diff --git a/404.html b/404.html index 8fd37512..8df8252a 100644 --- a/404.html +++ b/404.html @@ -39,10 +39,10 @@ })(); - +
- + diff --git a/assets/app-da86d7d0.js b/assets/app-7fa9642d.js similarity index 67% rename from assets/app-da86d7d0.js rename to assets/app-7fa9642d.js index cb17b73a..ef57cc39 100644 --- a/assets/app-da86d7d0.js +++ b/assets/app-7fa9642d.js @@ -1,3 +1,3 @@ -import{d as T,r as k,a as at,b as rt,i as se,c as it,e as lt,f as nt,g as ve,h as ct,j as ut,o as J,k as E,l as z,m as C,_ as A,n,p as d,q as p,u as w,t as V,F as I,s as B,v as L,w as j,x as me,y as _e,R as dt,z as O,A as W,B as D,T as de,C as S,D as re,E as ie,G as pt,H as N,I as q,J as M,K as ue,L as ye,M as ht,N as Y,O as Q,P,Q as ft,S as G,U as Be,V as oe,W as vt,X as mt,Y as _t,Z as gt,$ as He,a0 as bt,a1 as yt,a2 as wt,a3 as St,a4 as Lt,a5 as Ot,a6 as Et}from"./framework-0ba8e1ea.js";const Dt="modulepreload",$t=function(e){return"/"+e},Ve={},b=function(t,s,o){if(!s||s.length===0)return t();const a=document.getElementsByTagName("link");return Promise.all(s.map(r=>{if(r=$t(r),r in Ve)return;Ve[r]=!0;const i=r.endsWith(".css"),l=i?'[rel="stylesheet"]':"";if(!!o)for(let f=a.length-1;f>=0;f--){const _=a[f];if(_.href===r&&(!i||_.rel==="stylesheet"))return}else if(document.querySelector(`link[href="${r}"]${l}`))return;const u=document.createElement("link");if(u.rel=i?"stylesheet":Dt,i||(u.as="script",u.crossOrigin=""),u.href=r,document.head.appendChild(u),i)return new Promise((f,_)=>{u.addEventListener("load",f),u.addEventListener("error",()=>_(new Error(`Unable to preload CSS for ${r}`)))})})).then(()=>t())},Le={"v-8daa1a0e":()=>b(()=>import("./index.html-e8171bcc.js"),[]).then(({data:e})=>e),"v-b0d2ea62":()=>b(()=>import("./index.html-c0adceea.js"),[]).then(({data:e})=>e),"v-89bfb992":()=>b(()=>import("./index.html-1599dadb.js"),[]).then(({data:e})=>e),"v-1b6f4a0a":()=>b(()=>import("./index.html-ae0b2092.js"),[]).then(({data:e})=>e),"v-6c1fb884":()=>b(()=>import("./index.html-8c322342.js"),[]).then(({data:e})=>e),"v-cadd6498":()=>b(()=>import("./index.html-3b4a4f38.js"),[]).then(({data:e})=>e),"v-2d0a9a10":()=>b(()=>import("./index.html-092f14d9.js"),[]).then(({data:e})=>e),"v-33720eeb":()=>b(()=>import("./index.html-e1c111f0.js"),[]).then(({data:e})=>e),"v-37e5fb86":()=>b(()=>import("./index.html-b10d24f8.js"),[]).then(({data:e})=>e),"v-534e2916":()=>b(()=>import("./index.html-5fda4ef8.js"),[]).then(({data:e})=>e),"v-c271a6b2":()=>b(()=>import("./index.html-448a5efa.js"),[]).then(({data:e})=>e),"v-2f5e7500":()=>b(()=>import("./index.html-6c9650cc.js"),[]).then(({data:e})=>e),"v-1f847a28":()=>b(()=>import("./index.html-55653af3.js"),[]).then(({data:e})=>e),"v-ec0cad0c":()=>b(()=>import("./index.html-d924646e.js"),[]).then(({data:e})=>e),"v-52e27964":()=>b(()=>import("./index.html-71fb4d10.js"),[]).then(({data:e})=>e),"v-c05bf2be":()=>b(()=>import("./index.html-bfb306f5.js"),[]).then(({data:e})=>e),"v-3d707372":()=>b(()=>import("./index.html-04265117.js"),[]).then(({data:e})=>e),"v-7d514c7d":()=>b(()=>import("./index.html-c09eba5b.js"),[]).then(({data:e})=>e),"v-50c7132c":()=>b(()=>import("./index.html-45ca0bbf.js"),[]).then(({data:e})=>e),"v-fd036ae2":()=>b(()=>import("./index.html-070c63b3.js"),[]).then(({data:e})=>e),"v-03bf6597":()=>b(()=>import("./index.html-270136ce.js"),[]).then(({data:e})=>e),"v-b8319282":()=>b(()=>import("./index.html-e424f433.js"),[]).then(({data:e})=>e),"v-3706649a":()=>b(()=>import("./404.html-e0575d4e.js"),[]).then(({data:e})=>e)},Vt=JSON.parse(`{"base":"/","lang":"en-US","title":"","description":"","head":[["script",{"type":"text/javascript","charset":"UTF-8","src":"//cdn.cookie-script.com/s/c9f81de32507a4fec1eb03ee80d0f0ed.js"}],["script",{"type":"text/javascript","id":"hs-script-loader","async":true,"defer":true,"src":"//js.hs-scripts.com/5408110.js"}],["script",{},"\\n (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':\\n new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],\\n j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src=\\n 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);\\n })(window,document,'script','dataLayer','GTM-5BSW555');\\n "],["script",{},"\\n (function() {\\n var routes = {\\"/almacare/\\":\\"/enterprise-support-for-almalinux/\\",\\"/service-descriptions/#almacare\\":\\"/enterprise-support-for-almalinux/#essential-and-enhanced-support\\",\\"/eportal/#almacare-cybersecurity-patch-management\\":\\"/eportal/#live-patching-for-almalinux-kernelcare-and-libcare-management\\",\\"/eportal/#deploying-almacare-almacare-cybersecurity\\":\\"/eportal/#deploying-essential-support-live-patching-for-almalinux\\"};\\n \\n for (var route_url in routes) {\\n if (window.location.href.indexOf(route_url) !== -1) {\\n window.location.href = routes[route_url];\\n }\\n }\\n })();\\n "],["script",{},"\\n (function() {\\n // Trigger the scroll event without actually scrolling\\n function triggerScrollEvent() {\\n const targetElement = window;\\n const scrollEvent = new Event('scroll', {\\n bubbles: true,\\n cancelable: true,\\n });\\n targetElement.dispatchEvent(scrollEvent);\\n }\\n \\n // Call the triggerScrollEvent and scrollBodyDown functions after the page is fully loaded\\n window.addEventListener('load', () => {\\n triggerScrollEvent();\\n });\\n })();\\n "]],"locales":{}}`),je={"v-8daa1a0e":T(()=>b(()=>import("./index.html-5be4a58a.js"),["assets/index.html-5be4a58a.js","assets/framework-0ba8e1ea.js"])),"v-b0d2ea62":T(()=>b(()=>import("./index.html-67164235.js"),["assets/index.html-67164235.js","assets/framework-0ba8e1ea.js"])),"v-89bfb992":T(()=>b(()=>import("./index.html-e90bc61c.js"),["assets/index.html-e90bc61c.js","assets/sso_eportal-cc19d109.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-1b6f4a0a":T(()=>b(()=>import("./index.html-8e531858.js"),["assets/index.html-8e531858.js","assets/framework-0ba8e1ea.js"])),"v-6c1fb884":T(()=>b(()=>import("./index.html-fce30280.js"),["assets/index.html-fce30280.js","assets/framework-0ba8e1ea.js"])),"v-cadd6498":T(()=>b(()=>import("./index.html-eb566cba.js"),["assets/index.html-eb566cba.js","assets/framework-0ba8e1ea.js"])),"v-2d0a9a10":T(()=>b(()=>import("./index.html-84b523eb.js"),["assets/index.html-84b523eb.js","assets/framework-0ba8e1ea.js"])),"v-33720eeb":T(()=>b(()=>import("./index.html-f8b8c896.js"),["assets/index.html-f8b8c896.js","assets/framework-0ba8e1ea.js"])),"v-37e5fb86":T(()=>b(()=>import("./index.html-4de0b0ec.js"),["assets/index.html-4de0b0ec.js","assets/uchecker-31d683fa.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-534e2916":T(()=>b(()=>import("./index.html-777885c8.js"),["assets/index.html-777885c8.js","assets/framework-0ba8e1ea.js"])),"v-c271a6b2":T(()=>b(()=>import("./index.html-822dc78a.js"),["assets/index.html-822dc78a.js","assets/framework-0ba8e1ea.js"])),"v-2f5e7500":T(()=>b(()=>import("./index.html-c2cc080f.js"),["assets/index.html-c2cc080f.js","assets/framework-0ba8e1ea.js"])),"v-1f847a28":T(()=>b(()=>import("./index.html-f2b36c2b.js"),["assets/index.html-f2b36c2b.js","assets/reports-c7f76afe.js","assets/framework-0ba8e1ea.js"])),"v-ec0cad0c":T(()=>b(()=>import("./index.html-ace5d406.js"),["assets/index.html-ace5d406.js","assets/framework-0ba8e1ea.js"])),"v-52e27964":T(()=>b(()=>import("./index.html-527a5e84.js"),["assets/index.html-527a5e84.js","assets/sso_eportal-cc19d109.