From 6553ee241259eb03873851813fd123c7edf0b966 Mon Sep 17 00:00:00 2001 From: annlev <71260515+annlev@users.noreply.github.com> Date: Wed, 4 Oct 2023 12:47:55 +0000 Subject: [PATCH] =?UTF-8?q?Deploying=20to=20gh-pages=20from=20=20@=20fb883?= =?UTF-8?q?698d19f56cddfaab398a9632b9bec3c5325=20=F0=9F=9A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- 404.html | 4 ++-- assets/{app-b76ba2bb.js => app-7e27dcbd.js} | 2 +- assets/{index.html-e6b666ee.js => index.html-a217ad23.js} | 4 ++-- assets/index.html-b5822e8c.js | 1 + assets/index.html-ff856864.js | 1 - enterprise-support-for-almalinux/fips/index.html | 4 ++-- enterprise-support-for-almalinux/index.html | 4 ++-- eportal-api/index.html | 4 ++-- eportal/index.html | 4 ++-- extended-lifecycle-support-for-languages/index.html | 4 ++-- extended-lifecycle-support/index.html | 4 ++-- index.html | 4 ++-- jp/eportal-api/index.html | 4 ++-- jp/eportal/index.html | 4 ++-- jp/extended-lifecycle-support-for-languages/index.html | 4 ++-- jp/extended-lifecycle-support/index.html | 4 ++-- jp/index.html | 4 ++-- jp/linux-support-services/index.html | 4 ++-- jp/live-patching-services/index.html | 4 ++-- jp/tuxcare-cln/index.html | 4 ++-- jp/tuxcare/index.html | 4 ++-- kernelcare-for-iot/index.html | 4 ++-- live-patching-services/index.html | 8 ++++---- service-descriptions/index.html | 4 ++-- tuxcare-cln/index.html | 4 ++-- tuxcare/index.html | 4 ++-- 26 files changed, 50 insertions(+), 50 deletions(-) rename assets/{app-b76ba2bb.js => app-7e27dcbd.js} (99%) rename assets/{index.html-e6b666ee.js => index.html-a217ad23.js} (99%) create mode 100644 assets/index.html-b5822e8c.js delete mode 100644 assets/index.html-ff856864.js diff --git a/404.html b/404.html index f53374d8..a0c9233e 100644 --- a/404.html +++ b/404.html @@ -39,10 +39,10 @@ })(); - +
- + diff --git a/assets/app-b76ba2bb.js b/assets/app-7e27dcbd.js similarity index 99% rename from assets/app-b76ba2bb.js rename to assets/app-7e27dcbd.js index 880eef60..2e69ab11 100644 --- a/assets/app-b76ba2bb.js +++ b/assets/app-7e27dcbd.js @@ -1,3 +1,3 @@ -import{d as T,r as k,a as ot,b as at,i as se,c as rt,e as it,f as lt,g as ve,h as nt,j as ct,o as J,k as E,l as z,m as C,_ as A,n,p as d,q as p,u as w,t as V,F as M,s as B,v as L,w as j,x as me,y as _e,R as ut,z as O,A as W,B as D,T as de,C as S,D as re,E as ie,G as dt,H as N,I as q,J as I,K as ue,L as ye,M as pt,N as Y,O as Q,P,Q as ht,S as G,U as Be,V as oe,W as ft,X as vt,Y as mt,Z as _t,$ as He,a0 as gt,a1 as bt,a2 as yt,a3 as wt,a4 as St,a5 as Lt,a6 as Ot}from"./framework-0ba8e1ea.js";const Et="modulepreload",Dt=function(e){return"/"+e},Ve={},b=function(t,s,o){if(!s||s.length===0)return t();const a=document.getElementsByTagName("link");return Promise.all(s.map(r=>{if(r=Dt(r),r in Ve)return;Ve[r]=!0;const i=r.endsWith(".css"),l=i?'[rel="stylesheet"]':"";if(!!o)for(let f=a.length-1;f>=0;f--){const _=a[f];if(_.href===r&&(!i||_.rel==="stylesheet"))return}else if(document.querySelector(`link[href="${r}"]${l}`))return;const u=document.createElement("link");if(u.rel=i?"stylesheet":Et,i||(u.as="script",u.crossOrigin=""),u.href=r,document.head.appendChild(u),i)return new Promise((f,_)=>{u.addEventListener("load",f),u.addEventListener("error",()=>_(new Error(`Unable to preload CSS for ${r}`)))})})).then(()=>t())},Le={"v-8daa1a0e":()=>b(()=>import("./index.html-e8171bcc.js"),[]).then(({data:e})=>e),"v-b0d2ea62":()=>b(()=>import("./index.html-fc1e5c86.js"),[]).then(({data:e})=>e),"v-89bfb992":()=>b(()=>import("./index.html-c138238f.js"),[]).then(({data:e})=>e),"v-1b6f4a0a":()=>b(()=>import("./index.html-ae0b2092.js"),[]).then(({data:e})=>e),"v-6c1fb884":()=>b(()=>import("./index.html-998f6864.js"),[]).then(({data:e})=>e),"v-cadd6498":()=>b(()=>import("./index.html-3b4a4f38.js"),[]).then(({data:e})=>e),"v-2d0a9a10":()=>b(()=>import("./index.html-092f14d9.js"),[]).then(({data:e})=>e),"v-33720eeb":()=>b(()=>import("./index.html-e1c111f0.js"),[]).then(({data:e})=>e),"v-37e5fb86":()=>b(()=>import("./index.html-ff856864.js"),[]).then(({data:e})=>e),"v-c271a6b2":()=>b(()=>import("./index.html-448a5efa.js"),[]).then(({data:e})=>e),"v-2f5e7500":()=>b(()=>import("./index.html-6c9650cc.js"),[]).then(({data:e})=>e),"v-1f847a28":()=>b(()=>import("./index.html-55653af3.js"),[]).then(({data:e})=>e),"v-ec0cad0c":()=>b(()=>import("./index.html-a16753b4.js"),[]).then(({data:e})=>e),"v-52e27964":()=>b(()=>import("./index.html-71fb4d10.js"),[]).then(({data:e})=>e),"v-c05bf2be":()=>b(()=>import("./index.html-bfb306f5.js"),[]).then(({data:e})=>e),"v-3d707372":()=>b(()=>import("./index.html-04265117.js"),[]).then(({data:e})=>e),"v-7d514c7d":()=>b(()=>import("./index.html-c09eba5b.js"),[]).then(({data:e})=>e),"v-50c7132c":()=>b(()=>import("./index.html-45ca0bbf.js"),[]).then(({data:e})=>e),"v-fd036ae2":()=>b(()=>import("./index.html-070c63b3.js"),[]).then(({data:e})=>e),"v-03bf6597":()=>b(()=>import("./index.html-270136ce.js"),[]).then(({data:e})=>e),"v-b8319282":()=>b(()=>import("./index.html-e424f433.js"),[]).then(({data:e})=>e),"v-3706649a":()=>b(()=>import("./404.html-e0575d4e.js"),[]).then(({data:e})=>e)},$t=JSON.parse(`{"base":"/","lang":"en-US","title":"","description":"","head":[["script",{"type":"text/javascript","charset":"UTF-8","src":"//cdn.cookie-script.com/s/c9f81de32507a4fec1eb03ee80d0f0ed.js"}],["script",{"type":"text/javascript","id":"hs-script-loader","async":true,"defer":true,"src":"//js.hs-scripts.com/5408110.js"}],["script",{},"\\n (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':\\n new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],\\n j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src=\\n 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);\\n })(window,document,'script','dataLayer','GTM-5BSW555');\\n "],["script",{},"\\n (function() {\\n var routes = {\\"/almacare/\\":\\"/enterprise-support-for-almalinux/\\",\\"/service-descriptions/#almacare\\":\\"/enterprise-support-for-almalinux/#essential-and-enhanced-support\\",\\"/eportal/#almacare-cybersecurity-patch-management\\":\\"/eportal/#live-patching-for-almalinux-kernelcare-and-libcare-management\\",\\"/eportal/#deploying-almacare-almacare-cybersecurity\\":\\"/eportal/#deploying-essential-support-live-patching-for-almalinux\\"};\\n \\n for (var route_url in routes) {\\n if (window.location.href.indexOf(route_url) !== -1) {\\n window.location.href = routes[route_url];\\n }\\n }\\n })();\\n "],["script",{},"\\n (function() {\\n // Trigger the scroll event without actually scrolling\\n function triggerScrollEvent() {\\n const targetElement = window;\\n const scrollEvent = new Event('scroll', {\\n bubbles: true,\\n cancelable: true,\\n });\\n targetElement.dispatchEvent(scrollEvent);\\n }\\n \\n // Call the triggerScrollEvent and scrollBodyDown functions after the page is fully loaded\\n window.addEventListener('load', () => {\\n triggerScrollEvent();\\n });\\n })();\\n "]],"locales":{}}`),je={"v-8daa1a0e":T(()=>b(()=>import("./index.html-84b523eb.js"),["assets/index.html-84b523eb.js","assets/framework-0ba8e1ea.js"])),"v-b0d2ea62":T(()=>b(()=>import("./index.html-0974585b.js"),["assets/index.html-0974585b.js","assets/framework-0ba8e1ea.js"])),"v-89bfb992":T(()=>b(()=>import("./index.html-da6a5cef.js"),["assets/index.html-da6a5cef.js","assets/sso_eportal-cc19d109.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-1b6f4a0a":T(()=>b(()=>import("./index.html-8e531858.js"),["assets/index.html-8e531858.js","assets/framework-0ba8e1ea.js"])),"v-6c1fb884":T(()=>b(()=>import("./index.html-74b689f5.js"),["assets/index.html-74b689f5.js","assets/framework-0ba8e1ea.js"])),"v-cadd6498":T(()=>b(()=>import("./index.html-6fea13c2.js"),["assets/index.html-6fea13c2.js","assets/framework-0ba8e1ea.js"])),"v-2d0a9a10":T(()=>b(()=>import("./index.html-5be4a58a.js"),["assets/index.html-5be4a58a.js","assets/framework-0ba8e1ea.js"])),"v-33720eeb":T(()=>b(()=>import("./index.html-f8b8c896.js"),["assets/index.html-f8b8c896.js","assets/framework-0ba8e1ea.js"])),"v-37e5fb86":T(()=>b(()=>import("./index.html-e6b666ee.js"),["assets/index.html-e6b666ee.js","assets/uchecker-31d683fa.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-c271a6b2":T(()=>b(()=>import("./index.html-822dc78a.js"),["assets/index.html-822dc78a.js","assets/framework-0ba8e1ea.js"])),"v-2f5e7500":T(()=>b(()=>import("./index.html-3506f636.js"),["assets/index.html-3506f636.js","assets/framework-0ba8e1ea.js"])),"v-1f847a28":T(()=>b(()=>import("./index.html-f2b36c2b.js"),["assets/index.html-f2b36c2b.js","assets/reports-c7f76afe.js","assets/framework-0ba8e1ea.js"])),"v-ec0cad0c":T(()=>b(()=>import("./index.html-63823c79.js"),["assets/index.html-63823c79.js","assets/framework-0ba8e1ea.js"])),"v-52e27964":T(()=>b(()=>import("./index.html-527a5e84.js"),["assets/index.html-527a5e84.js","assets/sso_eportal-cc19d109.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-c05bf2be":T(()=>b(()=>import("./index.html-1738772c.js"),["assets/index.html-1738772c.js","assets/framework-0ba8e1ea.js"])),"v-3d707372":T(()=>b(()=>import("./index.html-3e49682f.js"),["assets/index.html-3e49682f.js","assets/framework-0ba8e1ea.js"])),"v-7d514c7d":T(()=>b(()=>import("./index.html-815d4f25.js"),["assets/index.html-815d4f25.js","assets/framework-0ba8e1ea.js"])),"v-50c7132c":T(()=>b(()=>import("./index.html-84c31207.js"),["assets/index.html-84c31207.js","assets/framework-0ba8e1ea.js"])),"v-fd036ae2":T(()=>b(()=>import("./index.html-862975e7.js"),["assets/index.html-862975e7.js","assets/uchecker-31d683fa.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-03bf6597":T(()=>b(()=>import("./index.html-9a9ef1ef.js"),["assets/index.html-9a9ef1ef.js","assets/framework-0ba8e1ea.js"])),"v-b8319282":T(()=>b(()=>import("./index.html-c0147096.js"),["assets/index.html-c0147096.js","assets/reports-c7f76afe.js","assets/framework-0ba8e1ea.js"])),"v-3706649a":T(()=>b(()=>import("./404.html-3b82156f.js"),["assets/404.html-3b82156f.js","assets/framework-0ba8e1ea.js"]))};var Vt=Symbol(""),kt=k(Le),Fe=ot({key:"",path:"",title:"",lang:"",frontmatter:{},headers:[]}),X=k(Fe),Z=()=>X,We=Symbol(""),ne=()=>{const e=C(We);if(!e)throw new Error("usePageFrontmatter() is called without provider.");return e},Ne=Symbol(""),xt=()=>{const e=C(Ne);if(!e)throw new Error("usePageHead() is called without provider.");return e},At=Symbol(""),Ge=Symbol(""),Ke=()=>{const e=C(Ge);if(!e)throw new Error("usePageLang() is called without provider.");return e},qe=Symbol(""),Tt=()=>{const e=C(qe);if(!e)throw new Error("usePageLayout() is called without provider.");return e},Ue=Symbol(""),ze=()=>{const e=C(Ue);if(!e)throw new Error("useRouteLocale() is called without provider.");return e},le=k($t),Pt=Symbol(""),Ct=Symbol(""),Rt="Layout",Mt="NotFound",U=at({resolveLayouts:e=>e.reduce((t,s)=>({...t,...s.layouts}),{}),resolvePageData:async e=>{const t=kt.value[e];return await(t==null?void 0:t())??Fe},resolvePageFrontmatter:e=>e.frontmatter,resolvePageHead:(e,t,s)=>{const o=se(t.description)?t.description:s.description,a=[...rt(t.head)?t.head:[],...s.head,["title",{},e],["meta",{name:"description",content:o}]];return it(a)},resolvePageHeadTitle:(e,t)=>[e.title,t.title].filter(s=>!!s).join(" | "),resolvePageLang:e=>e.lang||"en",resolvePageLayout:(e,t)=>{let s;if(e.path){const o=e.frontmatter.layout;se(o)?s=o:s=Rt}else s=Mt;return t[s]},resolveRouteLocale:(e,t)=>lt(e,t),resolveSiteLocaleData:(e,t)=>({...e,...e.locales[t]})}),It=ve({name:"ClientOnly",setup(e,t){const s=k(!1);return J(()=>{s.value=!0}),()=>{var o,a;return s.value?(a=(o=t.slots).default)==null?void 0:a.call(o):null}}}),Bt=ve({name:"Content",props:{pageKey:{type:String,required:!1,default:""}},setup(e){const t=Z(),s=E(()=>je[e.pageKey||t.value.key]);return()=>s.value?z(s.value):z("div","404 Not Found")}}),Ht=(e={})=>e,F=e=>nt(e)?e:`/${ct(e)}`;const jt={enhance:({app:e})=>{}};function Ft(e){return{all:e=e||new Map,on:function(t,s){var o=e.get(t);o?o.push(s):e.set(t,[s])},off:function(t,s){var o=e.get(t);o&&(s?o.splice(o.indexOf(s)>>>0,1):e.set(t,[]))},emit:function(t,s){var o=e.get(t);o&&o.slice().map(function(a){a(s)}),(o=e.get("*"))&&o.slice().map(function(a){a(t,s)})}}}const Wt={class:"footer__img"},Nt=["href"],Gt=["src","alt"],Kt={class:"footer-company-title"},qt={class:"social"},Ut={class:"social_links"},zt=["href"],Jt={class:"footer-social-text"},Xt={class:"social-icons-wrapper"},Yt=["href"],Qt=["src"],Zt={__name:"Footer",setup(e){const{social:t,cloudlinuxSite:s,footerCustomLogo:o,footerCustomAltText:a,locales:r}=C("themeConfig"),i=ne(),l=E(()=>new Date().getFullYear()),c=E(()=>i.value.layout==="HomeLayout");return(u,f)=>(n(),d("div",{class:j(["footer",{"footer-default-layout":!c.value}])},[p("div",Wt,[p("a",{href:w(s)},[p("img",{src:w(F)(w(o)),alt:w(a)},null,8,Gt)],8,Nt)]),p("div",Kt,V(l.value)+". CloudLinux Inc ",1),p("div",qt,[p("div",Ut,[(n(!0),d(M,null,B(w(r).bottomLinks,_=>(n(),d("a",{href:_.url,target:"_blank"},V(_.text),9,zt))),256))]),p("span",Jt,V(w(r).stayInTouch),1),p("div",Xt,[(n(!0),d(M,null,B(w(t),_=>(n(),d("a",{class:"social-icons-link",href:_==null?void 0:_.url,target:"_blank"},[_.icon?(n(),d("img",{key:0,class:"social-icons-link-img",src:w(F)(_==null?void 0:_.icon),alt:"footer logo"},null,8,Qt)):L("v-if",!0)],8,Yt))),256))])])],2))}},pe=A(Zt,[["__scopeId","data-v-0190e83e"],["__file","Footer.vue"]]),Oe=/#.*$/,es=/\.(md|html)$/,te=/\/$/,we=/^(https?:|mailto:|tel:)/;function ae(e){return decodeURI(e).replace(Oe,"").replace(es,"")}function ts(e){const t=e==null?void 0:e.match(Oe);if(t)return t[0]}function ss(e){return we.test(e)}function os(e){if(ss(e))return e;const t=e==null?void 0:e.match(Oe),s=t?t[0]:"",o=ae(e);return te.test(o)?e:o+".html"+s}function he(e,t){const s=e.hash,o=ts(t);if(o&&s!==o)return!1;const a=ae(e.path),r=ae(t);return a===r}function fe(e,t,s){s&&(t=as(t,s));const o=ae(t);for(let a=0;aXe(i,s,a)):[]}function rs(e){e=e.map(s=>Object.assign({},JSON.parse(JSON.stringify(s))));let t;return e.forEach(s=>{s.level!==1?t=s:t&&(t.children||(t.children=[])).push(s)}),e.filter(s=>s.level!==1)}function is(e,t){if(Array.isArray(t))return{base:"/",config:t};for(const s in t)if(ls(e.path).indexOf(s)===0)return{base:s,config:t[s]};return null}function ls(e){return/(\.html|\/)$/.test(e)?e:e+"/"}function Xe(e,t,s,o){if(typeof e=="string")return fe(t,e,s);if(Array.isArray(e))return Object.assign(fe(t,e[0],s),{title:e[1]});{o&&console.error("[vuepress] Nested sidebar groups are not supported. Consider using navbar + categories instead.");const a=e.children||[];return{type:"group",title:e.title,children:a.map(r=>Xe(r,t,s,!0)),collapsable:e.collapsable!==!1}}}const ns={functional:!0,props:["item","closeSidebarDrawer"],render({item:e,closeSidebarDrawer:t}){var f,_;if(!e)return;const s=Z(),o=me(),a=_e(),r=he(o,e==null?void 0:e.path),i=(e==null?void 0:e.type)==="auto"?r||e.children.some(g=>he(o,e.basePath+"#"+g.slug)):r,l=cs(z,e==null?void 0:e.path,e.title||(e==null?void 0:e.path),i,e.headers,t,a),c=((f=s.value.frontmatter)==null?void 0:f.sidebarDepth)!=null?(_=s.value.frontmatter)==null?void 0:_.sidebarDepth:5,u=c??1;if((e==null?void 0:e.type)==="auto")return[l,Se(z,e.children,e.basePath,o,u,1,t)];if(e.headers&&e.headers.length){const g=rs(e.headers);return[l,Se(z,g,e==null?void 0:e.path,o,u,1,t)]}return Ee(z,e==null?void 0:e.path,e.title||(e==null?void 0:e.path),i,e.children,0,t)}};function Ee(e,t,s,o,a,r=0,i){const l=e(ut,{"data-anchor":t,to:t,activeClass:"",exactActiveClass:"",class:{active:o,"sidebar-link":!0,["link-depth-level-"+r]:!0}},()=>[s]);return e("div",{class:{active:o,collapsed:!0,"sidebar-link-container":!!(a!=null&&a.length)},onClick:c=>{c.target.classList.toggle("collapsed"),c.target.tagName!=="DIV"&&i()}},[l])}function cs(e,t,s,o,a,r,i){const l=!!a&&a.some(c=>c.level!==1);return e("div",{class:{active:o,collapsed:o,"sidebar-header":!0,"sidebar-link":!0,"sidebar-header--empty":!l},onClick:c=>{const u=c.target.classList,f=c.target.querySelector("a");u.toggle("collapsed"),f&&i.push(f.getAttribute("href"))}},[Ee(e,t,s,o,null,0,r)])}function Se(e,t,s,o,a,r=1,i){return!t||r>a?null:e("ul",{class:"sidebar-sub-headers"},t.map(l=>{const c=he(o,s+"#"+l.slug);return e("li",{class:{collapsible:r<3,"sidebar-sub-header":!0}},[Ee(e,s+"#"+l.slug,l.title,c,l.children,r,i),Se(e,l.children,s,o,a,r+1,i)])}))}const Ye=A(ns,[["__file","SidebarLink.vue"]]);const us={__name:"DropdownTransition",setup(e){const t=o=>{o.style.height=o.scrollHeight+"px"},s=o=>{o.style.height=""};return(o,a)=>(n(),O(de,{name:"dropdown",onEnter:t,onAfterEnter:s,onBeforeLeave:t},{default:W(()=>[D(o.$slots,"default")]),_:3}))}},ds=A(us,[["__file","DropdownTransition.vue"]]);const ps={key:0,ref:"items",class:"sidebar-group-items"},hs={__name:"SidebarGroup",props:{item:{type:Object,required:!0},first:{type:Boolean,required:!0},open:{type:Boolean,required:!0},collapsable:{type:Boolean,required:!0},closeSidebarDrawer:{type:Function,default:()=>{}}},setup(e){return(t,s)=>(n(),d("div",{class:j(["sidebar-group",{first:e.first,collapsable:e.collapsable}])},[S(ds,null,{default:W(()=>{var o;return[e.open||!e.collapsable?(n(),d("ul",ps,[(n(!0),d(M,null,B((o=e.item)==null?void 0:o.children,a=>(n(),d("li",null,[S(Ye,{closeSidebarDrawer:e.closeSidebarDrawer,item:a},null,8,["closeSidebarDrawer","item"])]))),256))],512)):L("v-if",!0)]}),_:1})],2))}},fs=A(hs,[["__file","SidebarGroup.vue"]]);const vs={class:"sidebar"},ms={key:0,class:"sidebar-links"},_s={__name:"Sidebar",props:{items:{type:Array,required:!0},closeSidebarDrawer:{type:Function,default:()=>{}},isMobileWidth:{type:Boolean}},setup(e){const t=e,s=E(()=>t.items),o=me(),a=Z(),r=E(()=>Je(a.value,o,s.value)),i=k(0),l=()=>{const h=_(o,t.items);h>-1&&(i.value=h)},c=h=>{i.value=h===i.value?-1:h},u=h=>{const v=h.getBoundingClientRect();return v.top>=0&&v.left>=0&&v.bottom<=(window.innerHeight/2||document.documentElement.clientHeight/2)&&v.right<=(window.innerWidth||document.documentElement.clientWidth)};re(()=>o,l);const f=()=>{const h=document.querySelectorAll(".header-anchor"),v=document.querySelector(".sidebar"),m=v.querySelectorAll("a"),y=v.querySelectorAll(".collapsible.sidebar-sub-header"),x=Array.from(m).map($=>$.getAttribute("data-anchor"));h.forEach($=>{$.getAttribute("data-anchor")||$.setAttribute("data-anchor",a.value.path+$.hash)}),h.forEach($=>{if(u($)){const H=x.find(R=>R===$.getAttribute("data-anchor"));y.forEach(R=>{R.querySelectorAll(".sidebar-link-container").forEach(K=>{R.querySelector(`a[data-anchor="${H}"]`)?K.classList.remove("collapsed"):K.classList.add("collapsed")})}),v.querySelector(`a[data-anchor="${H}"]`)&&(m.forEach(R=>R.classList.remove("active")),v.querySelector(`a[data-anchor="${H}"]`).classList.add("active"))}})},_=(h,v)=>{for(let m=0;mhe(h,x.path)))return m}return-1},g=()=>{const h=window.location.hash,v=document.querySelectorAll(".sidebar a");v.forEach(m=>{if(m.getAttribute("data-anchor")===h){v.forEach(x=>x.classList.remove("active")),m.classList.add("active");const y=m.closest(".collapsible");y&&y.classList.remove("collapsed")}})};return J(()=>{l(),t.isMobileWidth||window.addEventListener("scroll",f),t.isMobileWidth||window.addEventListener("resize",f),window.addEventListener("hashchange",g)}),ie(()=>{window.removeEventListener("scroll",f),window.removeEventListener("resize",f),window.removeEventListener("hashchange",g)}),(h,v)=>(n(),d("div",vs,[D(h.$slots,"top"),r.value.length?(n(),d("ul",ms,[(n(!0),d(M,null,B(r.value,(m,y)=>(n(),d("li",{key:y},[m.type==="group"?(n(),O(fs,{key:0,item:m,first:y===0,open:y===i.value,closeSidebarDrawer:e.closeSidebarDrawer,collapsable:!!(m.collapsable||m.collapsible),onToggle:x=>c(y)},null,8,["item","first","open","closeSidebarDrawer","collapsable","onToggle"])):(n(),O(Ye,{key:1,closeSidebarDrawer:e.closeSidebarDrawer,item:m},null,8,["closeSidebarDrawer","item"]))]))),128))])):L("v-if",!0),D(h.$slots,"bottom")]))}},Qe=A(_s,[["__file","Sidebar.vue"]]);var gs=Object.defineProperty,bs=Object.defineProperties,ys=Object.getOwnPropertyDescriptors,ke=Object.getOwnPropertySymbols,ws=Object.prototype.hasOwnProperty,Ss=Object.prototype.propertyIsEnumerable,xe=(e,t,s)=>t in e?gs(e,t,{enumerable:!0,configurable:!0,writable:!0,value:s}):e[t]=s,ee=(e,t)=>{for(var s in t||(t={}))ws.call(t,s)&&xe(e,s,t[s]);if(ke)for(var s of ke(t))Ss.call(t,s)&&xe(e,s,t[s]);return e},Ae=(e,t)=>bs(e,ys(t));const Ls={props:{autoscroll:{type:Boolean,default:!0}},watch:{typeAheadPointer(){this.autoscroll&&this.maybeAdjustScroll()},open(e){this.autoscroll&&e&&this.$nextTick(()=>this.maybeAdjustScroll())}},methods:{maybeAdjustScroll(){var e;const t=((e=this.$refs.dropdownMenu)==null?void 0:e.children[this.typeAheadPointer])||!1;if(t){const s=this.getDropdownViewport(),{top:o,bottom:a,height:r}=t.getBoundingClientRect();if(os.bottom)return this.$refs.dropdownMenu.scrollTop=t.offsetTop-(s.height-r)}},getDropdownViewport(){return this.$refs.dropdownMenu?this.$refs.dropdownMenu.getBoundingClientRect():{height:0,top:0,bottom:0}}}},Os={data(){return{typeAheadPointer:-1}},watch:{filteredOptions(){for(let e=0;e=0;e--)if(this.selectable(this.filteredOptions[e])){this.typeAheadPointer=e;break}},typeAheadDown(){for(let e=this.typeAheadPointer+1;e{const s=e.__vccOpts||e;for(const[o,a]of t)s[o]=a;return s},Ds={},$s={xmlns:"http://www.w3.org/2000/svg",width:"10",height:"10"},Vs=p("path",{d:"M6.895455 5l2.842897-2.842898c.348864-.348863.348864-.914488 0-1.263636L9.106534.261648c-.348864-.348864-.914489-.348864-1.263636 0L5 3.104545 2.157102.261648c-.348863-.348864-.914488-.348864-1.263636 0L.261648.893466c-.348864.348864-.348864.914489 0 1.263636L3.104545 5 .261648 7.842898c-.348864.348863-.348864.914488 0 1.263636l.631818.631818c.348864.348864.914773.348864 1.263636 0L5 6.895455l2.842898 2.842897c.348863.348864.914772.348864 1.263636 0l.631818-.631818c.348864-.348864.348864-.914489 0-1.263636L6.895455 5z"},null,-1),ks=[Vs];function xs(e,t){return n(),d("svg",$s,ks)}const As=De(Ds,[["render",xs]]),Ts={},Ps={xmlns:"http://www.w3.org/2000/svg",width:"14",height:"10"},Cs=p("path",{d:"M9.211364 7.59931l4.48338-4.867229c.407008-.441854.407008-1.158247 0-1.60046l-.73712-.80023c-.407008-.441854-1.066904-.441854-1.474243 0L7 5.198617 2.51662.33139c-.407008-.441853-1.066904-.441853-1.474243 0l-.737121.80023c-.407008.441854-.407008 1.158248 0 1.600461l4.48338 4.867228L7 10l2.211364-2.40069z"},null,-1),Rs=[Cs];function Ms(e,t){return n(),d("svg",Ps,Rs)}const Is=De(Ts,[["render",Ms]]),Te={Deselect:As,OpenIndicator:Is},Bs={mounted(e,{instance:t}){if(t.appendToBody){const{height:s,top:o,left:a,width:r}=t.$refs.toggle.getBoundingClientRect();let i=window.scrollX||window.pageXOffset,l=window.scrollY||window.pageYOffset;e.unbindPosition=t.calculatePosition(e,t,{width:r+"px",left:i+a+"px",top:l+o+s+"px"}),document.body.appendChild(e)}},unmounted(e,{instance:t}){t.appendToBody&&(e.unbindPosition&&typeof e.unbindPosition=="function"&&e.unbindPosition(),e.parentNode&&e.parentNode.removeChild(e))}};function Hs(e){const t={};return Object.keys(e).sort().forEach(s=>{t[s]=e[s]}),JSON.stringify(t)}let js=0;function Fs(){return++js}const Ws={components:ee({},Te),directives:{appendToBody:Bs},mixins:[Ls,Os,Es],compatConfig:{MODE:3},emits:["open","close","update:modelValue","search","search:compositionstart","search:compositionend","search:keydown","search:blur","search:focus","search:input","option:created","option:selecting","option:selected","option:deselecting","option:deselected"],props:{modelValue:{},components:{type:Object,default:()=>({})},options:{type:Array,default(){return[]}},disabled:{type:Boolean,default:!1},clearable:{type:Boolean,default:!0},deselectFromDropdown:{type:Boolean,default:!1},searchable:{type:Boolean,default:!0},multiple:{type:Boolean,default:!1},placeholder:{type:String,default:""},transition:{type:String,default:"vs__fade"},clearSearchOnSelect:{type:Boolean,default:!0},closeOnSelect:{type:Boolean,default:!0},label:{type:String,default:"label"},autocomplete:{type:String,default:"off"},reduce:{type:Function,default:e=>e},selectable:{type:Function,default:e=>!0},getOptionLabel:{type:Function,default(e){return typeof e=="object"?e.hasOwnProperty(this.label)?e[this.label]:console.warn(`[vue-select warn]: Label key "option.${this.label}" does not exist in options object ${JSON.stringify(e)}. +import{d as T,r as k,a as ot,b as at,i as se,c as rt,e as it,f as lt,g as ve,h as nt,j as ct,o as J,k as E,l as z,m as C,_ as A,n,p as d,q as p,u as w,t as V,F as M,s as B,v as L,w as j,x as me,y as _e,R as ut,z as O,A as W,B as D,T as de,C as S,D as re,E as ie,G as dt,H as N,I as q,J as I,K as ue,L as ye,M as pt,N as Y,O as Q,P,Q as ht,S as G,U as Be,V as oe,W as ft,X as vt,Y as mt,Z as _t,$ as He,a0 as gt,a1 as bt,a2 as yt,a3 as wt,a4 as St,a5 as Lt,a6 as Ot}from"./framework-0ba8e1ea.js";const Et="modulepreload",Dt=function(e){return"/"+e},Ve={},b=function(t,s,o){if(!s||s.length===0)return t();const a=document.getElementsByTagName("link");return Promise.all(s.map(r=>{if(r=Dt(r),r in Ve)return;Ve[r]=!0;const i=r.endsWith(".css"),l=i?'[rel="stylesheet"]':"";if(!!o)for(let f=a.length-1;f>=0;f--){const _=a[f];if(_.href===r&&(!i||_.rel==="stylesheet"))return}else if(document.querySelector(`link[href="${r}"]${l}`))return;const u=document.createElement("link");if(u.rel=i?"stylesheet":Et,i||(u.as="script",u.crossOrigin=""),u.href=r,document.head.appendChild(u),i)return new Promise((f,_)=>{u.addEventListener("load",f),u.addEventListener("error",()=>_(new Error(`Unable to preload CSS for ${r}`)))})})).then(()=>t())},Le={"v-8daa1a0e":()=>b(()=>import("./index.html-e8171bcc.js"),[]).then(({data:e})=>e),"v-b0d2ea62":()=>b(()=>import("./index.html-fc1e5c86.js"),[]).then(({data:e})=>e),"v-89bfb992":()=>b(()=>import("./index.html-c138238f.js"),[]).then(({data:e})=>e),"v-1b6f4a0a":()=>b(()=>import("./index.html-ae0b2092.js"),[]).then(({data:e})=>e),"v-6c1fb884":()=>b(()=>import("./index.html-998f6864.js"),[]).then(({data:e})=>e),"v-cadd6498":()=>b(()=>import("./index.html-3b4a4f38.js"),[]).then(({data:e})=>e),"v-2d0a9a10":()=>b(()=>import("./index.html-092f14d9.js"),[]).then(({data:e})=>e),"v-33720eeb":()=>b(()=>import("./index.html-e1c111f0.js"),[]).then(({data:e})=>e),"v-37e5fb86":()=>b(()=>import("./index.html-b5822e8c.js"),[]).then(({data:e})=>e),"v-c271a6b2":()=>b(()=>import("./index.html-448a5efa.js"),[]).then(({data:e})=>e),"v-2f5e7500":()=>b(()=>import("./index.html-6c9650cc.js"),[]).then(({data:e})=>e),"v-1f847a28":()=>b(()=>import("./index.html-55653af3.js"),[]).then(({data:e})=>e),"v-ec0cad0c":()=>b(()=>import("./index.html-a16753b4.js"),[]).then(({data:e})=>e),"v-52e27964":()=>b(()=>import("./index.html-71fb4d10.js"),[]).then(({data:e})=>e),"v-c05bf2be":()=>b(()=>import("./index.html-bfb306f5.js"),[]).then(({data:e})=>e),"v-3d707372":()=>b(()=>import("./index.html-04265117.js"),[]).then(({data:e})=>e),"v-7d514c7d":()=>b(()=>import("./index.html-c09eba5b.js"),[]).then(({data:e})=>e),"v-50c7132c":()=>b(()=>import("./index.html-45ca0bbf.js"),[]).then(({data:e})=>e),"v-fd036ae2":()=>b(()=>import("./index.html-070c63b3.js"),[]).then(({data:e})=>e),"v-03bf6597":()=>b(()=>import("./index.html-270136ce.js"),[]).then(({data:e})=>e),"v-b8319282":()=>b(()=>import("./index.html-e424f433.js"),[]).then(({data:e})=>e),"v-3706649a":()=>b(()=>import("./404.html-e0575d4e.js"),[]).then(({data:e})=>e)},$t=JSON.parse(`{"base":"/","lang":"en-US","title":"","description":"","head":[["script",{"type":"text/javascript","charset":"UTF-8","src":"//cdn.cookie-script.com/s/c9f81de32507a4fec1eb03ee80d0f0ed.js"}],["script",{"type":"text/javascript","id":"hs-script-loader","async":true,"defer":true,"src":"//js.hs-scripts.com/5408110.js"}],["script",{},"\\n (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':\\n new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],\\n j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src=\\n 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);\\n })(window,document,'script','dataLayer','GTM-5BSW555');\\n "],["script",{},"\\n (function() {\\n var routes = {\\"/almacare/\\":\\"/enterprise-support-for-almalinux/\\",\\"/service-descriptions/#almacare\\":\\"/enterprise-support-for-almalinux/#essential-and-enhanced-support\\",\\"/eportal/#almacare-cybersecurity-patch-management\\":\\"/eportal/#live-patching-for-almalinux-kernelcare-and-libcare-management\\",\\"/eportal/#deploying-almacare-almacare-cybersecurity\\":\\"/eportal/#deploying-essential-support-live-patching-for-almalinux\\"};\\n \\n for (var route_url in routes) {\\n if (window.location.href.indexOf(route_url) !