/opschain-api -- /usr/bin/container_start.sh "rake release:create_user[opschain,password,email@example.com]"

This will create an opschain user with the password password.

Creating a locally authenticated user

To create a user that is authenticated locally in MintPress, execute:

kubectl exec -n ${KUBERNETES_NAMESPACE} deploy/opschain-api -- /usr/bin/container_start.sh "rake release:create_local_user[opschain,password,email@example.com]"

This will create an opschain user with the password password.

Updating a locally authenticated user email address

To update the email address for a user that is authenticated locally in MintPress, execute:

kubectl exec -n ${KUBERNETES_NAMESPACE} deploy/opschain-api -- /usr/bin/container_start.sh "rake release:update_local_user_email_address[opschain,new-email@example.com]"

Providing superuser access to a user

By default, users have permissions according to the authorisation policies assigned to them. MintPress provides a special superuser policy that can be assigned for users that should not have their access restricted in any circumstance.

To provide superuser access to the newly created opschain user, execute:

kubectl exec -n ${KUBERNETES_NAMESPACE} deploy/opschain-api -- /usr/bin/container_start.sh "rake release:setup_superuser[opschain,false]"
caution

Due to security risks, we strongly recommend keeping the number of users with superuser access as minimal as possible.

Configuring the MintPress CLI

The CLI can be configured by using the mintpress config init command. It will prompt you for the user created in the previous steps and the API address.

Validating your CLI and API

To validate your CLI has successfully connected to the API, you can run the following:

mintpress info

If everything is working, the output will look similar to:

--------------------
Instance Title : MintPress
License Issuer : LimePoint Pty Ltd (support@limepoint.com)
Licensee : Engineering
License Start Date : 2025-11-12 00:00:00 +0000 UTC
License Expiry Date : 2026-10-17 00:00:00 +0000 UTC
version : 2025-11-12 (9be060c7)
runner_image : limepoint/opschain-runner-enterprise:2025-11-12
db_version : 17.2
api_version : 7.1.5.1

Setup the custom CA

To ensure that the OpsChain image registry certificate is trusted by Kubernetes, you must trust the CA certificate within K3s' registry configuration. If you opted to use cert-manager, you can extract the CA certificate from the opschain-ca-key-pair secret into a stable location by running the following commands:

mkdir -p /limepoint/rancher/k3s/certs
kubectl -n ${KUBERNETES_NAMESPACE} get secret opschain-ca-key-pair -o jsonpath="{.data.ca\.crt}" | base64 -d > /limepoint/rancher/k3s/certs/opschain-ca.pem

And add the OpsChain image registry to K3s' registry configuration by editing the /limepoint/rancher/k3s/registries.yaml file. Note that the port used must be the one you configured in the Ingress TLS port setting.

configs:
"opschain-image-registry.local.gd:3443":
tls:
ca_file: /limepoint/rancher/k3s/certs/opschain-ca.pem
Certificate renewal and skipping TLS verification

Note that you will need to update the CA certificate file and restart K3s every time the OpsChain image registry certificate is renewed. You can check the certificate expiry and renewal dates by running the following command:

kubectl describe cert opschain-ca -n ${KUBERNETES_NAMESPACE}

If instead you'd like to just skip TLS verification for the local image registry, you can do so by adding the tls.insecure_skip_verify option to the configuration.

configs:
"opschain-image-registry.local.gd:3443":
tls:
insecure_skip_verify: true

Learn more about registry configuration in the K3s documentation.

Restart K3s

You must restart K3s to complete the custom CA setup.

sudo systemctl restart k3s

Each platform has a different way of trusting a certificate. Follow your client's platform documentation to trust the certificate so you're able to access the OpsChain API, UI and secret vault via HTTPS.

Accessing the MintPress GUI

Using a web browser, you can access the MintPress GUI by navigating to the address configured in your values.yaml file - if using the default installation options this would be locally accessible at http://localhost:3000/. If you have configured an HTTPS address for the API, you will need to trust the certificate associated with it and connect to that address instead. The credentials used for the GUI are the same as the CLI.

Once you're able to login, you can familiarise yourself with the MintPress GUI.

Basic authentication and HTTP

If you have configured the OPSCHAIN_ENABLE_BASIC_AUTH setting to false, it's recommended you connect to the OpsChain GUI via HTTPS. Refer to the basic authentication and HTTP setting reference for more information.

Accessing the OpsChain vault

If you have opted to use the OpsChain vault as the global default, you can access its UI by navigating to the address configured in your values.yaml file.

Refer to the secret vault settings for information on the credentials needed to access the secret vault UI.

Start and stopping MintPress

For future operations, download the manage-mintpress script to help with start and stopping MintPress.

What to do next