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-c05bf2be":T(()=>b(()=>import("./index.html-1738772c.js"),["assets/index.html-1738772c.js","assets/framework-0ba8e1ea.js"])),"v-3d707372":T(()=>b(()=>import("./index.html-3e49682f.js"),["assets/index.html-3e49682f.js","assets/framework-0ba8e1ea.js"])),"v-7d514c7d":T(()=>b(()=>import("./index.html-815d4f25.js"),["assets/index.html-815d4f25.js","assets/framework-0ba8e1ea.js"])),"v-50c7132c":T(()=>b(()=>import("./index.html-84c31207.js"),["assets/index.html-84c31207.js","assets/framework-0ba8e1ea.js"])),"v-fd036ae2":T(()=>b(()=>import("./index.html-862975e7.js"),["assets/index.html-862975e7.js","assets/uchecker-31d683fa.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-03bf6597":T(()=>b(()=>import("./index.html-9a9ef1ef.js"),["assets/index.html-9a9ef1ef.js","assets/framework-0ba8e1ea.js"])),"v-b8319282":T(()=>b(()=>import("./index.html-c0147096.js"),["assets/index.html-c0147096.js","assets/reports-c7f76afe.js","assets/framework-0ba8e1ea.js"])),"v-3706649a":T(()=>b(()=>import("./404.html-3b82156f.js"),["assets/404.html-3b82156f.js","assets/framework-0ba8e1ea.js"]))};var kt=Symbol(""),xt=k(Le),Fe=at({key:"",path:"",title:"",lang:"",frontmatter:{},headers:[]}),X=k(Fe),Z=()=>X,We=Symbol(""),ne=()=>{const e=C(We);if(!e)throw new Error("usePageFrontmatter() is called without provider.");return e},Ne=Symbol(""),At=()=>{const e=C(Ne);if(!e)throw new Error("usePageHead() is called without provider.");return e},Tt=Symbol(""),Ge=Symbol(""),Ke=()=>{const e=C(Ge);if(!e)throw new Error("usePageLang() is called without provider.");return e},qe=Symbol(""),Pt=()=>{const e=C(qe);if(!e)throw new Error("usePageLayout() is called without provider.");return e},Ue=Symbol(""),ze=()=>{const e=C(Ue);if(!e)throw new Error("useRouteLocale() is called without provider.");return e},le=k(Vt),Ct=Symbol(""),Rt=Symbol(""),It="Layout",Mt="NotFound",U=rt({resolveLayouts:e=>e.reduce((t,s)=>({...t,...s.layouts}),{}),resolvePageData:async e=>{const t=xt.value[e];return await(t==null?void 0:t())??Fe},resolvePageFrontmatter:e=>e.frontmatter,resolvePageHead:(e,t,s)=>{const o=se(t.description)?t.description:s.description,a=[...it(t.head)?t.head:[],...s.head,["title",{},e],["meta",{name:"description",content:o}]];return lt(a)},resolvePageHeadTitle:(e,t)=>[e.title,t.title].filter(s=>!!s).join(" | "),resolvePageLang:e=>e.lang||"en",resolvePageLayout:(e,t)=>{let s;if(e.path){const o=e.frontmatter.layout;se(o)?s=o:s=It}else s=Mt;return t[s]},resolveRouteLocale:(e,t)=>nt(e,t),resolveSiteLocaleData:(e,t)=>({...e,...e.locales[t]})}),Bt=ve({name:"ClientOnly",setup(e,t){const s=k(!1);return J(()=>{s.value=!0}),()=>{var o,a;return s.value?(a=(o=t.slots).default)==null?void 0:a.call(o):null}}}),Ht=ve({name:"Content",props:{pageKey:{type:String,required:!1,default:""}},setup(e){const t=Z(),s=E(()=>je[e.pageKey||t.value.key]);return()=>s.value?z(s.value):z("div","404 Not Found")}}),jt=(e={})=>e,F=e=>ct(e)?e:`/${ut(e)}`;const Ft={enhance:({app:e})=>{}};function Wt(e){return{all:e=e||new Map,on:function(t,s){var o=e.get(t);o?o.push(s):e.set(t,[s])},off:function(t,s){var o=e.get(t);o&&(s?o.splice(o.indexOf(s)>>>0,1):e.set(t,[]))},emit:function(t,s){var o=e.get(t);o&&o.slice().map(function(a){a(s)}),(o=e.get("*"))&&o.slice().map(function(a){a(t,s)})}}}const Nt={class:"footer__img"},Gt=["href"],Kt=["src","alt"],qt={class:"footer-company-title"},Ut={class:"social"},zt={class:"social_links"},Jt=["href"],Xt={class:"footer-social-text"},Yt={class:"social-icons-wrapper"},Qt=["href"],Zt=["src"],es={__name:"Footer",setup(e){const{social:t,cloudlinuxSite:s,footerCustomLogo:o,footerCustomAltText:a,locales:r}=C("themeConfig"),i=ne(),l=E(()=>new Date().getFullYear()),c=E(()=>i.value.layout==="HomeLayout");return(u,f)=>(n(),d("div",{class:j(["footer",{"footer-default-layout":!c.value}])},[p("div",Nt,[p("a",{href:w(s)},[p("img",{src:w(F)(w(o)),alt:w(a)},null,8,Kt)],8,Gt)]),p("div",qt,V(l.value)+". CloudLinux Inc ",1),p("div",Ut,[p("div",zt,[(n(!0),d(I,null,B(w(r).bottomLinks,_=>(n(),d("a",{href:_.url,target:"_blank"},V(_.text),9,Jt))),256))]),p("span",Xt,V(w(r).stayInTouch),1),p("div",Yt,[(n(!0),d(I,null,B(w(t),_=>(n(),d("a",{class:"social-icons-link",href:_==null?void 0:_.url,target:"_blank"},[_.icon?(n(),d("img",{key:0,class:"social-icons-link-img",src:w(F)(_==null?void 0:_.icon),alt:"footer logo"},null,8,Zt)):L("v-if",!0)],8,Qt))),256))])])],2))}},pe=A(es,[["__scopeId","data-v-0190e83e"],["__file","Footer.vue"]]),Je={"/enterprise-support-for-almalinux/":[{collapsable:!1,children:["/enterprise-support-for-almalinux/","/enterprise-support-for-almalinux/fips/"]}],"/eportal/":[{collapsable:!1,children:["/eportal/","/eportal/general"]}],"/eportal-api/":[{collapsable:!1,children:["/eportal-api/"]}],"/extended-lifecycle-support/":[{collapsable:!1,children:["/extended-lifecycle-support/"]}],"/extended-lifecycle-support-for-languages/":[{collapsable:!1,children:["/extended-lifecycle-support-for-languages/"]}],"/jp/":[{collapsable:!1,children:["/jp/","/jp/eportal","/jp/eportal-api","/jp/extended-lifecycle-support","/jp/extended-lifecycle-support-for-languages","/jp/linux-support-services","/jp/live-patching-services","/jp/tuxcare","/jp/tuxcare-cln"]}],"/kernelcare-for-iot/":[{collapsable:!1,children:["/kernelcare-for-iot/"]}],"/live-patching-services/":[{collapsable:!1,children:["/live-patching-services/"]}],"/service-descriptions/":[{collapsable:!1,children:["/service-descriptions/"]}],"/tuxcare/":[{collapsable:!1,children:["/tuxcare/"]}],"/tuxcare-cln/":[{collapsable:!1,children:["/tuxcare-cln/"]}]},Oe=/#.*$/,ts=/\.(md|html)$/,te=/\/$/,we=/^(https?:|mailto:|tel:)/;function ae(e){return decodeURI(e).replace(Oe,"").replace(ts,"")}function ss(e){const t=e==null?void 0:e.match(Oe);if(t)return t[0]}function os(e){return we.test(e)}function as(e){if(os(e))return e;const t=e==null?void 0:e.match(Oe),s=t?t[0]:"",o=ae(e);return te.test(o)?e:o+".html"+s}function he(e,t){const s=e.hash,o=ss(t);if(o&&s!==o)return!1;const a=ae(e.path),r=ae(t);return a===r}function fe(e,t,s){s&&(t=rs(t,s));const o=ae(t);for(let a=0;aYe(r,s,o)):[]}function is(e){e=e.map(s=>Object.assign({},JSON.parse(JSON.stringify(s))));let t;return e.forEach(s=>{s.level!==1?t=s:t&&(t.children||(t.children=[])).push(s)}),e.filter(s=>s.level!==1)}function ls(e,t){if(Array.isArray(t))return{base:"/",config:t};for(const s in t)if(ns(e.path).indexOf(s)===0)return{base:s,config:t[s]};return null}function ns(e){return/(\.html|\/)$/.test(e)?e:e+"/"}function Ye(e,t,s,o){if(typeof e=="string")return fe(t,e,s);if(Array.isArray(e))return Object.assign(fe(t,e[0],s),{title:e[1]});{o&&console.error("[vuepress] Nested sidebar groups are not supported. Consider using navbar + categories instead.");const a=e.children||[];return{type:"group",title:e.title,children:a.map(r=>Ye(r,t,s,!0)),collapsable:e.collapsable!