== -1) {\\n window.location.href = routes[route_url];\\n }\\n }\\n })();\\n "],["script",{},"\\n (function() {\\n // Trigger the scroll event without actually scrolling\\n function triggerScrollEvent() {\\n const targetElement = window;\\n const scrollEvent = new Event('scroll', {\\n bubbles: true,\\n cancelable: true,\\n });\\n targetElement.dispatchEvent(scrollEvent);\\n }\\n \\n // Call the triggerScrollEvent and scrollBodyDown functions after the page is fully loaded\\n window.addEventListener('load', () => {\\n triggerScrollEvent();\\n });\\n })();\\n "]],"locales":{}}`),je={"v-8daa1a0e":T(()=>b(()=>import("./index.html-84b523eb.js"),["assets/index.html-84b523eb.js","assets/framework-0ba8e1ea.js"])),"v-b0d2ea62":T(()=>b(()=>import("./index.html-0974585b.js"),["assets/index.html-0974585b.js","assets/framework-0ba8e1ea.js"])),"v-89bfb992":T(()=>b(()=>import("./index.html-da6a5cef.js"),["assets/index.html-da6a5cef.js","assets/sso_eportal-cc19d109.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-1b6f4a0a":T(()=>b(()=>import("./index.html-8e531858.js"),["assets/index.html-8e531858.js","assets/framework-0ba8e1ea.js"])),"v-6c1fb884":T(()=>b(()=>import("./index.html-74b689f5.js"),["assets/index.html-74b689f5.js","assets/framework-0ba8e1ea.js"])),"v-cadd6498":T(()=>b(()=>import("./index.html-6fea13c2.js"),["assets/index.html-6fea13c2.js","assets/framework-0ba8e1ea.js"])),"v-2d0a9a10":T(()=>b(()=>import("./index.html-5be4a58a.js"),["assets/index.html-5be4a58a.js","assets/framework-0ba8e1ea.js"])),"v-33720eeb":T(()=>b(()=>import("./index.html-f8b8c896.js"),["assets/index.html-f8b8c896.js","assets/framework-0ba8e1ea.js"])),"v-37e5fb86":T(()=>b(()=>import("./index.html-a217ad23.js"),["assets/index.html-a217ad23.js","assets/uchecker-31d683fa.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-c271a6b2":T(()=>b(()=>import("./index.html-822dc78a.js"),["assets/index.html-822dc78a.js","assets/framework-0ba8e1ea.js"])),"v-2f5e7500":T(()=>b(()=>import("./index.html-3506f636.js"),["assets/index.html-3506f636.js","assets/framework-0ba8e1ea.js"])),"v-1f847a28":T(()=>b(()=>import("./index.html-f2b36c2b.js"),["assets/index.html-f2b36c2b.js","assets/reports-c7f76afe.js","assets/framework-0ba8e1ea.js"])),"v-ec0cad0c":T(()=>b(()=>import("./index.html-63823c79.js"),["assets/index.html-63823c79.js","assets/framework-0ba8e1ea.js"])),"v-52e27964":T(()=>b(()=>import("./index.html-527a5e84.js"),["assets/index.html-527a5e84.js","assets/sso_eportal-cc19d109.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-c05bf2be":T(()=>b(()=>import("./index.html-1738772c.js"),["assets/index.html-1738772c.js","assets/framework-0ba8e1ea.js"])),"v-3d707372":T(()=>b(()=>import("./index.html-3e49682f.js"),["assets/index.html-3e49682f.js","assets/framework-0ba8e1ea.js"])),"v-7d514c7d":T(()=>b(()=>import("./index.html-815d4f25.js"),["assets/index.html-815d4f25.js","assets/framework-0ba8e1ea.js"])),"v-50c7132c":T(()=>b(()=>import("./index.html-84c31207.js"),["assets/index.html-84c31207.js","assets/framework-0ba8e1ea.js"])),"v-fd036ae2":T(()=>b(()=>import("./index.html-862975e7.js"),["assets/index.html-862975e7.js","assets/uchecker-31d683fa.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-03bf6597":T(()=>b(()=>import("./index.html-9a9ef1ef.js"),["assets/index.html-9a9ef1ef.js","assets/framework-0ba8e1ea.js"])),"v-b8319282":T(()=>b(()=>import("./index.html-c0147096.js"),["assets/index.html-c0147096.js","assets/reports-c7f76afe.js","assets/framework-0ba8e1ea.js"])),"v-3706649a":T(()=>b(()=>import("./404.html-3b82156f.js"),["assets/404.html-3b82156f.js","assets/framework-0ba8e1ea.js"]))};var Vt=Symbol(""),kt=k(Le),Fe=ot({key:"",path:"",title:"",lang:"",frontmatter:{},headers:[]}),X=k(Fe),Z=()=>X,We=Symbol(""),ne=()=>{const e=C(We);if(!e)throw new Error("usePageFrontmatter() is called without provider.");return e},Ne=Symbol(""),xt=()=>{const e=C(Ne);if(!e)throw new Error("usePageHead() is called without provider.");return e},At=Symbol(""),Ge=Symbol(""),Ke=()=>{const e=C(Ge);if(!e)throw new Error("usePageLang() is called without provider.");return e},qe=Symbol(""),Tt=()=>{const e=C(qe);if(!e)throw new Error("usePageLayout() is called without provider.");return e},Ue=Symbol(""),ze=()=>{const e=C(Ue);if(!e)throw new Error("useRouteLocale() is called without provider.");return e},le=k($t),Pt=Symbol(""),Ct=Symbol(""),Rt="Layout",Mt="NotFound",U=at({resolveLayouts:e=>e.reduce((t,s)=>({...t,...s.layouts}),{}),resolvePageData:async e=>{const t=kt.value[e];return await(t==null?void 0:t())??Fe},resolvePageFrontmatter:e=>e.frontmatter,resolvePageHead:(e,t,s)=>{const o=se(t.description)?t.description:s.description,a=[...rt(t.head)?t.head:[],...s.head,["title",{},e],["meta",{name:"description",content:o}]];return it(a)},resolvePageHeadTitle:(e,t)=>[e.title,t.title].filter(s=>!!s).join(" | "),resolvePageLang:e=>e.lang||"en",resolvePageLayout:(e,t)=>{let s;if(e.path){const o=e.frontmatter.layout;se(o)?s=o:s=Rt}else s=Mt;return t[s]},resolveRouteLocale:(e,t)=>lt(e,t),resolveSiteLocaleData:(e,t)=>({...e,...e.locales[t]})}),It=ve({name:"ClientOnly",setup(e,t){const s=k(!1);return J(()=>{s.value=!0}),()=>{var o,a;return s.value?(a=(o=t.slots).default)==null?void 0:a.call(o):null}}}),Bt=ve({name:"Content",props:{pageKey:{type:String,required:!1,default:""}},setup(e){const t=Z(),s=E(()=>je[e.pageKey||t.value.key]);return()=>s.value?z(s.value):z("div","404 Not Found")}}),Ht=(e={})=>e,F=e=>nt(e)?e:`/${ct(e)}`;const jt={enhance:({app:e})=>{}};function Ft(e){return{all:e=e||new Map,on:function(t,s){var o=e.get(t);o?o.push(s):e.set(t,[s])},off:function(t,s){var o=e.get(t);o&&(s?o.splice(o.indexOf(s)>>>0,1):e.set(t,[]))},emit:function(t,s){var o=e.get(t);o&&o.slice().map(function(a){a(s)}),(o=e.get("*"))&&o.slice().map(function(a){a(t,s)})}}}const Wt={class:"footer__img"},Nt=["href"],Gt=["src","alt"],Kt={class:"footer-company-title"},qt={class:"social"},Ut={class:"social_links"},zt=["href"],Jt={class:"footer-social-text"},Xt={class:"social-icons-wrapper"},Yt=["href"],Qt=["src"],Zt={__name:"Footer",setup(e){const{social:t,cloudlinuxSite:s,footerCustomLogo:o,footerCustomAltText:a,locales:r}=C("themeConfig"),i=ne(),l=E(()=>new Date().getFullYear()),c=E(()=>i.value.layout==="HomeLayout");return(u,f)=>(n(),d("div",{class:j(["footer",{"footer-default-layout":!c.value}])},[p("div",Wt,[p("a",{href:w(s)},[p("img",{src:w(F)(w(o)),alt:w(a)},null,8,Gt)],8,Nt)]),p("div",Kt,V(l.value)+". CloudLinux Inc ",1),p("div",qt,[p("div",Ut,[(n(!0),d(M,null,B(w(r).bottomLinks,_=>(n(),d("a",{href:_.url,target:"_blank"},V(_.text),9,zt))),256))]),p("span",Jt,V(w(r).stayInTouch),1),p("div",Xt,[(n(!0),d(M,null,B(w(t),_=>(n(),d("a",{class:"social-icons-link",href:_==null?void 0:_.url,target:"_blank"},[_.icon?(n(),d("img",{key:0,class:"social-icons-link-img",src:w(F)(_==null?void 0:_.icon),alt:"footer logo"},null,8,Qt)):L("v-if",!0)],8,Yt))),256))])])],2))}},pe=A(Zt,[["__scopeId","data-v-0190e83e"],["__file","Footer.vue"]]),Oe=/#.*$/,es=/\.(md|html)$/,te=/\/$/,we=/^(https?:|mailto:|tel:)/;function ae(e){return decodeURI(e).replace(Oe,"").replace(es,"")}function ts(e){const t=e==null?void 0:e.match(Oe);if(t)return t[0]}function ss(e){return we.test(e)}function os(e){if(ss(e))return e;const t=e==null?void 0:e.match(Oe),s=t?t[0]:"",o=ae(e);return te.test(o)?e:o+".html"+s}function he(e,t){const s=e.hash,o=ts(t);if(o&&s!==o)return!1;const a=ae(e.path),r=ae(t);return a===r}function fe(e,t,s){s&&(t=as(t,s));const o=ae(t);for(let a=0;aXe(i,s,a)):[]}function rs(e){e=e.map(s=>Object.assign({},JSON.parse(JSON.stringify(s))));let t;return e.forEach(s=>{s.level!==1?t=s:t&&(t.children||(t.children=[])).push(s)}),e.filter(s=>s.level!==1)}function is(e,t){if(Array.isArray(t))return{base:"/",config:t};for(const s in t)if(ls(e.path).indexOf(s)===0)return{base:s,config:t[s]};return null}function ls(e){return/(\.html|\/)$/.test(e)?e:e+"/"}function Xe(e,t,s,o){if(typeof e=="string")return fe(t,e,s);if(Array.isArray(e))return Object.assign(fe(t,e[0],s),{title:e[1]});{o&&console.error("[vuepress] Nested sidebar groups are not supported. Consider using navbar + categories instead.");const a=e.children||[];return{type:"group",title:e.title,children:a.map(r=>Xe(r,t,s,!0)),collapsable:e.collapsable!==!1}}}const ns={functional:!0,props:["item","closeSidebarDrawer"],render({item:e,closeSidebarDrawer:t}){var f,_;if(!e)return;const s=Z(),o=me(),a=_e(),r=he(o,e==null?void 0:e.path),i=(e==null?void 0:e.type)==="auto"?r||e.children.some(g=>he(o,e.basePath+"#"+g.slug)):r,l=cs(z,e==null?void 0:e.path,e.title||(e==null?void 0:e.path),i,e.headers,t,a),c=((f=s.value.frontmatter)==null?void 0:f.sidebarDepth)!=null?(_=s.value.frontmatter)==null?void 0:_.sidebarDepth:5,u=c??1;if((e==null?void 0:e.type)==="auto")return[l,Se(z,e.children,e.basePath,o,u,1,t)];if(e.headers&&e.headers.length){const g=rs(e.headers);return[l,Se(z,g,e==null?void 0:e.path,o,u,1,t)]}return Ee(z,e==null?void 0:e.path,e.title||(e==null?void 0:e.path),i,e.children,0,t)}};function Ee(e,t,s,o,a,r=0,i){const l=e(ut,{"data-anchor":t,to:t,activeClass:"",exactActiveClass:"",class:{active:o,"sidebar-link":!0,["link-depth-level-"+r]:!0}},()=>[s]);return e("div",{class:{active:o,collapsed:!0,"sidebar-link-container":!!(a!=null&&a.length)},onClick:c=>{c.target.classList.toggle("collapsed"),c.target.tagName!=="DIV"&&i()}},[l])}function cs(e,t,s,o,a,r,i){const l=!!a&&a.some(c=>c.level!==1);return e("div",{class:{active:o,collapsed:o,"sidebar-header":!0,"sidebar-link":!0,"sidebar-header--empty":!l},onClick:c=>{const u=c.target.classList,f=c.target.querySelector("a");u.toggle("collapsed"),f&&i.push(f.getAttribute("href"))}},[Ee(e,t,s,o,null,0,r)])}function Se(e,t,s,o,a,r=1,i){return!t||r>a?null:e("ul",{class:"sidebar-sub-headers"},t.map(l=>{const c=he(o,s+"#"+l.slug);return e("li",{class:{collapsible:r<3,"sidebar-sub-header":!0}},[Ee(e,s+"#"+l.slug,l.title,c,l.children,r,i),Se(e,l.children,s,o,a,r+1,i)])}))}const Ye=A(ns,[["__file","SidebarLink.vue"]]);const us={__name:"DropdownTransition",setup(e){const t=o=>{o.style.height=o.scrollHeight+"px"},s=o=>{o.style.height=""};return(o,a)=>(n(),O(de,{name:"dropdown",onEnter:t,onAfterEnter:s,onBeforeLeave:t},{default:W(()=>[D(o.$slots,"default")]),_:3}))}},ds=A(us,[["__file","DropdownTransition.vue"]]);const ps={key:0,ref:"items",class:"sidebar-group-items"},hs={__name:"SidebarGroup",props:{item:{type:Object,required:!0},first:{type:Boolean,required:!0},open:{type:Boolean,required:!0},collapsable:{type:Boolean,required:!0},closeSidebarDrawer:{type:Function,default:()=>{}}},setup(e){return(t,s)=>(n(),d("div",{class:j(["sidebar-group",{first:e.first,collapsable:e.collapsable}])},[S(ds,null,{default:W(()=>{var o;return[e.open||!e.collapsable?(n(),d("ul",ps,[(n(!0),d(M,null,B((o=e.item)==null?void 0:o.children,a=>(n(),d("li",null,[S(Ye,{closeSidebarDrawer:e.closeSidebarDrawer,item:a},null,8,["closeSidebarDrawer","item"])]))),256))],512)):L("v-if",!0)]}),_:1})],2))}},fs=A(hs,[["__file","SidebarGroup.vue"]]);const vs={class:"sidebar"},ms={key:0,class:"sidebar-links"},_s={__name:"Sidebar",props:{items:{type:Array,required:!0},closeSidebarDrawer:{type:Function,default:()=>{}},isMobileWidth:{type:Boolean}},setup(e){const t=e,s=E(()=>t.items),o=me(),a=Z(),r=E(()=>Je(a.value,o,s.value)),i=k(0),l=()=>{const h=_(o,t.items);h>-1&&(i.value=h)},c=h=>{i.value=h===i.value?-1:h},u=h=>{const v=h.getBoundingClientRect();return v.top>=0&&v.left>=0&&v.bottom<=(window.innerHeight/2||document.documentElement.clientHeight/2)&&v.right<=(window.innerWidth||document.documentElement.clientWidth)};re(()=>o,l);const f=()=>{const h=document.querySelectorAll(".header-anchor"),v=document.querySelector(".sidebar"),m=v.querySelectorAll("a"),y=v.querySelectorAll(".collapsible.sidebar-sub-header"),x=Array.from(m).map($=>$.getAttribute("data-anchor"));h.forEach($=>{$.getAttribute("data-anchor")||$.setAttribute("data-anchor",a.value.path+$.hash)}),h.forEach($=>{if(u($)){const H=x.find(R=>R===$.getAttribute("data-anchor"));y.forEach(R=>{R.querySelectorAll(".sidebar-link-container").forEach(K=>{R.querySelector(`a[data-anchor="${H}"]`)?K.classList.remove("collapsed"):K.classList.add("collapsed")})}),v.querySelector(`a[data-anchor="${H}"]`)&&(m.forEach(R=>R.classList.remove("active")),v.querySelector(`a[data-anchor="${H}"]`).classList.add("active"))}})},_=(h,v)=>{for(let m=0;mhe(h,x.path)))return m}return-1},g=()=>{const h=window.location.hash,v=document.querySelectorAll(".sidebar a");v.forEach(m=>{if(m.getAttribute("data-anchor")===h){v.forEach(x=>x.classList.remove("active")),m.classList.add("active");const y=m.closest(".collapsible");y&&y.classList.remove("collapsed")}})};return J(()=>{l(),t.isMobileWidth||window.addEventListener("scroll",f),t.isMobileWidth||window.addEventListener("resize",f),window.addEventListener("hashchange",g)}),ie(()=>{window.removeEventListener("scroll",f),window.removeEventListener("resize",f),window.removeEventListener("hashchange",g)}),(h,v)=>(n(),d("div",vs,[D(h.$slots,"top"),r.value.length?(n(),d("ul",ms,[(n(!0),d(M,null,B(r.value,(m,y)=>(n(),d("li",{key:y},[m.type==="group"?(n(),O(fs,{key:0,item:m,first:y===0,open:y===i.value,closeSidebarDrawer:e.closeSidebarDrawer,collapsable:!!(m.collapsable||m.collapsible),onToggle:x=>c(y)},null,8,["item","first","open","closeSidebarDrawer","collapsable","onToggle"])):(n(),O(Ye,{key:1,closeSidebarDrawer:e.closeSidebarDrawer,item:m},null,8,["closeSidebarDrawer","item"]))]))),128))])):L("v-if",!0),D(h.$slots,"bottom")]))}},Qe=A(_s,[["__file","Sidebar.vue"]]);var gs=Object.defineProperty,bs=Object.defineProperties,ys=Object.getOwnPropertyDescriptors,ke=Object.getOwnPropertySymbols,ws=Object.prototype.hasOwnProperty,Ss=Object.prototype.propertyIsEnumerable,xe=(e,t,s)=>t in e?gs(e,t,{enumerable:!0,configurable:!0,writable:!0,value:s}):e[t]=s,ee=(e,t)=>{for(var s in t||(t={}))ws.call(t,s)&&xe(e,s,t[s]);if(ke)for(var s of ke(t))Ss.call(t,s)&&xe(e,s,t[s]);return e},Ae=(e,t)=>bs(e,ys(t));const Ls={props:{autoscroll:{type:Boolean,default:!0}},watch:{typeAheadPointer(){this.autoscroll&&this.maybeAdjustScroll()},open(e){this.autoscroll&&e&&this.$nextTick(()=>this.maybeAdjustScroll())}},methods:{maybeAdjustScroll(){var e;const t=((e=this.$refs.dropdownMenu)==null?void 0:e.children[this.typeAheadPointer])||!1;if(t){const s=this.getDropdownViewport(),{top:o,bottom:a,height:r}=t.getBoundingClientRect();if(os.bottom)return this.$refs.dropdownMenu.scrollTop=t.offsetTop-(s.height-r)}},getDropdownViewport(){return this.$refs.dropdownMenu?this.$refs.dropdownMenu.getBoundingClientRect():{height:0,top:0,bottom:0}}}},Os={data(){return{typeAheadPointer:-1}},watch:{filteredOptions(){for(let e=0;e=0;e--)if(this.selectable(this.filteredOptions[e])){this.typeAheadPointer=e;break}},typeAheadDown(){for(let e=this.typeAheadPointer+1;e{const s=e.__vccOpts||e;for(const[o,a]of t)s[o]=a;return s},Ds={},$s={xmlns:"http://www.w3.org/2000/svg",width:"10",height:"10"},Vs=p("path",{d:"M6.895455 5l2.842897-2.842898c.348864-.348863.348864-.914488 0-1.263636L9.106534.261648c-.348864-.348864-.914489-.348864-1.263636 0L5 3.104545 2.157102.261648c-.348863-.348864-.914488-.348864-1.263636 0L.261648.893466c-.348864.348864-.348864.914489 0 1.263636L3.104545 5 .261648 7.842898c-.348864.348863-.348864.914488 0 1.263636l.631818.631818c.348864.348864.914773.348864 1.263636 0L5 6.895455l2.842898 2.842897c.348863.348864.914772.348864 1.263636 0l.631818-.631818c.348864-.348864.348864-.914489 0-1.263636L6.895455 5z"},null,-1),ks=[Vs];function xs(e,t){return n(),d("svg",$s,ks)}const As=De(Ds,[["render",xs]]),Ts={},Ps={xmlns:"http://www.w3.org/2000/svg",width:"14",height:"10"},Cs=p("path",{d:"M9.211364 7.59931l4.48338-4.867229c.407008-.441854.407008-1.158247 0-1.60046l-.73712-.80023c-.407008-.441854-1.066904-.441854-1.474243 0L7 5.198617 2.51662.33139c-.407008-.441853-1.066904-.441853-1.474243 0l-.737121.80023c-.407008.441854-.407008 1.158248 0 1.600461l4.48338 4.867228L7 10l2.211364-2.40069z"},null,-1),Rs=[Cs];function Ms(e,t){return n(),d("svg",Ps,Rs)}const Is=De(Ts,[["render",Ms]]),Te={Deselect:As,OpenIndicator:Is},Bs={mounted(e,{instance:t}){if(t.appendToBody){const{height:s,top:o,left:a,width:r}=t.$refs.toggle.getBoundingClientRect();let i=window.scrollX||window.pageXOffset,l=window.scrollY||window.pageYOffset;e.unbindPosition=t.calculatePosition(e,t,{width:r+"px",left:i+a+"px",top:l+o+s+"px"}),document.body.appendChild(e)}},unmounted(e,{instance:t}){t.appendToBody&&(e.unbindPosition&&typeof e.unbindPosition=="function"&&e.unbindPosition(),e.parentNode&&e.parentNode.removeChild(e))}};function Hs(e){const t={};return Object.keys(e).sort().forEach(s=>{t[s]=e[s]}),JSON.stringify(t)}let js=0;function Fs(){return++js}const Ws={components:ee({},Te),directives:{appendToBody:Bs},mixins:[Ls,Os,Es],compatConfig:{MODE:3},emits:["open","close","update:modelValue","search","search:compositionstart","search:compositionend","search:keydown","search:blur","search:focus","search:input","option:created","option:selecting","option:selected","option:deselecting","option:deselected"],props:{modelValue:{},components:{type:Object,default:()=>({})},options:{type:Array,default(){return[]}},disabled:{type:Boolean,default:!1},clearable:{type:Boolean,default:!0},deselectFromDropdown:{type:Boolean,default:!1},searchable:{type:Boolean,default:!0},multiple:{type:Boolean,default:!1},placeholder:{type:String,default:""},transition:{type:String,default:"vs__fade"},clearSearchOnSelect:{type:Boolean,default:!0},closeOnSelect:{type:Boolean,default:!0},label:{type:String,default:"label"},autocomplete:{type:String,default:"off"},reduce:{type:Function,default:e=>e},selectable:{type:Function,default:e=>!0},getOptionLabel:{type:Function,default(e){return typeof e=="object"?e.hasOwnProperty(this.label)?e[this.label]:console.warn(`[vue-select warn]: Label key "option.${this.label}" does not exist in options object ${JSON.stringify(e)}. https://vue-select.org/api/props.html#getoptionlabel`):e}},getOptionKey:{type:Function,default(e){if(typeof e!="object")return e;try{return e.hasOwnProperty("id")?e.id:Hs(e)}catch(t){return console.warn(`[vue-select warn]: Could not stringify this option to generate unique key. Please provide'getOptionKey' prop to return a unique key for each option. https://vue-select.org/api/props.html#getoptionkey`,e,t)}}},onTab:{type:Function,default:function(){this.selectOnTab&&!this.isComposing&&this.typeAheadSelect()}},taggable:{type:Boolean,default:!1},tabindex:{type:Number,default:null},pushTags:{type:Boolean,default:!1},filterable:{type:Boolean,default:!0},filterBy:{type:Function,default(e,t,s){return(t||"").toLocaleLowerCase().indexOf(s.toLocaleLowerCase())>-1}},filter:{type:Function,default(e,t){return e.filter(s=>{let o=this.getOptionLabel(s);return typeof o=="number"&&(o=o.toString()),this.filterBy(s,o,t)})}},createOption:{type:Function,default(e){return typeof this.optionList[0]=="object"?{[this.label]:e}:e}},resetOnOptionsChange:{default:!1,validator:e=>["function","boolean"].includes(typeof e)},clearSearchOnBlur:{type:Function,default:function({clearSearchOnSelect:e,multiple:t}){return e&&!t}},noDrop:{type:Boolean,default:!1},inputId:{type:String},dir:{type:String,default:"auto"},selectOnTab:{type:Boolean,default:!1},selectOnKeyCodes:{type:Array,default:()=>[13]},searchInputQuerySelector:{type:String,default:"[type=search]"},mapKeydown:{type:Function,default:(e,t)=>e},appendToBody:{type:Boolean,default:!1},calculatePosition:{type:Function,default(e,t,{width:s,top:o,left:a}){e.style.top=o,e.style.left=a,e.style.width=s}},dropdownShouldOpen:{type:Function,default({noDrop:e,open:t,mutableLoading:s}){return e?!1:t&&!s}},uid:{type:[String,Number],default:()=>Fs()}},data(){return{search:"",open:!1,isComposing:!1,pushedTags:[],_value:[],deselectButtons:[]}},computed:{isReducingValues(){return this.$props.reduce!==this.$options.props.reduce.default},isTrackingValues(){return typeof this.modelValue>"u"||this.isReducingValues},selectedValue(){let e=this.modelValue;return this.isTrackingValues&&(e=this.$data._value),e!=null&&e!==""?[].concat(e):[]},optionList(){return this.options.concat(this.pushTags?this.pushedTags:[])},searchEl(){return this.$slots.search?this.$refs.selectedOptions.querySelector(this.searchInputQuerySelector):this.$refs.search},scope(){const e={search:this.search,loading:this.loading,searching:this.searching,filteredOptions:this.filteredOptions};return{search:{attributes:ee({disabled:this.disabled,placeholder:this.searchPlaceholder,tabindex:this.tabindex,readonly:!this.searchable,id:this.inputId,"aria-autocomplete":"list","aria-labelledby":`vs${this.uid}__combobox`,"aria-controls":`vs${this.uid}__listbox`,ref:"search",type:"search",autocomplete:this.autocomplete,value:this.search},this.dropdownOpen&&this.filteredOptions[this.typeAheadPointer]?{"aria-activedescendant":`vs${this.uid}__option-${this.typeAheadPointer}`}:{}),events:{compositionstart:()=>this.isComposing=!0,compositionend:()=>this.isComposing=!1,keydown:this.onSearchKeyDown,blur:this.onSearchBlur,focus:this.onSearchFocus,input:t=>this.search=t.target.value}},spinner:{loading:this.mutableLoading},noOptions:{search:this.search,loading:this.mutableLoading,searching:this.searching},openIndicator:{attributes:{ref:"openIndicator",role:"presentation",class:"vs__open-indicator"}},listHeader:e,listFooter:e,header:Ae(ee({},e),{deselect:this.deselect}),footer:Ae(ee({},e),{deselect:this.deselect})}},childComponents(){return ee(ee({},Te),this.components)},stateClasses(){return{"vs--open":this.dropdownOpen,"vs--single":!this.multiple,"vs--multiple":this.multiple,"vs--searching":this.searching&&!this.noDrop,"vs--searchable":this.searchable&&!this.noDrop,"vs--unsearchable":!this.searchable,"vs--loading":this.mutableLoading,"vs--disabled":this.disabled}},searching(){return!!this.search},dropdownOpen(){return this.dropdownShouldOpen(this)},searchPlaceholder(){return this.isValueEmpty&&this.placeholder?this.placeholder:void 0},filteredOptions(){const e=[].concat(this.optionList);if(!this.filterable&&!this.taggable)return e;const t=this.search.length?this.filter(e,this.search,this):e;if(this.taggable&&this.search.length){const s=this.createOption(this.search);this.optionExists(s)||t.unshift(s)}return t},isValueEmpty(){return this.selectedValue.length===0},showClearButton(){return!this.multiple&&this.clearable&&!this.open&&!this.isValueEmpty}},watch:{options(e,t){const s=()=>typeof this.resetOnOptionsChange=="function"?this.resetOnOptionsChange(e,t,this.selectedValue):this.resetOnOptionsChange;!this.taggable&&s()&&this.clearSelection(),this.modelValue&&this.isTrackingValues&&this.setInternalValueFromOptions(this.modelValue)},modelValue:{immediate:!0,handler(e){this.isTrackingValues&&this.setInternalValueFromOptions(e)}},multiple(){this.clearSelection()},open(e){this.$emit(e?"open":"close")}},created(){this.mutableLoading=this.loading},methods:{setInternalValueFromOptions(e){Array.isArray(e)?this.$data._value=e.map(t=>this.findOptionFromReducedValue(t)):this.$data._value=this.findOptionFromReducedValue(e)},select(e){this.$emit("option:selecting",e),this.isOptionSelected(e)?this.deselectFromDropdown&&(this.clearable||this.multiple&&this.selectedValue.length>1)&&this.deselect(e):(this.taggable&&!this.optionExists(e)&&(this.$emit("option:created",e),this.pushTag(e)),this.multiple&&(e=this.selectedValue.concat(e)),this.updateValue(e),this.$emit("option:selected",e)),this.onAfterSelect(e)},deselect(e){this.$emit("option:deselecting",e),this.updateValue(this.selectedValue.filter(t=>!this.optionComparator(t,e))),this.$emit("option:deselected",e)},clearSelection(){this.updateValue(this.multiple?[]:null)},onAfterSelect(e){this.closeOnSelect&&(this.open=!this.open,this.searchEl.blur()),this.clearSearchOnSelect&&(this.search="")},updateValue(e){typeof this.modelValue>"u"&&(this.$data._value=e),e!==null&&(Array.isArray(e)?e=e.map(t=>this.reduce(t)):e=this.reduce(e)),this.$emit("update:modelValue",e)},toggleDropdown(e){const t=e.target!==this.searchEl;t&&e.preventDefault();const s=[...this.deselectButtons||[],this.$refs.clearButton];if(this.searchEl===void 0||s.filter(Boolean).some(o=>o.contains(e.target)||o===e.target)){e.preventDefault();return}this.open&&t?this.searchEl.blur():this.disabled||(this.open=!0,this.searchEl.focus())},isOptionSelected(e){return this.selectedValue.some(t=>this.optionComparator(t,e))},isOptionDeselectable(e){return this.isOptionSelected(e)&&this.deselectFromDropdown},optionComparator(e,t){return this.getOptionKey(e)===this.getOptionKey(t)},findOptionFromReducedValue(e){const t=o=>JSON.stringify(this.reduce(o))===JSON.stringify(e),s=[...this.options,...this.pushedTags].filter(t);return s.length===1?s[0]:s.find(o=>this.optionComparator(o,this.$data._value))||e},closeSearchOptions(){this.open=!1,this.$emit("search:blur")},maybeDeleteValue(){if(!this.searchEl.value.length&&this.selectedValue&&this.selectedValue.length&&this.clearable){let e=null;this.multiple&&(e=[...this.selectedValue.slice(0,this.selectedValue.length-1)]),this.updateValue(e)}},optionExists(e){return this.optionList.some(t=>this.optionComparator(t,e))},normalizeOptionForSlot(e){return typeof e=="object"?e:{[this.label]:e}},pushTag(e){this.pushedTags.push(e)},onEscape(){this.search.length?this.search="":this.searchEl.blur()},onSearchBlur(){if(this.mousedown&&!this.searching)this.mousedown=!1;else{const{clearSearchOnSelect:e,multiple:t}=this;this.clearSearchOnBlur({clearSearchOnSelect:e,multiple:t})&&(this.search=""),this.closeSearchOptions();return}if(this.search.length===0&&this.options.length===0){this.closeSearchOptions();return}},onSearchFocus(){this.open=!0,this.$emit("search:focus")},onMousedown(){this.mousedown=!0},onMouseUp(){this.mousedown=!1},onSearchKeyDown(e){const t=a=>(a.preventDefault(),!this.isComposing&&this.typeAheadSelect()),s={8:a=>this.maybeDeleteValue(),9:a=>this.onTab(),27:a=>this.onEscape(),38:a=>(a.preventDefault(),this.typeAheadUp()),40:a=>(a.preventDefault(),this.typeAheadDown())};this.selectOnKeyCodes.forEach(a=>s[a]=t);const o=this.mapKeydown(s,this);if(typeof o[e.keyCode]=="function")return o[e.keyCode](e)}}},Ns=["dir"],Gs=["id","aria-expanded","aria-owns"],Ks={ref:"selectedOptions",class:"vs__selected-options"},qs=["disabled","title","aria-label","onClick"],Us={ref:"actions",class:"vs__actions"},zs=["disabled"],Js={class:"vs__spinner"},Xs=["id"],Ys=["id","aria-selected","onMouseover","onClick"],Qs={key:0,class:"vs__no-options"},Zs=I(" Sorry, no matching options. "),eo=["id"];function to(e,t,s,o,a,r){const i=dt("append-to-body");return n(),d("div",{dir:s.dir,class:j(["v-select",r.stateClasses])},[D(e.$slots,"header",N(q(r.scope.header))),p("div",{id:`vs${s.uid}__combobox`,ref:"toggle",class:"vs__dropdown-toggle",role:"combobox","aria-expanded":r.dropdownOpen.toString(),"aria-owns":`vs${s.uid}__listbox`,"aria-label":"Search for option",onMousedown:t[1]||(t[1]=l=>r.toggleDropdown(l))},[p("div",Ks,[(n(!0),d(M,null,B(r.selectedValue,(l,c)=>D(e.$slots,"selected-option-container",{option:r.normalizeOptionForSlot(l),deselect:r.deselect,multiple:s.multiple,disabled:s.disabled},()=>[(n(),d("span",{key:s.getOptionKey(l),class:"vs__selected"},[D(e.$slots,"selected-option",N(q(r.normalizeOptionForSlot(l))),()=>[I(V(s.getOptionLabel(l)),1)]),s.multiple?(n(),d("button",{key:0,ref_for:!0,ref:u=>a.deselectButtons[c]=u,disabled:s.disabled,type:"button",class:"vs__deselect",title:`Deselect ${s.getOptionLabel(l)}`,"aria-label":`Deselect ${s.getOptionLabel(l)}`,onClick:u=>r.deselect(l)},[(n(),O(ue(r.childComponents.Deselect)))],8,qs)):L("",!0)]))])),256)),D(e.