Dash Enterprise Administration
4.3.1
4.3.1
  • Changelog
  • Installation
    • Capacity Planning
      • Dash Enterprise Single Server
      • Dash Enterprise for Kubernetes
    • Before you install
    • Dash Enterprise Single Server
      • Installation on cloud provider
      • On-premise installation on own server
      • Fully offline installation
    • Dash Enterprise Kubernetes
      • Amazon Web Services resource prerequisites
      • Google Cloud Platform resource prerequisites
      • Microsoft Azure resource prerequisites
  • Configuration
    • Set up your Server Manager
    • Run preflight checks
    • Configure basic settings
    • Authentication settings
      • Built-in local authentication
      • LDAP authentication
      • SAML authentication
    • Dash Enterprise Kubernetes additional required configuration
    • Configure optional settings
    • Add SELinux permissions to mapped directories
    • Other options and customizations
    • Using Snapshots & Backups
    • Running and logging into Dash Enterprise
    • Next steps
  • Advanced Configuration
    • General troubleshooting and problem solving
      • Dash Enterprise Kubernetes
    • Load balancer configuration
    • Reverse proxy setup instructions
    • Docker storage driver requirements and considerations
    • Import an LDAPS certificate from Active Directory into Dash Enterprise
    • Transfer Dash Enterprise to a new server
    • Sync license changes
    • Change channels for an upgrade
    • Admin panel reference
    • Configure Dash Enterprise to use common SAML IdPs
      • Active Directory Federation Services (AD FS)
      • PingFederate
      • Okta
    • Configure Dash Enterprise to use common LDAP IdPs
      • Okta
  • Upgrade
    • Prepare for the upgrade
    • Upgrade
      • Dash Enterprise Single Server
      • Dash Enterprise for Kubernetes
    • After the upgrade
  • Advanced Troubleshooting
    • Dash Enterprise Architecture and Internals
    • Navigating the System
    • Navigating the Support Bundle
    • Getting Help and Reporting Issues
    • Troubleshooting Specific Issues
Powered by GitBook
On this page
  • Configure external services and enable High Availability for Dash
  • Update base domain DNS record to use the load balancer IP

Was this helpful?

  1. Configuration

Dash Enterprise Kubernetes additional required configuration

PreviousSAML authenticationNextConfigure optional settings

Last updated 2 years ago

Was this helpful?

First, configure your Server Manager Settings as for Dash Enterprise Single Server (). Once that is complete, continue as below.

Configure external services and enable High Availability for Dash

External Databases

Under "External Databases":

1 - Check Use External Postgres Database and fill out the fields as below:

1.1 - Postgres DB Host

The Endpoint of your Postgres instance (from your RDS instance’s details)

The IP address of your Postgres instance

The “Server name” from the instance page on Azure Portal

1.2 - Postgres DB port: 5432 (default)

1.3 - Database User:

postgres (default)

“Admin username” from the instance page on Azure Portal

1.4 - Database Password: whatever was set for the Database User user upon creation

1.5 - Authentication Database Name: dashauth

1.6 - Dash Deployment Server Database Name: dash_deployment_server

2 - Check Use External Redis Database and fill out the fields as below:

2.1 - Redis Host

The Primary Endpoint of your Redis cluster

the IP address of your Redis instance

The Hostname of the redis instance (from the instance page on Azure Portal)

2.2 - Redis Port: 6379 (default)

2.3 - Access Key (Optional):

Can be left blank

Primary access key from the “Access Key” section of the instance’s page on Azure Portal

2.4 - Celery Redis Database Number: caches data related to Celery and task queues; default 0 (but can be any number from 0-16)

2.5 - Dash Deployment Server Database Number: caches data related to Dash Deployment Server user sessions; default 1 (but can be any number from 0-16)

Check Enable High Availability for Dash

Fill out the fields in that section as follows

1 - Select Use Google Kubernetes Engine, Amazon Elastic Kubernetes Service or Azure Kubernetes Service as appropriate for your situation

2 - Docker Registry URL: the URI for the container registry you created. Only use the base DNS name; do not include / or anything after it

3 - Change the Cloud provider-specific settings.

  1. EKS Cluster Name: the Name you input when creating the cluster

    • Retrieve this from the EKS Clusters summary page

  2. EKS Cluster Region: the Location you selected when creating the cluster

    • Retrieve this in the EKS dashboard by clicking on your cluster name and checking the Cluster ARN value

  3. Use internal Network Load Balancer (NLB) for incoming connections: Enabling this option creates the load balancer on a private subnet so that it is not accessible outside the VPC. Prerequisites:

    • For internal load balancers, your Amazon EKS cluster must be configured to use at least one private subnet in your VPC

  1. GKE Cluster Name: the Name you input when creating the cluster

  2. GKE Cluster Zone: the Location you selected when creating the cluster

  3. This information is available in the GCP console’s GKE Clusters summary

  1. Cluster Name: The Name you input when creating the cluster.

  2. Resource Group: The Resource Group under which the cluster was created.

4 - Max pod lifetime in seconds: the default is fine for most purposes

  • Configure this to a lower value if you find yourself frequently updating configuration settings and need to flush pods with the stale configuration

    • This can be manually accomplished by scaling deployments to 0 and back up as required for your needs

Save the settings, then return to the Dashboard and click "Stop", then "Start"**

Update base domain DNS record to use the load balancer IP

1 - Retrieve the external IP for your loadbalancer

Go to EC2 > Load Balancers, find the load balancer associated with your VPC, and copy its DNS name

Go to Kubernetes Engine > Services & Ingress and locate the Endpoint value for dds-elb-service.

Go to Load Balancers, find the load balancer named kubernetes belonging to the resource group and cluster name created earlier and locate the “Public IP Address” from the load balancer’s page on Azure Portal. If there are multiple IP addresses attached to the load balancer, choose the one which has ports: 80, 443, 3022 and 8800 exposed in the rules.

2 - In your DNS provider, update your existing Plotly Base Domain Name record to use the load balancer address

Update the A record to point to the load balancer’s IP address

Update the CNAME record to point to the load balancer’s DNS name

If this option is not available in your Server Manager Settings, contact for help with your license

The private subnet should have correct tags as per

Configure basic settings
Plotly support
this guide