==!1}}}const cs={functional:!0,props:["item","closeSidebarDrawer"],render({item:e,closeSidebarDrawer:t}){var f,_;if(!e)return;const s=Z(),o=me(),a=_e(),r=he(o,e==null?void 0:e.path),i=(e==null?void 0:e.type)==="auto"?r||e.children.some(g=>he(o,e.basePath+"#"+g.slug)):r,l=us(z,e==null?void 0:e.path,e.title||(e==null?void 0:e.path),i,e.headers,t,a),c=((f=s.value.frontmatter)==null?void 0:f.sidebarDepth)!=null?(_=s.value.frontmatter)==null?void 0:_.sidebarDepth:5,u=c??1;if((e==null?void 0:e.type)==="auto")return[l,Se(z,e.children,e.basePath,o,u,1,t)];if(e.headers&&e.headers.length){const g=is(e.headers);return[l,Se(z,g,e==null?void 0:e.path,o,u,1,t)]}return Ee(z,e==null?void 0:e.path,e.title||(e==null?void 0:e.path),i,e.children,0,t)}};function Ee(e,t,s,o,a,r=0,i){const l=e(dt,{"data-anchor":t,to:t,activeClass:"",exactActiveClass:"",class:{active:o,"sidebar-link":!0,["link-depth-level-"+r]:!0}},()=>[s]);return e("div",{class:{active:o,collapsed:!0,"sidebar-link-container":!!(a!=null&&a.length)},onClick:c=>{c.target.classList.toggle("collapsed"),c.target.tagName!=="DIV"&&i()}},[l])}function us(e,t,s,o,a,r,i){const l=!!a&&a.some(c=>c.level!==1);return e("div",{class:{active:o,collapsed:o,"sidebar-header":!0,"sidebar-link":!0,"sidebar-header--empty":!l},onClick:c=>{const u=c.target.classList,f=c.target.querySelector("a");u.toggle("collapsed"),f&&i.push(f.getAttribute("href"))}},[Ee(e,t,s,o,null,0,r)])}function Se(e,t,s,o,a,r=1,i){return!t||r>a?null:e("ul",{class:"sidebar-sub-headers"},t.map(l=>{const c=he(o,s+"#"+l.slug);return e("li",{class:{collapsible:r<3,"sidebar-sub-header":!0}},[Ee(e,s+"#"+l.slug,l.title,c,l.children,r,i),Se(e,l.children,s,o,a,r+1,i)])}))}const Qe=A(cs,[["__file","SidebarLink.vue"]]);const ds={__name:"DropdownTransition",setup(e){const t=o=>{o.style.height=o.scrollHeight+"px"},s=o=>{o.style.height=""};return(o,a)=>(n(),O(de,{name:"dropdown",onEnter:t,onAfterEnter:s,onBeforeLeave:t},{default:W(()=>[D(o.$slots,"default")]),_:3}))}},ps=A(ds,[["__file","DropdownTransition.vue"]]);const hs={key:0,ref:"items",class:"sidebar-group-items"},fs={__name:"SidebarGroup",props:{item:{type:Object,required:!0},first:{type:Boolean,required:!0},open:{type:Boolean,required:!0},collapsable:{type:Boolean,required:!0},closeSidebarDrawer:{type:Function,default:()=>{}}},setup(e){return(t,s)=>(n(),d("div",{class:j(["sidebar-group",{first:e.first,collapsable:e.collapsable}])},[S(ps,null,{default:W(()=>{var o;return[e.open||!e.collapsable?(n(),d("ul",hs,[(n(!0),d(I,null,B((o=e.item)==null?void 0:o.children,a=>(n(),d("li",null,[S(Qe,{closeSidebarDrawer:e.closeSidebarDrawer,item:a},null,8,["closeSidebarDrawer","item"])]))),256))],512)):L("v-if",!0)]}),_:1})],2))}},vs=A(fs,[["__file","SidebarGroup.vue"]]);const ms={class:"sidebar"},_s={key:0,class:"sidebar-links"},gs={__name:"Sidebar",props:{items:{type:Array,required:!0},closeSidebarDrawer:{type:Function,default:()=>{}},isMobileWidth:{type:Boolean}},setup(e){const t=e,s=E(()=>t.items),o=me(),a=Z(),r=E(()=>Xe(a.value,o,s.value)),i=k(0),l=()=>{const h=_(o,t.items);h>-1&&(i.value=h)},c=h=>{i.value=h===i.value?-1:h},u=h=>{const v=h.getBoundingClientRect();return v.top>=0&&v.left>=0&&v.bottom<=(window.innerHeight/2||document.documentElement.clientHeight/2)&&v.right<=(window.innerWidth||document.documentElement.clientWidth)};re(()=>o,l);const f=()=>{const h=document.querySelectorAll(".header-anchor"),v=document.querySelector(".sidebar"),m=v.querySelectorAll("a"),y=v.querySelectorAll(".collapsible.sidebar-sub-header"),x=Array.from(m).map($=>$.getAttribute("data-anchor"));h.forEach($=>{$.getAttribute("data-anchor")||$.setAttribute("data-anchor",a.value.path+$.hash)}),h.forEach($=>{if(u($)){const H=x.find(R=>R===$.getAttribute("data-anchor"));y.forEach(R=>{R.querySelectorAll(".sidebar-link-container").forEach(K=>{R.querySelector(`a[data-anchor="${H}"]`)?K.classList.remove("collapsed"):K.classList.add("collapsed")})}),v.querySelector(`a[data-anchor="${H}"]`)&&(m.forEach(R=>R.classList.remove("active")),v.querySelector(`a[data-anchor="${H}"]`).classList.add("active"))}})},_=(h,v)=>{for(let m=0;mhe(h,x.path)))return m}return-1},g=()=>{const h=window.location.hash,v=document.querySelectorAll(".sidebar a");v.forEach(m=>{if(m.getAttribute("data-anchor")===h){v.forEach(x=>x.classList.remove("active")),m.classList.add("active");const y=m.closest(".collapsible");y&&y.classList.remove("collapsed")}})};return J(()=>{l(),t.isMobileWidth||window.addEventListener("scroll",f),t.isMobileWidth||window.addEventListener("resize",f),window.addEventListener("hashchange",g)}),ie(()=>{window.removeEventListener("scroll",f),window.removeEventListener("resize",f),window.removeEventListener("hashchange",g)}),(h,v)=>(n(),d("div",ms,[D(h.$slots,"top"),r.value.length?(n(),d("ul",_s,[(n(!0),d(I,null,B(r.value,(m,y)=>(n(),d("li",{key:y},[m.type==="group"?(n(),O(vs,{key:0,item:m,first:y===0,open:y===i.value,closeSidebarDrawer:e.closeSidebarDrawer,collapsable:!!(m.collapsable||m.collapsible),onToggle:x=>c(y)},null,8,["item","first","open","closeSidebarDrawer","collapsable","onToggle"])):(n(),O(Qe,{key:1,closeSidebarDrawer:e.closeSidebarDrawer,item:m},null,8,["closeSidebarDrawer","item"]))]))),128))])):L("v-if",!0),D(h.$slots,"bottom")]))}},Ze=A(gs,[["__file","Sidebar.vue"]]);var bs=Object.defineProperty,ys=Object.defineProperties,ws=Object.getOwnPropertyDescriptors,ke=Object.getOwnPropertySymbols,Ss=Object.prototype.hasOwnProperty,Ls=Object.prototype.propertyIsEnumerable,xe=(e,t,s)=>t in e?bs(e,t,{enumerable:!0,configurable:!0,writable:!0,value:s}):e[t]=s,ee=(e,t)=>{for(var s in t||(t={}))Ss.call(t,s)&&xe(e,s,t[s]);if(ke)for(var s of ke(t))Ls.call(t,s)&&xe(e,s,t[s]);return e},Ae=(e,t)=>ys(e,ws(t));const Os={props:{autoscroll:{type:Boolean,default:!0}},watch:{typeAheadPointer(){this.autoscroll&&this.maybeAdjustScroll()},open(e){this.autoscroll&&e&&this.$nextTick(()=>this.maybeAdjustScroll())}},methods:{maybeAdjustScroll(){var e;const t=((e=this.$refs.dropdownMenu)==null?void 0:e.children[this.typeAheadPointer])||!1;if(t){const s=this.getDropdownViewport(),{top:o,bottom:a,height:r}=t.getBoundingClientRect();if(os.bottom)return this.$refs.dropdownMenu.scrollTop=t.offsetTop-(s.height-r)}},getDropdownViewport(){return this.$refs.dropdownMenu?this.$refs.dropdownMenu.getBoundingClientRect():{height:0,top:0,bottom:0}}}},Es={data(){return{typeAheadPointer:-1}},watch:{filteredOptions(){for(let e=0;e=0;e--)if(this.selectable(this.filteredOptions[e])){this.typeAheadPointer=e;break}},typeAheadDown(){for(let e=this.typeAheadPointer+1;e{const s=e.