$slots,"search",N(q(r.scope.search)),()=>[p("input",ye({class:"vs__search"},r.scope.search.attributes,pt(r.scope.search.events)),null,16)])],512),p("div",Us,[Y(p("button",{ref:"clearButton",disabled:s.disabled,type:"button",class:"vs__clear",title:"Clear Selected","aria-label":"Clear Selected",onClick:t[0]||(t[0]=(...l)=>r.clearSelection&&r.clearSelection(...l))},[(n(),O(ue(r.childComponents.Deselect)))],8,zs),[[Q,r.showClearButton]]),D(e.$slots,"open-indicator",N(q(r.scope.openIndicator)),()=>[s.noDrop?L("",!0):(n(),O(ue(r.childComponents.OpenIndicator),N(ye({key:0},r.scope.openIndicator.attributes)),null,16))]),D(e.$slots,"spinner",N(q(r.scope.spinner)),()=>[Y(p("div",Js,"Loading...",512),[[Q,e.mutableLoading]])])],512)],40,Gs),S(de,{name:s.transition},{default:W(()=>[r.dropdownOpen?Y((n(),d("ul",{id:`vs${s.uid}__listbox`,ref:"dropdownMenu",key:`vs${s.uid}__listbox`,class:"vs__dropdown-menu",role:"listbox",tabindex:"-1",onMousedown:t[2]||(t[2]=P((...l)=>r.onMousedown&&r.onMousedown(...l),["prevent"])),onMouseup:t[3]||(t[3]=(...l)=>r.onMouseUp&&r.onMouseUp(...l))},[D(e.$slots,"list-header",N(q(r.scope.listHeader))),(n(!0),d(M,null,B(r.filteredOptions,(l,c)=>(n(),d("li",{id:`vs${s.uid}__option-${c}`,key:s.getOptionKey(l),role:"option",class:j(["vs__dropdown-option",{"vs__dropdown-option--deselect":r.isOptionDeselectable(l)&&c===e.typeAheadPointer,"vs__dropdown-option--selected":r.isOptionSelected(l),"vs__dropdown-option--highlight":c===e.typeAheadPointer,"vs__dropdown-option--disabled":!s.selectable(l)}]),"aria-selected":c===e.typeAheadPointer?!0:null,onMouseover:u=>s.selectable(l)?e.typeAheadPointer=c:null,onClick:P(u=>s.selectable(l)?r.select(l):null,["prevent","stop"])},[D(e.$slots,"option",N(q(r.normalizeOptionForSlot(l))),()=>[I(V(s.getOptionLabel(l)),1)])],42,Ys))),128)),r.filteredOptions.length===0?(n(),d("li",Qs,[D(e.$slots,"no-options",N(q(r.scope.noOptions)),()=>[Zs])])):L("",!0),D(e.$slots,"list-footer",N(q(r.scope.listFooter)))],40,Xs)),[[i]]):(n(),d("ul",{key:1,id:`vs${s.uid}__listbox`,role:"listbox",style:{display:"none",visibility:"hidden"}},null,8,eo))]),_:3},8,["name"]),D(e.$slots,"footer",N(q(r.scope.footer)))],10,Ns)}const so=De(Ws,[["render",to]]);const oo=["src"],ao={key:1},ro={__name:"DSelect",props:{withIcon:{type:Boolean,default:!0},modelValue:{type:Object,default:()=>({label:"",value:""})},options:{type:Array,default:()=>[]}},emits:["changeSidebarItems","update:selectedValue","update:model-value"],setup(e,{emit:t}){const{searchSelectIcon:s}=C("themeConfig"),o=i=>{t("changeSidebarItems",i),t("update:model-value",i)},a=k(),r=()=>{a.value&&(a.value.open=!1)};return J(()=>window.addEventListener("click",i=>{var l;(l=a.value)!=null&&l.$el.contains(i.target)||r()})),ie(()=>window.removeEventListener("click",r)),(i,l)=>(n(),O(w(so),{ref_key:"dropdown",ref:a,"onUpdate:modelValue":o,"model-value":e.modelValue,label:"title",value:"link",clearable:!1,searchable:!1,options:e.options},{"open-indicator":W(({attributes:c})=>[e.withIcon?(n(),d("div",ye({key:0,class:"select-icon"},c),[p("img",{src:w(F)(w(s)),alt:"search Icon"},null,8,oo)],16)):(n(),d("span",ao))]),_:1},8,["model-value","options"]))}},Ze=A(ro,[["__file","DSelect.vue"]]),io={class:"sidebar-drawer__mobile"},lo={class:"sidebar-header"},no=p("p",{class:"sidebar-header__paragraph"},"Select TuxCare docs",-1),co=ve({__name:"SidebarDrawer",props:{allPages:{type:Array,required:!0,default:()=>[]},documents:{type:Array,required:!0,default:()=>[]},closeSidebarDrawer:{type:Function,default:()=>{}},modelValue:{type:Object,required:!0,default:()=>{}},isMobileWidth:{type:Boolean}},emits:["changeSidebarItems","update:model-value"],setup(e){return(t,s)=>(n(),d("div",io,[S(Qe,{closeSidebarDrawer:e.closeSidebarDrawer,items:e.allPages,isMobileWidth:e.isMobileWidth},{top:W(()=>[p("div",lo,[no,S(Ze,{modelValue:e.modelValue,"onUpdate:modelValue":s[0]||(s[0]=o=>t.$emit("update:model-value",o)),onChangeSidebarItems:s[1]||(s[1]=o=>t.$emit("changeSidebarItems",o)),"with-icon":"",options:e.documents},null,8,["modelValue","options"])])]),_:1},8,["closeSidebarDrawer","items","isMobileWidth"])]))}});const uo=A(co,[["__file","SidebarDrawer.vue"]]);const po={class:"drawer-tabs__wrapper"},ho=["onClick"],fo={__name:"DrawerTabs",props:{data:{type:Array,required:!0,default:()=>({})},modelValue:{type:Number,default:-1}},emits:["update:modelValue"],setup(e,{emit:t}){const s=o=>{t("update:modelValue",o)};return(o,a)=>(n(),d("div",po,[(n(!0),d(M,null,B(e.data,(r,i)=>(n(),d("div",{key:i,onClick:l=>s(i),class:j([{"drawer-tab__active":e.modelValue===i},"drawer-tab"])},[p("div",{class:j(["drawer-tab__text",{"drawer-tab__text__active":e.modelValue===i}])},V(r.title)+" ("+V(r==null?void 0:r.numberResults)+") ",3)],10,ho))),128))]))}},vo=A(fo,[["__scopeId","data-v-c60e280a"],["__file","DrawerTabs.vue"]]);const mo={key:0,class:"drawer-main__search-results"},_o=["onClick"],go=["innerHTML"],bo=["innerHTML"],yo=["innerHTML"],wo={key:1},So={class:"hidden_results__text"},Lo=p("p",{class:"hidden_results__text"},"Collapse results",-1),Oo=[Lo],Eo={key:2},Do={key:0,class:"no_results"},$o={key:1,class:"no_results"},Vo={key:0},ko=p("br",null,null,-1),xo=p("a",{class:"no_results__link",href:" https://forum.cloudlinux.com/",target:"_blank"},"https://forum.cloudlinux.com/",-1),Ao={__name:"DrawerSearchResult",props:{data:{type:[Array,Object],required:!0},modelValue:{type:String,required:!0}},setup(e){const t=e;ht(g=>({aa1be2ec:w(o)}));const{MAX_ALGOLIA_VISIBLE_RESULT:s,MAX_ALGOLIA_VISIBLE_ROWS:o}=C("themeConfig"),a=k(!1),r=g=>{window.location.href=g},i=E(()=>{var g;return a.value?t.data:(g=t.data)==null?void 0:g.slice(0,s)}),l=E(()=>t.data.length-i.value.length),c=()=>{a.value=!0},u=()=>{a.value=!1},f=g=>{var h,v;for(const m in g)if(g[m].value!==null||g[m].value!==void 0)return((h=g.lvl1)==null?void 0:h.value)||((v=g.lvl0)==null?void 0:v.value);return null},_=g=>Object.values(g).slice(2).filter(Boolean).map(h=>h.value).join(" > ");return(g,h)=>(n(),d(M,null,[e.data.length?(n(),d("section",mo,[(n(!0),d(M,null,B(i.value,v=>{var m,y,x,$;return n(),d("div",{key:v,class:"search-result",onClick:H=>r((v==null?void 0:v.url)||"/")},[p("div",{class:"search-result__title",innerHTML:f((m=v._highlightResult)==null?void 0:m.hierarchy)},null,8,go),p("div",{class:"search-result__breadcrumb",innerHTML:_((y=v._highlightResult)==null?void 0:y.hierarchy)},null,8,bo),p("div",{class:"search-result__text",innerHTML:($=(x=v._highlightResult)==null?void 0:x.content)==null?void 0:$.value},null,8,yo)],8,_o)}),128))])):L("v-if",!0),e.data.length?(n(),d("div",wo,[l.value?(n(),d("div",{key:0,class:"hidden_results",onClick:c},[p("p",So,"Show all results("+V(l.value)+")",1)])):!l.value&&a.value?(n(),d("div",{key:1,class:"hidden_results",onClick:u},Oo)):L("v-if",!0)])):(n(),d("div",Eo,[e.modelValue.length?(n(),d("p",$o,[I(" Sorry! No results found for "),e.modelValue?(n(),d("span",Vo,'"'+V(e.modelValue)+'"',1)):L("v-if",!0),I(" 😞"),ko,I("Please try ask the community (link to the "),xo,I("). ")])):(n(),d("p",Do,"What are you searching for?"))]))],64))}},To=A(Ao,[["__file","DrawerSearchResult.vue"]]);const Po={class:"drawer-header"},Co=p("div",{class:"drawer-header__wrapper"},[p("h2",{class:"drawer-header__paragraph"},"How can we help you?"),p("div",{id:"drawerSearch"})],-1),Ro={class:"drawer-cross"},Mo=["src"],Io={class:"drawer-main"},Bo={class:"drawer-main__wrapper"},Ho={class:"drawer-main__breadcrumb"},jo={key:0,class:"drawer-main__breadcrumb__text"},Fo=["src"],Wo={__name:"Drawer",props:{isOpenDrawer:{type:Boolean,required:!0,default:!1},isMobileWidth:{type:Boolean,required:!0,default:!1},modelValue:{type:String,required:!0,default:""},homeLayoutSearchResult:{type:Array,required:!0,default:()=>[]}},emits:["closeDrawer","update:modelValue"],setup(e,{emit:t}){const s=e,o=k(0),a=E(()=>{const l=s.homeLayoutSearchResult.reduce((c,u)=>{var _;const f=(_=u.hierarchy)==null?void 0:_.lvl0;return c[f]=c[f]||{title:f,numberResults:0},c[f].numberResults++,c},{});return Object.values(l)}),r=E(()=>{if(o.value===-1)return s.homeLayoutSearchResult||[];const l=a.value[o.value];return s.homeLayoutSearchResult.filter(c=>c.hierarchy.lvl0===(l==null?void 0:l.title))}),i=()=>{t("closeDrawer"),o.value=0};return re(()=>s.isOpenDrawer,()=>{document.body.classList.toggle("disable-scroll",s.isOpenDrawer)}),(l,c)=>(n(),d("div",null,[p("div",{class:j(["drawer",{"is-open":e.isOpenDrawer}])},[p("div",Po,[Co,p("div",Ro,[p("img",{onClick:i,class:"drawer-cross__img",src:w(F)("/global/cross.svg"),alt:"cross"},null,8,Mo),p("p",{onClick:i,class:"drawer-cross__text"},"close")])]),S(vo,{modelValue:o.value,"onUpdate:modelValue":c[0]||(c[0]=u=>o.value=u),data:a.value},null,8,["modelValue","data"]),p("main",null,[p("div",Io,[p("div",Bo,[p("div",Ho,[r.value.length?(n(),d("p",jo,[I("Home "),p("img",{src:w(F)("/arrows/arrow-right-breadcrumb.svg"),alt:"breadcrumb icon"},null,8,Fo),I(" Documentation ")])):L("v-if",!0)]),S(To,{modelValue:e.modelValue,data:r.value},null,8,["modelValue","data"])])]),e.isOpenDrawer&&e.isMobileWidth?(n(),O(pe,{key:0,class:"drawer-footer__mobile"})):L("v-if",!0)])],2),e.isOpenDrawer&&!e.isMobileWidth?(n(),O(pe,{key:0,class:"drawer-footer"})):L("v-if",!0)]))}},No=A(Wo,[["__file","Drawer.vue"]]);const Go={id:"search-form",class:"drawer-header__input"},Ko=["value","placeholder"],qo=["src"],Uo={__name:"DrawerSearch",props:{options:{type:[Object,Array],required:!0},modelValue:{type:String,required:!0},isOpenDrawer:{type:Boolean,required:!0},isMobileWidth:{type:Boolean}},emits:["openDrawer","update:modelValue","result"],setup(e,{emit:t}){const s=e,{MAX_ALGOLIA_HITS_PER_PAGE:o}=C("themeConfig"),{headerDefaultSearchIcon:a,headerSearchIcon:r,headerSearchPlaceholder:i}=C("themeConfig"),l=ne(),c=E(()=>l.value.layout==="HomeLayout"),u=E(()=>s.isOpenDrawer?"drawer-header__search":c.value?"header-layout__search":"header-layout__search-default"),f=E(()=>s.isOpenDrawer?"drawer-header__search-icon":c.value?"header-layout__search-icon":"header-layout__search-icon-default"),_=E(()=>c.value||s.isOpenDrawer?r:a),g=E(()=>s.isOpenDrawer?"Search":c.value?i:"Search"),h=E(()=>s.isMobileWidth?"Search accross all Imunify Security support":g.value),v=async m=>{if(typeof window>"u")return;const[y]=await Promise.all([b(()=>import("./docsearch.min-de7e3b59.js").then($=>$.d),["assets/docsearch.min-de7e3b59.js","assets/framework-0ba8e1ea.js"]),b(()=>import("./docsearch.min-49eb4b49.js"),[])]),x=y.default;x(Object.assign({},m,{inputSelector:"#algolia-search-input",algoliaOptions:{hitsPerPage:o},handleSelected:()=>{t("openDrawer")},transformData:$=>{t("result",$)}}))};return re(()=>s.options,async m=>{await v(m)},{immediate:!0}),(m,y)=>(n(),d("form",Go,[p("input",{value:e.modelValue,onInput:y[0]||(y[0]=x=>m.$emit("update:modelValue",x.target.value)),id:"algolia-search-input",placeholder:h.value,class:j(u.value),onKeypress:y[1]||(y[1]=G(P(x=>m.$emit("openDrawer"),["prevent"]),["enter"]))},null,42,Ko),p("div",{class:j(f.value)},[p("img",{onClick:y[2]||(y[2]=x=>m.$emit("openDrawer")),alt:"search icon",src:w(F)(_.value)},null,8,qo)],2)]))}},Pe=A(Uo,[["__file","DrawerSearch.vue"]]);const zo={class:"header-layout__search-container"},Jo={key:0,class:"header-layout__search-title"},Xo={__name:"HeaderLayoutSearch",props:{isMobileWidth:{type:Boolean,default:!1},closeSidebarDrawer:{type:Function}},setup(e,{expose:t}){const s=e,{headerSearch:o,algoliaOptions:a}=C("themeConfig"),r=ne(),i=k(!1),l=k(!1),c=k(""),u=k([]);re(()=>c.value,()=>{c.value||(u.value=[])});const f=v=>{u.value=v},_=E(()=>r.value.layout==="HomeLayout"),g=()=>{i.value=!0,l.value=!0,s.closeSidebarDrawer&&s.closeSidebarDrawer()},h=()=>{u.value.length=0,c.value="",i.value=!1,l.value=!1};return t({openDrawer:g,closeDrawer:h,mobileDrawerVisible:l}),(v,m)=>(n(),d("div",zo,[_.value?(n(),d("h1",Jo,V(w(o)),1)):L("v-if",!0),i.value?(n(),O(Be,{key:1,to:"#drawerSearch"},[S(Pe,{options:w(a),modelValue:c.value,"onUpdate:modelValue":m[0]||(m[0]=y=>c.value=y),isMobileWidth:e.isMobileWidth,onOpenDrawer:g,isOpenDrawer:i.value,onResult:f},null,8,["options","modelValue","isMobileWidth","isOpenDrawer"])])):(n(),O(Pe,{key:2,isMobileWidth:e.isMobileWidth,options:w(a),modelValue:c.value,"onUpdate:modelValue":m[1]||(m[1]=y=>c.value=y),onOpenDrawer:g,isOpenDrawer:i.value,onResult:f},null,8,["isMobileWidth","options","modelValue","isOpenDrawer"])),S(No,{homeLayoutSearchResult:u.value,modelValue:c.value,"onUpdate:modelValue":m[2]||(m[2]=y=>c.value=y),onCloseDrawer:h,isOpenDrawer:i.value,isMobileWidth:e.isMobileWidth},null,8,["homeLayoutSearchResult","modelValue","isOpenDrawer","isMobileWidth"])]))}},Ce=A(Xo,[["__file","HeaderLayoutSearch.vue"]]);const Yo={class:"header-products-wrapper"},Qo={key:0,class:"dropdown-wrapper"},Zo=["href"],ea={key:1,class:"dropdown-wrapper"},ta=["href"],sa=["src"],oa={class:"header-products-wrapper-paragraph"},aa=["src"],ra={__name:"HeaderProducts",props:{isMobileWidth:{type:Boolean}},setup(e){const{productsTitle:t,arrowDownIcon:s,productsList:o,productsURLs:a}=C("themeConfig"),r=k(!1),i=k(null),l=c=>{!c.composedPath().includes(i.value)&&(r.value=!1)};return J(()=>{document.addEventListener("click",l)}),ie(()=>{document.removeEventListener("click",l)}),(c,u)=>(n(),d("div",Yo,[p("div",{ref_key:"menu",ref:i,class:"dropdown"},[e.isMobileWidth?(n(),O(Be,{key:0,to:"body"},[r.value?(n(),d("div",Qo,[(n(!0),d(M,null,B(w(o),(f,_)=>(n(),d("p",{class:"dropdown-content__paragraph",key:f},[p("a",{class:"dropdown-content__link",href:w(a)[_]},V(f),9,Zo)]))),128))])):L("v-if",!0)])):L("v-if",!0),r.value&&!e.isMobileWidth?(n(),d("div",ea,[(n(!0),d(M,null,B(w(o),(f,_)=>(n(),d("p",{class:"dropdown-content__paragraph",key:f},[p("a",{class:"dropdown-content__link",href:w(a)[_]},V(f),9,ta)]))),128))])):L("v-if",!0),p("div",{onClick:u[0]||(u[0]=f=>r.value=!r.value),class:"header-products-container"},[p("img",{class:"header-products-container__img",alt:"hamburger menu",src:w(F)("/global/hamburger-menu.svg")},null,8,sa),p("p",oa,V(w(t)),1),p("img",{class:j(["products-icon__default",{"products-icon__rotate":r.value}]),width:"10",height:"8",src:w(F)(w(s)),alt:"arrow down icon"},null,10,aa)])],512)]))}},ia=A(ra,[["__file","HeaderProducts.vue"]]);const la={class:"navbar-header"},na={class:"navbar-header__logo-wrapper"},ca=["src"],ua=["src"],da=["href","onClick"],pa={__name:"HeaderLayout",props:{isMobileWidth:{type:Boolean},closeSidebarDrawer:{type:Function}},setup(e){const{siteLogo:t,defaultURL:s,locales:o,headerDefaultSearchIcon:a}=C("themeConfig"),r=k(null),i=ne(),l=ze(),c=k(null),u=()=>{var h;return(h=c==null?void 0:c.value)==null?void 0:h.openDrawer()},f=E(()=>i.value.layout==="HomeLayout"),_=E(()=>(l.value+s).replace(/\/+/g,"/")),g=h=>{if(h.type)switch(h.type){case"event":var h=new CustomEvent(h.name);document.dispatchEvent(h)}};return(h,v)=>{var y;const m=oe("router-link");return n(),d("header",{class:j(["navbar",{fixed:!f.value}])},[p("div",la,[p("div",na,[S(m,{to:_.value,class:"home-link"},{default:W(()=>[w(t)?(n(),d("img",{key:0,class:"logo",src:w(F)(w(t)),alt:"logo header"},null,8,ca)):L("v-if",!0)]),_:1},8,["to"]),f.value?L("v-if",!0):(n(),O(Ce,{key:0,closeSidebarDrawer:e.closeSidebarDrawer,ref_key:"headerLayoutSearch",ref:c,class:j({"header-mobile__hidden":!((y=c.value)!=null&&y.mobileDrawerVisible)}),isMobileWidth:e.isMobileWidth},null,8,["closeSidebarDrawer","class","isMobileWidth"]))]),p("div",{class:"links",style:ft({"max-width":r.value+"px"})},[p("img",{onClick:u,class:"navbar-header__mobile-search",src:w(F)(w(a)),alt:"icon image"},null,8,ua),S(ia,{isMobileWidth:e.isMobileWidth},null,8,["isMobileWidth"]),(n(!0),d(M,null,B(w(o).navbarLinks,x=>(n(),d("a",{href:x.url,target:"_blank",class:j(x.class),onClick:$=>g(x.event)},V(x.text),11,da))),256))],4)]),f.value?(n(),O(Ce,{key:0,closeSidebarDrawer:e.closeSidebarDrawer,ref_key:"headerLayoutSearch",ref:c,isMobileWidth:e.isMobileWidth},null,8,["closeSidebarDrawer","isMobileWidth"])):L("v-if",!0)],2)}}},et=A(pa,[["__file","HeaderLayout.vue"]]);const ha=e=>(vt("data-v-1eb13e00"),e=e(),mt(),e),fa={class:"back-to-top"},va=ha(()=>p("span",{class:"back-to-top__link-span"},"Scroll up",-1)),ma=[va],_a={__name:"BackToTop",props:{boundary:{type:Number,default:200}},setup(e){const t=e,s=k(!1),o=()=>{window&&(s.value=window.pageYOffset>t.boundary)},a=()=>{document.body.scrollTop=0,document.documentElement.scrollTop=0};return J(()=>{window&&(o(),window.addEventListener("scroll",o))}),ie(()=>{window&&window.removeEventListener("scroll",o)}),(r,i)=>(n(),d("div",fa,[p("a",{class:j([{active:s.value},"nav-arrow top back-to-top__link"]),onClick:a},ma,2)]))}},ga=A(_a,[["__scopeId","data-v-1eb13e00"],["__file","BackToTop.vue"]]);const ba={class:"breadcrumb-wrapper"},ya={class:"breadcrumb-title"},wa={__name:"Breadcrumb",setup(e){const t=Z(),{locales:{siteTitle:s}}=C("themeConfig"),o=E(()=>{const a=[];return t.value.path!=="/"&&a.push({path:t.value.path,title:t.value.title}),a});return(a,r)=>{const i=oe("router-link");return n(),d("div",ba,[p("span",ya,V(w(s))+":",1),(n(!0),d(M,null,B(o.value,l=>(n(),O(i,{class:"breadcrumb",key:l.path,to:l.path},{default:W(()=>[I(V(l.title),1)]),_:2},1032,["to"]))),128))])}}},Sa=A(wa,[["__scopeId","data-v-9445381a"],["__file","Breadcrumb.vue"]]);const La={key:0,class:"page-nav"},Oa={__name:"PageNav",props:{sidebarItems:{type:Array,default:()=>[]},allPages:{type:Array}},setup(e){const t=e,s=ze(),o=Z(),a=E(()=>{const u=o.value.frontmatter.prev;return u===!1?null:u?fe(t.allPages,u,s):i(o.value,t.sidebarItems)}),r=E(()=>{const u=o.value.frontmatter.next;return u===!1?null:u?fe(t.allPages,u,s):l(o.value,t.sidebarItems)}),i=(u,f)=>c(u,f,-1),l=(u,f)=>c(u,f,1),c=(u,f,_)=>{const g=[];f.forEach(h=>{h.type==="group"?g.push(...h.children||[]):g.push(h)});for(let h=0;h{const _=oe("router-link");return a.value||r.value?(n(),d("div",La,[a.value?(n(),O(_,{key:0,class:"nav-arrow left",to:a.value.path},null,8,["to"])):L("v-if",!0),r.value?(n(),O(_,{key:1,class:"nav-arrow right",to:r.value.path},null,8,["to"])):L("v-if",!0)])):L("v-if",!0)}}},Ea=A(Oa,[["__file","PageNav.vue"]]);const Da={class:"page"},$a=["src"],Va={class:"page-nav-wrapper"},ka={key:0,class:"page-edit"},xa={class:"edit-link"},Aa=["src"],Ta=["href"],Pa={__name:"Page",props:{sidebarItems:{type:Array,default:()=>[]},allPages:{type:Array,default:()=>[]},isMobileWidth:{type:Boolean}},setup(e,{expose:t}){const s=e,{githubEditIcon:o,githubRepository:a,allowGithubEdit:r,githubMainDir:i="",githubBranch:l="master",docsRepo:c=a,editLinkText:u}=C("themeConfig"),f=Z();Ke();const _=ne(),g=k(s.isMobileWidth),h=()=>g.value=!0,v=()=>g.value=!1,m=E(()=>{if(_.value.editLink===!1)return;let $=ae(f.value.path);if(te.test($)?$+="README.md":$+=".md",c&&r)return x(a,c,i,l,$)}),y=E(()=>u||"Edit this page"),x=($,H,R,K,$e)=>/bitbucket.org/.test($)?(we.test(H)?H:$).replace(te,"")+`/${K}`+(R?"/"+R.replace(te,""):"")+$e+`?mode=edit&spa=0&at=${K}&fileviewer=file-view-default`:(we.test(H)?H:`https://github.com/${H}`).replace(te,"")+`/tree/${K}`+(R?"/"+R.replace(te,""):"")+$e;return t({isOpenMobileSidebarMenu:g,closeSidebarDrawer:v}),($,H)=>{const R=oe("Content");return n(),d("div",Da,[D($.$slots,"top"),S(Sa,{class:"page-breadcrumb"}),p("img",{onClick:h,class:"page-mobile__sidebar-menu",src:w(F)("/global/sidebar-menu.svg"),alt:"sidebar hamburger menu"},null,8,$a),p("div",Va,[S(Ea,{"sidebar-items":e.sidebarItems,allPages:e.allPages},null,8,["sidebar-items","allPages"])]),S(R,{class:"content",custom:!1}),w(r)?(n(),d("div",ka,[p("div",xa,[p("img",{src:w(F)(w(o)),alt:"icon pen"},null,8,Aa),p("a",{href:m.value,target:"_blank",rel:"noopener noreferrer"},V(y.value),9,Ta)])])):L("v-if",!0),S(ga),D($.$slots,"bottom")])}}},Ca=A(Pa,[["__file","Page.vue"]]);const Ra={class:"theme-container"},Ma={key:0,class:"sidebar-header"},Ia=p("p",{class:"sidebar-header__paragraph"},"Select TuxCare docs",-1),Ba={__name:"Layout",setup(e){const{documents:t,MOBILE_BREAKPOINT:s}=C("themeConfig"),o=k(null),a=k(null),r=_e(),i=me(),l=Z(),c=k([]),u=k(!1),f=E(()=>l.value&&c.value.length?Je(l.value,i,c.value):[]),_=v=>r.push(v.link),g=()=>{var y;const v=(y=l.value)==null?void 0:y.path,m=v.indexOf("/",v.indexOf("/")+1);return v.substr(0,m)},h=()=>{u.value=window.innerWidth<=s};return J(()=>{Object.values(Le).map(v=>v().then(m=>{c.value.push(m)})),a.value=t.find(v=>{var m;return(m=v.link)==null?void 0:m.startsWith(g())}),window.addEventListener("resize",h),u.value=window.innerWidth<=s}),ie(()=>{window.removeEventListener("resize",h)}),(v,m)=>{var y,x,$,H,R;return n(),d("div",Ra,[S(et,{closeSidebarDrawer:(y=o.value)==null?void 0:y.closeSidebarDrawer,isMobileWidth:u.value},null,8,["closeSidebarDrawer","isMobileWidth"]),c.value.length&&!((x=o.value)!=null&&x.isOpenMobileSidebarMenu)&&!u.value?(n(),O(Qe,{key:0,items:c.value,closeSidebarDrawer:($=o.value)==null?void 0:$.closeSidebarDrawer},{top:W(()=>[w(t)?(n(),d("div",Ma,[Ia,S(Ze,{"with-icon":"",modelValue:a.value,"onUpdate:modelValue":m[0]||(m[0]=K=>a.value=K),onChangeSidebarItems:_,options:w(t)},null,8,["modelValue","options"])])):L("v-if",!0)]),_:1},8,["items","closeSidebarDrawer"])):L("v-if",!0),S(Ca,{ref_key:"pageRef",ref:o,sidebarItems:f.value,allPages:c.value,isMobileWidth:u.value},null,8,["sidebarItems","allPages","isMobileWidth"]),c.value.length&&((H=o.value)!=null&&H.isOpenMobileSidebarMenu)&&u.value?(n(),O(uo,{key:1,onChangeSidebarItems:_,"all-pages":c.value,documents:w(t),modelValue:a.value,"onUpdate:modelValue":m[1]||(m[1]=K=>a.value=K),closeSidebarDrawer:(R=o.value)==null?void 0:R.closeSidebarDrawer,isMobileWidth:u.value},null,8,["all-pages","documents","modelValue","closeSidebarDrawer","isMobileWidth"])):L("v-if",!0),S(pe)])}}},Ha=A(Ba,[["__file","Layout.vue"]]);const ja={class:"docs-card-container"},Fa={class:"docs-card-container__header"},Wa=["src"],Na={key:0,class:"docs-card-container__header-paragraph"},Ga={class:"docs-card-container__main"},Ka={key:0,class:"docs-card-container__main-paragraph"},qa={class:"docs-card-container__footer"},Ua={__name:"DocsCard",props:{card:{type:Object,default:null}},setup(e){const t=e,s=_e(),o=()=>{var a;return s.push((a=t.card)==null?void 0:a.link)};return(a,r)=>(n(),d("div",ja,[p("div",Fa,[p("img",{width:"20",height:"20",src:w(F)("collections-bookmark.svg"),alt:"document icon"},null,8,Wa),e.card.title?(n(),d("p",Na,V(e.card.title),1)):L("v-if",!0)]),p("div",Ga,[e.card.description?(n(),d("p",Ka,V(e.card.description),1)):L("v-if",!0)]),p("div",qa,[p("button",{onClick:r[0]||(r[0]=i=>o()),class:"docs-card-container__footer-btn"},"View Documentation")])]))}},za=A(Ua,[["__file","DocsCard.vue"]]);const Ja={class:"docs-cards-wrapper"},Xa={__name:"DocsCardsWrapper",setup(e){const{documents:t}=C("themeConfig");return(s,o)=>(n(),d("div",Ja,[(n(!0),d(M,null,B(w(t),(a,r)=>(n(),O(za,{key:r,card:a},null,8,["card"]))),128))]))}},Ya=A(Xa,[["__file","DocsCardsWrapper.vue"]]),Qa={class:"theme-container"},Za={__name:"HomeLayout",setup(e){const{MOBILE_BREAKPOINT:t}=C("themeConfig"),s=k(!1),o=()=>s.value=window.innerWidth<=t;return J(()=>{window.addEventListener("resize",o),s.value=window.innerWidth<=t}),ie(()=>window.removeEventListener("resize",o)),(a,r)=>(n(),d("div",Qa,[S(et,{isMobileWidth:s.value},null,8,["isMobileWidth"]),S(Ya),S(pe)]))}},er=A(Za,[["__file","HomeLayout.vue"]]),tr={class:"theme-container"},sr={__name:"NotFound",setup(e){const t=me(),s=_e();k([]);const o=[{from:"cloudlinux-os-plus/#get-started",to:"shared-pro/accelerate-wp/#get-started"},{from:"cloudlinux-os-plus/#setup-upgrade-url-for-acceleratewp-premium",to:"shared-pro/accelerate-wp/#setup-upgrade-url-for-acceleratewp-premium"},{from:"cloudlinux-os-plus",to:"shared-pro"},{from:"cagefs.html",to:"shared/cloudlinux_os_components/#cagefs"},{from:"index.html?cagefs_installation.html",to:"shared/cloudlinux_os_components/#installation-and-update-1"},{from:"mod_lsapi_troubleshooting.html",to:"shared/cloudlinux_os_components/#troubleshooting-3"}];return J(()=>{const a=t.path+t.hash,r=new RegExp(a,"gi");let i=!1;const l=(u,f)=>{var _;if(!i&&((_=u.children)==null?void 0:_.length)>0)for(let g of u.children){const h=f+"/"+g.link;if(h.search(r)!==-1){s.push(h),i=!0;return}u.children.length>0&&l(g,f)}};(async()=>{var _;const u=Object==null?void 0:Object.values(Le);let f=!1;for(let g of o)if(a.search(g.from)!==-1){const h=a.replace(g.from,g.to);s.push(h),f=!0;return}f||(window.location.href="/not-found.html");for(let g of u){const h=await g();let v=h.path;if(v.at(-1)==="/"&&(v=v.slice(0,-1)),((_=h.headers)==null?void 0:_.length)>0)for(let m of h.headers){const y=v+"/"+m.link;if(y.search(r)!==-1){s.push(y),i=!0;return}l(m,v)}}})()}),(a,r)=>(n(),d("div",tr))}},or=A(sr,[["__file","NotFound.vue"]]),ar=[{text:"Knowledge base",url:"https://cloudlinux.zendesk.com/hc/en-us/categories/360002375960-KernelCare"},{text:"Forum",url:"https://forum.cloudlinux.com/forum/tuxcare"},{text:"Blog",url:"https://blog.tuxcare.com/"},{text:"Privacy Policy",url:"https://www.cloudlinux.com/privacy-policy/"}],rr=[{text:"Ask GPT?",event:{type:"event",name:"botui-open"},class:"btn"},{text:"Submit support request",url:"https://www.tuxcare.com/support-portal/",class:"btn"},{text:"Submit your idea",url:"https://features.tuxcare.com/submit-idea/",class:"btn"}],ir=[{title:"TuxCare",description:"services automate, simplify, and enhance Linux operations, giving organizations more flexibility in managing Linux distro choices and versions, significant maintenance cost reductions, and greatly enhanced security and compliance postures.",link:"/tuxcare/"},{title:"Enterprise Support for AlmaLinux",description:"provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.",link:"/enterprise-support-for-almalinux/"},{title:"KernelCare Enterprise",description:"is a live kernel patching service that provides security patches and bugfixes for a range of popular Linux kernels that can be installed without rebooting the system.",link:"/live-patching-services/"},{title:"KernelCare for IOT",description:"provides live security patching for ARM64-based embedded systems for enterprise IoT users and original equipment manufacturers.",link:"/kernelcare-for-iot/"},{title:"ePortal",description:"TuxCare ePortal is the web management console dedicated to KernelCare Enterprise live patch management.",link:"/eportal/"},{title:"ePortal API",description:"is a complete API for everyday use.",link:"/eportal-api/"},{title:"Extended Lifecycle Support",description:"allows you to continue running your Linux server after the operating system’s end of life.",link:"/extended-lifecycle-support/"},{title:"Extended Lifecycle Support for Languages",description:"provides security fixes for PHP and Python versions that have reached their end-of-life which allows to continue running Linux server vulnerability-free.",link:"/extended-lifecycle-support-for-languages/"},{title:"Subscription Management Portal",description:"The TuxCare subscription management portal is designed to easily manage your licenses of TuxCare products and services by means of a user-friendly interface.",link:"/tuxcare-cln/"},{title:"Service Descriptions",description:"AlmaCare service description",link:"/service-descriptions/"}],lr={"/enterprise-support-for-almalinux/":[{collapsable:!1,children:["/enterprise-support-for-almalinux/","/enterprise-support-for-almalinux/fips/"]}],"/eportal/":[{collapsable:!1,children:["/eportal/","/eportal/general"]}],"/eportal-api/":[{collapsable:!1,children:["/eportal-api/"]}],"/extended-lifecycle-support/":[{collapsable:!1,children:["/extended-lifecycle-support/"]}],"/extended-lifecycle-support-for-languages/":[{collapsable:!1,children:["/extended-lifecycle-support-for-languages/"]}],"/jp/":[{collapsable:!1,children:["/jp/","/jp/eportal","/jp/eportal-api","/jp/extended-lifecycle-support","/jp/extended-lifecycle-support-for-languages","/jp/linux-support-services","/jp/live-patching-services","/jp/tuxcare","/jp/tuxcare-cln"]}],"/kernelcare-for-iot/":[{collapsable:!1,children:["/kernelcare-for-iot/"]}],"/live-patching-services/":[{collapsable:!1,children:["/live-patching-services/"]}],"/service-descriptions/":[{collapsable:!1,children:["/service-descriptions/"]}],"/tuxcare/":[{collapsable:!1,children:["/tuxcare/"]}],"/tuxcare-cln/":[{collapsable:!1,children:["/tuxcare-cln/"]}]},nr=[{url:"https://www.facebook.com/tuxcare/",icon:"footer-social/fb.png"},{url:"https://twitter.com/tuxcare_/",icon:"footer-social/tw.png"},{url:"https://linkedin.com/company/tuxcare",icon:"footer-social/in.png"},{url:"https://www.youtube.com/@TuxCare",icon:"footer-social/ytube.png"}];function ge(e){return e===0?!1:Array.isArray(e)&&e.length===0?!0:!e}function cr(e){return(...t)=>!e(...t)}function ur(e,t){return e===void 0&&(e="undefined"),e===null&&(e="null"),e===!1&&(e="false"),e.toString().toLowerCase().indexOf(t.trim())!