Introduction
This section is for Poolside administrators operating in on-premises environments where access and support may be limited.Helpful aliases
Either set these per bash session, or add them to your ~/.bashrc file to help assist with repetitive keystrokes and commands.Check namespaces
The Poolside application uses several namespaces:poolsidepoolside-modelspoolside-serviceskube-system
Confirm deployments for each namespace
All deployments / pods should exist in either a 1/1 Ready state or 0/1 Completed state for jobs that have not yet been removed.poolside
Hosts the core application services - the front-end UI and the API.
- core-api
- web-assistant
poolside-models
poolside-models should have one deployment per model that has been deployed.Deployment identifiers use a randomly generated UUID and appear in the format
inference-<uuid>.
If you do not create any models using Splash or the UI, this namespace remains empty.
poolside-services
Hosts the backend, secondary services necessary for an on-prem Poolside deployment.
Postgres is the database for Poolside.
Keycloak is used for the OIDC client to configure authentication and authorization to Poolside during setup.
SeaweedFS is used for object storage to emulate the S3 API for model checkpoints.
- postgres
- keycloak
- seaweedfs-admin
- seaweedfs-filer
- seaweedfs-master
- seaweedfs-volume
Shutdown
Shutting down Poolside in on-prem environments involves scaling down all resources and deployed objects in the correct order. If you are shutting down to facilitate moving to a new network, review the steps in the Network relocation guide instead.Scale down Poolside deployments
Shut down RKE2
You can shut down the system after this step.Startup
Starting up Poolside after a shutdown on the same network involves bringing services back up in the correct order. RKE2 is configured to start automatically on boot. Poolside recommends waiting ~5 minutes for RKE2 to initialize and become healthy after a shutdown or reboot before scaling Poolside services back up.Troubleshooting steps
Almost all troubleshooting for an on-prem deployment focuses on the Network tab in your browser’s developer tools and kubectl logs command.The following steps are generalized and error dependent. For any browser-based errors at any point during the usage or function of Poolside, open the Developer tools, select the Network tab, and identify the failing request + response. All requests pass through core-api, so it’s the best place to review the logs for initial indicators.
Checking for TLS certificates
Poolside uses cert-manager to issue and renew certificates. The self-signed CA certificate is typically namedpoolside-self-signed-ca.
If certificates are missing, expired, or stuck in a non-ready state, verify cert-manager resources and events before troubleshooting application pods.
SSL / x509 errors
The cluster CA certificate signs all self-signed certificates used by SeaweedFS, Poolside, Keycloak, and PostgreSQL. TLS is enforced for database connections. Other services terminate TLS at the ingress, and in-cluster traffic is otherwise plaintext. This is an area planned for improvement. Terraform installs the Poolside CA certificate into the host OS trust store using/usr/local/... paths and runs the OS update command. Avoid placing Poolside CA certificates under /etc paths.
You must import the CA certificate to each host that interacts with the platform, either by CLI, browser, or IDE.
After you import the certificate, restart the application or browser, or start a new private session so it takes effect.
Importing on Windows
Importing on macOS
Importing on Ubuntu and Debian
Importing on Red Hat Enterprise Linux and Fedora
Certificate distribution
Some common mechanisms for distributing, and disseminating the Poolside CA TLS certificate include:- Group Policy for all domain-joined machines to a specific Certificate Store
- Configuration Management Tools such as Ansible or Puppet can be used for mixed environments
- MDM such as Intune to push certificates via Configuration profiles
- Browser Enterprise policies can push certificates
- Direct sharing, email, fileshare, browser hosting