__vccOpts||e;for(const[o,a]of t)s[o]=a;return s},$s={},Vs={xmlns:"http://www.w3.org/2000/svg",width:"10",height:"10"},ks=p("path",{d:"M6.895455 5l2.842897-2.842898c.348864-.348863.348864-.914488 0-1.263636L9.106534.261648c-.348864-.348864-.914489-.348864-1.263636 0L5 3.104545 2.157102.261648c-.348863-.348864-.914488-.348864-1.263636 0L.261648.893466c-.348864.348864-.348864.914489 0 1.263636L3.104545 5 .261648 7.842898c-.348864.348863-.348864.914488 0 1.263636l.631818.631818c.348864.348864.914773.348864 1.263636 0L5 6.895455l2.842898 2.842897c.348863.348864.914772.348864 1.263636 0l.631818-.631818c.348864-.348864.348864-.914489 0-1.263636L6.895455 5z"},null,-1),xs=[ks];function As(e,t){return n(),d("svg",Vs,xs)}const Ts=De($s,[["render",As]]),Ps={},Cs={xmlns:"http://www.w3.org/2000/svg",width:"14",height:"10"},Rs=p("path",{d:"M9.211364 7.59931l4.48338-4.867229c.407008-.441854.407008-1.158247 0-1.60046l-.73712-.80023c-.407008-.441854-1.066904-.441854-1.474243 0L7 5.198617 2.51662.33139c-.407008-.441853-1.066904-.441853-1.474243 0l-.737121.80023c-.407008.441854-.407008 1.158248 0 1.600461l4.48338 4.867228L7 10l2.211364-2.40069z"},null,-1),Is=[Rs];function Ms(e,t){return n(),d("svg",Cs,Is)}const Bs=De(Ps,[["render",Ms]]),Te={Deselect:Ts,OpenIndicator:Bs},Hs={mounted(e,{instance:t}){if(t.appendToBody){const{height:s,top:o,left:a,width:r}=t.$refs.toggle.getBoundingClientRect();let i=window.scrollX||window.pageXOffset,l=window.scrollY||window.pageYOffset;e.unbindPosition=t.calculatePosition(e,t,{width:r+"px",left:i+a+"px",top:l+o+s+"px"}),document.body.appendChild(e)}},unmounted(e,{instance:t}){t.appendToBody&&(e.unbindPosition&&typeof e.unbindPosition=="function"&&e.unbindPosition(),e.parentNode&&e.parentNode.removeChild(e))}};function js(e){const t={};return Object.keys(e).sort().forEach(s=>{t[s]=e[s]}),JSON.stringify(t)}let Fs=0;function Ws(){return++Fs}const Ns={components:ee({},Te),directives:{appendToBody:Hs},mixins:[Os,Es,Ds],compatConfig:{MODE:3},emits:["open","close","update:modelValue","search","search:compositionstart","search:compositionend","search:keydown","search:blur","search:focus","search:input","option:created","option:selecting","option:selected","option:deselecting","option:deselected"],props:{modelValue:{},components:{type:Object,default:()=>({})},options:{type:Array,default(){return[]}},disabled:{type:Boolean,default:!1},clearable:{type:Boolean,default:!0},deselectFromDropdown:{type:Boolean,default:!1},searchable:{type:Boolean,default:!0},multiple:{type:Boolean,default:!1},placeholder:{type:String,default:""},transition:{type:String,default:"vs__fade"},clearSearchOnSelect:{type:Boolean,default:!0},closeOnSelect:{type:Boolean,default:!0},label:{type:String,default:"label"},autocomplete:{type:String,default:"off"},reduce:{type:Function,default:e=>e},selectable:{type:Function,default:e=>!0},getOptionLabel:{type:Function,default(e){return typeof e=="object"?e.hasOwnProperty(this.label)?e[this.label]:console.warn(`[vue-select warn]: Label key "option.${this.label}" does not exist in options object ${JSON.stringify(e)}. +import{d as T,r as k,a as at,b as rt,i as se,c as it,e as lt,f as nt,g as ve,h as ct,j as ut,o as J,k as E,l as z,m as C,_ as A,n,p as d,q as p,u as w,t as V,F as I,s as B,v as L,w as j,x as me,y as _e,R as dt,z as O,A as W,B as D,T as de,C as S,D as re,E as ie,G as pt,H as N,I as q,J as M,K as ue,L as ye,M as ht,N as Y,O as Q,P,Q as ft,S as G,U as Be,V as oe,W as vt,X as mt,Y as _t,Z as gt,$ as He,a0 as bt,a1 as yt,a2 as wt,a3 as St,a4 as Lt,a5 as Ot,a6 as Et}from"./framework-0ba8e1ea.js";const Dt="modulepreload",$t=function(e){return"/"+e},Ve={},b=function(t,s,o){if(!s||s.length===0)return t();const a=document.getElementsByTagName("link");return Promise.all(s.map(r=>{if(r=$t(r),r in Ve)return;Ve[r]=!0;const i=r.endsWith(".css"),l=i?'[rel="stylesheet"]':"";if(!!o)for(let f=a.length-1;f>=0;f--){const _=a[f];if(_.href===r&&(!i||_.rel==="stylesheet"))return}else if(document.querySelector(`link[href="${r}"]${l}`))return;const u=document.createElement("link");if(u.rel=i?"stylesheet":Dt,i||(u.as="script",u.crossOrigin=""),u.href=r,document.head.appendChild(u),i)return new Promise((f,_)=>{u.addEventListener("load",f),u.addEventListener("error",()=>_(new Error(`Unable to preload CSS for ${r}`)))})})).then(()=>t())},Le={"v-8daa1a0e":()=>b(()=>import("./index.html-e8171bcc.js"),[]).then(({data:e})=>e),"v-89bfb992":()=>b(()=>import("./index.html-1599dadb.js"),[]).then(({data:e})=>e),"v-b0d2ea62":()=>b(()=>import("./index.html-c0adceea.js"),[]).then(({data:e})=>e),"v-1b6f4a0a":()=>b(()=>import("./index.html-ae0b2092.js"),[]).then(({data:e})=>e),"v-6c1fb884":()=>b(()=>import("./index.html-8c322342.js"),[]).then(({data:e})=>e),"v-cadd6498":()=>b(()=>import("./index.html-3b4a4f38.js"),[]).then(({data:e})=>e),"v-2d0a9a10":()=>b(()=>import("./index.html-092f14d9.js"),[]).then(({data:e})=>e),"v-33720eeb":()=>b(()=>import("./index.html-e1c111f0.js"),[]).then(({data:e})=>e),"v-37e5fb86":()=>b(()=>import("./index.html-f5c3f0ca.js"),[]).then(({data:e})=>e),"v-534e2916":()=>b(()=>import("./index.html-5fda4ef8.js"),[]).then(({data:e})=>e),"v-c271a6b2":()=>b(()=>import("./index.html-448a5efa.js"),[]).then(({data:e})=>e),"v-2f5e7500":()=>b(()=>import("./index.html-6c9650cc.js"),[]).then(({data:e})=>e),"v-1f847a28":()=>b(()=>import("./index.html-55653af3.js"),[]).then(({data:e})=>e),"v-ec0cad0c":()=>b(()=>import("./index.html-d924646e.js"),[]).then(({data:e})=>e),"v-52e27964":()=>b(()=>import("./index.html-71fb4d10.js"),[]).then(({data:e})=>e),"v-c05bf2be":()=>b(()=>import("./index.html-bfb306f5.js"),[]).then(({data:e})=>e),"v-3d707372":()=>b(()=>import("./index.html-04265117.js"),[]).then(({data:e})=>e),"v-7d514c7d":()=>b(()=>import("./index.html-c09eba5b.js"),[]).then(({data:e})=>e),"v-50c7132c":()=>b(()=>import("./index.html-45ca0bbf.js"),[]).then(({data:e})=>e),"v-fd036ae2":()=>b(()=>import("./index.html-070c63b3.js"),[]).then(({data:e})=>e),"v-03bf6597":()=>b(()=>import("./index.html-270136ce.js"),[]).then(({data:e})=>e),"v-b8319282":()=>b(()=>import("./index.html-e424f433.js"),[]).then(({data:e})=>e),"v-3706649a":()=>b(()=>import("./404.html-e0575d4e.js"),[]).then(({data:e})=>e)},Vt=JSON.parse(`{"base":"/","lang":"en-US","title":"","description":"","head":[["script",{"type":"text/javascript","charset":"UTF-8","src":"//cdn.cookie-script.com/s/c9f81de32507a4fec1eb03ee80d0f0ed.js"}],["script",{"type":"text/javascript","id":"hs-script-loader","async":true,"defer":true,"src":"//js.hs-scripts.com/5408110.js"}],["script",{},"\\n (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':\\n new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],\\n j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src=\\n 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);\\n })(window,document,'script','dataLayer','GTM-5BSW555');\\n "],["script",{},"\\n (function() {\\n var routes = {\\"/almacare/\\":\\"/enterprise-support-for-almalinux/\\",\\"/service-descriptions/#almacare\\":\\"/enterprise-support-for-almalinux/#essential-and-enhanced-support\\",\\"/eportal/#almacare-cybersecurity-patch-management\\":\\"/eportal/#live-patching-for-almalinux-kernelcare-and-libcare-management\\",\\"/eportal/#deploying-almacare-almacare-cybersecurity\\":\\"/eportal/#deploying-essential-support-live-patching-for-almalinux\\"};\\n \\n for (var route_url in routes) {\\n if (window.location.href.indexOf(route_url) !