==-1}function tt(e,t,s,o){return t?e.filter(a=>ur(o(a,s),t)).sort((a,r)=>o(a,s).length-o(r,s).length):e}function dr(e){return e.filter(t=>!t.$isLabel)}function be(e,t){return s=>s.reduce((o,a)=>a[e]&&a[e].length?(o.push({$groupLabel:a[t],$isLabel:!0}),o.concat(a[e])):o,[])}function pr(e,t,s,o,a){return r=>r.map(i=>{if(!i[s])return console.warn("Options passed to vue-multiselect do not contain groups, despite the config."),[];const l=tt(i[s],e,t,a);return l.length?{[o]:i[o],[s]:l}:[]})}const Re=(...e)=>t=>e.reduce((s,o)=>o(s),t);var hr={data(){return{search:"",isOpen:!1,preferredOpenDirection:"below",optimizedHeight:this.maxHeight}},props:{internalSearch:{type:Boolean,default:!0},options:{type:Array,required:!0},multiple:{type:Boolean,default:!1},trackBy:{type:String},label:{type:String},searchable:{type:Boolean,default:!0},clearOnSelect:{type:Boolean,default:!0},hideSelected:{type:Boolean,default:!1},placeholder:{type:String,default:"Select option"},allowEmpty:{type:Boolean,default:!0},resetAfter:{type:Boolean,default:!1},closeOnSelect:{type:Boolean,default:!0},customLabel:{type:Function,default(e,t){return ge(e)?"":t?e[t]:e}},taggable:{type:Boolean,default:!1},tagPlaceholder:{type:String,default:"Press enter to create a tag"},tagPosition:{type:String,default:"top"},max:{type:[Number,Boolean],default:!1},id:{default:null},optionsLimit:{type:Number,default:1e3},groupValues:{type:String},groupLabel:{type:String},groupSelect:{type:Boolean,default:!1},blockKeys:{type:Array,default(){return[]}},preserveSearch:{type:Boolean,default:!1},preselectFirst:{type:Boolean,default:!1},preventAutofocus:{type:Boolean,default:!1}},mounted(){!this.multiple&&this.max&&console.warn("[Vue-Multiselect warn]: Max prop should not be used when prop Multiple equals false."),this.preselectFirst&&!this.internalValue.length&&this.options.length&&this.select(this.filteredOptions[0])},computed:{internalValue(){return this.modelValue||this.modelValue===0?Array.isArray(this.modelValue)?this.modelValue:[this.modelValue]:[]},filteredOptions(){const e=this.search||"",t=e.toLowerCase().trim();let s=this.options.concat();return this.internalSearch?s=this.groupValues?this.filterAndFlat(s,t,this.label):tt(s,t,this.label,this.customLabel):s=this.groupValues?be(this.groupValues,this.groupLabel)(s):s,s=this.hideSelected?s.filter(cr(this.isSelected)):s,this.taggable&&t.length&&!this.isExistingOption(t)&&(this.tagPosition==="bottom"?s.push({isTag:!0,label:e}):s.unshift({isTag:!0,label:e})),s.slice(0,this.optionsLimit)},valueKeys(){return this.trackBy?this.internalValue.map(e=>e[this.trackBy]):this.internalValue},optionKeys(){return(this.groupValues?this.flatAndStrip(this.options):this.options).map(t=>this.customLabel(t,this.label).toString().toLowerCase())},currentOptionLabel(){return this.multiple?this.searchable?"":this.placeholder:this.internalValue.length?this.getOptionLabel(this.internalValue[0]):this.searchable?"":this.placeholder}},watch:{internalValue:{handler(){this.resetAfter&&this.internalValue.length&&(this.search="",this.$emit("update:modelValue",this.multiple?[]:null))},deep:!0},search(){this.$emit("search-change",this.search)}},emits:["open","search-change","close","select","update:modelValue","remove","tag"],methods:{getValue(){return this.multiple?this.internalValue:this.internalValue.length===0?null:this.internalValue[0]},filterAndFlat(e,t,s){return Re(pr(t,s,this.groupValues,this.groupLabel,this.customLabel),be(this.groupValues,this.groupLabel))(e)},flatAndStrip(e){return Re(be(this.groupValues,this.groupLabel),dr)(e)},updateSearch(e){this.search=e},isExistingOption(e){return this.options?this.optionKeys.indexOf(e)>-1:!1},isSelected(e){const t=this.trackBy?e[this.trackBy]:e;return this.valueKeys.indexOf(t)>-1},isOptionDisabled(e){return!!e.$isDisabled},getOptionLabel(e){if(ge(e))return"";if(e.isTag)return e.label;if(e.$isLabel)return e.$groupLabel;const t=this.customLabel(e,this.label);return ge(t)?"":t},select(e,t){if(e.$isLabel&&this.groupSelect){this.selectGroup(e);return}if(!(this.blockKeys.indexOf(t)!==-1||this.disabled||e.$isDisabled||e.$isLabel)&&!(this.max&&this.multiple&&this.internalValue.length===this.max)&&!(t==="Tab"&&!this.pointerDirty)){if(e.isTag)this.$emit("tag",e.label,this.id),this.search="",this.closeOnSelect&&!this.multiple&&this.deactivate();else{if(this.isSelected(e)){t!=="Tab"&&this.removeElement(e);return}this.multiple?this.$emit("update:modelValue",this.internalValue.concat([e])):this.$emit("update:modelValue",e),this.$emit("select",e,this.id),this.clearOnSelect&&(this.search="")}this.closeOnSelect&&this.deactivate()}},selectGroup(e){const t=this.options.find(s=>s[this.groupLabel]===e.$groupLabel);if(t){if(this.wholeGroupSelected(t)){this.$emit("remove",t[this.groupValues],this.id);const s=this.internalValue.filter(o=>t[this.groupValues].indexOf(o)===-1);this.$emit("update:modelValue",s)}else{let s=t[this.groupValues].filter(o=>!(this.isOptionDisabled(o)||this.isSelected(o)));this.max&&s.splice(this.max-this.internalValue.length),this.$emit("select",s,this.id),this.$emit("update:modelValue",this.internalValue.concat(s))}this.closeOnSelect&&this.deactivate()}},wholeGroupSelected(e){return e[this.groupValues].every(t=>this.isSelected(t)||this.isOptionDisabled(t))},wholeGroupDisabled(e){return e[this.groupValues].every(this.isOptionDisabled)},removeElement(e,t=!0){if(this.disabled||e.$isDisabled)return;if(!this.allowEmpty&&this.internalValue.length<=1){this.deactivate();return}const s=typeof e=="object"?this.valueKeys.indexOf(e[this.trackBy]):this.valueKeys.indexOf(e);if(this.multiple){const o=this.internalValue.slice(0,s).concat(this.internalValue.slice(s+1));this.$emit("update:modelValue",o)}else this.$emit("update:modelValue",null);this.$emit("remove",e,this.id),this.closeOnSelect&&t&&this.deactivate()},removeLastElement(){this.blockKeys.indexOf("Delete")===-1&&this.search.length===0&&Array.isArray(this.internalValue)&&this.internalValue.length&&this.removeElement(this.internalValue[this.internalValue.length-1],!1)},activate(){this.isOpen||this.disabled||(this.adjustPosition(),this.groupValues&&this.pointer===0&&this.filteredOptions.length&&(this.pointer=1),this.isOpen=!0,this.searchable?(this.preserveSearch||(this.search=""),this.preventAutofocus||this.$nextTick(()=>this.$refs.search&&this.$refs.search.focus())):this.preventAutofocus||typeof this.$el<"u"&&this.$el.focus(),this.$emit("open",this.id))},deactivate(){this.isOpen&&(this.isOpen=!1,this.searchable?typeof this.$refs.search<"u"&&this.$refs.search.blur():typeof this.$el<"u"&&this.$el.blur(),this.preserveSearch||(this.search=""),this.$emit("close",this.getValue(),this.id))},toggle(){this.isOpen?this.deactivate():this.activate()},adjustPosition(){if(typeof window>"u")return;const e=this.$el.getBoundingClientRect().top,t=window.innerHeight-this.$el.getBoundingClientRect().bottom;t>this.maxHeight||t>e||this.openDirection==="below"||this.openDirection==="bottom"?(this.preferredOpenDirection="below",this.optimizedHeight=Math.min(t-40,this.maxHeight)):(this.preferredOpenDirection="above",this.optimizedHeight=Math.min(e-40,this.maxHeight))}}},fr={data(){return{pointer:0,pointerDirty:!1}},props:{showPointer:{type:Boolean,default:!0},optionHeight:{type:Number,default:40}},computed:{pointerPosition(){return this.pointer*this.optionHeight},visibleElements(){return this.optimizedHeight/this.optionHeight}},watch:{filteredOptions(){this.pointerAdjust()},isOpen(){this.pointerDirty=!1},pointer(){this.$refs.search&&this.$refs.search.setAttribute("aria-activedescendant",this.id+"-"+this.pointer.toString())}},methods:{optionHighlight(e,t){return{"multiselect__option--highlight":e===this.pointer&&this.showPointer,"multiselect__option--selected":this.isSelected(t)}},groupHighlight(e,t){if(!this.groupSelect)return["multiselect__option--disabled",{"multiselect__option--group":t.$isLabel}];const s=this.options.find(o=>o[this.groupLabel]===t.$groupLabel);return s&&!this.wholeGroupDisabled(s)?["multiselect__option--group",{"multiselect__option--highlight":e===this.pointer&&this.showPointer},{"multiselect__option--group-selected":this.wholeGroupSelected(s)}]:"multiselect__option--disabled"},addPointerElement({key:e}="Enter"){this.filteredOptions.length>0&&this.select(this.filteredOptions[this.pointer],e),this.pointerReset()},pointerForward(){this.pointer0?(this.pointer--,this.$refs.list.scrollTop>=this.pointerPosition&&(this.$refs.list.scrollTop=this.pointerPosition),this.filteredOptions[this.pointer]&&this.filteredOptions[this.pointer].$isLabel&&!this.groupSelect&&this.pointerBackward()):this.filteredOptions[this.pointer]&&this.filteredOptions[0].$isLabel&&!this.groupSelect&&this.pointerForward(),this.pointerDirty=!0},pointerReset(){this.closeOnSelect&&(this.pointer=0,this.$refs.list&&(this.$refs.list.scrollTop=0))},pointerAdjust(){this.pointer>=this.filteredOptions.length-1&&(this.pointer=this.filteredOptions.length?this.filteredOptions.length-1:0),this.filteredOptions.length>0&&this.filteredOptions[this.pointer].$isLabel&&!this.groupSelect&&this.pointerForward()},pointerSet(e){this.pointer=e,this.pointerDirty=!0}}},st={name:"vue-multiselect",mixins:[hr,fr],compatConfig:{MODE:3,ATTR_ENUMERATED_COERCION:!1},props:{name:{type:String,default:""},modelValue:{type:null,default(){return[]}},selectLabel:{type:String,default:"Press enter to select"},selectGroupLabel:{type:String,default:"Press enter to select group"},selectedLabel:{type:String,default:"Selected"},deselectLabel:{type:String,default:"Press enter to remove"},deselectGroupLabel:{type:String,default:"Press enter to deselect group"},showLabels:{type:Boolean,default:!0},limit:{type:Number,default:99999},maxHeight:{type:Number,default:300},limitText:{type:Function,default:e=>`and ${e} more`},loading:{type:Boolean,default:!1},disabled:{type:Boolean,default:!1},openDirection:{type:String,default:""},showNoOptions:{type:Boolean,default:!0},showNoResults:{type:Boolean,default:!0},tabindex:{type:Number,default:0}},computed:{hasOptionGroup(){return this.groupValues&&this.groupLabel&&this.groupSelect},isSingleLabelVisible(){return(this.singleValue||this.singleValue===0)&&(!this.isOpen||!this.searchable)&&!this.visibleValues.length},isPlaceholderVisible(){return!this.internalValue.length&&(!this.searchable||!this.isOpen)},visibleValues(){return this.multiple?this.internalValue.slice(0,this.limit):[]},singleValue(){return this.internalValue[0]},deselectLabelText(){return this.showLabels?this.deselectLabel:""},deselectGroupLabelText(){return this.showLabels?this.deselectGroupLabel:""},selectLabelText(){return this.showLabels?this.selectLabel:""},selectGroupLabelText(){return this.showLabels?this.selectGroupLabel:""},selectedLabelText(){return this.showLabels?this.selectedLabel:""},inputStyle(){return this.searchable||this.multiple&&this.modelValue&&this.modelValue.length?this.isOpen?{width:"100%"}:{width:"0",position:"absolute",padding:"0"}:""},contentStyle(){return this.options.length?{display:"inline-block"}:{display:"block"}},isAbove(){return this.openDirection==="above"||this.openDirection==="top"?!0:this.openDirection==="below"||this.openDirection==="bottom"?!1:this.preferredOpenDirection==="above"},showSearchInput(){return this.searchable&&(this.hasSingleSelectedSlot&&(this.visibleSingleValue||this.visibleSingleValue===0)?this.isOpen:!0)}}};const vr={ref:"tags",class:"multiselect__tags"},mr={class:"multiselect__tags-wrap"},_r={class:"multiselect__spinner"},gr={key:0},br={class:"multiselect__option"},yr={class:"multiselect__option"},wr=I("No elements found. Consider changing the search query."),Sr={class:"multiselect__option"},Lr=I("List is empty.");function Or(e,t,s,o,a,r){return n(),O("div",{tabindex:e.searchable?-1:s.tabindex,class:[{"multiselect--active":e.isOpen,"multiselect--disabled":s.disabled,"multiselect--above":r.isAbove,"multiselect--has-options-group":r.hasOptionGroup},"multiselect"],onFocus:t[14]||(t[14]=i=>e.activate()),onBlur:t[15]||(t[15]=i=>e.searchable?!1:e.deactivate()),onKeydown:[t[16]||(t[16]=G(P(i=>e.pointerForward(),["self","prevent"]),["down"])),t[17]||(t[17]=G(P(i=>e.pointerBackward(),["self","prevent"]),["up"]))],onKeypress:t[18]||(t[18]=G(P(i=>e.addPointerElement(i),["stop","self"]),["enter","tab"])),onKeyup:t[19]||(t[19]=G(i=>e.deactivate(),["esc"])),role:"combobox","aria-owns":"listbox-"+e.id},[D(e.$slots,"caret",{toggle:e.toggle},()=>[S("div",{onMousedown:t[1]||(t[1]=P(i=>e.toggle(),["prevent","stop"])),class:"multiselect__select"},null,32)]),D(e.$slots,"clear",{search:e.search}),S("div",vr,[D(e.$slots,"selection",{search:e.search,remove:e.removeElement,values:r.visibleValues,isOpen:e.isOpen},()=>[Y(S("div",mr,[(n(!0),O(M,null,B(r.visibleValues,(i,l)=>D(e.$slots,"tag",{option:i,search:e.search,remove:e.removeElement},()=>[(n(),O("span",{class:"multiselect__tag",key:l},[S("span",{textContent:V(e.getOptionLabel(i))},null,8,["textContent"]),S("i",{tabindex:"1",onKeypress:G(P(c=>e.removeElement(i),["prevent"]),["enter"]),onMousedown:P(c=>e.removeElement(i),["prevent"]),class:"multiselect__tag-icon"},null,40,["onKeypress","onMousedown"])]))])),256))],512),[[Q,r.visibleValues.length>0]]),e.internalValue&&e.internalValue.length>s.limit?D(e.$slots,"limit",{key:0},()=>[S("strong",{class:"multiselect__strong",textContent:V(s.limitText(e.internalValue.length-s.limit))},null,8,["textContent"])]):L("v-if",!0)]),S(de,{name:"multiselect__loading"},{default:W(()=>[D(e.$slots,"loading",{},()=>[Y(S("div",_r,null,512),[[Q,s.loading]])])]),_:3}),e.searchable?(n(),O("input",{key:0,ref:"search",name:s.name,id:e.id,type:"text",autocomplete:"off",spellcheck:"false",placeholder:e.placeholder,style:r.inputStyle,value:e.search,disabled:s.disabled,tabindex:s.tabindex,onInput:t[2]||(t[2]=i=>e.updateSearch(i.target.value)),onFocus:t[3]||(t[3]=P(i=>e.activate(),["prevent"])),onBlur:t[4]||(t[4]=P(i=>e.deactivate(),["prevent"])),onKeyup:t[5]||(t[5]=G(i=>e.deactivate(),["esc"])),onKeydown:[t[6]||(t[6]=G(P(i=>e.pointerForward(),["prevent"]),["down"])),t[7]||(t[7]=G(P(i=>e.pointerBackward(),["prevent"]),["up"])),t[9]||(t[9]=G(P(i=>e.removeLastElement(),["stop"]),["delete"]))],onKeypress:t[8]||(t[8]=G(P(i=>e.addPointerElement(i),["prevent","stop","self"]),["enter"])),class:"multiselect__input","aria-controls":"listbox-"+e.id},null,44,["name","id","placeholder","value","disabled","tabindex","aria-controls"])):L("v-if",!0),r.isSingleLabelVisible?(n(),O("span",{key:1,class:"multiselect__single",onMousedown:t[10]||(t[10]=P((...i)=>e.toggle&&e.toggle(...i),["prevent"]))},[D(e.$slots,"singleLabel",{option:r.singleValue},()=>[I(V(e.currentOptionLabel),1)])],32)):L("v-if",!0),r.isPlaceholderVisible?(n(),O("span",{key:2,class:"multiselect__placeholder",onMousedown:t[11]||(t[11]=P((...i)=>e.toggle&&e.toggle(...i),["prevent"]))},[D(e.$slots,"placeholder",{},()=>[I(V(e.placeholder),1)])],32)):L("v-if",!0)],512),S(de,{name:"multiselect"},{default:W(()=>[Y(S("div",{class:"multiselect__content-wrapper",onFocus:t[12]||(t[12]=(...i)=>e.activate&&e.activate(...i)),tabindex:"-1",onMousedown:t[13]||(t[13]=P(()=>{},["prevent"])),style:{maxHeight:e.optimizedHeight+"px"},ref:"list"},[S("ul",{class:"multiselect__content",style:r.contentStyle,role:"listbox",id:"listbox-"+e.id},[D(e.$slots,"beforeList"),e.multiple&&e.max===e.internalValue.length?(n(),O("li",gr,[S("span",br,[D(e.$slots,"maxElements",{},()=>[I("Maximum of "+V(e.max)+" options selected. First remove a selected option to select another.",1)])])])):L("v-if",!0),!e.max||e.internalValue.length(n(),O("li",{class:"multiselect__element",key:l,id:e.id+"-"+l,role:i&&(i.$isLabel||i.$isDisabled)?null:"option"},[i&&(i.$isLabel||i.$isDisabled)?L("v-if",!0):(n(),O("span",{key:0,class:[e.optionHighlight(l,i),"multiselect__option"],onClick:P(c=>e.select(i),["stop"]),onMouseenter:P(c=>e.pointerSet(l),["self"]),"data-select":i&&i.isTag?e.tagPlaceholder:r.selectLabelText,"data-selected":r.selectedLabelText,"data-deselect":r.deselectLabelText},[D(e.$slots,"option",{option:i,search:e.search,index:l},()=>[S("span",null,V(e.getOptionLabel(i)),1)])],42,["onClick","onMouseenter","data-select","data-selected","data-deselect"])),i&&(i.$isLabel||i.$isDisabled)?(n(),O("span",{key:1,"data-select":e.groupSelect&&r.selectGroupLabelText,"data-deselect":e.groupSelect&&r.deselectGroupLabelText,class:[e.groupHighlight(l,i),"multiselect__option"],onMouseenter:P(c=>e.groupSelect&&e.pointerSet(l),["self"]),onMousedown:P(c=>e.selectGroup(i),["prevent"])},[D(e.$slots,"option",{option:i,search:e.search,index:l},()=>[S("span",null,V(e.getOptionLabel(i)),1)])],42,["data-select","data-deselect","onMouseenter","onMousedown"])):L("v-if",!0)],8,["id","role"]))),128)):L("v-if",!0),Y(S("li",null,[S("span",yr,[D(e.$slots,"noResult",{search:e.search},()=>[wr])])],512),[[Q,s.showNoResults&&e.filteredOptions.length===0&&e.search&&!s.loading]]),Y(S("li",null,[S("span",Sr,[D(e.$slots,"noOptions",{},()=>[Lr])])],512),[[Q,s.showNoOptions&&(e.options.length===0||r.hasOptionGroup===!0&&e.filteredOptions.length===0)&&!e.search&&!s.loading]]),D(e.$slots,"afterList")],12,["id"])],36),[[Q,e.isOpen]])]),_:3})],42,["tabindex","aria-owns"])}st.render=Or;const Me="/assets/bot-6afebef6.png";const Er={components:{BotIcon:Me,Multiselect:st},data(){return{dynamicComponent:null,messages:[],isConnected:!1,waitResponse:!1,botOptions:{botAvatarImg:Me,botTitle:"AI Bot",colorScheme:"#314659",boardContentBg:"#f4f4f4",msgBubbleBgBot:"#fff",msgBubbleBgUser:"#314659",inputPlaceholder:"Ask a new question"},docName:"tuxcare-documentation",tags:[],options:[{name:"TuxCare",value:["level-0","tuxcare"]},{name:"AlmaCare",value:["level-0","almacare"]},{name:"KernelCare Enterprise",value:["level-0","live-patching-services"]},{name:"KernelCare for IOT",value:["level-0","kernelcare-for-iot"]},{name:"ePortal",value:["level-0","eportal"]},{name:"ePortal API",value:["level-0","eportal-api"]},{name:"Extended Lifecycle Support",value:["level-0","extended-lifecycle-support"]},{name:"Extended Lifecycle Support for Languages",value:["level-0","extended-lifecycle-support-for-languages"]},{name:"Subscription Management Portal",value:["level-0","tuxcare-cln"]},{name:"Service Descriptions",value:["level-0","service-descriptions"]}]}},mounted(){b(()=>import("./vue-bot-ui.common-605c2d08.js").then(e=>e.v),["assets/vue-bot-ui.common-605c2d08.js","assets/framework-0ba8e1ea.js"]).then(e=>{this.dynamicComponent=_t(e.VueBotUI)}),console.log("Starting connection..."),this.connection=new WebSocket("wss://doc-bot.cloudlinux.com:2096"),this.connection.onmessage=e=>{const t=JSON.parse(e.data);this.messages.push({agent:"bot",type:"markdown",text:t.text}),this.waitResponse=!1,setTimeout(()=>{this.messages.push({agent:"bot",type:"rate",id:t.id})},1e3)},this.connection.onclose=()=>{console.log("Connection closed"),this.isConnected=!1},this.connection.onopen=()=>{console.log("Successfully connected to the websocket server..."),this.isConnected=!0}},methods:{messageSendHandler(e){this.messages.push({agent:"user",type:"text",text:e.text});let t=[];this.tags.length!==this.options.length&&(t=this.tags.map(s=>s.value)),this.connection.send(JSON.stringify({type:"question",text:e.text,"doc-name":this.docName,tags:t})),this.waitResponse=!0},messageToServer(e){this.connection.send(JSON.stringify({"doc-name":this.docName,...e}))}}},Dr={id:"bot-ui"},$r={class:"qkb-board-header__title"},Vr={class:"qkb-board-header__select_field"};function kr(e,t,s,o,a,r){const i=oe("multiselect"),l=oe("ClientOnly");return n(),O(l,null,{default:W(()=>[p("div",Dr,[a.dynamicComponent&&a.isConnected?(n(),O(ue(a.dynamicComponent),{key:0,messages:a.messages,options:a.botOptions,"bot-typing":a.waitResponse,"input-disable":a.waitResponse,onMsgSend:r.messageSendHandler,onMsgToServer:r.messageToServer},{header:W(()=>[p("div",$r,V(a.botOptions.botTitle),1),p("div",Vr,[S(i,{modelValue:a.tags,"onUpdate:modelValue":t[0]||(t[0]=c=>a.tags=c),options:a.options,multiple:!0,"close-on-select":!0,limit:3,label:"name","track-by":"value",placeholder:"Select section"},null,8,["modelValue","options"])])]),_:1},40,["messages","options","bot-typing","input-disable","onMsgSend","onMsgToServer"])):L("v-if",!0)])]),_:1})}const xr=A(Er,[["render",kr],["__file","Chat.vue"]]),Ar=Ht({rootComponents:[xr],async enhance({app:e}){e.config.globalProperties.$eventBus=Ft()},layouts:{Layout:Ha,HomeLayout:er,NotFound:or},setup(){He("themeConfig",{cloudlinuxSite:"https://tuxcare.com",defaultURL:"/",githubBranch:"master",allowGithubEdit:!0,githubMainDir:"docs",githubRepository:"cloudlinux/tuxcare-documentation",MOBILE_BREAKPOINT:767,documents:ir,arrowDownIcon:"arrows/arrow-down.svg",githubEditIcon:"global/pen.svg",footerCustomLogo:"global/we-are-cloudlinux.svg",headerDefaultSearchIcon:"global/search.svg",siteLogo:"global/logo.svg",searchSelectIcon:"arrows/select-down.svg",headerSearchIcon:"global/header-search.svg",headerSearch:"TuxCare Product Documentation",headerSearchPlaceholder:"Search across the TuxCare product documentation",locales:{bottomLinks:ar,editLinkText:"Edit this page",sidebar:lr,siteTitle:"Documentation",stayInTouch:"Stay in touch",navbarLinks:rr},productsList:["CloudLinux","Imunify","TuxCare"],productsTitle:"Products",productsURLs:["https://docs.cloudlinux.com","https://docs.imunify360.com","https://docs.tuxcare.com"],social:nr,algoliaOptions:{apiKey:"17e673c12b93fbf7c4a00159b0ae2de0",indexName:"tuxcare",appId:"R7FCMJM4P7"},MAX_ALGOLIA_VISIBLE_RESULT:20,MAX_ALGOLIA_VISIBLE_ROWS:15,MAX_ALGOLIA_HITS_PER_PAGE:20})}}),ce=[jt,Ar],Tr=[["v-8daa1a0e","/",{},["/index.html","/README.md"]],["v-b0d2ea62","/enterprise-support-for-almalinux/",{},["/enterprise-support-for-almalinux/index.html","/enterprise-support-for-almalinux/README.md"]],["v-89bfb992","/eportal/",{},["/eportal/index.html","/eportal/README.md"]],["v-1b6f4a0a","/eportal-api/",{},["/eportal-api/index.html","/eportal-api/README.md"]],["v-6c1fb884","/extended-lifecycle-support/",{},["/extended-lifecycle-support/index.html","/extended-lifecycle-support/README.md"]],["v-cadd6498","/extended-lifecycle-support-for-languages/",{},["/extended-lifecycle-support-for-languages/index.html","/extended-lifecycle-support-for-languages/README.md"]],["v-2d0a9a10","/jp/",{},["/jp/index.html","/jp/README.md"]],["v-33720eeb","/kernelcare-for-iot/",{},["/kernelcare-for-iot/index.html","/kernelcare-for-iot/README.md"]],["v-37e5fb86","/live-patching-services/",{},["/live-patching-services/index.html","/live-patching-services/README.md"]],["v-c271a6b2","/service-descriptions/",{},["/service-descriptions/index.html","/service-descriptions/README.md"]],["v-2f5e7500","/tuxcare/",{},["/tuxcare/index.html","/tuxcare/README.md"]],["v-1f847a28","/tuxcare-cln/",{},["/tuxcare-cln/index.html","/tuxcare-cln/README.md"]],["v-ec0cad0c","/enterprise-support-for-almalinux/fips/",{},["/enterprise-support-for-almalinux/fips/index.html","/enterprise-support-for-almalinux/fips/README.md"]],["v-52e27964","/jp/eportal/",{},["/jp/eportal/index.html","/jp/eportal/README.md"]],["v-c05bf2be","/jp/eportal-api/",{},["/jp/eportal-api/index.html","/jp/eportal-api/README.md"]],["v-3d707372","/jp/extended-lifecycle-support/",{},["/jp/extended-lifecycle-support/index.html","/jp/extended-lifecycle-support/README.md"]],["v-7d514c7d","/jp/extended-lifecycle-support-for-languages/",{},["/jp/extended-lifecycle-support-for-languages/index.html","/jp/extended-lifecycle-support-for-languages/README.md"]],["v-50c7132c","/jp/linux-support-services/",{},["/jp/linux-support-services/index.html","/jp/linux-support-services/README.md"]],["v-fd036ae2","/jp/live-patching-services/",{},["/jp/live-patching-services/index.html","/jp/live-patching-services/README.md"]],["v-03bf6597","/jp/tuxcare/",{},["/jp/tuxcare/index.html","/jp/tuxcare/README.md"]],["v-b8319282","/jp/tuxcare-cln/",{},["/jp/tuxcare-cln/index.html","/jp/tuxcare-cln/README.md"]],["v-3706649a","/404.html",{},["/404"]]];var Ie=ve({name:"Vuepress",setup(){const e=Tt();return()=>z(e.value)}}),Pr=()=>Tr.reduce((e,[t,s,o,a])=>(e.push({name:t,path:s,component:Ie,meta:o},...a.map(r=>({path:r,redirect:s}))),e),[{name:"404",path:"/:catchAll(.*)",component:Ie}]),Cr=St,Rr=()=>{const e=gt({history:Cr(bt("/")),routes:Pr(),scrollBehavior:(t,s,o)=>o||(t.hash?{el:t.hash}:{top:0})});return e.beforeResolve(async(t,s)=>{var o;(t.path!==s.path||s===yt)&&([X.value]=await Promise.all([U.resolvePageData(t.name),(o=je[t.name])==null?void 0:o.__asyncLoader()]))}),e},Mr=e=>{e.component("ClientOnly",It),e.component("Content",Bt)},Ir=(e,t,s)=>{const o=k(t.currentRoute.value.path);re(()=>t.currentRoute.value.path,g=>o.value=g);const a=E(()=>U.resolveLayouts(s)),r=E(()=>U.resolveRouteLocale(le.value.locales,o.value)),i=E(()=>U.resolveSiteLocaleData(le.value,r.value)),l=E(()=>U.resolvePageFrontmatter(X.value)),c=E(()=>U.resolvePageHeadTitle(X.value,i.value)),u=E(()=>U.resolvePageHead(c.value,l.value,i.value)),f=E(()=>U.resolvePageLang(X.value)),_=E(()=>U.resolvePageLayout(X.value,a.value));return e.provide(Vt,a),e.provide(We,l),e.provide(At,c),e.provide(Ne,u),e.provide(Ge,f),e.provide(qe,_),e.provide(Ue,r),e.provide(Pt,i),Object.defineProperties(e.config.globalProperties,{$frontmatter:{get:()=>l.value},$head:{get:()=>u.value},$headTitle:{get:()=>c.value},$lang:{get:()=>f.value},$page:{get:()=>X.value},$routeLocale:{get:()=>r.value},$site:{get:()=>le.value},$siteLocale:{get:()=>i.value},$withBase:{get:()=>F}}),{layouts:a,pageData:X,pageFrontmatter:l,pageHead:u,pageHeadTitle:c,pageLang:f,pageLayout:_,routeLocale:r,siteData:le,siteLocaleData:i}},Br=()=>{const e=xt(),t=Ke(),s=k([]),o=()=>{e.value.forEach(r=>{const i=Hr(r);i&&s.value.push(i)})},a=()=>{document.documentElement.lang=t.value,s.value.forEach(r=>{r.parentNode===document.head&&document.head.removeChild(r)}),s.value.splice(0,s.value.length),e.value.forEach(r=>{const i=jr(r);i!==null&&(document.head.appendChild(i),s.value.push(i))})};He(Ct,a),J(()=>{o(),a(),re(()=>e.value,()=>a())})},Hr=([e,t,s=""])=>{const o=Object.entries(t).map(([l,c])=>se(c)?`[${l}=${JSON.stringify(c)}]`:c===!0?`[${l}]`:"").join(""),a=`head > ${e}${o}`;return Array.from(document.querySelectorAll(a)).find(l=>l.innerText===s)||null},jr=([e,t,s])=>{if(!se(e))return null;const o=document.createElement(e);return Ot(t)&&Object.entries(t).forEach(([a,r])=>{se(r)?o.setAttribute(a,r):r===!0&&o.setAttribute(a,"")}),se(s)&&o.appendChild(document.createTextNode(s)),o},Fr=wt,Wr=async()=>{var s;const e=Fr({name:"VuepressApp",setup(){var o;Br();for(const a of ce)(o=a.setup)==null||o.call(a);return()=>[z(Lt),...ce.flatMap(({rootComponents:a=[]})=>a.map(r=>z(r)))]}}),t=Rr();Mr(e),Ir(e,t,ce);for(const o of ce)await((s=o.enhance)==null?void 0:s.call(o,{app:e,router:t,siteData:le}));return e.use(t),{app:e,router:t}};Wr().then(({app:e,router:t})=>{t.isReady().then(()=>{e.mount("#app")})});export{Wr as createVueApp}; diff --git a/assets/index.html-e6b666ee.js b/assets/index.html-a217ad23.js similarity index 99% rename from assets/index.html-e6b666ee.js rename to assets/index.html-a217ad23.js index c37192ee..b8e185ad 100644 --- a/assets/index.html-e6b666ee.js +++ b/assets/index.html-a217ad23.js @@ -22,7 +22,7 @@ Uploading... Key: FRWf74Zw11111111.83991334-1111-1111-1111-681ddd653e5f Please, provide above mentioned key to KernelCare Support Team -