== -1) {\\n window.location.href = routes[route_url];\\n }\\n }\\n })();\\n "],["script",{},"\\n (function() {\\n // Trigger the scroll event without actually scrolling\\n function triggerScrollEvent() {\\n const targetElement = window;\\n const scrollEvent = new Event('scroll', {\\n bubbles: true,\\n cancelable: true,\\n });\\n targetElement.dispatchEvent(scrollEvent);\\n }\\n \\n // Call the triggerScrollEvent and scrollBodyDown functions after the page is fully loaded\\n window.addEventListener('load', () => {\\n triggerScrollEvent();\\n });\\n })();\\n "]],"locales":{}}`),je={"v-8daa1a0e":T(()=>b(()=>import("./index.html-5be4a58a.js"),["assets/index.html-5be4a58a.js","assets/framework-0ba8e1ea.js"])),"v-89bfb992":T(()=>b(()=>import("./index.html-e90bc61c.js"),["assets/index.html-e90bc61c.js","assets/sso_eportal-cc19d109.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-b0d2ea62":T(()=>b(()=>import("./index.html-67164235.js"),["assets/index.html-67164235.js","assets/framework-0ba8e1ea.js"])),"v-1b6f4a0a":T(()=>b(()=>import("./index.html-8e531858.js"),["assets/index.html-8e531858.js","assets/framework-0ba8e1ea.js"])),"v-6c1fb884":T(()=>b(()=>import("./index.html-fce30280.js"),["assets/index.html-fce30280.js","assets/framework-0ba8e1ea.js"])),"v-cadd6498":T(()=>b(()=>import("./index.html-eb566cba.js"),["assets/index.html-eb566cba.js","assets/framework-0ba8e1ea.js"])),"v-2d0a9a10":T(()=>b(()=>import("./index.html-84b523eb.js"),["assets/index.html-84b523eb.js","assets/framework-0ba8e1ea.js"])),"v-33720eeb":T(()=>b(()=>import("./index.html-f8b8c896.js"),["assets/index.html-f8b8c896.js","assets/framework-0ba8e1ea.js"])),"v-37e5fb86":T(()=>b(()=>import("./index.html-0f1aeece.js"),["assets/index.html-0f1aeece.js","assets/uchecker-31d683fa.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-534e2916":T(()=>b(()=>import("./index.html-777885c8.js"),["assets/index.html-777885c8.js","assets/framework-0ba8e1ea.js"])),"v-c271a6b2":T(()=>b(()=>import("./index.html-822dc78a.js"),["assets/index.html-822dc78a.js","assets/framework-0ba8e1ea.js"])),"v-2f5e7500":T(()=>b(()=>import("./index.html-c2cc080f.js"),["assets/index.html-c2cc080f.js","assets/framework-0ba8e1ea.js"])),"v-1f847a28":T(()=>b(()=>import("./index.html-f2b36c2b.js"),["assets/index.html-f2b36c2b.js","assets/reports-c7f76afe.js","assets/framework-0ba8e1ea.js"])),"v-ec0cad0c":T(()=>b(()=>import("./index.html-ace5d406.js"),["assets/index.html-ace5d406.js","assets/framework-0ba8e1ea.js"])),"v-52e27964":T(()=>b(()=>import("./index.html-527a5e84.js"),["assets/index.html-527a5e84.js","assets/sso_eportal-cc19d109.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-c05bf2be":T(()=>b(()=>import("./index.html-1738772c.js"),["assets/index.html-1738772c.js","assets/framework-0ba8e1ea.js"])),"v-3d707372":T(()=>b(()=>import("./index.html-3e49682f.js"),["assets/index.html-3e49682f.js","assets/framework-0ba8e1ea.js"])),"v-7d514c7d":T(()=>b(()=>import("./index.html-815d4f25.js"),["assets/index.html-815d4f25.js","assets/framework-0ba8e1ea.js"])),"v-50c7132c":T(()=>b(()=>import("./index.html-84c31207.js"),["assets/index.html-84c31207.js","assets/framework-0ba8e1ea.js"])),"v-fd036ae2":T(()=>b(()=>import("./index.html-862975e7.js"),["assets/index.html-862975e7.js","assets/uchecker-31d683fa.js","assets/eportal-qemu-feed-7c9efdb9.js","assets/framework-0ba8e1ea.js"])),"v-03bf6597":T(()=>b(()=>import("./index.html-9a9ef1ef.js"),["assets/index.html-9a9ef1ef.js","assets/framework-0ba8e1ea.js"])),"v-b8319282":T(()=>b(()=>import("./index.html-c0147096.js"),["assets/index.html-c0147096.js","assets/reports-c7f76afe.js","assets/framework-0ba8e1ea.js"])),"v-3706649a":T(()=>b(()=>import("./404.html-3b82156f.js"),["assets/404.html-3b82156f.js","assets/framework-0ba8e1ea.js"]))};var kt=Symbol(""),xt=k(Le),Fe=at({key:"",path:"",title:"",lang:"",frontmatter:{},headers:[]}),X=k(Fe),Z=()=>X,We=Symbol(""),ne=()=>{const e=C(We);if(!e)throw new Error("usePageFrontmatter() is called without provider.");return e},Ne=Symbol(""),At=()=>{const e=C(Ne);if(!e)throw new Error("usePageHead() is called without provider.");return e},Tt=Symbol(""),Ge=Symbol(""),Ke=()=>{const e=C(Ge);if(!e)throw new Error("usePageLang() is called without provider.");return e},qe=Symbol(""),Pt=()=>{const e=C(qe);if(!e)throw new Error("usePageLayout() is called without provider.");return e},Ue=Symbol(""),ze=()=>{const e=C(Ue);if(!e)throw new Error("useRouteLocale() is called without provider.");return e},le=k(Vt),Ct=Symbol(""),Rt=Symbol(""),It="Layout",Mt="NotFound",U=rt({resolveLayouts:e=>e.reduce((t,s)=>({...t,...s.layouts}),{}),resolvePageData:async e=>{const t=xt.value[e];return await(t==null?void 0:t())??Fe},resolvePageFrontmatter:e=>e.frontmatter,resolvePageHead:(e,t,s)=>{const o=se(t.description)?t.description:s.description,a=[...it(t.head)?t.head:[],...s.head,["title",{},e],["meta",{name:"description",content:o}]];return lt(a)},resolvePageHeadTitle:(e,t)=>[e.title,t.title].filter(s=>!!s).join(" | "),resolvePageLang:e=>e.lang||"en",resolvePageLayout:(e,t)=>{let s;if(e.path){const o=e.frontmatter.layout;se(o)?s=o:s=It}else s=Mt;return t[s]},resolveRouteLocale:(e,t)=>nt(e,t),resolveSiteLocaleData:(e,t)=>({...e,...e.locales[t]})}),Bt=ve({name:"ClientOnly",setup(e,t){const s=k(!1);return J(()=>{s.value=!0}),()=>{var o,a;return s.value?(a=(o=t.slots).default)==null?void 0:a.call(o):null}}}),Ht=ve({name:"Content",props:{pageKey:{type:String,required:!1,default:""}},setup(e){const t=Z(),s=E(()=>je[e.pageKey||t.value.key]);return()=>s.value?z(s.value):z("div","404 Not Found")}}),jt=(e={})=>e,F=e=>ct(e)?e:`/${ut(e)}`;const Ft={enhance:({app:e})=>{}};function Wt(e){return{all:e=e||new Map,on:function(t,s){var o=e.get(t);o?o.push(s):e.set(t,[s])},off:function(t,s){var o=e.get(t);o&&(s?o.splice(o.indexOf(s)>>>0,1):e.set(t,[]))},emit:function(t,s){var o=e.get(t);o&&o.slice().map(function(a){a(s)}),(o=e.get("*"))&&o.slice().map(function(a){a(t,s)})}}}const Nt={class:"footer__img"},Gt=["href"],Kt=["src","alt"],qt={class:"footer-company-title"},Ut={class:"social"},zt={class:"social_links"},Jt=["href"],Xt={class:"footer-social-text"},Yt={class:"social-icons-wrapper"},Qt=["href"],Zt=["src"],es={__name:"Footer",setup(e){const{social:t,cloudlinuxSite:s,footerCustomLogo:o,footerCustomAltText:a,locales:r}=C("themeConfig"),i=ne(),l=E(()=>new Date().getFullYear()),c=E(()=>i.value.layout==="HomeLayout");return(u,f)=>(n(),d("div",{class:j(["footer",{"footer-default-layout":!c.value}])},[p("div",Nt,[p("a",{href:w(s)},[p("img",{src:w(F)(w(o)),alt:w(a)},null,8,Kt)],8,Gt)]),p("div",qt,V(l.value)+". CloudLinux Inc ",1),p("div",Ut,[p("div",zt,[(n(!0),d(I,null,B(w(r).bottomLinks,_=>(n(),d("a",{href:_.url,target:"_blank"},V(_.text),9,Jt))),256))]),p("span",Xt,V(w(r).stayInTouch),1),p("div",Yt,[(n(!0),d(I,null,B(w(t),_=>(n(),d("a",{class:"social-icons-link",href:_==null?void 0:_.url,target:"_blank"},[_.icon?