The command generates a report and prints out the ID which could be linked to a support ticket.

Note

If there was some connection problem during report uploading, the report will be stored locally as /root/cl-report. This file should be sent to the support team manually.

Config options

A kcarectl behavior can be configured using /etc/sysconfig/kcare/kcare.conf

`,11),pe=e("thead",null,[e("tr",null,[e("th"),e("th")])],-1),me=e("tr",null,[e("td",null,[e("code",null,"AUTO_UPDATE=YES|NO")]),e("td",null,[e("code",null,"YES"),a(" - enable auto-update; "),e("code",null,"NO"),a(" - disable auto-update.")])],-1),ve=e("tr",null,[e("td",null,[e("code",null,"PATCH_METHOD=normal|nofreeze|smart")]),e("td",null,[e("code",null,"Normal"),a(" - (default) use freezer;"),e("br"),e("code",null,"Nofreeze"),a(" - don't use freezer to freeze processes;"),e("br"),a(),e("code",null,"Smart"),a(" - smart freezer freezes only threads that need to be frozen for patching [kernelcare 2.3+].")])],-1),be=e("tr",null,[e("td",null,[e("code",null,"PATCH_SERVER")]),e("td",null,"Server to use to download patches.")],-1),ge=e("tr",null,[e("td",null,[e("code",null,"REGISTRATION_URL")]),e("td",null,"Licensing server.")],-1),fe=e("tr",null,[e("td",null,[e("code",null,"PREFIX=prefix")]),e("td",null,"Patch source prefix, used to test different builds, by downloading builds from a different location, based on prefix [kernelcare 2.2+]")],-1),ye=e("tr",null,[e("td",null,[e("code",null,"UPDATE_POLICY=REMOTE|LOCAL|LOCAL_FIRST")]),e("td",null,[a("Depending on the policy, on server startup, use:"),e("br"),e("code",null,"REMOTE"),a(" - (default) patches from patch server."),e("br"),e("code",null,"LOCAL"),a(" - only locally cached patches, if none cached (caching is done automatically) - do nothing."),e("br"),e("code",null,"LOCAL_FIRST"),a(" - see if locally cached patches exist, and load them. If not, try getting them from remote server.")])],-1),xe=e("tr",null,[e("td",null,[e("code",null,"IGNORE_UNKNOWN_KERNEL=True|False")]),e("td",null,"Don't provide notification if unknown kernel on auto-update. [kernelcare 2.5+]")],-1),ke=e("tr",null,[e("td",null,[e("code",null,"LOAD_KCARE_SYSCTL")]),e("td",null,[a("Controls if "),e("code",null,"/etc/sysconfig/kcare/sysctl.conf"),a(" will be loaded on patchset load. True by default. [kernelcare 2.7+]")])],-1),we=e("tr",null,[e("td",null,[e("code",null,"STICKY_PATCH=KEY")]),e("td",null,[a("Retrieve sticky patch from "),e("code",null,"KEY"),a(" (see CLN, Key Edit); not supported for IP based servers or ePortal.")])],-1),_e=e("td",null,[e("code",null,"STICKY_PATCH=DDMMYY")],-1),Ce=e("tr",null,[e("td",null,[e("code",null,"[AUTO_]UPDATE_DELAY=h|d")]),e("td",null,[a("Use patchsets not newer than specified time. For example "),e("code",null,"24h"),a(" or "),e("code",null,"2d"),a(". "),e("code",null,"AUTO_UPDATE_DELAY"),a(" works for "),e("code",null,"auto"),a(" and "),e("code",null,"smart"),a(" modes. "),e("code",null,"UPDATE_DELAY"),a(" works for all modes. [kernelcare 2.82+]")])],-1),Te=e("tr",null,[e("td",null,[e("code",null,"[AUTO_]STICKY_PATCHSET=")]),e("td",null,[a("Use patchsets not newer than specified value. For example "),e("code",null,"K20230908_02"),a(". "),e("code",null,"AUTO_STICKY_PATCHSET"),a(" works for "),e("code",null,"auto"),a(" and "),e("code",null,"smart"),a(" modes. "),e("code",null,"STICKY_PATCHSET"),a(" works for all modes. [kernelcare 2.82+]")])],-1),Ke=e("tr",null,[e("td",null,[e("code",null,"REPORT_FQDN=True|False")]),e("td",null,"Force using Fully Qualified Domain as a hostname. False by default.")],-1),Ee=e("tr",null,[e("td",null,[e("code",null,"FORCE_GID=N")]),e("td",null,[a("Use this group ID for symlink protection patch. By default, it's 48 (default Apache user GID) or 99 ("),e("code",null,"nobody"),a(" user)")])],-1),Se=e("tr",null,[e("td",null,[e("code",null,"USERSPACE_PATCHES=libs,qemu")]),e("td",null,"Define which userspace patches will be applyed by default")],-1),Pe=t(`

Disabling some patches

Some patches might affect the work of the system, and we created a way to disable them.

This is done via the sysctl command.

When new patchset loads, KernelCare Enterprise sysctl options get reset. To prevent that we added a file:

/etc/sysconfig/kcare/sysctl.conf

Options in this file will be loaded automatically on new patchset load.

To disable loading this options, specify:

LOAD_KCARE_SYSCTL=0 in /etc/sysconfig/kcare/kcare.conf

To disable the patch, set the corresponding kcare option to 1.

Patches that can be disabled:

Patchsysctl option
CVE-2015-5157kcare_modify_ldt

Extra patchset

Note

KernelCare Enterprise 2.12-5 or higher

KernelCare Enterprise Extra patchset includes all the security fixes from KernelCare Enterprise for AlmaLinux, CentOS 6, CentOS 7, and CentOS 8 as well as symlink protection and IPSet bugfix for CentOS 6.

To enable extra patches and apply patch, run:

kcarectl --set-patch-type extra --update
+

The command generates a report and prints out the ID which could be linked to a support ticket.

Note

If there was some connection problem during report uploading, the report will be stored locally as /root/cl-report. This file should be sent to the support team manually.

Config options

A kcarectl behavior can be configured using /etc/sysconfig/kcare/kcare.conf

`,11),pe=e("thead",null,[e("tr",null,[e("th"),e("th")])],-1),me=e("tr",null,[e("td",null,[e("code",null,"AUTO_UPDATE=YES|NO")]),e("td",null,[e("code",null,"YES"),a(" - enable auto-update; "),e("code",null,"NO"),a(" - disable auto-update.")])],-1),ve=e("tr",null,[e("td",null,[e("code",null,"PATCH_METHOD=normal|nofreeze|smart")]),e("td",null,[e("code",null,"Normal"),a(" - (default) use freezer;"),e("br"),e("code",null,"Nofreeze"),a(" - don't use freezer to freeze processes;"),e("br"),a(),e("code",null,"Smart"),a(" - smart freezer freezes only threads that need to be frozen for patching [kernelcare 2.3+].")])],-1),be=e("tr",null,[e("td",null,[e("code",null,"PATCH_SERVER")]),e("td",null,"Server to use to download patches.")],-1),ge=e("tr",null,[e("td",null,[e("code",null,"REGISTRATION_URL")]),e("td",null,"Licensing server.")],-1),fe=e("tr",null,[e("td",null,[e("code",null,"PREFIX=prefix")]),e("td",null,"Patch source prefix, used to test different builds, by downloading builds from a different location, based on prefix [kernelcare 2.2+]")],-1),ye=e("tr",null,[e("td",null,[e("code",null,"UPDATE_POLICY=REMOTE|LOCAL|LOCAL_FIRST")]),e("td",null,[a("Depending on the policy, on server startup, use:"),e("br"),e("code",null,"REMOTE"),a(" - (default) patches from patch server."),e("br"),e("code",null,"LOCAL"),a(" - only locally cached patches, if none cached (caching is done automatically) - do nothing."),e("br"),e("code",null,"LOCAL_FIRST"),a(" - see if locally cached patches exist, and load them. If not, try getting them from remote server.")])],-1),xe=e("tr",null,[e("td",null,[e("code",null,"IGNORE_UNKNOWN_KERNEL=True|False")]),e("td",null,"Don't provide notification if unknown kernel on auto-update. [kernelcare 2.5+]")],-1),ke=e("tr",null,[e("td",null,[e("code",null,"LOAD_KCARE_SYSCTL")]),e("td",null,[a("Controls if "),e("code",null,"/etc/sysconfig/kcare/sysctl.conf"),a(" will be loaded on patchset load. True by default. [kernelcare 2.7+]")])],-1),we=e("tr",null,[e("td",null,[e("code",null,"STICKY_PATCH=KEY")]),e("td",null,[a("Retrieve sticky patch from "),e("code",null,"KEY"),a(" (see CLN, Key Edit); not supported for IP based servers or ePortal.")])],-1),_e=e("td",null,[e("code",null,"STICKY_PATCH=DDMMYY")],-1),Ce=e("tr",null,[e("td",null,[e("code",null,"[AUTO_]UPDATE_DELAY=h|d")]),e("td",null,[a("Use patchsets not newer than specified time. For example "),e("code",null,"24h"),a(" or "),e("code",null,"2d"),a(". "),e("code",null,"AUTO_UPDATE_DELAY"),a(" works for "),e("code",null,"auto"),a(" and "),e("code",null,"smart"),a(" modes. "),e("code",null,"UPDATE_DELAY"),a(" works for all modes. [kernelcare 2.82+]")])],-1),Te=e("tr",null,[e("td",null,[e("code",null,"[AUTO_]STICKY_PATCHSET=")]),e("td",null,[a("Use patchsets not newer than specified value. For example "),e("code",null,"K20230908_02"),a(". "),e("code",null,"AUTO_STICKY_PATCHSET"),a(" works for "),e("code",null,"auto"),a(" and "),e("code",null,"smart"),a(" modes. "),e("code",null,"STICKY_PATCHSET"),a(" works for all modes. [kernelcare 2.82+]")])],-1),Ke=e("tr",null,[e("td",null,[e("code",null,"REPORT_FQDN=True|False")]),e("td",null,"Force using Fully Qualified Domain as a hostname. False by default.")],-1),Ee=e("tr",null,[e("td",null,[e("code",null,"FORCE_GID=N")]),e("td",null,[a("Use this group ID for symlink protection patch. By default, it's 48 (default Apache user GID) or 99 ("),e("code",null,"nobody"),a(" user)")])],-1),Se=e("tr",null,[e("td",null,[e("code",null,"USERSPACE_PATCHES=libs,qemu")]),e("td",null,"Define which userspace patches will be applyed by default")],-1),Pe=t(`

Disabling some patches

Some patches might affect the work of the system, and we created a way to disable them.

This is done via the sysctl command.

When new patchset loads, KernelCare Enterprise sysctl options get reset. To prevent that we added a file:

/etc/sysconfig/kcare/sysctl.conf

Options in this file will be loaded automatically on new patchset load.

To disable loading this options, specify:

LOAD_KCARE_SYSCTL=0 in /etc/sysconfig/kcare/kcare.conf

To disable the patch, set the corresponding kcare option to 1.

Patches that can be disabled:

Patchsysctl option
CVE-2015-5157kcare_modify_ldt

Extra patchset

Note

KernelCare Enterprise 2.12-5 or higher

KernelCare Enterprise Extra patchset includes all the security fixes from KernelCare Enterprise for AlmaLinux, CentOS 6, CentOS 7, and CentOS 8 as well as symlink protection and IPSet bugfix for CentOS 6.

To enable extra patches and apply patch, run:

kcarectl --set-patch-type extra --update
 

To enable extra patches without update, run:

kcarectl --set-patch-type extra
 

The ‘extra’ patch will be applied on the next automatic update.

To see details, run:

kcarectl --patch-info
 

You should see something similar to:

OS: centos6
@@ -54,7 +54,7 @@ kpatch-cvss: N/A
 kpatch-cve-url: N/A
 kpatch-patch-url: https://bugs.centos.org/view.php?id=13499
 

To enable Symlink Owner Match Protection, add the following line:

fs.enforce_symlinksifowner=1

to /etc/sysconfig/kcare/sysctl.conf.

And run:

sysctl -w fs.enforce_symlinksifowner=1
-

Sticky patches

`,29),Ie={class:"tip custom-block"},Ae=e("p",{class:"custom-block-title"},"Note",-1),Le=t('

Note

Since v2.82 there is more convenient way to specify latest available release via [AUTO]_STICKY_PATCHSET and [AUTO_]UPDATE_DELAY configuration options. It also works with recent ePortal versions (v2.3+).

Sometimes you don't want to use the latest patches, but you'd like to control which patches are get installed instead. For example, you have tested the patch released on 25th of May 2018 and want to use that patch across all servers.

You can do it by setting STICKY_PATCH=25052018 (DDMMYY format, ISO YYYY-MM-DD is also valid) in /etc/sysconfig/kcare/kcare.conf This guarantees that when kcarectl --update or kcarectl --auto-update is called, you will get patches from that date and not the newest patches.

Alternatively, you can set STICKY_PATCH=KEY This way you can control the date from which patches will be applied using KernelCare keys in CLN. On update, the actual date will be retrieved from CLN (from Key settings) for the key used to register a particular server (not supported for IP based servers).

This is very useful if you want to test patches in QA first and later roll them out to production without doing any changes on the systems.

Here is how you can do that:

  • Set STICKY_PATCH=KEY on all your servers.
  • Register QA servers with one KEY, and Production servers with ANOTHER key.
  • Then, stop new updates for Production servers. In CLN set Sticky Tag to yesterday. You can do it by editing KEY in CLN in DDMMYY format.
  • Now, for example, let's use patches as of 03052018 (DDMMYY format). Set them for your QA server key. On the next auto-update, your QA servers will get those patches (auto-updates are typically every 4 hours).

Once you are happy with this patches, set the same Sticky Tag for Production servers key. In 4 hours your production servers should be updated to the same patches that QA servers were.

How to find a proper sticky patch name

Let's assume that you have some kernel patch that you want to "stick" with. All you need is to find a proper label for that patch.

sticky-proper-label

As you can see, the patch was released at 2020-09-16. And if apply label's date format, it becomes 16092020 that will be the sticky patch value.

Scanning for vulnerabilities

Identifying the vulnerabilities that apply to your systems is an important task for IT and InfoSec teams, and at TuxCare we make it easy. KernelCare live patching is integrated natively with vulnerability scanners including Tenable Nessus, Qualys, Rapid7 and many others.

Note

A generic integration that works with any vulnerability scanner is available for environments that native integration may not be sufficient. Contact your account manager or sales@tuxcare.com for more information.

How to use a vulnerability scanner with KernelCare

It’s rather simple. New scan results after installing a package and applying a patchset should not show any kernel CVEs that are handled by KernelCare Enterprise.

For example, Nessus for an old kernel shows a bunch of detected CVEs:

After the live patches were applied, there are no kernel-related CVEs:

How use OpenSCAP with KernelCare

OpenSCAP is an open source vulnerability scanner and compliance tool and it can be used to scan a system protected by KernelCare Enterprise. The following commands show how to use OpenSCAP to produce a vulnerability report for a system.

$ source /etc/os-release
+

Sticky patches

`,29),Ie={class:"tip custom-block"},Ae=e("p",{class:"custom-block-title"},"Note",-1),Le=t('

Note

Since v2.82 there is more convenient way to specify latest available release via [AUTO_]STICKY_PATCHSET and [AUTO_]UPDATE_DELAY configuration options. It also works with recent ePortal versions (v2.3+).

Sometimes you don't want to use the latest patches, but you'd like to control which patches are get installed instead. For example, you have tested the patch released on 25th of May 2018 and want to use that patch across all servers.

You can do it by setting STICKY_PATCH=25052018 (DDMMYY format, ISO YYYY-MM-DD is also valid) in /etc/sysconfig/kcare/kcare.conf This guarantees that when kcarectl --update or kcarectl --auto-update is called, you will get patches from that date and not the newest patches.

Alternatively, you can set STICKY_PATCH=KEY This way you can control the date from which patches will be applied using KernelCare keys in CLN. On update, the actual date will be retrieved from CLN (from Key settings) for the key used to register a particular server (not supported for IP based servers).

This is very useful if you want to test patches in QA first and later roll them out to production without doing any changes on the systems.

Here is how you can do that:

  • Set STICKY_PATCH=KEY on all your servers.
  • Register QA servers with one KEY, and Production servers with ANOTHER key.
  • Then, stop new updates for Production servers. In CLN set Sticky Tag to yesterday. You can do it by editing KEY in CLN in DDMMYY format.
  • Now, for example, let's use patches as of 03052018 (DDMMYY format). Set them for your QA server key. On the next auto-update, your QA servers will get those patches (auto-updates are typically every 4 hours).

Once you are happy with this patches, set the same Sticky Tag for Production servers key. In 4 hours your production servers should be updated to the same patches that QA servers were.

How to find a proper sticky patch name

Let's assume that you have some kernel patch that you want to "stick" with. All you need is to find a proper label for that patch.

sticky-proper-label

As you can see, the patch was released at 2020-09-16. And if apply label's date format, it becomes 16092020 that will be the sticky patch value.

Scanning for vulnerabilities

Identifying the vulnerabilities that apply to your systems is an important task for IT and InfoSec teams, and at TuxCare we make it easy. KernelCare live patching is integrated natively with vulnerability scanners including Tenable Nessus, Qualys, Rapid7 and many others.

Note

A generic integration that works with any vulnerability scanner is available for environments that native integration may not be sufficient. Contact your account manager or sales@tuxcare.com for more information.

How to use a vulnerability scanner with KernelCare

It’s rather simple. New scan results after installing a package and applying a patchset should not show any kernel CVEs that are handled by KernelCare Enterprise.

For example, Nessus for an old kernel shows a bunch of detected CVEs:

After the live patches were applied, there are no kernel-related CVEs:

How use OpenSCAP with KernelCare

OpenSCAP is an open source vulnerability scanner and compliance tool and it can be used to scan a system protected by KernelCare Enterprise. The following commands show how to use OpenSCAP to produce a vulnerability report for a system.

$ source /etc/os-release
 $ wget https://patches.kernelcare.com/oval/com.kernelcare.\${ID}.\${VERSION_ID}.xml
 $ oscap oval eval --report report.htm com.kernelcare.\${ID}.\${VERSION_ID}.xml
 

How to natively integrate KernelCare with a vulnerability scanner

Note

These instructions are intended for integrators with 3rd party vulnerability scanners.

There are two ways for a vulnerability scanner to integrate with KernelCare live patching.

Integrate via OVAL data

KernelCare comes with OVAL data that provide the instructions to the scanner to identify the vulnerabilities that are addressed by the installed live patches. OVAL data are available for the operating systems supported by KernelCare Enterprise, including AlmaLinux, Red Hat Enterprise Linux, Oracle Linux, CentOS, Debian and Ubuntu.

The OVAL data cover all KernelCare enterprise products and add-ons including LibCare, and QEMUCare.

The OVAL data for KernelCare live patching are available at patches.kernelcare.com/oval.

Integrate using files

KernelCare provides two files that list the vulnerabilities that are addressed by the currently installed live patches. These files contain a list of CVEs separated by a newline.

The list of vulnerabilities addressed by Kernel live patches is available at:

  • /proc/kcare/cvelist

The list of vulnerabilities addressed by system live patching (LibCare, QEMUCare etc.) is available at:

  • /var/cache/kcare/libcare_cvelist

UEFI Secure Boot Support

Note

This feature is an early stage of adoption. Not all the distribution will be able to support.

This new functionality lets KernelCare work on systems with secure boot set up in their UEFI firmware. We are going to add a public certificate to the MOK (Machine Owner Keys) database that KernelCare will use to sign modules.

The latest KernelCare package contains a public certificate and will be available in the /usr/libexec/kcare/kernelcare_pub.der. For older versions, it could be downloaded from the https://patches.kernelcare.com/kernelcare_pub.der to that location.

For example:

curl -o /usr/libexec/kcare/kernelcare_pub.der https://patches.kernelcare.com/kernelcare_pub.der
diff --git a/assets/index.html-b5822e8c.js b/assets/index.html-b5822e8c.js
new file mode 100644
index 00000000..f1866a83
--- /dev/null
+++ b/assets/index.html-b5822e8c.js
@@ -0,0 +1 @@
+const e=JSON.parse('{"key":"v-37e5fb86","path":"/live-patching-services/","title":"KernelCare Enterprise","lang":"en-US","frontmatter":{"sidebarDepth":4},"headers":[{"level":2,"title":"KernelCare","slug":"kernelcare","link":"#kernelcare","children":[{"level":3,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":3,"title":"Benefits","slug":"benefits","link":"#benefits","children":[]},{"level":3,"title":"Key Features","slug":"key-features","link":"#key-features","children":[]},{"level":3,"title":"Getting trial license","slug":"getting-trial-license","link":"#getting-trial-license","children":[]},{"level":3,"title":"Installation","slug":"installation","link":"#installation","children":[]},{"level":3,"title":"Update","slug":"update","link":"#update","children":[]},{"level":3,"title":"Uninstalling","slug":"uninstalling","link":"#uninstalling","children":[]},{"level":3,"title":"Switching from Ksplice","slug":"switching-from-ksplice","link":"#switching-from-ksplice","children":[{"level":4,"title":"Canonical Livepatch","slug":"canonical-livepatch","link":"#canonical-livepatch","children":[]}]},{"level":3,"title":"Basic management","slug":"basic-management","link":"#basic-management","children":[]},{"level":3,"title":"Command line tools","slug":"command-line-tools","link":"#command-line-tools","children":[{"level":4,"title":"kcarectl","slug":"kcarectl","link":"#kcarectl","children":[]},{"level":4,"title":"kcare-uname","slug":"kcare-uname","link":"#kcare-uname","children":[]},{"level":4,"title":"kernelcare doctor","slug":"kernelcare-doctor","link":"#kernelcare-doctor","children":[]}]},{"level":3,"title":"Config options","slug":"config-options","link":"#config-options","children":[]},{"level":3,"title":"Disabling some patches","slug":"disabling-some-patches","link":"#disabling-some-patches","children":[]},{"level":3,"title":"Extra patchset","slug":"extra-patchset","link":"#extra-patchset","children":[]},{"level":3,"title":"Sticky patches","slug":"sticky-patches","link":"#sticky-patches","children":[{"level":4,"title":"How to find a proper sticky patch name","slug":"how-to-find-a-proper-sticky-patch-name","link":"#how-to-find-a-proper-sticky-patch-name","children":[]}]},{"level":3,"title":"Scanning for vulnerabilities","slug":"scanning-for-vulnerabilities","link":"#scanning-for-vulnerabilities","children":[{"level":4,"title":"How to use a vulnerability scanner with KernelCare","slug":"how-to-use-a-vulnerability-scanner-with-kernelcare","link":"#how-to-use-a-vulnerability-scanner-with-kernelcare","children":[]},{"level":4,"title":"How use OpenSCAP with KernelCare","slug":"how-use-openscap-with-kernelcare","link":"#how-use-openscap-with-kernelcare","children":[]},{"level":4,"title":"How to natively integrate KernelCare with a vulnerability scanner","slug":"how-to-natively-integrate-kernelcare-with-a-vulnerability-scanner","link":"#how-to-natively-integrate-kernelcare-with-a-vulnerability-scanner","children":[]},{"level":4,"title":"Integrate via OVAL data","slug":"integrate-via-oval-data","link":"#integrate-via-oval-data","children":[]},{"level":4,"title":"Integrate using files","slug":"integrate-using-files","link":"#integrate-using-files","children":[]}]},{"level":3,"title":"UEFI Secure Boot Support","slug":"uefi-secure-boot-support","link":"#uefi-secure-boot-support","children":[]},{"level":3,"title":"Live patching and FIPS compliance","slug":"live-patching-and-fips-compliance","link":"#live-patching-and-fips-compliance","children":[]},{"level":3,"title":"Firewall and Proxy Settings","slug":"firewall-and-proxy-settings","link":"#firewall-and-proxy-settings","children":[{"level":4,"title":"Patching servers through firewall","slug":"patching-servers-through-firewall","link":"#patching-servers-through-firewall","children":[]},{"level":4,"title":"Patching servers through proxy","slug":"patching-servers-through-proxy","link":"#patching-servers-through-proxy","children":[]}]},{"level":3,"title":"KernelCare on AWS – Deployment User Guide","slug":"kernelcare-on-aws-–-deployment-user-guide","link":"#kernelcare-on-aws-–-deployment-user-guide","children":[{"level":4,"title":"Introductory Material","slug":"introductory-material","link":"#introductory-material","children":[]},{"level":4,"title":"Introduction","slug":"introduction-1","link":"#introduction-1","children":[]},{"level":4,"title":"Prerequisites and Requirements","slug":"prerequisites-and-requirements","link":"#prerequisites-and-requirements","children":[]},{"level":4,"title":"Architecture Diagrams","slug":"architecture-diagrams","link":"#architecture-diagrams","children":[]},{"level":4,"title":"Planning Guidance","slug":"planning-guidance","link":"#planning-guidance","children":[]},{"level":4,"title":"Security","slug":"security","link":"#security","children":[]},{"level":4,"title":"Costs","slug":"costs","link":"#costs","children":[]},{"level":4,"title":"Sizing","slug":"sizing","link":"#sizing","children":[]},{"level":4,"title":"Deployment Guidance","slug":"deployment-guidance","link":"#deployment-guidance","children":[]},{"level":4,"title":"Deployment Assets","slug":"deployment-assets","link":"#deployment-assets","children":[]},{"level":4,"title":"Operational Guidance","slug":"operational-guidance","link":"#operational-guidance","children":[]},{"level":4,"title":"Health Check","slug":"health-check","link":"#health-check","children":[]},{"level":4,"title":"Backup and Recovery","slug":"backup-and-recovery","link":"#backup-and-recovery","children":[]},{"level":4,"title":"Routine Maintenance","slug":"routine-maintenance","link":"#routine-maintenance","children":[]},{"level":4,"title":"Emergency Maintenance","slug":"emergency-maintenance","link":"#emergency-maintenance","children":[]},{"level":4,"title":"Patch Feed Advanced Options","slug":"patch-feed-advanced-options","link":"#patch-feed-advanced-options","children":[{"level":5,"title":"Test and Delayed Feeds","slug":"test-and-delayed-feeds","link":"#test-and-delayed-feeds","children":[]},{"level":5,"title":"Feed Management With Sticky Patch Feature","slug":"feed-management-with-sticky-patch-feature","link":"#feed-management-with-sticky-patch-feature","children":[]}]},{"level":4,"title":"Support","slug":"support","link":"#support","children":[]},{"level":4,"title":"Support Costs","slug":"support-costs","link":"#support-costs","children":[]},{"level":4,"title":"Accessibility","slug":"accessibility","link":"#accessibility","children":[]},{"level":4,"title":"Reference Materials","slug":"reference-materials","link":"#reference-materials","children":[]},{"level":4,"title":"Localization","slug":"localization","link":"#localization","children":[]}]},{"level":3,"title":"Reseller Partner UI","slug":"reseller-partner-ui","link":"#reseller-partner-ui","children":[{"level":4,"title":"Server Section","slug":"server-section","link":"#server-section","children":[]},{"level":4,"title":"Billing Info/Add Funds","slug":"billing-info-add-funds","link":"#billing-info-add-funds","children":[]},{"level":4,"title":"API Section","slug":"api-section","link":"#api-section","children":[]},{"level":4,"title":"Profile","slug":"profile","link":"#profile","children":[]}]},{"level":3,"title":"How To","slug":"how-to","link":"#how-to","children":[{"level":4,"title":"How to disable HyperThreading (SMT) without reboot: KernelCare case","slug":"how-to-disable-hyperthreading-smt-without-reboot-kernelcare-case","link":"#how-to-disable-hyperthreading-smt-without-reboot-kernelcare-case","children":[]},{"level":4,"title":"SMT Control","slug":"smt-control","link":"#smt-control","children":[]},{"level":4,"title":"SMT Status","slug":"smt-status","link":"#smt-status","children":[]},{"level":4,"title":"Check the SMT state","slug":"check-the-smt-state","link":"#check-the-smt-state","children":[]},{"level":4,"title":"Enable SMT","slug":"enable-smt","link":"#enable-smt","children":[]},{"level":4,"title":"Disable SMT","slug":"disable-smt","link":"#disable-smt","children":[]},{"level":4,"title":"How to update Microcode without reboot with vendor-provided package","slug":"how-to-update-microcode-without-reboot-with-vendor-provided-package","link":"#how-to-update-microcode-without-reboot-with-vendor-provided-package","children":[]},{"level":4,"title":"Updating microcode on Ubuntu and Debian","slug":"updating-microcode-on-ubuntu-and-debian","link":"#updating-microcode-on-ubuntu-and-debian","children":[]},{"level":4,"title":"Updating Microcode on Red Hat and CentOS","slug":"updating-microcode-on-red-hat-and-centos","link":"#updating-microcode-on-red-hat-and-centos","children":[]},{"level":4,"title":"Updating Microcode on CentOS 6","slug":"updating-microcode-on-centos-6","link":"#updating-microcode-on-centos-6","children":[]},{"level":4,"title":"Plesk related","slug":"plesk-related","link":"#plesk-related","children":[]},{"level":4,"title":"How to get a KernelCare activation key from the extended Plesk license","slug":"how-to-get-a-kernelcare-activation-key-from-the-extended-plesk-license","link":"#how-to-get-a-kernelcare-activation-key-from-the-extended-plesk-license","children":[]}]}]},{"level":2,"title":"LibCare","slug":"libcare","link":"#libcare","children":[{"level":3,"title":"Supported libraries and operating systems","slug":"supported-libraries-and-operating-systems","link":"#supported-libraries-and-operating-systems","children":[]},{"level":3,"title":"Supported operating systems","slug":"supported-operating-systems","link":"#supported-operating-systems","children":[]},{"level":3,"title":"Installation and upgrade","slug":"installation-and-upgrade","link":"#installation-and-upgrade","children":[]},{"level":3,"title":"Usage","slug":"usage","link":"#usage","children":[{"level":4,"title":"Blacklisting","slug":"blacklisting","link":"#blacklisting","children":[]},{"level":4,"title":"Auto update","slug":"auto-update","link":"#auto-update","children":[]}]},{"level":3,"title":"Usage in containers","slug":"usage-in-containers","link":"#usage-in-containers","children":[{"level":4,"title":"Disposable container servers","slug":"disposable-container-servers","link":"#disposable-container-servers","children":[]},{"level":4,"title":"Persistent container servers","slug":"persistent-container-servers","link":"#persistent-container-servers","children":[]}]},{"level":3,"title":"Troubleshooting","slug":"troubleshooting","link":"#troubleshooting","children":[{"level":4,"title":"Auditd logs","slug":"auditd-logs","link":"#auditd-logs","children":[]}]},{"level":3,"title":"Unpatched Library Detector (UChecker)","slug":"unpatched-library-detector-uchecker","link":"#unpatched-library-detector-uchecker","children":[{"level":4,"title":"Description","slug":"description","link":"#description","children":[]},{"level":4,"title":"How UChecker works","slug":"how-uchecker-works","link":"#how-uchecker-works","children":[]},{"level":4,"title":"Usage","slug":"usage-1","link":"#usage-1","children":[]},{"level":4,"title":"Troubleshooting","slug":"troubleshooting-1","link":"#troubleshooting-1","children":[]}]}]},{"level":2,"title":"QEMUCare","slug":"qemucare","link":"#qemucare","children":[{"level":3,"title":"How QEMUCare works","slug":"how-qemucare-works","link":"#how-qemucare-works","children":[]},{"level":3,"title":"QEMU PatchSet Deployment","slug":"qemu-patchset-deployment","link":"#qemu-patchset-deployment","children":[{"level":4,"title":"CLI to install the latest patchsets","slug":"cli-to-install-the-latest-patchsets","link":"#cli-to-install-the-latest-patchsets","children":[]},{"level":4,"title":"CLI to deploy patchset from archive","slug":"cli-to-deploy-patchset-from-archive","link":"#cli-to-deploy-patchset-from-archive","children":[]}]}]},{"level":2,"title":"Vulnerability Scanner Integration with KernelCare","slug":"vulnerability-scanner-integration-with-kernelcare","link":"#vulnerability-scanner-integration-with-kernelcare","children":[{"level":3,"title":"Easiest: Identifying correctly the effective kernel","slug":"easiest-identifying-correctly-the-effective-kernel","link":"#easiest-identifying-correctly-the-effective-kernel","children":[]},{"level":3,"title":"Comprehensive: Using OVAL data","slug":"comprehensive-using-oval-data","link":"#comprehensive-using-oval-data","children":[]},{"level":3,"title":"Comprehensive & local: Using the local CVELIST file on each scanned node","slug":"comprehensive-local-using-the-local-cvelist-file-on-each-scanned-node","link":"#comprehensive-local-using-the-local-cvelist-file-on-each-scanned-node","children":[]}]}]}');export{e as data};
diff --git a/assets/index.html-ff856864.js b/assets/index.html-ff856864.js
deleted file mode 100644
index c4e1d841..00000000
--- a/assets/index.html-ff856864.js
+++ /dev/null
@@ -1 +0,0 @@
-const e=JSON.parse('{"key":"v-37e5fb86","path":"/live-patching-services/","title":"KernelCare Enterprise","lang":"en-US","frontmatter":{"sidebarDepth":4},"headers":[{"level":2,"title":"KernelCare","slug":"kernelcare","link":"#kernelcare","children":[{"level":3,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":3,"title":"Benefits","slug":"benefits","link":"#benefits","children":[]},{"level":3,"title":"Key Features","slug":"key-features","link":"#key-features","children":[]},{"level":3,"title":"Getting trial license","slug":"getting-trial-license","link":"#getting-trial-license","children":[]},{"level":3,"title":"Installation","slug":"installation","link":"#installation","children":[]},{"level":3,"title":"Update","slug":"update","link":"#update","children":[]},{"level":3,"title":"Uninstalling","slug":"uninstalling","link":"#uninstalling","children":[]},{"level":3,"title":"Switching from Ksplice","slug":"switching-from-ksplice","link":"#switching-from-ksplice","children":[{"level":4,"title":"Canonical Livepatch","slug":"canonical-livepatch","link":"#canonical-livepatch","children":[]}]},{"level":3,"title":"Basic management","slug":"basic-management","link":"#basic-management","children":[]},{"level":3,"title":"Command line tools","slug":"command-line-tools","link":"#command-line-tools","children":[{"level":4,"title":"kcarectl","slug":"kcarectl","link":"#kcarectl","children":[]},{"level":4,"title":"kcare-uname","slug":"kcare-uname","link":"#kcare-uname","children":[]},{"level":4,"title":"kernelcare doctor","slug":"kernelcare-doctor","link":"#kernelcare-doctor","children":[]}]},{"level":3,"title":"Config options","slug":"config-options","link":"#config-options","children":[]},{"level":3,"title":"Disabling some patches","slug":"disabling-some-patches","link":"#disabling-some-patches","children":[]}]},{"level":2,"title":"Extra patchset","slug":"extra-patchset","link":"#extra-patchset","children":[{"level":3,"title":"Sticky patches","slug":"sticky-patches","link":"#sticky-patches","children":[{"level":4,"title":"How to find a proper sticky patch name","slug":"how-to-find-a-proper-sticky-patch-name","link":"#how-to-find-a-proper-sticky-patch-name","children":[]}]},{"level":3,"title":"Scanning for vulnerabilities","slug":"scanning-for-vulnerabilities","link":"#scanning-for-vulnerabilities","children":[{"level":4,"title":"How to use a vulnerability scanner with KernelCare","slug":"how-to-use-a-vulnerability-scanner-with-kernelcare","link":"#how-to-use-a-vulnerability-scanner-with-kernelcare","children":[]},{"level":4,"title":"How use OpenSCAP with KernelCare","slug":"how-use-openscap-with-kernelcare","link":"#how-use-openscap-with-kernelcare","children":[]},{"level":4,"title":"How to natively integrate KernelCare with a vulnerability scanner","slug":"how-to-natively-integrate-kernelcare-with-a-vulnerability-scanner","link":"#how-to-natively-integrate-kernelcare-with-a-vulnerability-scanner","children":[]},{"level":4,"title":"Integrate via OVAL data","slug":"integrate-via-oval-data","link":"#integrate-via-oval-data","children":[]},{"level":4,"title":"Integrate using files","slug":"integrate-using-files","link":"#integrate-using-files","children":[]}]},{"level":3,"title":"UEFI Secure Boot Support","slug":"uefi-secure-boot-support","link":"#uefi-secure-boot-support","children":[]},{"level":3,"title":"Live patching and FIPS compliance","slug":"live-patching-and-fips-compliance","link":"#live-patching-and-fips-compliance","children":[]},{"level":3,"title":"Firewall and Proxy Settings","slug":"firewall-and-proxy-settings","link":"#firewall-and-proxy-settings","children":[{"level":4,"title":"Patching servers through firewall","slug":"patching-servers-through-firewall","link":"#patching-servers-through-firewall","children":[]},{"level":4,"title":"Patching servers through proxy","slug":"patching-servers-through-proxy","link":"#patching-servers-through-proxy","children":[]}]},{"level":3,"title":"KernelCare on AWS – Deployment User Guide","slug":"kernelcare-on-aws-–-deployment-user-guide","link":"#kernelcare-on-aws-–-deployment-user-guide","children":[{"level":4,"title":"Introductory Material","slug":"introductory-material","link":"#introductory-material","children":[]},{"level":4,"title":"Introduction","slug":"introduction-1","link":"#introduction-1","children":[]},{"level":4,"title":"Prerequisites and Requirements","slug":"prerequisites-and-requirements","link":"#prerequisites-and-requirements","children":[]},{"level":4,"title":"Architecture Diagrams","slug":"architecture-diagrams","link":"#architecture-diagrams","children":[]},{"level":4,"title":"Planning Guidance","slug":"planning-guidance","link":"#planning-guidance","children":[]},{"level":4,"title":"Security","slug":"security","link":"#security","children":[]},{"level":4,"title":"Costs","slug":"costs","link":"#costs","children":[]},{"level":4,"title":"Sizing","slug":"sizing","link":"#sizing","children":[]},{"level":4,"title":"Deployment Guidance","slug":"deployment-guidance","link":"#deployment-guidance","children":[]},{"level":4,"title":"Deployment Assets","slug":"deployment-assets","link":"#deployment-assets","children":[]},{"level":4,"title":"Operational Guidance","slug":"operational-guidance","link":"#operational-guidance","children":[]},{"level":4,"title":"Health Check","slug":"health-check","link":"#health-check","children":[]},{"level":4,"title":"Backup and Recovery","slug":"backup-and-recovery","link":"#backup-and-recovery","children":[]},{"level":4,"title":"Routine Maintenance","slug":"routine-maintenance","link":"#routine-maintenance","children":[]},{"level":4,"title":"Emergency Maintenance","slug":"emergency-maintenance","link":"#emergency-maintenance","children":[]},{"level":4,"title":"Patch Feed Advanced Options","slug":"patch-feed-advanced-options","link":"#patch-feed-advanced-options","children":[{"level":5,"title":"Test and Delayed Feeds","slug":"test-and-delayed-feeds","link":"#test-and-delayed-feeds","children":[]},{"level":5,"title":"Feed Management With Sticky Patch Feature","slug":"feed-management-with-sticky-patch-feature","link":"#feed-management-with-sticky-patch-feature","children":[]}]},{"level":4,"title":"Support","slug":"support","link":"#support","children":[]},{"level":4,"title":"Support Costs","slug":"support-costs","link":"#support-costs","children":[]},{"level":4,"title":"Accessibility","slug":"accessibility","link":"#accessibility","children":[]},{"level":4,"title":"Reference Materials","slug":"reference-materials","link":"#reference-materials","children":[]},{"level":4,"title":"Localization","slug":"localization","link":"#localization","children":[]}]},{"level":3,"title":"Reseller Partner UI","slug":"reseller-partner-ui","link":"#reseller-partner-ui","children":[{"level":4,"title":"Server Section","slug":"server-section","link":"#server-section","children":[]},{"level":4,"title":"Billing Info/Add Funds","slug":"billing-info-add-funds","link":"#billing-info-add-funds","children":[]},{"level":4,"title":"API Section","slug":"api-section","link":"#api-section","children":[]},{"level":4,"title":"Profile","slug":"profile","link":"#profile","children":[]}]},{"level":3,"title":"How To","slug":"how-to","link":"#how-to","children":[{"level":4,"title":"How to disable HyperThreading (SMT) without reboot: KernelCare case","slug":"how-to-disable-hyperthreading-smt-without-reboot-kernelcare-case","link":"#how-to-disable-hyperthreading-smt-without-reboot-kernelcare-case","children":[]},{"level":4,"title":"SMT Control","slug":"smt-control","link":"#smt-control","children":[]},{"level":4,"title":"SMT Status","slug":"smt-status","link":"#smt-status","children":[]},{"level":4,"title":"Check the SMT state","slug":"check-the-smt-state","link":"#check-the-smt-state","children":[]},{"level":4,"title":"Enable SMT","slug":"enable-smt","link":"#enable-smt","children":[]},{"level":4,"title":"Disable SMT","slug":"disable-smt","link":"#disable-smt","children":[]},{"level":4,"title":"How to update Microcode without reboot with vendor-provided package","slug":"how-to-update-microcode-without-reboot-with-vendor-provided-package","link":"#how-to-update-microcode-without-reboot-with-vendor-provided-package","children":[]},{"level":4,"title":"Updating microcode on Ubuntu and Debian","slug":"updating-microcode-on-ubuntu-and-debian","link":"#updating-microcode-on-ubuntu-and-debian","children":[]},{"level":4,"title":"Updating Microcode on Red Hat and CentOS","slug":"updating-microcode-on-red-hat-and-centos","link":"#updating-microcode-on-red-hat-and-centos","children":[]},{"level":4,"title":"Updating Microcode on CentOS 6","slug":"updating-microcode-on-centos-6","link":"#updating-microcode-on-centos-6","children":[]},{"level":4,"title":"Plesk related","slug":"plesk-related","link":"#plesk-related","children":[]},{"level":4,"title":"How to get a KernelCare activation key from the extended Plesk license","slug":"how-to-get-a-kernelcare-activation-key-from-the-extended-plesk-license","link":"#how-to-get-a-kernelcare-activation-key-from-the-extended-plesk-license","children":[]}]}]},{"level":2,"title":"LibCare","slug":"libcare","link":"#libcare","children":[{"level":3,"title":"Supported libraries and operating systems","slug":"supported-libraries-and-operating-systems","link":"#supported-libraries-and-operating-systems","children":[]},{"level":3,"title":"Supported operating systems","slug":"supported-operating-systems","link":"#supported-operating-systems","children":[]},{"level":3,"title":"Installation and upgrade","slug":"installation-and-upgrade","link":"#installation-and-upgrade","children":[]},{"level":3,"title":"Usage","slug":"usage","link":"#usage","children":[{"level":4,"title":"Blacklisting","slug":"blacklisting","link":"#blacklisting","children":[]},{"level":4,"title":"Auto update","slug":"auto-update","link":"#auto-update","children":[]}]},{"level":3,"title":"Usage in containers","slug":"usage-in-containers","link":"#usage-in-containers","children":[{"level":4,"title":"Disposable container servers","slug":"disposable-container-servers","link":"#disposable-container-servers","children":[]},{"level":4,"title":"Persistent container servers","slug":"persistent-container-servers","link":"#persistent-container-servers","children":[]}]},{"level":3,"title":"Troubleshooting","slug":"troubleshooting","link":"#troubleshooting","children":[{"level":4,"title":"Auditd logs","slug":"auditd-logs","link":"#auditd-logs","children":[]}]},{"level":3,"title":"Unpatched Library Detector (UChecker)","slug":"unpatched-library-detector-uchecker","link":"#unpatched-library-detector-uchecker","children":[{"level":4,"title":"Description","slug":"description","link":"#description","children":[]},{"level":4,"title":"How UChecker works","slug":"how-uchecker-works","link":"#how-uchecker-works","children":[]},{"level":4,"title":"Usage","slug":"usage-1","link":"#usage-1","children":[]},{"level":4,"title":"Troubleshooting","slug":"troubleshooting-1","link":"#troubleshooting-1","children":[]}]}]},{"level":2,"title":"QEMUCare","slug":"qemucare","link":"#qemucare","children":[{"level":3,"title":"How QEMUCare works","slug":"how-qemucare-works","link":"#how-qemucare-works","children":[]},{"level":3,"title":"QEMU PatchSet Deployment","slug":"qemu-patchset-deployment","link":"#qemu-patchset-deployment","children":[{"level":4,"title":"CLI to install the latest patchsets","slug":"cli-to-install-the-latest-patchsets","link":"#cli-to-install-the-latest-patchsets","children":[]},{"level":4,"title":"CLI to deploy patchset from archive","slug":"cli-to-deploy-patchset-from-archive","link":"#cli-to-deploy-patchset-from-archive","children":[]}]}]},{"level":2,"title":"Vulnerability Scanner Integration with KernelCare","slug":"vulnerability-scanner-integration-with-kernelcare","link":"#vulnerability-scanner-integration-with-kernelcare","children":[{"level":3,"title":"Easiest: Identifying correctly the effective kernel","slug":"easiest-identifying-correctly-the-effective-kernel","link":"#easiest-identifying-correctly-the-effective-kernel","children":[]},{"level":3,"title":"Comprehensive: Using OVAL data","slug":"comprehensive-using-oval-data","link":"#comprehensive-using-oval-data","children":[]},{"level":3,"title":"Comprehensive & local: Using the local CVELIST file on each scanned node","slug":"comprehensive-local-using-the-local-cvelist-file-on-each-scanned-node","link":"#comprehensive-local-using-the-local-cvelist-file-on-each-scanned-node","children":[]}]}]}');export{e as data};
diff --git a/enterprise-support-for-almalinux/fips/index.html b/enterprise-support-for-almalinux/fips/index.html
index bf79533d..add16941 100644
--- a/enterprise-support-for-almalinux/fips/index.html
+++ b/enterprise-support-for-almalinux/fips/index.html
@@ -39,7 +39,7 @@
                     })();
                   FIPS packages for AlmaLinux
     
-    
+    
   
   
     
sidebar hamburger menu

FIPS packages for AlmaLinux

Below are the instructions for installing the TuxCare FIPS 140-3 validated modules for AlmaLinux 9.2, they should be run as root.

By installing this software, you agree to be bound by the terms of the TuxCare Community EULA.

# dnf -y install https://repo.tuxcare.com/fips/tuxcare-fips-release-latest-9.noarch.rpm
@@ -54,6 +54,6 @@
 # dnf versionlock add openssl*tuxcare* kernel*tuxcare*
 

To revert to the previous behaviour of getting updated kernel/openssl packages from AlmaLinux, run the following as root:

# dnf versionlock delete openssl*tuxcare* kernel*tuxcare*
 
- + diff --git a/enterprise-support-for-almalinux/index.html b/enterprise-support-for-almalinux/index.html index 52e9a331..826ddede 100644 --- a/enterprise-support-for-almalinux/index.html +++ b/enterprise-support-for-almalinux/index.html @@ -39,7 +39,7 @@ })(); Enterprise Support for AlmaLinux - +
sidebar hamburger menu

Enterprise Support for AlmaLinux

This guide describes Enterprise Support for AlmaLinux and how to set it up on your AlmaLinux system.

What is Enterprise Support for AlmaLinux?

Enterprise Support for AlmaLinux services provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.

Available services:

  • Essential Support: TuxCare-vetted repository of AlmaLinux updates with guaranteed uptime, expedited break-and-fix support and up to 16 years of support coverage
  • Live Patching (KernelCare and LibCare): automated live patches for the kernel and critical userspace packages with zero downtime
  • Enhanced Support: Enterprise-grade support for AlmaLinux and open-source applications with pay-as-you-go pricing in 5, 10, and 20-hour bundles

Learn more at https://tuxcare.com/almalinux-enterprise-support/

Requirements

  • AlmaLinux 8 or AlmaLinux 9 operating system
  • x86_64 or aarch64 architecture
  • Enterprise Support license key (should be obtained from portal.tuxcare.com)
  • Internet access

Installing tuxctl

tuxctl is a setup tool for TuxCare’s Enterprise Support for AlmaLinux, which provides access to Essential Support and Live Patching (KernelCare and LibCare), depending on the purchased license. To install tuxctl you need to install the tuxcare-release package first. This package contains the TuxCare repo definitions, TuxCare GPG key and the tuxctl setup tool. Run the following as root:

# dnf install https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-$(rpm --eval %almalinux).noarch.rpm
@@ -57,6 +57,6 @@
 Patch level 1 applied. Effective kernel version 5.14.0-162.12.1.el9_1
 Kernel is safe
 

Essential and Enhanced Support

1. Introduction

In April 2023, TuxCare, a division of CloudLinux Inc., launched Enterprise Support for AlmaLinux, delivering a range of services for AlmaLinux workloads. It provides two levels of support, the essential level, focused on the operating system, and the enhanced support focused on applications. This document defines those services.

Overview of Services

There are two levels of support services for AlmaLinux:

Essential Support – a limited technical support offering that covers AlmaLinux installation/update issues (packaging, dependencies, repositories), migration issues (from CentOS/OracleLinux/RHEL to AlmaLinux), operating systems bugs/kernel crashes, a self-service portal, as well as an online knowledge base

Enhanced Support – an enterprise technical support service covering a range of open-source software running on AlmaLinux, a self-service portal, as well as an online knowledge base.

2. Definitions

“Customer,” “End User,” “User,” “You/Your” shall mean an organization which has a valid license to the Product that is supported in accordance with this Program.

“Customer Technical Lead” shall mean an employee or authorized contractor of Customer who shall complete required AlmaLinux product training, in order to serve as Customer’s first line of internal support for the purpose of triaging AlmaLinux-related product issues, and who shall have authority to submit Technical Support Incidents and Service Requests to TuxCare Technical Support

“Incident” shall mean any event reported by the Customer, which is not part of the standard operation of a Product, and which causes, or may cause an interruption to, or a reduction in, the quality of service provided by the Product.

“Incident Severity/Urgency” shall mean a measure of the business criticality of an incident or problem based on the business needs of the Customer. See Appendix 1 for more details.

“Known Error” shall mean a Problem that becomes a Known Error when the root cause is known, and a temporary workaround or permanent alternative has been identified.

“Problem” shall mean an unknown underlying cause of one or more Incidents. It becomes a Known Error when the root cause is known, and a temporary workaround or permanent alternative has been identified.

“Product(s)” shall mean software product(s) of TuxCare, which the Customer has purchased, deployed, and installed in accordance with the terms of a License Agreement between TuxCare and the Customer.

“Product Error” shall mean undeclared behaviour of the Product.

“Response time” shall mean the elapsed time measured from the moment of any incident receipt until confirmation of receipt by TuxCare to the initiator (via the support system).

“Service Request” shall mean a request from a Customer for support, delivery, information, advice, or documentation, which is not related to an incorrect functioning or non-functioning of the Product(s).

“Upgrade” shall mean a Product update associated with assigning a new version number.

“Workaround” shall mean a procedure that may serve as a temporary solution to an incident.

3. Service Features

FeatureEssential SupportEnhanced Support
Support
  • AlmaLinux installation/update issues (packaging, dependencies, repositories)
  • Migration issues (from CentOS/OracleLinux/RHEL to AlmaLinux)
  • Operating system bugs / kernel crashes; root cause analysis
Coverage, includes the following applications:
  • Apps - Identity / Directory
    • FreeIPA, Bind
    • openldap
  • Apps - Infrastructure
    • Ceph
    • Samba
  • Containers (docker, podman)
  • VMs (KVM)
  • Apps - Package / Config management:
    • Foreman
    • Ansible
    • Puppet
    • Chef
  • Apps - Web servers
    • nginx
    • apache
    • squid
  • Apps - Data
    • SQL Databases (MariaDB, Postgresql)
    • Redis, MySQL, InfluxDB, CouchDB
  • Apps - Security / Compliance
    • OpenSCAP
  • Devops Apps:
    • gitlab/git, jenkins, kubernetes
  • Apps - event streaming
    • Apache Kafka
    • Rabbitmq
  • Operating system migration (e.g, from Oracle to AlmaLinux)
  • Operating system upgrades (e.g, from CentOS 7 to AlmaLinux 8)
  • Design & Architecture (e.g., review)
  • Data storage, backup assistance
  • Configuration assistance
Outside the scope: code changes or software updates
Incident Support24/7/365 support through web ticketing system24/7/365 support through web ticketing system and email
Allowed Number of Customer Technical Leads2 per 1000 hosts, with maximum 102 per 1000 hosts, with maximum 10

4. Description of Support Program

Accessing Technical Support

TuxCare Technical Support is designed for enterprise clients with trained IT staff which provide initial ‘1st-line’ support to triage incidents. Customer and TuxCare will agree on Customer Technical Leads with the client, who will be entitled to access TuxCare Technical Support services; Customer Technical Leads must complete AlmaLinux training requirements. Customer Technical Leads may submit Technical Support Incidents and Service Requests to:

  1. Technical Support ticketing system:
  • Acceptance of requests 24 hours a day, 365 days a year
  • Unlimited number of tickets may be submitted
  • Customers will be supplied with instructions describing the use of the ticketing system during onboarding
  • User accounts will be created for each nominated user within each client organization
  • User accounts will have access to log, view and respond to tickets
  1. Email: acceptance of requests 24 hours a day, 365 days a year:
  • New tickets may be created by simply emailing the support desk (email address to be provided during onboarding)

All customers are entitled to access the Support knowledgebase, FAQs, and other self-service tools as may be offered by Enterprise Support for AlmaLinux.

Response Time

When submitting a ticket, Customers will select the appropriate Severity Level, as defined in Appendix A, from a drop-down list; TuxCare reserves the right to change the Severity Level based on available information. TuxCare will use reasonable efforts to respond to support requests within the initial response times described below, based on the Severity Level of the incident.

Severity LevelEssential SupportEnhanced Support
12 hours30 minutes
212 hours2 hours
32 business days12 hours
45 business days2 business days

Incident Resolution Cooperation

Some incidents may require reproduction by TuxCare for the purpose of testing and verifying a product error. Customer agrees to provide TuxCare with all information which may be necessary for reproducing the condition under which the incident will re-occur and could be examined.

TuxCare will endeavor to reproduce the incident as soon as all the necessary information and software and/or hardware is provided. If the incident could not be reproduced, Customer should grant TuxCare a supervised remote access to the malfunctioning system. If the incident cannot be reproduced by either party, or Customer did not grant access to the network environment where the incident could be reproduced, or if it is detected that the incident’s cause lies beyond the Product, the incident cannot be classified within this Support Program.

An incident may at any time be either on the Customer’s side (i.e., Customer is taking actions that will promote/expedite the resolution of the issue by TuxCare) or on the AlmaLinux side. An incident is on the Customer’s side when TuxCare engineers request information from the Customer. When Customer provides the requested information to TuxCare, the incident is considered to be on the side of the latter. The period during which the incident may be on the Customer’s side is limited to one calendar week. If the Customer’s response is overdue, the incident is closed by timeout.

Appendices

Appendix A. Incident Severity Levels

Level: DescriptorCriteria/Definition
Level 1: Business StandstillProduction and/or mission critical services are down and there is no immediate workaround.
  • All or a majority of your mission critical environment is unavailable or not functioning
  • Your business operations are completely disrupted
  • Majority / All Critical users affected
  • Request from important client/partner (subject to management approval)
Level 2: Major ImpactMajor feature or function failure; operations are severely restricted, but a workaround is available.
  • Critical business operations seriously affected
  • Direct fiscal impact
  • Substantial number of users are affected, or critical group of users are affected that would not allow the business to run normally
Level 3: Minor ImpactMinor feature or function failure; standard business operations can continue, though possibly in a minor restricted manner.
  • No immediate direct fiscal impact
  • A temporary workaround may have been provided
Level 4: General Inquiry/IssueGeneral usage questions or other non-critical inquiries.
  • Small number of users/systems affected
  • Documentation issue
  • General information request
  • Enhancement request

Appendix B: Quality management

Incident escalation

Customer may escalate unresolved incidents or reports of dissatisfaction according to the following scheme:

Escalation Level123
Escalation PathTechnical Senior Support EngineerSpecialized Support Team Lead or ManagerChief Experience Officer (CXO)

Provision of reports on open incidents

During the process of incident resolution, TuxCare will use reasonable effort to promptly provide the Customer with information regarding open incidents’ status, according to the following table.

Severity LevelReport Schedule (through the web ticketing system)
1By agreement, but not more often than once a day
2At least once every 3 business days
3At least once every 2 weeks
4Upon customer request

Limitations of the Support Services

Technical support covered by any of the TuxCare Support Programs shall not be provided in the following cases:

  • Incidents already resolved for the Customer (e.g., an incident that occurred on one installed copy of the Product after the same incident had been resolved for another copy of the Product)
  • Troubleshooting of all issues similar or identical to already resolved issues (i.e., the incidents to which a previously produced solution can be applied without additional guidance from TuxCare)
  • Incidents caused by Customer’s hardware malfunction
  • Incidents caused by software platform incompatibility (including, but not limited to beta software, new versions of service packs or additions, whose compatibility with the Product has not been confirmed by AlmaLinux)
  • Incidents caused by installing and running third-party applications (including, but not limited to the list of unsupported or incompatible applications published in the documentation)
  • Incidents for which the Customer cannot provide accurate information, as reasonably requested by TuxCare, in order to reproduce, investigate, and resolve the incident
  • Incidents which arise as a result of neglect or incorrect use of TuxCare instructions, which, if properly used, would have prevented the Incident
- + diff --git a/eportal-api/index.html b/eportal-api/index.html index 46f440eb..43dfb795 100644 --- a/eportal-api/index.html +++ b/eportal-api/index.html @@ -39,7 +39,7 @@ })(); ePortal API - +
sidebar hamburger menu

ePortal API

You may need to create a separate ePortal account for API usage with:

kc.eportal user -a api-user -p <password>
@@ -255,6 +255,6 @@
 
  • Now your plan is ready and can be called directly with:
    bolt plan run eportal_puppet:unregister_server -t <TARGETS>
     
  • Ad hoc run example with:

    bolt plan run eportal_puppet::unregister_server -t 192.168.246.110
     

    This can be called during machine tear down to properly remove the server from ePortal.

    - + diff --git a/eportal/index.html b/eportal/index.html index a7aa675c..51d45798 100644 --- a/eportal/index.html +++ b/eportal/index.html @@ -39,7 +39,7 @@ })(); ePortal - +
    sidebar hamburger menu

    ePortal

    TuxCare ePortal is the web management console dedicated to KernelCare Enterprise live patch management.

    ePortal software can help protect servers located behind the firewall (i.e. with no internet access) and can be installed both on-premises and in the cloud.

    Overview

    ePortal Hardware Requirements

    Disk

    • 100 GB minimum, 200 GB recommended (20GB in case of cache mode)
    • SSD with at least 100 IOPS

    Note

    SSD based storage is a crucial requirement for ePortal server.

    CPU

    As far as other requirements concerned, we have tested the following configuration and the following number of connected servers:

    • 10k of connected machines is the maximum for the following requirements:

      • VM
      • 1 VCPU
      • 1 GB RAM
    • 75k of connected machines is the maximum for the following requirements:

      • Core i5
      • 1 CPU
      • 4 GB RAM

    Installation

    ePortal is compatible with 64-bit versions of EL7/8/9 based distros like CentOS 7/8, AlmaLinux 8/9 and Ubuntu 20.04/22.04.

    RHEL-based distros

    For installation and workability of ePortal the Nginx web server is required. We recommend to use stable version from the official Nginx repository:

    cat > /etc/yum.repos.d/nginx.repo <<EOL
    @@ -365,6 +365,6 @@
     

    Run:

    kc.eportal sync-nginx-conf
     

    It initializes storage and makes corresponding modifications to nginx config to serve patches from a new place.

    And restart nginx and eportal services to apply changes:

    systemctl restart eportal nginx
     
    - + diff --git a/extended-lifecycle-support-for-languages/index.html b/extended-lifecycle-support-for-languages/index.html index 7dde89ca..3bf828aa 100644 --- a/extended-lifecycle-support-for-languages/index.html +++ b/extended-lifecycle-support-for-languages/index.html @@ -39,7 +39,7 @@ })(); Extended Lifecycle Support for Languages - +
    sidebar hamburger menu

    Extended Lifecycle Support for Languages

    Extended Lifecycle Support for PHP

    Extended Lifecycle Support (ELS) for PHP from TuxCare provides security fixes for PHP versions that have reached their end-of-life. This allows to continue running Linux server vulnerability-free.

    Supported OS

    TuxCare provides Extended Lifecycle Support through four years after the EOL date.