(n(),d("img",{key:0,class:"social-icons-link-img",src:w(F)(_==null?void 0:_.icon),alt:"footer logo"},null,8,Zt)):L("v-if",!0)],8,Qt))),256))])])],2))}},pe=A(es,[["__scopeId","data-v-0190e83e"],["__file","Footer.vue"]]),Je={"/enterprise-support-for-almalinux/":[{collapsable:!1,children:["/enterprise-support-for-almalinux/","/enterprise-support-for-almalinux/fips/"]}],"/eportal/":[{collapsable:!1,children:["/eportal/","/eportal/general"]}],"/eportal-api/":[{collapsable:!1,children:["/eportal-api/"]}],"/extended-lifecycle-support/":[{collapsable:!1,children:["/extended-lifecycle-support/"]}],"/extended-lifecycle-support-for-languages/":[{collapsable:!1,children:["/extended-lifecycle-support-for-languages/"]}],"/jp/":[{collapsable:!1,children:["/jp/","/jp/eportal","/jp/eportal-api","/jp/extended-lifecycle-support","/jp/extended-lifecycle-support-for-languages","/jp/linux-support-services","/jp/live-patching-services","/jp/tuxcare","/jp/tuxcare-cln"]}],"/kernelcare-for-iot/":[{collapsable:!1,children:["/kernelcare-for-iot/"]}],"/live-patching-services/":[{collapsable:!1,children:["/live-patching-services/"]}],"/service-descriptions/":[{collapsable:!1,children:["/service-descriptions/"]}],"/tuxcare/":[{collapsable:!1,children:["/tuxcare/"]}],"/tuxcare-cln/":[{collapsable:!1,children:["/tuxcare-cln/"]}]},Oe=/#.*$/,ts=/\.(md|html)$/,te=/\/$/,we=/^(https?:|mailto:|tel:)/;function ae(e){return decodeURI(e).replace(Oe,"").replace(ts,"")}function ss(e){const t=e==null?void 0:e.match(Oe);if(t)return t[0]}function os(e){return we.test(e)}function as(e){if(os(e))return e;const t=e==null?void 0:e.match(Oe),s=t?t[0]:"",o=ae(e);return te.test(o)?e:o+".html"+s}function he(e,t){const s=e.hash,o=ss(t);if(o&&s!==o)return!1;const a=ae(e.path),r=ae(t);return a===r}function fe(e,t,s){s&&(t=rs(t,s));const o=ae(t);for(let a=0;aYe(r,s,o)):[]}function is(e){e=e.map(s=>Object.assign({},JSON.parse(JSON.stringify(s))));let t;return e.forEach(s=>{s.level!==1?t=s:t&&(t.children||(t.children=[])).push(s)}),e.filter(s=>s.level!==1)}function ls(e,t){if(Array.isArray(t))return{base:"/",config:t};for(const s in t)if(ns(e.path).indexOf(s)===0)return{base:s,config:t[s]};return null}function ns(e){return/(\.html|\/)$/.test(e)?e:e+"/"}function Ye(e,t,s,o){if(typeof e=="string")return fe(t,e,s);if(Array.isArray(e))return Object.assign(fe(t,e[0],s),{title:e[1]});{o&&console.error("[vuepress] Nested sidebar groups are not supported. Consider using navbar + categories instead.");const a=e.children||[];return{type:"group",title:e.title,children:a.map(r=>Ye(r,t,s,!0)),collapsable:e.collapsable!==!1}}}const cs={functional:!0,props:["item","closeSidebarDrawer"],render({item:e,closeSidebarDrawer:t}){var f,_;if(!e)return;const s=Z(),o=me(),a=_e(),r=he(o,e==null?void 0:e.path),i=(e==null?void 0:e.type)==="auto"?r||e.children.some(g=>he(o,e.basePath+"#"+g.slug)):r,l=us(z,e==null?void 0:e.path,e.title||(e==null?void 0:e.path),i,e.headers,t,a),c=((f=s.value.frontmatter)==null?void 0:f.sidebarDepth)!=null?(_=s.value.frontmatter)==null?void 0:_.sidebarDepth:5,u=c??1;if((e==null?void 0:e.type)==="auto")return[l,Se(z,e.children,e.basePath,o,u,1,t)];if(e.headers&&e.headers.length){const g=is(e.headers);return[l,Se(z,g,e==null?void 0:e.path,o,u,1,t)]}return Ee(z,e==null?void 0:e.path,e.title||(e==null?void 0:e.path),i,e.children,0,t)}};function Ee(e,t,s,o,a,r=0,i){const l=e(dt,{"data-anchor":t,to:t,activeClass:"",exactActiveClass:"",class:{active:o,"sidebar-link":!0,["link-depth-level-"+r]:!0}},()=>[s]);return e("div",{class:{active:o,collapsed:!0,"sidebar-link-container":!!(a!=null&&a.length)},onClick:c=>{c.target.classList.toggle("collapsed"),c.target.tagName!=="DIV"&&i()}},[l])}function us(e,t,s,o,a,r,i){const l=!!a&&a.some(c=>c.level!==1);return e("div",{class:{active:o,collapsed:o,"sidebar-header":!0,"sidebar-link":!0,"sidebar-header--empty":!l},onClick:c=>{const u=c.target.classList,f=c.target.querySelector("a");u.toggle("collapsed"),f&&i.push(f.getAttribute("href"))}},[Ee(e,t,s,o,null,0,r)])}function Se(e,t,s,o,a,r=1,i){return!t||r>a?null:e("ul",{class:"sidebar-sub-headers"},t.map(l=>{const c=he(o,s+"#"+l.slug);return e("li",{class:{collapsible:r<3,"sidebar-sub-header":!0}},[Ee(e,s+"#"+l.slug,l.title,c,l.children,r,i),Se(e,l.children,s,o,a,r+1,i)])}))}const Qe=A(cs,[["__file","SidebarLink.vue"]]);const ds={__name:"DropdownTransition",setup(e){const t=o=>{o.style.height=o.scrollHeight+"px"},s=o=>{o.style.height=""};return(o,a)=>(n(),O(de,{name:"dropdown",onEnter:t,onAfterEnter:s,onBeforeLeave:t},{default:W(()=>[D(o.$slots,"default")]),_:3}))}},ps=A(ds,[["__file","DropdownTransition.vue"]]);const hs={key:0,ref:"items",class:"sidebar-group-items"},fs={__name:"SidebarGroup",props:{item:{type:Object,required:!0},first:{type:Boolean,required:!0},open:{type:Boolean,required:!0},collapsable:{type:Boolean,required:!0},closeSidebarDrawer:{type:Function,default:()=>{}}},setup(e){return(t,s)=>(n(),d("div",{class:j(["sidebar-group",{first:e.first,collapsable:e.collapsable}])},[S(ps,null,{default:W(()=>{var o;return[e.open||!e.collapsable?(n(),d("ul",hs,[(n(!0),d(I,null,B((o=e.item)==null?void 0:o.children,a=>(n(),d("li",null,[S(Qe,{closeSidebarDrawer:e.closeSidebarDrawer,item:a},null,8,["closeSidebarDrawer","item"])]))),256))],512)):L("v-if",!0)]}),_:1})],2))}},vs=A(fs,[["__file","SidebarGroup.vue"]]);const ms={class:"sidebar"},_s={key:0,class:"sidebar-links"},gs={__name:"Sidebar",props:{items:{type:Array,required:!0},closeSidebarDrawer:{type:Function,default:()=>{}},isMobileWidth:{type:Boolean}},setup(e){const t=e,s=E(()=>t.items),o=me(),a=Z(),r=E(()=>Xe(a.value,o,s.value)),i=k(0),l=()=>{const h=_(o,t.items);h>-1&&(i.value=h)},c=h=>{i.value=h===i.value?-1:h},u=h=>{const v=h.getBoundingClientRect();return v.top>=0&&v.left>=0&&v.bottom<=(window.innerHeight/2||document.documentElement.clientHeight/2)&&v.right<=(window.innerWidth||document.documentElement.clientWidth)};re(()=>o,l);const f=()=>{const h=document.querySelectorAll(".header-anchor"),v=document.querySelector(".sidebar"),m=v.querySelectorAll("a"),y=v.querySelectorAll(".collapsible.sidebar-sub-header"),x=Array.from(m).map($=>$.getAttribute("data-anchor"));h.forEach($=>{$.getAttribute("data-anchor")||$.setAttribute("data-anchor",a.value.path+$.hash)}),h.forEach($=>{if(u($)){const H=x.find(R=>R===$.getAttribute("data-anchor"));y.forEach(R=>{R.querySelectorAll(".sidebar-link-container").forEach(K=>{R.querySelector(`a[data-anchor="${H}"]`)?K.classList.remove("collapsed"):K.classList.add("collapsed")})}),v.querySelector(`a[data-anchor="${H}"]`)&&(m.forEach(R=>R.classList.remove("active")),v.querySelector(`a[data-anchor="${H}"]`).classList.add("active"))}})},_=(h,v)=>{for(let m=0;mhe(h,x.path)))return m}return-1},g=()=>{const h=window.location.hash,v=document.querySelectorAll(".sidebar a");v.forEach(m=>{if(m.getAttribute("data-anchor")===h){v.forEach(x=>x.classList.remove("active")),m.classList.add("active");const y=m.closest(".collapsible");y&&y.classList.remove("collapsed")}})};return J(()=>{l(),t.isMobileWidth||window.addEventListener("scroll",f),t.isMobileWidth||window.addEventListener("resize",f),window.addEventListener("hashchange",g)}),ie(()=>{window.removeEventListener("scroll",f),window.removeEventListener("resize",f),window.removeEventListener("hashchange",g)}),(h,v)=>(n(),d("div",ms,[D(h.$slots,"top"),r.value.length?(n(),d("ul",_s,[(n(!0),d(I,null,B(r.value,(m,y)=>(n(),d("li",{key:y},[m.type==="group"?(n(),O(vs,{key:0,item:m,first:y===0,open:y===i.value,closeSidebarDrawer:e.closeSidebarDrawer,collapsable:!!(m.collapsable||m.collapsible),onToggle:x=>c(y)},null,8,["item","first","open","closeSidebarDrawer","collapsable","onToggle"])):(n(),O(Qe,{key:1,closeSidebarDrawer:e.closeSidebarDrawer,item:m},null,8,["closeSidebarDrawer","item"]))]))),128))])):L("v-if",!0),D(h.