    OSVersion
    CentOS, CloudLinux, OracleLinux, etc.6.x 64-bit, 7.x 64-bit, 8.x 64-bit, 9.x 64-bit
    AlmaLinux8.x 64-bit, 9.x 64-bit
    Ubuntu16.04 64-bit, 18.04 64-bit, 20.04 64-bit, 22.04 64-bit

    Supported versions

    CentOS, CloudLinux, AlmaLinux, Oracle Linux, etc.: 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 7.0, 7.1, 7.2, 7.3, 7.4, 8.0, 8.1, 8.2

    Ubuntu: 5.6, 7.0, 7.1, 7.2, 7.3, 7.4, 8.0, 8.1, 8.2

    Installation instructions of yum repositories

    RHEL based systems

    1. Download an installer script:
    wget https://repo.cloudlinux.com/php-els/install-php-els-repo.sh
    @@ -258,6 +258,6 @@
     
    1. Download OVAL stream:
    wget https://repo.cloudlinux.com/python-els/almalinux9-els-python-oval.xml
     
    1. Run scanning:
    oscap oval eval --results result.xml --report report.xml almalinux9-els-python-oval.xml
     
    - + diff --git a/extended-lifecycle-support/index.html b/extended-lifecycle-support/index.html index 4609ea8c..e0d9b031 100644 --- a/extended-lifecycle-support/index.html +++ b/extended-lifecycle-support/index.html @@ -39,7 +39,7 @@ })(); Extended Lifecycle Support - +
    sidebar hamburger menu

    Extended Lifecycle Support

    TuxCare's Extended Lifecycle Support (ELS) service provides security updates, system enhancement patches, and selected bug fixes for older versions of a variety of Linux distributions, including CentOS 6, Oracle Linux 6, CloudLinux 6, CentOS 7, CentOS 8, Ubuntu 16.04, and Ubuntu 18.04. These distributions have either reached their end of standard support from vendors or have reached End of Life (EOL).

    Our ELS service is designed to provide solutions for organizations that are not yet ready to migrate to newer versions and that are seeking long-term stability for their out-of-date operating systems. The service coverage includes updates for the Linux kernel and a list of essential packages that are integral to server operations.

    Vulnerability coverage

    TuxCare employs the Common Vulnerability Scoring System (CVSS v3) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we give priority to the NVD score.

    TuxCare Extended Lifecycle Support, by default, provides security patches for High and Critical vulnerabilities (with a 7+ CVSS score). For vulnerabilities rated as Medium (4.0 to 6.9), and/or when patches are required for FIPS-certified deployments, custom coverage options are available. Specific details regarding these coverage options and their pricing can be obtained by contacting our sales team.

    Target response times

    Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.

    We aim to deliver security patches for critical and high-risk vulnerabilities (CVSS 7+) within 14 days from when the vulnerabilities become publicly disclosed. This rapid response time significantly reduces the window of opportunity for potential attackers and meets most security regulation requirements.

    Duration of support

    TuxCare provides Extended Lifecycle Support (ELS) for up to four years (except for CentOS 7 which is supported for up to five years). This support is offered after the Linux distribution has reached its End of Life (EOL) or no longer receives standard support.

    DistributionEOLELS
    CentOS 6December 2020December 2024
    CentOS 7June 2024June 2029
    CentOS 8January 2022January 2026
    Oracle Linux 6December 2020December 2024
    Ubuntu 16.04April 2021April 2025
    Ubuntu 18.04April 2023April 2027

    Supported packages

    TuxCare's Extended Lifecycle Support provides updates for a comprehensive list of packages integral to server operations (100+ packages), providing maximum security for your operating system. You can view the full list of supported packages for each operating system, as well as get detailed information on the patched Common Vulnerabilities and Exposures (CVEs), here. Support for additional packages can be provided on request.

    Errata advisories

    TuxCare Extended Lifecycle Support provides qualified security and selected bug-fix errata advisories across all architectures. They can help users track which CVEs are resolved and which bugs have been addressed. You can view the full list of released advisories here.

    OVAL patch definitions

    Leveraging the Open Vulnerability and Assessment Language (OVAL) patch definitions with OVAL-compatible tools, e.g. OpenSCAP, users can accurately check their systems for the presence of vulnerabilities.

    Connection to ELS repository

    To install the Extended Lifecycle Support repository on a server, you just need to download an installer script and run the script with a key. The installation script will register the server in the CLN with the key, add a PGP key to the server, and create the ELS repository.

    In order to use Extended Lifecycle Support, you will need to open TCP port 443 to the following destinations:

    Technical Support

    All TuxCare products include technical support provided according to the support policy. It delivers 24/7/365 access to our engineers through the TuxCare Support Portal https://tuxcare.com/support-portal/ and to our online knowledge base.

    Installation instructions of yum repositories

    CentOS 6 ELS

    1. Download an installer script:
    wget https://repo.cloudlinux.com/centos6-els/install-centos6-els-repo.sh
    @@ -182,6 +182,6 @@
     # rm /etc/yum.repos.d/centos6-els.repo
     
    1. Remove the els-define package:
    # yum remove els-define
     
    - + diff --git a/index.html b/index.html index b0f458f6..54b5f1bc 100644 --- a/index.html +++ b/index.html @@ -39,10 +39,10 @@ })(); - +
    document icon

    TuxCare

    services automate, simplify, and enhance Linux operations, giving organizations more flexibility in managing Linux distro choices and versions, significant maintenance cost reductions, and greatly enhanced security and compliance postures.

    document icon

    Enterprise Support for AlmaLinux

    provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.

    document icon

    KernelCare Enterprise

    is a live kernel patching service that provides security patches and bugfixes for a range of popular Linux kernels that can be installed without rebooting the system.

    document icon

    KernelCare for IOT

    provides live security patching for ARM64-based embedded systems for enterprise IoT users and original equipment manufacturers.

    document icon

    ePortal

    TuxCare ePortal is the web management console dedicated to KernelCare Enterprise live patch management.

    document icon

    ePortal API

    is a complete API for everyday use.

    document icon

    Extended Lifecycle Support

    allows you to continue running your Linux server after the operating system’s end of life.

    document icon

    Extended Lifecycle Support for Languages

    provides security fixes for PHP and Python versions that have reached their end-of-life which allows to continue running Linux server vulnerability-free.

    document icon

    Subscription Management Portal

    The TuxCare subscription management portal is designed to easily manage your licenses of TuxCare products and services by means of a user-friendly interface.

    document icon

    Service Descriptions

    AlmaCare service description

    - + diff --git a/jp/eportal-api/index.html b/jp/eportal-api/index.html index ed3fc910..63a4c57e 100644 --- a/jp/eportal-api/index.html +++ b/jp/eportal-api/index.html @@ -39,7 +39,7 @@ })(); ePortal API - +
    sidebar hamburger menu

    ePortal API

    以下のコマンドで、API使用のための別のePortalアカウントを作成する必要がある場合があります。

    kc.eportal user -a api-user -p <password>
    @@ -239,6 +239,6 @@
     }
     

    例:

    mainフィードとtest-feedフィードで、libcareパッチセットU20200506_01を有効にします。

    curl -X POST -u admin 'https://eportal.corp.com/admin/api/patchsets/manage?patchset=U20200506_01&feed=main&feed=test-feed&product=user&action=enable'
     
    - + diff --git a/jp/eportal/index.html b/jp/eportal/index.html index 6165302a..081f653b 100644 --- a/jp/eportal/index.html +++ b/jp/eportal/index.html @@ -39,7 +39,7 @@ })(); ePortal - +
    sidebar hamburger menu

    ePortal

    TuxCare ePortalは、KernelCare Enterpriseライブ パッチ管理専用のWeb管理コンソールです。

    ePortalソフトウェアは、ファイアウォールの内側にある(つまり、インターネットにアクセスできない)サーバーを保護するのに役立ちます。また、オンプレミスにもクラウドにもインストールできます。

    Overview

    ePortalハードウェア要件

    ディスク

    • 最小100 GB、推奨200 GB(キャッシュモードの場合は、20 GB)
    • 100 IOPS以上のSSD

    SSDベースのストレージは、ePortalサーバーに必須の要件です。

    CPU

    その他の要件に関して、以下の構成と接続サーバー数をテストしました。

    • 以下の要件では、最大接続マシン数は10kです。

      • VM
      • 1 vCPU
      • 1 GB RAM
    • 以下の要件では、最大接続マシン数は75kです。

      • Core i5
      • 1 CPU
      • 4 GB RAM

    インストール

    ePortalは、CentOS 7/8、AlmaLinux 8、Ubuntu 20.04/22.04などのEL7/8ベースのディストリビューションの64bit版と互換性があります。

    RHELベースのディストリビューション

    ePortalをインストールして実行するには、NginxのWebサーバーが必要です。Nginxの公式リポジトリからインストールした安定版を使用することをお勧めします。

    cat > /etc/yum.repos.d/nginx.repo <<EOL
    @@ -358,6 +358,6 @@
     

    以下を実行します。

    kc.eportal sync-nginx-conf
     

    ストレージが初期化され、新しい場所からパッチが提供されるように、nginx構成ファイルに対応する変更が行われます。

    nginxePortalサービスを再起動して、変更を適用します。

    systemctl restart eportal nginx
     
    - + diff --git a/jp/extended-lifecycle-support-for-languages/index.html b/jp/extended-lifecycle-support-for-languages/index.html index 5e77cc75..ee72ed4f 100644 --- a/jp/extended-lifecycle-support-for-languages/index.html +++ b/jp/extended-lifecycle-support-for-languages/index.html @@ -39,7 +39,7 @@ })(); 言語向け延長ライフサイクルサポート - +
    sidebar hamburger menu

    言語向け延長ライフサイクルサポート

    HP向け延長ライフサイクルサポート

    TuxCareは、PHP向け延長ライフサイクルサポート(ELS)によって、ライフサイクルが終了したPHPバージョンにセキュリティ修正を提供しています。これにより、脆弱性なしでLinuxサーバーを実行し続けることができます。

    対応OS

    TuxCareは、EOL日から4年間延長ライフサイクルサポートを提供します。

    OSバージョン
    CentOS、CloudLinux、OracleLinuxなど.6.x 64-bit、7.x 64-bit、8.x 64-bit
    AlmaLinux8.x 64-bit
    Ubuntu16.04 64-bit、18.04 64-bit、20.04 64-bit

    サポートバージョン

    CentOS、CloudLinux、AlmaLinux、OracleLinuxなど:5.1、5.2、5.3、5.4、5.5、5.6、7.0、7.1、7.2、7.3、7.4、8.0、8.1

    Ubuntu: 5.6、7.0、7.1、7.2、7.3、7.4、8.0、8.1

    yumリポジトリのインストール説明

    RHELベースのシステム

    1. インストールスクリプトをダウンロードします。
    wget https://repo.cloudlinux.com/php-els/install-php-els-repo.sh
    @@ -258,6 +258,6 @@
     
    1. OVALストリームをダウンロードします。
    wget https://repo.cloudlinux.com/python-els/almalinux9-els-python-oval.xml
     
    1. スキャンを実行します。
    oscap oval eval --results result.xml --report report.xml almalinux9-els-python-oval.xml
     
    - + diff --git a/jp/extended-lifecycle-support/index.html b/jp/extended-lifecycle-support/index.html index 31a3f01e..cb2a553c 100644 --- a/jp/extended-lifecycle-support/index.html +++ b/jp/extended-lifecycle-support/index.html @@ -39,7 +39,7 @@ })(); 延長ライフサイクルサポート - +
    sidebar hamburger menu

    延長ライフサイクルサポート

    TuxCareの延長ライフサイクルサポート(ELS)をご利用いただければ、オペレーティングシステムのライフサイクル終了後も引き続きLinuxサーバーを稼働できます。

    他のバージョンのディストリビューションのサポートをご希望の場合は、SLA対象のサポートに他のパッケージを追加してください。ご不明な点がございましたら、FAQ欄をお読みください。ご意見がございましたら、sales@tuxcare.comまでご連絡ください。

    サポート期間

    TuxCareは、EOL日から4年間延長ライフサイクルサポートを提供します。

    ディストリビューションEOLELS
    CentOS 62020年12月2024年12月
    Oracle Linux 62020年12月2024年12月
    Ubuntu 16.042021年4月2025年4月
    CentOS 8.42022年1月2026年1月
    CentOS 8.52022年1月2026年1月

    対応パッケージ

    TuxCareは、カーネル、Apache、PHP、Glibc、OpenSSL、OpenSSH、Pythonパッケージを継続的にアップデートします。

    アップデート情報の入手方法

    CVEダッシュボードを使用して、アップデートを受信するように登録できます。CVEダッシュボードでは、各CVEに対する当社の進捗状況、CVEに関する情報、CVEの既知の悪用事例の詳細などに関する詳しい情報を確認できます。

    ダッシュボードをより良く、より便利にするためのご意見がございましたら、sales@tuxcare.comまでご連絡ください。

    また、TuxCareブログを購読して、パッチされた脆弱性の詳細な分析や、TuxCareチームのメンバーが作成したその他のサイバーセキュリティコンテンツを読むこともできます。

    ELSへの移行

    TuxCareの延長ライフサイクルサポートサービスでは、移行の必要がありません。新しいリポジトリ ファイルを追加するインストールスクリプトを実行するだけです。再起動は必要ありません。

    ELSリポジトリのインストール方法

    サーバーに延長ライフサイクルサポートリポジトリをインストールするには、インストールスクリプトをダウンロードして、キーを使用してスクリプトを実行するだけです。インストールスクリプトを実行すると、そのキーと一緒にCLNにサーバーが登録され、サーバーにPGPキーが追加され、ELSリポジトリが作成されます。

    延長ライフサイクルサポートのご利用には、以下の宛先に対してTCP ポート443を開く必要があります。

    • cln.cloudlinux.com
    • repo.cloudlinux.com

    yumリポジトリのインストール手順

    CentOS 6 ELS

    1. インストールスクリプトをダウンロードします。
    wget https://repo.cloudlinux.com/centos6-els/install-centos6-els-repo.py
    @@ -164,6 +164,6 @@
     

    Ubuntu 16.04の場合

    OVALを使用するには、システムがELSとして定義されていることを確認してください。

    1. 以下のコマンドを実行します。
    $ apt list els-define | grep -o "installed"
     

    コマンドの結果がinstalledの場合、ご利用のシステムはELSとして定義されていますので、OVALを使用できます。

    1. それ以外の場合は、以下のコマンドを使用して、els-defineパッケージをインストールする必要があります。
    $ apt-get install els-define
     
    - + diff --git a/jp/index.html b/jp/index.html index 1ebe864f..95dc6d48 100644 --- a/jp/index.html +++ b/jp/index.html @@ -39,10 +39,10 @@ })(); - +
    - + diff --git a/jp/linux-support-services/index.html b/jp/linux-support-services/index.html index d6e6e253..82780894 100644 --- a/jp/linux-support-services/index.html +++ b/jp/linux-support-services/index.html @@ -39,10 +39,10 @@ })(); Linuxサポートサービス - +
    sidebar hamburger menu

    Linuxサポートサービス

    TuxCareは、「エッセンシャル」ティア、「プレミアム」ティア、「製品OEMサポート」ティアでサブスクリプションパッケージを提供しています。AlmaLinux OS 8やその他の一般的なEnterprise Linuxディストリビューションでご利用いただけます。

    AlmaLinux OS 8向け「エッセンシャル」サポート

    生産インフラストラクチャでAlmaLinux OSをご利用の企業向けに基本的なサポートパッケージを提供しています。

    • Linuxカーネルとコアパッケージ向けの定期的なパッチとアップデート
    • CVSSと高CVEに14営業日でパッチを配信
    • 24時間年中無休のEメールサポート

    AlmaLinux OS8とその他のLinuxディストリビューション向け「プレミアム」サポート

    カスタムベースの、さまざまなLinuxディストリビューション向けパッチとアップデート、プレミアムSLA、年中無休のインシデントサポート、コンサルティングサービスへのアクセスの提供

    • AlmaLinux OS、CentOS、Oracle、Ubuntu、Debian、Suse、Linuxディストリビューションに含まれていないその他のオープンソースソフトウェアのサポート
    • 24時間365日のEメールによるインシデントサポート、ライブチャットと電話も利用可能
    • 他のLinuxディストリビューション向けの、ニーズに応じた、リポジトリ外のセキュリティ/バグ修正(作業範囲記述書の一部)

    AlmaLinux OS 8向け製品NodeOSサポート

    顧客に出荷中の製品のNodeOSとして、AlmaLinux 8をご利用のエンタープライズ企業向けに、カスタマイズされたLinuxサポートパッケージを提供しています。特定のパッケージセット、カスタムSLA、迅速なインシデント対応のための専任サポートチーム。

    • 各契約向けに特別に交渉されたパッチ配信とインシデント対応
    • CVSSと高CVEに10営業日でパッチを配信
    • 24時間365日対応のEメールサポート。重大インシデント用ライブチャットも利用可能
    • 指名された専任サポートマネージャー
    • 個々の作業範囲記述書(SOW)ベースでのコンサルティングサービスへのアクセス

    詳細については、TuxCare LinuxサポートサービスWebサイトを参照してください。

    - + diff --git a/jp/live-patching-services/index.html b/jp/live-patching-services/index.html index 95f0aedd..9815a980 100644 --- a/jp/live-patching-services/index.html +++ b/jp/live-patching-services/index.html @@ -39,7 +39,7 @@ })(); ライブパッチ適用サービス - +
    sidebar hamburger menu

    ライブパッチ適用サービス

    ライブパッチ適用サービスの一環として、TuxCareは以下のサービスを提供します。

    • KernelCare Enterprise
    • LibCare
    • KernelCare for IOT
    • QEMUCare
    • DBCare(ベータ版で利用可能)

    KernelCare Enterprise

    概要

    KernelCare Enterpriseは、さまざまな人気のLinuxカーネルに、システムを再起動することなしにインストール可能なセキュリティパッチとバグ修正を提供するライブカーネルパッチ適用サービスです。

    メリット

    現在、システム管理者は、最新のカーネルアップデートを適用するのに、サーバーを再起動する必要があります。このアップデートは、セキュリティ上の問題を防ぐために必要です。ただし、再起動に伴うダウンタイムのせいで、このようなアップデートは遅れがちで、深夜の時間帯になりがちです。ダウンタイムを回避するために、サーバーの所有者が数ヶ月、数年もシステムをアップデートせずに、脆弱なシステムを実行し続けることはめずらしいことではありません。マネージドサービスプロバイダは、ダウンタイムを計画し、リソースを圧迫しながら短時間に数千台のサーバーのアップデートと再起動をする問題に直面しています。KernelCareは、再起動不要のライブカーネルパッチ適用サービスを提供することで、このアップデートと再起動の問題を解決します。

    主な機能

    • 再起動不要のLinuxカーネルパッチ適用とカスタムパッチ適用
    • オンプレミスでも、クラウドでも利用可能
    • 保護されたインフラストラクチャ用のプライベートパッチサーバー、ePortal
    • 追加設定不要で、パッチ管理・脆弱性評価ツールと統合

    試用ライセンスの取得

    KernelCare Enterpriseのご利用には、試用版アクティベーションキーが必要です。試用ライセンスは7日間有効です。

    アクティベーションキーの取得に問題がある場合や試用版の使用に関してご不明点がある場合は、sales@cloudlinux.com までご連絡ください。私たちがお助けします。

    インストール

    KernelCare Enterpriseは、64ビット版のAlmaLinux/CloudLinuxOS/CentOS/RHEL 6、7、8、Oracle Linux 6、7、Amazon Linux 1、2、Virtuozzo/PCS/OpenVZ 2.6.32、Debian 8、9、10、Proxmox VE 5 、6、Virt-SIG/Xen 4CentOS 6、7、Ubuntu 14.04、15.04、16.04、18.04、20.04カーネルと互換性があります。互換性のあるカーネル一覧は、https://patches.kernelcare.com/ からご覧いただけます。

    KernelCare Enterpriseをインストールするには、以下を実行します。

    curl -s -L https://kernelcare.com/installer | bash
    @@ -253,6 +253,6 @@
       --disabled   do not enable patchset after deploy
     

    例えば、

    kc.eportal qemu deploy --feed test /tmp/U20210818_01-qemu.tar.bz2
     

    このコマンドは、U20210818_01-qemuパッチセットをtestフィードにデプロイして、有効にします。

    DBCare

    DBCareのベータテストが利用可能です!こちらからお申し込みください。

    概要

    DBCareは、MariaDB向けのライブパッチ適用サービスです。 DBCareを使用すると、データベースのバックエンドがアップデートされている間もアプリケーションを実行し続けることができるので、データベースのパフォーマンス、信頼性、セキュリティ、コンプライアンスが強化されます。

    メリット

    データベースのアップデートは、バグの修正、システムパフォーマンスの向上、脆弱性数の削減のために行われますが、これらの活動には多大な影響と労力が必要になります。DBCareを使用すると、データベースのダウンタイム一切不要で、パッチがメモリに適用されます。

    ライブパッチ適用は、メンテナンスウィンドウまでの待機不要で、迅速にセキュリティアップデートを適用します。実は、DBCareを導入している組織は、データベースシステムのほとんどのメンテナンスウィンドウを完全に削除していて、それでいて、これまで以上に安全になっています。

    主な機能

    • 現時点で、MariaDBをサポート
    • 高可用性環境におけるデータベースのフェイルオーバーの回避
    • ダウンタイム中のワークロードの移行の回避

    DBCareの仕組み

    • データベースサーバーにエージェントがインストールされ、当社のリポジトリから直接パッチがインストールされます。
    • このエージェントは、すべてのTuxCare製品にわたって、パッチをダウンロードして適用するために使用されます。そのため、複数のTuxCare製品を使用する場合でも、実行中のエージェントは1つだけです。

    DBCareの詳細については、こちらのページにアクセスしてください

    - + diff --git a/jp/tuxcare-cln/index.html b/jp/tuxcare-cln/index.html index 7e78e461..11c40c15 100644 --- a/jp/tuxcare-cln/index.html +++ b/jp/tuxcare-cln/index.html @@ -39,10 +39,10 @@ })(); サブスクリプション管理ポータル - +
    sidebar hamburger menu

    サブスクリプション管理ポータル

    TuxCareサブスクリプション管理ポータル(CLN)は、TuxCareの製品とサービスのライセンスをユーザーフレンドリーなインターフェイスで簡単に管理できるように設計されています。

    概要

    CLNでは、以下のことができます。

    • ライセンスの追加、削除、編集
    • サーバーの追加、削除、編集
    • お支払い方法の選択とライセンスの購入
    • 関連するすべての費用の追跡

    新しいアカウントの作成

    初めてのユーザーの方は、https://portal.tuxcare.comにアクセスして、簡単な登録フォームに記入して、アカウントを作成してください。ログイン名とパスワードは、登録確認メールでご案内しています。

    ログイン

    https://portal.tuxcare.comにアクセスして、ログイン名とパスワードでログインします。

    Dashboard

    Dashboardは、Productsに迅速にアクセスするのに役立ちます。以下のタブがあります。

    Products

    Dashboardをクリックすると、My Productsページにリダイレクトされます。

    以下のアクションをご利用いただけます。

    • Manage licenses and billing cycle。リンクをクリックすると、当社セールスチームに連絡できます。ライセンス数や製品クォータを変更したり、請求サイクルを管理したりする際にご利用ください。
    • Manage activation keysExtended Support Services | Activation Keysページへのショートカット。

    Servers

    Dashboard → Serversの順にクリックして、All Serversページに移動します。このアカウントに属する全サーバーが、各サーバーにインストールされている製品とともにリスト表示されます。

    表には、アカウント内の全製品のアクティブ化されたサーバーがすべて含まれています。表には、以下の列が含まれています。

    • Server name — サーバーのホスト名
    • IP — サーバーのIPアドレス
    • Registered — サーバーがアクティブ化された日付。サーバーは、この情報をCLNに送信します
    • Group — サーバーグループ(サーバーグループの詳細については、CLNのドキュメントを参照してください)
    • Installed products — サーバー上でアクティブ化された製品のロゴの表示
    • Actions
      • アイテムを削除するには、 をクリックしてください

    サーバーの詳細を表示するには、サーバー名をクリックしてください。

    • Installed products — インストール済み製品の完全な名前
    • Last check-in — サーバーが正常にチェックインに応答した最後の日付

    以下のフィルターを利用できます。

    • ProductProductボタンをクリックすると、1つ以上の製品を選択できま
    • Registered dateRegistered dateをクリックすると、カレンダーが表示されます。選択した日付または期間でフィルタリングできます
    • Search — クエリを入力します。検索は、Server nameActivation keyエンティティで実行されます

    Live Patching Services

    Live Patching Servicesをクリックすると、Server License Typesページにリダイレクトされます。

    このページでは、サーバーライセンス数を確認できます。また、TuxCareセールスチームに連絡して、ライセンスと請求サイクルを管理できます。

    Extended Support Services

    Extended Support Servicesをクリックすると、Server License Typesページにリダイレクトされます。

    Server License Types

    このページでは、各製品のサーバーライセンス数を確認できます。

    Activation Keys

    Extended Support Services → Activation Keysの順にクリックすると、Activation Keysページにリダイレクトされます。

    表には、アカウント内の全製品のアクティベーションキーがすべて含まれています。表には、以下の列が含まれています。

    • Activation key — 製品のアクティベーションに使用される英数字の文字列です
    • License type — 使用されるサーバーライセンスの種類です。サーバーユーザーの制限を決定します
    • Note — このアクティベーションキーに追加した情報
    • Servers (used/limits) — このキーですでにアクティブ化されたサーバー数(used)と、この特定のキーで登録できるサーバーの総数(limits)
    • チェック — 1つ以上のアクティベーションキーにチェックを入れて、削除アクションを実行します((use ) を使用)

    注意

    デフォルトのアクティベーションキーは削除できません。

    以下のフィルターを利用できます。

    • Server limits — サーバー制限/無制限でフィルタリング
    • License type — ライセンスの種類でフィルタリング

    アクティベーションキーをクリックすると、そのキーのActivation Key Details(アクティベーションキー詳細)ページに移動します。

    製品別アクティベーションキー

    Extended Support ServicesProductの順にクリックすると、そのProduct Activation Keysページにリダイレクトされます。

    • 製品のアクティベーションキーがない場合は、Create activation keyをクリックしてキーを作成できます。
    • 製品のデフォルトのアクティベーションキーがある場合は、Generate new activation keyをクリックして、新しいキーを生成できます。新しいキーは自動的に作成され、表に追加されます。
    • Copyをクリックすると、アクティベーションキーをコピーできます。

    この表には、製品のすべてのアクティベーションキーが含まれています。表には、以下の列が含まれます。

    • Activation key — 製品のアクティベーションに使用される英数字の文字列です。
    • Note — このアクティベーションキーに追加した情報
    • Servers (used/limits) – このキーですでにアクティブ化されているサーバー数(used)と、この特定のキーで登録できるサーバーの総数(limits)

    キーを削除するには、キーを選択して をクリックしてください。

    以下のフィルターを利用できます。

    • Server limits — サーバー制限/無制限でフィルタリング
    • 検索

    キーをクリックして、このキーのActivation Key Detailsページに移動します。

    Activation Key Details

    このページでは、以下のことができます。

    • アクティベーションキーの完全な情報の閲覧
    • キーの編集。 Edit keyをクリックしてください
    • キーの削除。 をクリックしてください
    • サーバーリストの確認

    表には、そのキーで登録されたすべてのサーバーが含まれています。表には以下の列があります。

    • Server name — サーバーのホスト名
    • IP — サーバーのIPアドレス
    • Registered — サーバーがアクティブ化された日付。サーバーはこの情報をCLNに送信します
    • Last check-in — サーバーがチェックインに正常に応答した最後の日付

    以下のフィルターを利用できます。

    • Server limits — サーバー制限/無制限でフィルタリング
    • 検索欄

    サーバー

    Extended Support ServicesServersの順にクリックすると、Serversページにリダイレクトされます。

    表には、延長ライフサイクルサポート内のあらゆる製品に対してアクティブ化されたすべてのサーバーが含まれています。表には以下の列があります。

    • Server name — サーバーのホスト名
    • IP — サーバーのIPアドレス
    • Registered — サーバーがアクティブ化された日付。サーバーは、この情報をCLNに送信します
    • Installed products — サーバー上でアクティブ化された製品のロゴの表示
    • Actions
      • アイテムを削除するには、 をクリックしてください

    サーバーの詳細を表示するには、サーバー名をクリックしてください。

    • Installed products – インストール済み製品の完全な名前
    • Last check-in — サーバーが正常にチェックインに応答した最後の日付

    以下のフィルターを利用できます。

    • ProductProductボタンをクリックして、1つ以上の製品を選択します
    • Registered dateRegistered dateをクリックすると、カレンダーが表示されます。選択した日付または期間でフィルタリングできます
    • 検索 — クエリを入力します

    製品別サーバー

    Extended Support Services → ServersProductの順にクリックすると、その製品のProduct Serversページにリダイレクトされます。

    表には、延長ライフサイクルサポート内でその製品用にアクティブ化されたすべてのサーバーが含まれています。表には以下の列があります。

    • Server name — サーバーのホスト名
    • IP — サーバーのIPアドレス
    • Registered — サーバーがアクティブ化された日付。サーバーは、この情報をCLNに送信します
    • Installed products — サーバー上でアクティブ化された製品のロゴの表示
    • Actions
      • アイテムを削除するには、 をクリックしてください

    サーバーの詳細を表示するには、サーバー名をクリックしてください。

    • Installed products — インストール済み製品の完全な名前
    • Last check-in — サーバーが正常にチェックインに応答した最後の日付

    以下のフィルターを利用できます。

    • Registered dateRegistered dateをクリックすると、カレンダーが表示されます。選択した日付または期間でフィルタリングできます
    • 検索 — クエリを入力します

    Get servers listをクリックすると、サーバーリストをダウンロードできます。

    Billing

    Balance & Top up

    Billingをクリックすると、Balance & Top upページにリダイレクトされます。

    このページでは、以下のことがわかります。

    • 現在のプランと価格
    • 残高

    金額を入力してTop upをクリックすると、アカウントに入金できます。

    Payment methods

    BillingPayment methodsの順にクリックすると、Payment methodsページにリダイレクトされます。

    以下のタブを使用できます。

    • Billing information
    • Payment methods
    • Autopayment

    Billing information

    ここでは、請求先のEメールアドレスを変更できます。 変更を適用するには、Saveをクリックしてください。

    Payment methods

    ここでは、支払い方法を管理できます。変更を適用するには、Saveをクリックしてください。

    Autopayment

    ここでは、自動支払いの種類を変更できます。

    • Auto add funds(自動資金追加)
    • Auto repay(自動支払)
    • Do not add funds automatically(自動で資金を追加しない)

    変更を適用するには、Saveをクリックしてください。

    Invoices

    表には以下の列があります。

    • Invoice id — 一意の請求書番号
    • Created — 請求書の発行日
    • Type — 支払いの種類:請求書または支払いの受領
    • Pay period — 発行された請求書の対象期間の開始日
    • Total — 受領済み/支払う必要がある合計金額
    • Balance — 現在の残高
    • Actions — 以下のアクションを利用できます。
      • 請求書の閲覧 — — 請求書の詳細を閲覧するには、をクリックしてください。詳細は、新しいポップアップで開きます。
      • 請求書のダウンロード — — 請求書をダウンロードするには、をクリックしてください。

    請求書の詳細を表示するには、 をクリックしてください。

    Settings

    アカウントの詳細に移動するには、右上隅にある Userアイコン → Settingsをクリックします。Account detailsページにリダイレクトされます。

    Account details

    以下のタブを使用できます。

    • Personal information(個人情報)
    • Company information(企業情報)
    • Billing contact information(請求連絡先情報)

    P個人情報

    *の付いた入力欄はすべて必須です。

    • API secret key – この鍵をCLN APIで使用します
    • IM Upgrade URL – Imunify製品をアップグレードするためのURL(URLがデフォルトのものではない場合)

    パスワードを変更するには、Change passwordをクリックします。

    2要素認証を有効にするには、スイッチをOnにします。

    変更を適用するには、Saveをクリックしてください。

    企業情報

    変更を適用するには、Saveをクリックしてください。

    請求連絡先

    変更を適用するには、Saveをクリックしてください。

    Account sublogins

    Eメールアドレスの形式で、ご利用のアカウントに追加のログイン名を作成できます。サブログイン名は、以下に一覧表示されている、さまざまな権限がある任意の役割を持つことができます。マスターサーバー管理者アカウントには、すべての権限があり、アカウントサブログイン名を作成できます。

    変更を適用するには、Saveをクリックしてください。

    #役割

    Full Access/Admin

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング
    • サーバーの追加/削除
    • アクティベーションキーの作成
    • ライセンスの注文/削除
    • 請求書の閲覧
    • 請求情報の閲覧
    • クレジットカード情報の編集
    • アカウント情報の編集
    • 請求情報の編集/再販業者用入金
    • 料金の閲覧
    • アカウント情報の表示
    • パスワードの変更

    Billing

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • 請求書の閲覧
    • 請求情報の閲覧
    • クレジットカード情報の編集
    • アカウント情報の編集
    • 請求情報の編集/再販業者用入金
    • 料金の閲覧
    • アカウント情報の閲覧

    Server and License Management

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング
    • サーバーの追加/削除
    • アクティベーションキーの作成
    • ライセンスの注文/削除

    Server Management Only

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング
    • サーバーの追加/削除
    • アクティベーションキーの作成

    Read Only — Billing

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング
    • 請求書の閲覧
    • 請求情報の閲覧

    Read Only — Server Management

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング

    Reports

    ご希望のEメールアドレスにアカウントのレポートを受信するように設定できます。

    新しいレポートの設定を追加するには、Add configをクリックしてください。

    - + diff --git a/jp/tuxcare/index.html b/jp/tuxcare/index.html index a4350f66..8d882a91 100644 --- a/jp/tuxcare/index.html +++ b/jp/tuxcare/index.html @@ -39,10 +39,10 @@ })(); TuxCare - +
    sidebar hamburger menu

    TuxCare

    TuxCareサービスは、Linuxの運用を自動化し、簡略化し、改善します。TuxCareサービスによって、組織は、Linuxディストリビューションの選択とバージョンをより柔軟に管理でき、メンテナンス費用を大幅に削減でき、セキュリティとコンプライアンス体制を大幅に強化できます。

    TuxCareは、CloudLinuxのKernelCareブランドと延長ライフサイクルサポートブランドが拡張されたものです。組織がEnterprise Linuxシステムのサポート、メンテナンス、セキュリティを管理するのに役立ちます。

    TuxCareライブパッチ適用サービスにより、Linuxカーネル、ライブラリ、データベース、仮想化プラットフォーム、IoT端末に、ダウンタイムなしで自動的にセキュリティパッチが適用されます。

    TuxCare延長ライフサイクルサポートサービスを使用すると、ライフサイクルが終了したディストリビューションを実行する一般的なリスクから保護された状態を維持しながら、ご自身の都合に合わせて最新バージョンのLinuxに移行できます。

    Linuxサポートサービスは、特定のベンダーに依存しないテクノロジーパートナーシップの特典がある、エンタープライズクラスのLinuxサポートを幅広く提供しています。手頃な価格で、柔軟に、現在ご利用のバージョンのLinuxシステムを継続的に更新して安全に保つことができるサービスです。

    - + diff --git a/kernelcare-for-iot/index.html b/kernelcare-for-iot/index.html index 1dbbd1b8..93a44659 100644 --- a/kernelcare-for-iot/index.html +++ b/kernelcare-for-iot/index.html @@ -39,10 +39,10 @@ })(); KernelCare for IOT - +
    sidebar hamburger menu

    KernelCare for IOT

    Provides live security patching for ARM64-based embedded systems for enterprise IoT users and original equipment manufacturers.

    For the list of supported distributions and chipsets, visit this page.

    How KernelCare IoT works

    • The KernelCare team is constantly monitoring security mailing lists to check for vulnerabilities. As soon as one is found, the team prepares a patch and then sends it to distribution servers.
    • An agent will run a process on your device, checking with the distribution servers every 4 hours until it finds a new patch and then safely apply it to the running kernel without needing to stop it.
    • A special kernel module is used to apply the patches. It first loads the update into the kernel address space, then it places relocations on the original code/data to make sure the code block doesn’t execute during the update. Once finished, it will safely switch the execution path from the original to the updated code and then make sure the old code will never run again.
    • KernelCare does all of this instantly, automatically, and without service interruptions.

    For more information about KernelCare for IOT, visit this page.

    - + diff --git a/live-patching-services/index.html b/live-patching-services/index.html index 08b533fa..c1bfeb51 100644 --- a/live-patching-services/index.html +++ b/live-patching-services/index.html @@ -39,7 +39,7 @@ })(); KernelCare Enterprise - +
    sidebar hamburger menu

    KernelCare Enterprise

    KernelCare Enterprise live patching enhances your vulnerability patching program by providing live patches to the Linux kernel and, optionally, with add-ons to critical userspace components, as well as the virtualization stack.

    The systems are patched according to your patch deployment policy, allowing you to customize your patch management to align with the needs of your unique environment, whether online or in an air-gapped environment. Plus, your vulnerability reports reduce in size quickly as KernelCare seamlessly integrates with all popular vulnerability scanners to give you an accurate vulnerability exposure report.

    KernelCare Enterprise brings KernelCare live patching by default and the following add-ons:

    • LibCare
    • QEMUCare

    The sections below describe KernelCare live patching and the additional add-ons in more detail.

    KernelCare

    Introduction

    KernelCare Enterprise is a live kernel patching service that provides security patches and bugfixes for a range of popular Linux kernels that can be installed without rebooting the system

    Benefits

    Today, system administrators have to reboot a server to apply the latest kernel updates. These updates are necessary to prevent security issues. Due to downtime associated with reboots, however, such updates are often delayed, pushed into the darkest hours of the night. It is common for server owners to not update their systems for months or even years and to run vulnerable systems to avoid downtime. Managed service providers face the problem of having to schedule downtime and then updating and rebooting thousands of servers in a short period of time, straining resources. KernelCare solves this update and reboot issue by providing live kernel patching without the need for a reboot

    Key Features

    • Rebootless Linux Kernel Patching & Custom Patching
    • Works On-prem & in the cloud
    • Private patch server for gated infrastructures - ePortal
    • Out-of-the-box integration with patch management & vulnerability assessment tools

    Getting trial license

    You will need a trial activation key to be able to use the KernelCare Enterprise. The trial license subscription will work for 7 days.

    If you have any issues getting activation key or if you have any questions regarding using your trial subscription – contact sales@cloudlinux.com and we will help.

    Installation

    KernelCare Enterprise is compatible with 64-bit versions of CloudLinuxOS/CentOS 6,7, and 8, AlmaLinux/RHEL 6,7,8, and 9, Oracle Linux 6 and 7, Amazon Linux 1 and 2, Virtuozzo/PCS/OpenVZ 2.6.32, Debian 8,9 and 10, Proxmox VE 5 and 6, Virt-SIG/Xen4CentOS 6 and 7, Ubuntu 14.04, 15.04, 16.04, 18.04 and 20.04 kernels. The list of compatible kernels can be found on the following link: https://patches.kernelcare.com/ .

    To install KernelCare Enterprise, run:

    curl -s -L https://kernelcare.com/installer | bash
    @@ -66,7 +66,7 @@
     Key: FRWf74Zw11111111.83991334-1111-1111-1111-681ddd653e5f
     Please, provide above mentioned key to KernelCare Support Team
     
    -

    The command generates a report and prints out the ID which could be linked to a support ticket.

    Note

    If there was some connection problem during report uploading, the report will be stored locally as /root/cl-report. This file should be sent to the support team manually.

    Config options

    A kcarectl behavior can be configured using /etc/sysconfig/kcare/kcare.conf

    AUTO_UPDATE=YES|NOYES - enable auto-update; NO - disable auto-update.
    PATCH_METHOD=normal|nofreeze|smartNormal - (default) use freezer;
    Nofreeze - don't use freezer to freeze processes;
    Smart - smart freezer freezes only threads that need to be frozen for patching [kernelcare 2.3+].
    PATCH_SERVERServer to use to download patches.
    REGISTRATION_URLLicensing server.
    PREFIX=prefixPatch source prefix, used to test different builds, by downloading builds from a different location, based on prefix [kernelcare 2.2+]
    UPDATE_POLICY=REMOTE|LOCAL|LOCAL_FIRSTDepending on the policy, on server startup, use:
    REMOTE - (default) patches from patch server.
    LOCAL - only locally cached patches, if none cached (caching is done automatically) - do nothing.
    LOCAL_FIRST - see if locally cached patches exist, and load them. If not, try getting them from remote server.
    IGNORE_UNKNOWN_KERNEL=True|FalseDon't provide notification if unknown kernel on auto-update. [kernelcare 2.5+]
    LOAD_KCARE_SYSCTLControls if /etc/sysconfig/kcare/sysctl.conf will be loaded on patchset load. True by default. [kernelcare 2.7+]
    STICKY_PATCH=KEYRetrieve sticky patch from KEY (see CLN, Key Edit); not supported for IP based servers or ePortal.
    STICKY_PATCH=DDMMYYStick patch to a particular date. More info at Sticky Patches.
    [AUTO_]UPDATE_DELAY=<num>h|<num>dUse patchsets not newer than specified time. For example 24h or 2d. AUTO_UPDATE_DELAY works for auto and smart modes. UPDATE_DELAY works for all modes. [kernelcare 2.82+]
    [AUTO_]STICKY_PATCHSET=<patchset>Use patchsets not newer than specified value. For example K20230908_02. AUTO_STICKY_PATCHSET works for auto and smart modes. STICKY_PATCHSET works for all modes. [kernelcare 2.82+]
    REPORT_FQDN=True|FalseForce using Fully Qualified Domain as a hostname. False by default.
    FORCE_GID=NUse this group ID for symlink protection patch. By default, it's 48 (default Apache user GID) or 99 (nobody user)
    USERSPACE_PATCHES=libs,qemuDefine which userspace patches will be applyed by default

    Disabling some patches

    Some patches might affect the work of the system, and we created a way to disable them.

    This is done via the sysctl command.

    When new patchset loads, KernelCare Enterprise sysctl options get reset. To prevent that we added a file:

    /etc/sysconfig/kcare/sysctl.conf

    Options in this file will be loaded automatically on new patchset load.

    To disable loading this options, specify:

    LOAD_KCARE_SYSCTL=0 in /etc/sysconfig/kcare/kcare.conf

    To disable the patch, set the corresponding kcare option to 1.

    Patches that can be disabled:

    Patchsysctl option
    CVE-2015-5157kcare_modify_ldt

    Extra patchset

    Note

    KernelCare Enterprise 2.12-5 or higher

    KernelCare Enterprise Extra patchset includes all the security fixes from KernelCare Enterprise for AlmaLinux, CentOS 6, CentOS 7, and CentOS 8 as well as symlink protection and IPSet bugfix for CentOS 6.

    To enable extra patches and apply patch, run:

    kcarectl --set-patch-type extra --update
    +

    The command generates a report and prints out the ID which could be linked to a support ticket.

    Note

    If there was some connection problem during report uploading, the report will be stored locally as /root/cl-report. This file should be sent to the support team manually.

    Config options

    A kcarectl behavior can be configured using /etc/sysconfig/kcare/kcare.conf

    AUTO_UPDATE=YES|NOYES - enable auto-update; NO - disable auto-update.
    PATCH_METHOD=normal|nofreeze|smartNormal - (default) use freezer;
    Nofreeze - don't use freezer to freeze processes;
    Smart - smart freezer freezes only threads that need to be frozen for patching [kernelcare 2.3+].
    PATCH_SERVERServer to use to download patches.
    REGISTRATION_URLLicensing server.
    PREFIX=prefixPatch source prefix, used to test different builds, by downloading builds from a different location, based on prefix [kernelcare 2.2+]
    UPDATE_POLICY=REMOTE|LOCAL|LOCAL_FIRSTDepending on the policy, on server startup, use:
    REMOTE - (default) patches from patch server.
    LOCAL - only locally cached patches, if none cached (caching is done automatically) - do nothing.
    LOCAL_FIRST - see if locally cached patches exist, and load them. If not, try getting them from remote server.
    IGNORE_UNKNOWN_KERNEL=True|FalseDon't provide notification if unknown kernel on auto-update. [kernelcare 2.5+]
    LOAD_KCARE_SYSCTLControls if /etc/sysconfig/kcare/sysctl.conf will be loaded on patchset load. True by default. [kernelcare 2.7+]
    STICKY_PATCH=KEYRetrieve sticky patch from KEY (see CLN, Key Edit); not supported for IP based servers or ePortal.
    STICKY_PATCH=DDMMYYStick patch to a particular date. More info at Sticky Patches.
    [AUTO_]UPDATE_DELAY=<num>h|<num>dUse patchsets not newer than specified time. For example 24h or 2d. AUTO_UPDATE_DELAY works for auto and smart modes. UPDATE_DELAY works for all modes. [kernelcare 2.82+]
    [AUTO_]STICKY_PATCHSET=<patchset>Use patchsets not newer than specified value. For example K20230908_02. AUTO_STICKY_PATCHSET works for auto and smart modes. STICKY_PATCHSET works for all modes. [kernelcare 2.82+]
    REPORT_FQDN=True|FalseForce using Fully Qualified Domain as a hostname. False by default.
    FORCE_GID=NUse this group ID for symlink protection patch. By default, it's 48 (default Apache user GID) or 99 (nobody user)
    USERSPACE_PATCHES=libs,qemuDefine which userspace patches will be applyed by default

    Disabling some patches

    Some patches might affect the work of the system, and we created a way to disable them.

    This is done via the sysctl command.

    When new patchset loads, KernelCare Enterprise sysctl options get reset. To prevent that we added a file:

    /etc/sysconfig/kcare/sysctl.conf

    Options in this file will be loaded automatically on new patchset load.

    To disable loading this options, specify:

    LOAD_KCARE_SYSCTL=0 in /etc/sysconfig/kcare/kcare.conf

    To disable the patch, set the corresponding kcare option to 1.

    Patches that can be disabled:

    Patchsysctl option
    CVE-2015-5157kcare_modify_ldt

    Extra patchset

    Note

    KernelCare Enterprise 2.12-5 or higher

    KernelCare Enterprise Extra patchset includes all the security fixes from KernelCare Enterprise for AlmaLinux, CentOS 6, CentOS 7, and CentOS 8 as well as symlink protection and IPSet bugfix for CentOS 6.

    To enable extra patches and apply patch, run:

    kcarectl --set-patch-type extra --update
     

    To enable extra patches without update, run:

    kcarectl --set-patch-type extra
     

    The ‘extra’ patch will be applied on the next automatic update.

    To see details, run:

    kcarectl --patch-info
     

    You should see something similar to:

    OS: centos6
    @@ -98,7 +98,7 @@
     kpatch-cve-url: N/A
     kpatch-patch-url: https://bugs.centos.org/view.php?id=13499
     

    To enable Symlink Owner Match Protection, add the following line:

    fs.enforce_symlinksifowner=1

    to /etc/sysconfig/kcare/sysctl.conf.

    And run:

    sysctl -w fs.enforce_symlinksifowner=1
    -

    Sticky patches

    Note

    This functionality is not available for ePortal customers. If you are using ePortal, please use Feeds instead.

    Note

    Since v2.82 there is more convenient way to specify latest available release via [AUTO]_STICKY_PATCHSET and [AUTO_]UPDATE_DELAY configuration options. It also works with recent ePortal versions (v2.3+).

    Sometimes you don't want to use the latest patches, but you'd like to control which patches are get installed instead. For example, you have tested the patch released on 25th of May 2018 and want to use that patch across all servers.

    You can do it by setting STICKY_PATCH=25052018 (DDMMYY format, ISO YYYY-MM-DD is also valid) in /etc/sysconfig/kcare/kcare.conf This guarantees that when kcarectl --update or kcarectl --auto-update is called, you will get patches from that date and not the newest patches.

    Alternatively, you can set STICKY_PATCH=KEY This way you can control the date from which patches will be applied using KernelCare keys in CLN. On update, the actual date will be retrieved from CLN (from Key settings) for the key used to register a particular server (not supported for IP based servers).

    This is very useful if you want to test patches in QA first and later roll them out to production without doing any changes on the systems.

    Here is how you can do that:

    • Set STICKY_PATCH=KEY on all your servers.
    • Register QA servers with one KEY, and Production servers with ANOTHER key.
    • Then, stop new updates for Production servers. In CLN set Sticky Tag to yesterday. You can do it by editing KEY in CLN in DDMMYY format.
    • Now, for example, let's use patches as of 03052018 (DDMMYY format). Set them for your QA server key. On the next auto-update, your QA servers will get those patches (auto-updates are typically every 4 hours).

    Once you are happy with this patches, set the same Sticky Tag for Production servers key. In 4 hours your production servers should be updated to the same patches that QA servers were.

    How to find a proper sticky patch name

    Let's assume that you have some kernel patch that you want to "stick" with. All you need is to find a proper label for that patch.

    sticky-proper-label

    As you can see, the patch was released at 2020-09-16. And if apply label's date format, it becomes 16092020 that will be the sticky patch value.

    Scanning for vulnerabilities

    Identifying the vulnerabilities that apply to your systems is an important task for IT and InfoSec teams, and at TuxCare we make it easy. KernelCare live patching is integrated natively with vulnerability scanners including Tenable Nessus, Qualys, Rapid7 and many others.

    Note

    A generic integration that works with any vulnerability scanner is available for environments that native integration may not be sufficient. Contact your account manager or sales@tuxcare.com for more information.

    How to use a vulnerability scanner with KernelCare

    It’s rather simple. New scan results after installing a package and applying a patchset should not show any kernel CVEs that are handled by KernelCare Enterprise.

    For example, Nessus for an old kernel shows a bunch of detected CVEs:

    After the live patches were applied, there are no kernel-related CVEs:

    How use OpenSCAP with KernelCare

    OpenSCAP is an open source vulnerability scanner and compliance tool and it can be used to scan a system protected by KernelCare Enterprise. The following commands show how to use OpenSCAP to produce a vulnerability report for a system.

    $ source /etc/os-release
    +

    Sticky patches

    Note

    This functionality is not available for ePortal customers. If you are using ePortal, please use Feeds instead.

    Note

    Since v2.82 there is more convenient way to specify latest available release via [AUTO_]STICKY_PATCHSET and [AUTO_]UPDATE_DELAY configuration options. It also works with recent ePortal versions (v2.3+).

    Sometimes you don't want to use the latest patches, but you'd like to control which patches are get installed instead. For example, you have tested the patch released on 25th of May 2018 and want to use that patch across all servers.

    You can do it by setting STICKY_PATCH=25052018 (DDMMYY format, ISO YYYY-MM-DD is also valid) in /etc/sysconfig/kcare/kcare.conf This guarantees that when kcarectl --update or kcarectl --auto-update is called, you will get patches from that date and not the newest patches.

    Alternatively, you can set STICKY_PATCH=KEY This way you can control the date from which patches will be applied using KernelCare keys in CLN. On update, the actual date will be retrieved from CLN (from Key settings) for the key used to register a particular server (not supported for IP based servers).

    This is very useful if you want to test patches in QA first and later roll them out to production without doing any changes on the systems.

    Here is how you can do that:

    • Set STICKY_PATCH=KEY on all your servers.
    • Register QA servers with one KEY, and Production servers with ANOTHER key.
    • Then, stop new updates for Production servers. In CLN set Sticky Tag to yesterday. You can do it by editing KEY in CLN in DDMMYY format.
    • Now, for example, let's use patches as of 03052018 (DDMMYY format). Set them for your QA server key. On the next auto-update, your QA servers will get those patches (auto-updates are typically every 4 hours).

    Once you are happy with this patches, set the same Sticky Tag for Production servers key. In 4 hours your production servers should be updated to the same patches that QA servers were.

    How to find a proper sticky patch name

    Let's assume that you have some kernel patch that you want to "stick" with. All you need is to find a proper label for that patch.

    sticky-proper-label

    As you can see, the patch was released at 2020-09-16. And if apply label's date format, it becomes 16092020 that will be the sticky patch value.

    Scanning for vulnerabilities

    Identifying the vulnerabilities that apply to your systems is an important task for IT and InfoSec teams, and at TuxCare we make it easy. KernelCare live patching is integrated natively with vulnerability scanners including Tenable Nessus, Qualys, Rapid7 and many others.

    Note

    A generic integration that works with any vulnerability scanner is available for environments that native integration may not be sufficient. Contact your account manager or sales@tuxcare.com for more information.

    How to use a vulnerability scanner with KernelCare

    It’s rather simple. New scan results after installing a package and applying a patchset should not show any kernel CVEs that are handled by KernelCare Enterprise.

    For example, Nessus for an old kernel shows a bunch of detected CVEs:

    After the live patches were applied, there are no kernel-related CVEs:

    How use OpenSCAP with KernelCare

    OpenSCAP is an open source vulnerability scanner and compliance tool and it can be used to scan a system protected by KernelCare Enterprise. The following commands show how to use OpenSCAP to produce a vulnerability report for a system.

    $ source /etc/os-release
     $ wget https://patches.kernelcare.com/oval/com.kernelcare.${ID}.${VERSION_ID}.xml
     $ oscap oval eval --report report.htm com.kernelcare.${ID}.${VERSION_ID}.xml
     

    How to natively integrate KernelCare with a vulnerability scanner

    Note

    These instructions are intended for integrators with 3rd party vulnerability scanners.

    There are two ways for a vulnerability scanner to integrate with KernelCare live patching.

    Integrate via OVAL data

    KernelCare comes with OVAL data that provide the instructions to the scanner to identify the vulnerabilities that are addressed by the installed live patches. OVAL data are available for the operating systems supported by KernelCare Enterprise, including AlmaLinux, Red Hat Enterprise Linux, Oracle Linux, CentOS, Debian and Ubuntu.

    The OVAL data cover all KernelCare enterprise products and add-ons including LibCare, and QEMUCare.

    The OVAL data for KernelCare live patching are available at patches.kernelcare.com/oval.

    Integrate using files

    KernelCare provides two files that list the vulnerabilities that are addressed by the currently installed live patches. These files contain a list of CVEs separated by a newline.

    The list of vulnerabilities addressed by Kernel live patches is available at:

    • /proc/kcare/cvelist

    The list of vulnerabilities addressed by system live patching (LibCare, QEMUCare etc.) is available at:

    • /var/cache/kcare/libcare_cvelist

    UEFI Secure Boot Support

    Note

    This feature is an early stage of adoption. Not all the distribution will be able to support.

    This new functionality lets KernelCare work on systems with secure boot set up in their UEFI firmware. We are going to add a public certificate to the MOK (Machine Owner Keys) database that KernelCare will use to sign modules.

    The latest KernelCare package contains a public certificate and will be available in the /usr/libexec/kcare/kernelcare_pub.der. For older versions, it could be downloaded from the https://patches.kernelcare.com/kernelcare_pub.der to that location.

    For example:

    curl -o /usr/libexec/kcare/kernelcare_pub.der https://patches.kernelcare.com/kernelcare_pub.der
    @@ -267,6 +267,6 @@
     

    Security scanners can check if the file is present, and if it is, use it instead of /proc/version to identify the kernel. This will provide an effective kernel version from a security standpoint.

    Alternatively, the command /usr/bin/kcarectl --uname can be run instead of the uname command to detect effective kernel version

    Comprehensive: Using OVAL data

    KernelCare comes with OVAL data that provides instructions to the scanner to identify the vulnerabilities addressed by the installed live patches. OVAL data are available for the operating systems supported by KernelCare Enterprise, including AlmaLinux, Red Hat Enterprise Linux, Oracle Linux, CentOS, Debian, and Ubuntu.

    The OVAL data cover all KernelCare enterprise products and add-ons, including LibCare and QEMUCare.

    The OVAL data for KernelCare live patching are available at patches.kernelcare.com/oval.

    Comprehensive & local: Using the local CVELIST file on each scanned node

    KernelCare provides two files listing the vulnerabilities the currently installed live patches address. These files contain a list of CVEs separated by a new line.

    The list of vulnerabilities addressed by Kernel live patches is available at:

    /proc/kcare/cvelist
     

    The list of vulnerabilities addressed by system live patching (LibCare, QEMUCare, etc.) is available at:

    /var/cache/kcare/libcare_cvelist
     
    - + diff --git a/service-descriptions/index.html b/service-descriptions/index.html index 515e8255..9e8fe997 100644 --- a/service-descriptions/index.html +++ b/service-descriptions/index.html @@ -39,10 +39,10 @@ })(); Service Descriptions - +
    sidebar hamburger menu

    Service Descriptions

    Essential and Enhanced Support

    The description of Essential and Enhanced Support for AlmaLinux systems can be found here.

    Technical Account Manager

    Technical Account Manager (TAM)

    A Technical Account Manager (TAM) is an extension to TuxCare products to enhance product and support experience.

    • TuxCare provides a technical account manager who can perform the following tasks for up to 8 hours per week.
    • Provides best-in-practice configuration assistance.
    • Provides product presentation and training.
    • Participate in calls every other week identifying and addressing the customer's operational issues related to the TuxCare products.
    • Organise multi-vendor issue coordination through TuxCare's partners when applicable.
    • The TAM is available for customer requests during regular working hours for the TAM. Outside working hours support is provided through regular TuxCare support.

    Dedicated Technical Account Manager (dTAM)

    A dedicated Technical Account Manager (dTAM) is an extension to TuxCare products to enhance the product and support experience.

    • TuxCare provides a dedicated technical account manager who can perform the following tasks for up to 40 hours per week.
    • Acts as a primary point of contact for all TuxCare product-related requests from the customer.
    • Provides best-in-practice configuration assistance.
    • Provides product presentation and training.
    • Can assume maintenance and configuration tasks of TuxCare products on the agreement.
    • Participate in calls every other week identifying and addressing the customer's operational issues related to the TuxCare products.
    • Organise multi-vendor issue coordination through TuxCare's partners when applicable.
    • Facilitate integration of customer's ticketing system with TuxCare's when applicable.
    • Attend applicable TuxCare training and development activities.
    • The dTAM is available for customer requests during regular working hours for the dTAM and is subject to TuxCare leave policies. Outside working hours support is provided through regular TuxCare support.
    • The dTAM will visit the customer's site annually or twice per year according to the agreement.
    • If the dTAM is on annual leave for more than 5 consequent days, TuxCare will assign a temporary account manager.
    - + diff --git a/tuxcare-cln/index.html b/tuxcare-cln/index.html index 41129324..7fcf51d3 100644 --- a/tuxcare-cln/index.html +++ b/tuxcare-cln/index.html @@ -39,10 +39,10 @@ })(); Subscription management portal - +
    sidebar hamburger menu

    Subscription management portal

    The TuxCare subscription management portal is designed to easily manage your licenses of TuxCare products and services by means of a user-friendly interface.

    Introduction

    The following are available in TuxCare portal:

    • Add, delete and edit licenses
    • Add, delete and edit servers
    • Choose payment methods and buy licenses
    • Track all the associated costs

    Create new account

    If you are a first time user, go to https://portal.tuxcare.com and fill in the simple registration form to create your account. You will find your login and password in your welcome email.

    Log in

    Go to https://portal.tuxcare.com and sign in with your credentials.

    Dashboard

    Dashboard helps quickly navigate to your Products. It has the following tabs:

    Products

    Click Dashboard. You will be redirected to the My Products page.

    The following actions are available:

    • Manage licenses and billing cycle. Click the link to contact our Sales team to change license quantity and product quota, and to manage the billing cycle.
    • Manage activation keys. Shortcut to the Extended Support Services | Activation Keys page.

    Servers

    Click Dashboard → Servers to go to All Servers page. A list of all servers with installed products belonged to this account is available.

    The table includes all servers that have been activated in all products within the account. The table contains the following columns:

    • Server name — server hostname
    • IP — server IP address
    • Registered — a date when a server was activated. A server sends this information to TuxCare portal
    • Group – server group (please refer to the TuxCare portal documentation to find more information about server group)
    • Installed products — shows a logo of a product activated on a server
    • Actions
      • To remove an item, click on

    Click the server name to show server details:

    • Installed products – the full name of the installed products
    • Last check-in — the last date when a server successfully responded to check-in

    The following filters are available:

    • Product — click Product button and select one or more products
    • Registered date — click Registered date to display a calendar where you can pick a date or a period to filter by
    • Search — type a query. A search is performed in Server name and Activation key entities

    Live Patching Services

    Click Live Patching Services You will be redirected to the Server License Types page.

    Here you can see the number of server licenses and manage licenses and billing cycle by contacting TuxCare Sales team.

    Extended Support Services

    Click Extended Support Services You will be redirected to the Server License Types page.

    Server License Types

    Here you can see the the number of server licenses for each product.

    Activation Keys

    Click Extended Support Services → Activation Keys. You will be redirected to the Activation Keys page.

    Activation Key is a string of numbers and letters used to activate a product.

    The table includes all activation keys for all products within the account. The table contains the following columns:

    • Activation key – is a string of numbers and letters used to activate a product
    • License type — a type of server license that is used and determines a limit of server users
    • Note — any information you’ve added to this activation key
    • Servers (used/limits) – a number of servers that have already been activated with this key (used) and a total number of servers that can be registered with this particular key (limits)
    • Tick – tick an activation key or keys to perform a remove action (use )

    Note

    The default activation key cannot be deleted.

    The following filters are available:

    • Server limits — filter by server limit/unlimited
    • License type — filter by license type

    Click an activation key to go to this Activation Key Details page.

    Activation Keys by product

    Click Extended Support Services → Activation Keys → Product. You will be redirected to the Product Activation Keys page.

    • If there are no activation keys for the product, you can create one by clicking the Create activation key.
    • If there is the default activation key for the product, you can generate a new one by clicking the Generate new activation key. A new key will be created automatically and added to the table.
    • You can copy an activation key by clicking Copy.

    The table includes all activation keys for the product. The table contains the following columns:

    • Activation key – is a string of numbers and letters used to activate a product
    • Note — any information you’ve added to this activation key
    • Servers (used/limits) – a number of servers that have already been activated with this key (used) and a total number of servers that can be registered with this particular key (limits)

    To remove a key, select it and click .

    The following filters are available:

    • Server limits — filter by server limit/unlimited
    • Search

    Click a key to go to the Activation Key Details page for this key.

    Activation Key Details

    Here you can:

    • See the activation key complete information
    • Edit key. Click Edit key
    • Remove key. Click
    • Review Servers List

    The table includes all servers registered with the key. The table contains the following columns:

    • Server name — server hostname
    • IP — server IP address
    • Registered — a date when a server was activated. A server sends this information to TuxCare portal
    • Last check-in — the last date when a server successfully responded to check-in

    The following filters are available:

    • Server limits — filter by server limit/unlimited
    • Search field

    Servers

    Click Extended Support Services → Servers. You will be redirected to the Servers page.

    The table includes all servers activated for all products within Extended Lifecycle Support. The table contains the following columns:

    • Server name — server hostname
    • IP — server IP address
    • Registered — a date when a server was activated. A server sends this information to TuxCare portal
    • Installed products — shows a logo of a product activated on a server
    • Actions
      • To remove an item, click on

    Click the server name to show server details:

    • Installed products – the full name of the installed products
    • Last check-in — the last date when a server successfully responded to check-in

    The following filters are available:

    • Product — click Product button and select one or more products
    • Registered date — click Registered date to display a calendar where you can pick a date or a period to filter by
    • Search — type a query

    Servers by product

    Click Extended Support Services → Servers → Product. You will be redirected to the Product Servers page.

    The table includes all servers activated for the product within Extended Lifecycle Support. The table contains the following columns:

    • Server name — server hostname
    • IP — server IP address
    • Registered — a date when a server was activated. A server sends this information to TuxCare portal
    • Installed products — shows a logo of a product activated on a server
    • Actions
      • To remove an item, click on

    Click the server name to show server details:

    • Installed products – the full name of the installed products
    • Last check-in — the last date when a server successfully responded to check-in

    The following filters are available:

    • Registered date — click Registered date to display a calendar where you can pick a date or a period to filter by
    • Search — type a query

    You can download the servers list by clicking the Get servers list.

    Billing

    Balance and Top up

    Click Billing, you will be redirected to the Balance and Top up page.

    Here you find the following:

    • your current plan and prices
    • your balance

    You can top up your account by entering the amount and clicking Top up.

    Payment methods

    Click Billing → Payment methods, you will be redirected to the Payment methods page.

    The following tabs are available:

    • Billing information
    • Payment methods
    • Autopayment

    Billing information

    Here, you can change your email for billing. Click Save to apply changes.

    Payment methods

    Here, you can manage your payment method. Click Save to apply changes.

    Autopayment

    Here, you can change your autopayment type:

    • Auto add funds
    • Auto repay
    • Do not add funds automatically

    Click Save to apply changes.

    Invoices

    The table contains the followings columns:

    • Invoice id – unique invoice number
    • Created — invoice issue date.
    • Type – type of payment: invoice or payment received
    • Pay period – the start date of the period for which the invoice was issued
    • Total — a total amount received/need to pay
    • Balance – the current balance
    • Actions — the following actions are available:
      • View invoice — click to view invoice in-details. It opens in a new popup.
      • Download invoice — click to download an invoice.

    Click to view the invoice details.

    Settings

    To go to account details, click User icon → Settings in the top right corner. You will be redirected to the Account details page.

    Account details

    The following tabs are available:

    • Personal information
    • Company information
    • Billing contact information

    Personal information

    All fields marked * are required.

    • API secret key – use this key with TuxCare portal API
    • IM Upgrade URL – URL for upgrade Imunify products if it is not the default one

    To change the password, click Change password.

    To enable two-factor authentication, move the slider to On.

    Click Save to apply changes.

    Company information

    Click Save to apply changes.

    Billing contact information

    Click Save to apply changes.

    Account sublogins

    You can create additional logins for your account in the form of the email address. The sub login can have any role with different permissions listed below. A master Server Administrator account has the full scope of permissions; this role can create account sub logins.

    Click Save to apply changes.

    Roles

    Full Access/Admin

    • View products
    • View servers/licenses information
    • Reporting
    • Add/delete servers
    • Create activation keys
    • Order/delete licenses
    • View invoices
    • View billing information
    • Edit credit cards information
    • Edit account information
    • Edit billing information/top up for reseller
    • View prices
    • View account information
    • Change password

    Billing

    • View products
    • View server's/licenses information
    • View invoices
    • View billing information
    • Edit credit cards information
    • Edit account information
    • Edit billing information/top up for reseller
    • View prices
    • View account information

    Server and License Management

    • View products
    • View server's/licenses information
    • Reporting
    • Add/delete servers
    • Create activation keys
    • Order/delete licenses

    Server Management Only

    • View products
    • View server's/licenses information
    • Reporting
    • Add/delete servers
    • Create activation keys

    Read Only — Billing

    • View products
    • View server's/licenses information
    • Reporting
    • View invoices
    • View billing information

    Read Only — Server Management

    • View products
    • View server's/licenses information
    • Reporting

    Reports

    It is possible to set reports receiving for an account to the desired email address.

    To add a new report configuration, click Add config.

    - + diff --git a/tuxcare/index.html b/tuxcare/index.html index eef213f0..3956a858 100644 --- a/tuxcare/index.html +++ b/tuxcare/index.html @@ -39,10 +39,10 @@ })(); TuxCare - +
    sidebar hamburger menu

    TuxCare

    The TuxCare services automate, simplify, and enhance Linux operations, giving organizations more flexibility in managing Linux distro choices and versions, significant maintenance cost reductions, and greatly enhanced security and compliance postures.

    TuxCare, which is an expansion of the CloudLinux’s KernelCare and Extended Lifecycle Support brands, helps organizations take care of support, maintenance, and security for Enterprise Linux systems.

    With TuxCare Live Patching Services, Linux kernels, libraries, databases, virtualizations and IoT devices receive automated security patches applied with zero downtime.

    Using the TuxCare Extended Lifecycle Support services, you can migrate to the newest version of Linux at your own pace while maintaining protection from the common risks of running an end-of-life distro.

    Enterprise Support for AlmaLinux provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.

    TuxCare provides the AlmaLinux community with FIPS 140-3 certification for AlmaLinux 9.2. Organizations requiring FIPS-certified AlmaLinux deployments or those operating under compliance regimes with similar requirements (e.g., PCI DSS, HIPAA) can download and install FIPS-validated cryptographic packages for AlmaLinux 9.2 (including the kernel and OpenSSL) for free.

    - +