$slots,"bottom")]))}},Ze=A(gs,[["__file","Sidebar.vue"]]);var bs=Object.defineProperty,ys=Object.defineProperties,ws=Object.getOwnPropertyDescriptors,ke=Object.getOwnPropertySymbols,Ss=Object.prototype.hasOwnProperty,Ls=Object.prototype.propertyIsEnumerable,xe=(e,t,s)=>t in e?bs(e,t,{enumerable:!0,configurable:!0,writable:!0,value:s}):e[t]=s,ee=(e,t)=>{for(var s in t||(t={}))Ss.call(t,s)&&xe(e,s,t[s]);if(ke)for(var s of ke(t))Ls.call(t,s)&&xe(e,s,t[s]);return e},Ae=(e,t)=>ys(e,ws(t));const Os={props:{autoscroll:{type:Boolean,default:!0}},watch:{typeAheadPointer(){this.autoscroll&&this.maybeAdjustScroll()},open(e){this.autoscroll&&e&&this.$nextTick(()=>this.maybeAdjustScroll())}},methods:{maybeAdjustScroll(){var e;const t=((e=this.$refs.dropdownMenu)==null?void 0:e.children[this.typeAheadPointer])||!1;if(t){const s=this.getDropdownViewport(),{top:o,bottom:a,height:r}=t.getBoundingClientRect();if(os.bottom)return this.$refs.dropdownMenu.scrollTop=t.offsetTop-(s.height-r)}},getDropdownViewport(){return this.$refs.dropdownMenu?this.$refs.dropdownMenu.getBoundingClientRect():{height:0,top:0,bottom:0}}}},Es={data(){return{typeAheadPointer:-1}},watch:{filteredOptions(){for(let e=0;e=0;e--)if(this.selectable(this.filteredOptions[e])){this.typeAheadPointer=e;break}},typeAheadDown(){for(let e=this.typeAheadPointer+1;e{const s=e.__vccOpts||e;for(const[o,a]of t)s[o]=a;return s},$s={},Vs={xmlns:"http://www.w3.org/2000/svg",width:"10",height:"10"},ks=p("path",{d:"M6.895455 5l2.842897-2.842898c.348864-.348863.348864-.914488 0-1.263636L9.106534.261648c-.348864-.348864-.914489-.348864-1.263636 0L5 3.104545 2.157102.261648c-.348863-.348864-.914488-.348864-1.263636 0L.261648.893466c-.348864.348864-.348864.914489 0 1.263636L3.104545 5 .261648 7.842898c-.348864.348863-.348864.914488 0 1.263636l.631818.631818c.348864.348864.914773.348864 1.263636 0L5 6.895455l2.842898 2.842897c.348863.348864.914772.348864 1.263636 0l.631818-.631818c.348864-.348864.348864-.914489 0-1.263636L6.895455 5z"},null,-1),xs=[ks];function As(e,t){return n(),d("svg",Vs,xs)}const Ts=De($s,[["render",As]]),Ps={},Cs={xmlns:"http://www.w3.org/2000/svg",width:"14",height:"10"},Rs=p("path",{d:"M9.211364 7.59931l4.48338-4.867229c.407008-.441854.407008-1.158247 0-1.60046l-.73712-.80023c-.407008-.441854-1.066904-.441854-1.474243 0L7 5.198617 2.51662.33139c-.407008-.441853-1.066904-.441853-1.474243 0l-.737121.80023c-.407008.441854-.407008 1.158248 0 1.600461l4.48338 4.867228L7 10l2.211364-2.40069z"},null,-1),Is=[Rs];function Ms(e,t){return n(),d("svg",Cs,Is)}const Bs=De(Ps,[["render",Ms]]),Te={Deselect:Ts,OpenIndicator:Bs},Hs={mounted(e,{instance:t}){if(t.appendToBody){const{height:s,top:o,left:a,width:r}=t.$refs.toggle.getBoundingClientRect();let i=window.scrollX||window.pageXOffset,l=window.scrollY||window.pageYOffset;e.unbindPosition=t.calculatePosition(e,t,{width:r+"px",left:i+a+"px",top:l+o+s+"px"}),document.body.appendChild(e)}},unmounted(e,{instance:t}){t.appendToBody&&(e.unbindPosition&&typeof e.unbindPosition=="function"&&e.unbindPosition(),e.parentNode&&e.parentNode.removeChild(e))}};function js(e){const t={};return Object.keys(e).sort().forEach(s=>{t[s]=e[s]}),JSON.stringify(t)}let Fs=0;function Ws(){return++Fs}const Ns={components:ee({},Te),directives:{appendToBody:Hs},mixins:[Os,Es,Ds],compatConfig:{MODE:3},emits:["open","close","update:modelValue","search","search:compositionstart","search:compositionend","search:keydown","search:blur","search:focus","search:input","option:created","option:selecting","option:selected","option:deselecting","option:deselected"],props:{modelValue:{},components:{type:Object,default:()=>({})},options:{type:Array,default(){return[]}},disabled:{type:Boolean,default:!1},clearable:{type:Boolean,default:!0},deselectFromDropdown:{type:Boolean,default:!1},searchable:{type:Boolean,default:!0},multiple:{type:Boolean,default:!1},placeholder:{type:String,default:""},transition:{type:String,default:"vs__fade"},clearSearchOnSelect:{type:Boolean,default:!0},closeOnSelect:{type:Boolean,default:!0},label:{type:String,default:"label"},autocomplete:{type:String,default:"off"},reduce:{type:Function,default:e=>e},selectable:{type:Function,default:e=>!0},getOptionLabel:{type:Function,default(e){return typeof e=="object"?e.hasOwnProperty(this.label)?e[this.label]:console.warn(`[vue-select warn]: Label key "option.${this.label}" does not exist in options object ${JSON.stringify(e)}. https://vue-select.org/api/props.html#getoptionlabel`):e}},getOptionKey:{type:Function,default(e){if(typeof e!="object")return e;try{return e.hasOwnProperty("id")?e.id:js(e)}catch(t){return console.warn(`[vue-select warn]: Could not stringify this option to generate unique key. Please provide'getOptionKey' prop to return a unique key for each option. -https://vue-select.org/api/props.html#getoptionkey`,e,t)}}},onTab:{type:Function,default:function(){this.selectOnTab&&!this.isComposing&&this.typeAheadSelect()}},taggable:{type:Boolean,default:!1},tabindex:{type:Number,default:null},pushTags:{type:Boolean,default:!1},filterable:{type:Boolean,default:!0},filterBy:{type:Function,default(e,t,s){return(t||"").toLocaleLowerCase().indexOf(s.toLocaleLowerCase())>-1}},filter:{type:Function,default(e,t){return e.filter(s=>{let o=this.getOptionLabel(s);return typeof o=="number"&&(o=o.toString()),this.filterBy(s,o,t)})}},createOption:{type:Function,default(e){return typeof this.optionList[0]=="object"?{[this.label]:e}:e}},resetOnOptionsChange:{default:!1,validator:e=>["function","boolean"].includes(typeof e)},clearSearchOnBlur:{type:Function,default:function({clearSearchOnSelect:e,multiple:t}){return e&&!t}},noDrop:{type:Boolean,default:!1},inputId:{type:String},dir:{type:String,default:"auto"},selectOnTab:{type:Boolean,default:!1},selectOnKeyCodes:{type:Array,default:()=>[13]},searchInputQuerySelector:{type:String,default:"[type=search]"},mapKeydown:{type:Function,default:(e,t)=>e},appendToBody:{type:Boolean,default:!1},calculatePosition:{type:Function,default(e,t,{width:s,top:o,left:a}){e.style.top=o,e.style.left=a,e.style.width=s}},dropdownShouldOpen:{type:Function,default({noDrop:e,open:t,mutableLoading:s}){return e?!1:t&&!s}},uid:{type:[String,Number],default:()=>Ws()}},data(){return{search:"",open:!1,isComposing:!1,pushedTags:[],_value:[],deselectButtons:[]}},computed:{isReducingValues(){return this.$props.reduce!==this.$options.props.reduce.default},isTrackingValues(){return typeof this.modelValue>"u"||this.isReducingValues},selectedValue(){let e=this.modelValue;return this.isTrackingValues&&(e=this.$data._value),e!=null&&e!==""?[].concat(e):[]},optionList(){return this.options.concat(this.pushTags?this.pushedTags:[])},searchEl(){return this.$slots.search?this.$refs.selectedOptions.querySelector(this.searchInputQuerySelector):this.$refs.search},scope(){const e={search:this.search,loading:this.loading,searching:this.searching,filteredOptions:this.filteredOptions};return{search:{attributes:ee({disabled:this.disabled,placeholder:this.searchPlaceholder,tabindex:this.tabindex,readonly:!this.searchable,id:this.inputId,"aria-autocomplete":"list","aria-labelledby":`vs${this.uid}__combobox`,"aria-controls":`vs${this.uid}__listbox`,ref:"search",type:"search",autocomplete:this.autocomplete,value:this.search},this.dropdownOpen&&this.filteredOptions[this.typeAheadPointer]?{"aria-activedescendant":`vs${this.uid}__option-${this.typeAheadPointer}`}:{}),events:{compositionstart:()=>this.isComposing=!0,compositionend:()=>this.isComposing=!1,keydown:this.onSearchKeyDown,blur:this.onSearchBlur,focus:this.onSearchFocus,input:t=>this.search=t.target.value}},spinner:{loading:this.mutableLoading},noOptions:{search:this.search,loading:this.mutableLoading,searching:this.searching},openIndicator:{attributes:{ref:"openIndicator",role:"presentation",class:"vs__open-indicator"}},listHeader:e,listFooter:e,header:Ae(ee({},e),{deselect:this.deselect}),footer:Ae(ee({},e),{deselect:this.deselect})}},childComponents(){return ee(ee({},Te),this.components)},stateClasses(){return{"vs--open":this.dropdownOpen,"vs--single":!this.multiple,"vs--multiple":this.multiple,"vs--searching":this.searching&&!this.noDrop,"vs--searchable":this.searchable&&!this.noDrop,"vs--unsearchable":!this.searchable,"vs--loading":this.mutableLoading,"vs--disabled":this.disabled}},searching(){return!!this.search},dropdownOpen(){return this.dropdownShouldOpen(this)},searchPlaceholder(){return this.isValueEmpty&&this.placeholder?this.placeholder:void 0},filteredOptions(){const e=[].concat(this.optionList);if(!this.filterable&&!this.taggable)return e;const t=this.search.length?this.filter(e,this.search,this):e;if(this.taggable&&this.search.length){const s=this.createOption(this.search);this.optionExists(s)||t.unshift(s)}return t},isValueEmpty(){return this.selectedValue.length===0},showClearButton(){return!this.multiple&&this.clearable&&!this.open&&!this.isValueEmpty}},watch:{options(e,t){const s=()=>typeof this.resetOnOptionsChange=="function"?this.resetOnOptionsChange(e,t,this.selectedValue):this.resetOnOptionsChange;!this.taggable&&s()&&this.clearSelection(),this.modelValue&&this.isTrackingValues&&this.setInternalValueFromOptions(this.modelValue)},modelValue:{immediate:!0,handler(e){this.isTrackingValues&&this.setInternalValueFromOptions(e)}},multiple(){this.clearSelection()},open(e){this.$emit(e?"open":"close")}},created(){this.mutableLoading=this.loading},methods:{setInternalValueFromOptions(e){Array.isArray(e)?this.$data._value=e.map(t=>this.findOptionFromReducedValue(t)):this.$data._value=this.findOptionFromReducedValue(e)},select(e){this.$emit("option:selecting",e),this.isOptionSelected(e)?this.deselectFromDropdown&&(this.clearable||this.multiple&&this.selectedValue.length>1)&&this.deselect(e):(this.taggable&&!this.optionExists(e)&&(this.$emit("option:created",e),this.pushTag(e)),this.multiple&&(e=this.selectedValue.concat(e)),this.updateValue(e),this.$emit("option:selected",e)),this.onAfterSelect(e)},deselect(e){this.$emit("option:deselecting",e),this.updateValue(this.selectedValue.filter(t=>!this.optionComparator(t,e))),this.$emit("option:deselected",e)},clearSelection(){this.updateValue(this.multiple?[]:null)},onAfterSelect(e){this.closeOnSelect&&(this.open=!this.open,this.searchEl.blur()),this.clearSearchOnSelect&&(this.search="")},updateValue(e){typeof this.modelValue>"u"&&(this.$data._value=e),e!==null&&(Array.isArray(e)?e=e.map(t=>this.reduce(t)):e=this.reduce(e)),this.$emit("update:modelValue",e)},toggleDropdown(e){const t=e.target!==this.searchEl;t&&e.preventDefault();const s=[...this.deselectButtons||[],this.$refs.clearButton];if(this.searchEl===void 0||s.filter(Boolean).some(o=>o.contains(e.target)||o===e.target)){e.preventDefault();return}this.open&&t?this.searchEl.blur():this.disabled||(this.open=!0,this.searchEl.focus())},isOptionSelected(e){return this.selectedValue.some(t=>this.optionComparator(t,e))},isOptionDeselectable(e){return this.isOptionSelected(e)&&this.deselectFromDropdown},optionComparator(e,t){return this.getOptionKey(e)===this.getOptionKey(t)},findOptionFromReducedValue(e){const t=o=>JSON.stringify(this.reduce(o))===JSON.stringify(e),s=[...this.options,...this.pushedTags].filter(t);return s.length===1?s[0]:s.find(o=>this.optionComparator(o,this.$data._value))||e},closeSearchOptions(){this.open=!1,this.$emit("search:blur")},maybeDeleteValue(){if(!this.searchEl.value.length&&this.selectedValue&&this.selectedValue.length&&this.clearable){let e=null;this.multiple&&(e=[...this.selectedValue.slice(0,this.selectedValue.length-1)]),this.updateValue(e)}},optionExists(e){return this.optionList.some(t=>this.optionComparator(t,e))},normalizeOptionForSlot(e){return typeof e=="object"?e:{[this.label]:e}},pushTag(e){this.pushedTags.push(e)},onEscape(){this.search.length?this.search="":this.searchEl.blur()},onSearchBlur(){if(this.mousedown&&!this.searching)this.mousedown=!1;else{const{clearSearchOnSelect:e,multiple:t}=this;this.clearSearchOnBlur({clearSearchOnSelect:e,multiple:t})&&(this.search=""),this.closeSearchOptions();return}if(this.search.length===0&&this.options.length===0){this.closeSearchOptions();return}},onSearchFocus(){this.open=!0,this.$emit("search:focus")},onMousedown(){this.mousedown=!0},onMouseUp(){this.mousedown=!1},onSearchKeyDown(e){const t=a=>(a.preventDefault(),!this.isComposing&&this.typeAheadSelect()),s={8:a=>this.maybeDeleteValue(),9:a=>this.onTab(),27:a=>this.onEscape(),38:a=>(a.preventDefault(),this.typeAheadUp()),40:a=>(a.preventDefault(),this.typeAheadDown())};this.selectOnKeyCodes.forEach(a=>s[a]=t);const o=this.mapKeydown(s,this);if(typeof o[e.keyCode]=="function")return o[e.keyCode](e)}}},Gs=["dir"],Ks=["id","aria-expanded","aria-owns"],qs={ref:"selectedOptions",class:"vs__selected-options"},Us=["disabled","title","aria-label","onClick"],zs={ref:"actions",class:"vs__actions"},Js=["disabled"],Xs={class:"vs__spinner"},Ys=["id"],Qs=["id","aria-selected","onMouseover","onClick"],Zs={key:0,class:"vs__no-options"},eo=M(" Sorry, no matching options. "),to=["id"];function so(e,t,s,o,a,r){const i=pt("append-to-body");return n(),d("div",{dir:s.dir,class:j(["v-select",r.stateClasses])},[D(e.$slots,"header",N(q(r.scope.header))),p("div",{id:`vs${s.uid}__combobox`,ref:"toggle",class:"vs__dropdown-toggle",role:"combobox","aria-expanded":r.dropdownOpen.toString(),"aria-owns":`vs${s.uid}__listbox`,"aria-label":"Search for option",onMousedown:t[1]||(t[1]=l=>r.toggleDropdown(l))},[p("div",qs,[(n(!0),d(I,null,B(r.selectedValue,(l,c)=>D(e.$slots,"selected-option-container",{option:r.normalizeOptionForSlot(l),deselect:r.deselect,multiple:s.multiple,disabled:s.disabled},()=>[(n(),d("span",{key:s.getOptionKey(l),class:"vs__selected"},[D(e.$slots,"selected-option",N(q(r.normalizeOptionForSlot(l))),()=>[M(V(s.getOptionLabel(l)),1)]),s.multiple?(n(),d("button",{key:0,ref_for:!0,ref:u=>a.deselectButtons[c]=u,disabled:s.disabled,type:"button",class:"vs__deselect",title:`Deselect ${s.getOptionLabel(l)}`,"aria-label":`Deselect ${s.getOptionLabel(l)}`,onClick:u=>r.deselect(l)},[(n(),O(ue(r.childComponents.Deselect)))],8,Us)):L("",!0)]))])),256)),D(e.$slots,"search",N(q(r.scope.search)),()=>[p("input",ye({class:"vs__search"},r.scope.search.attributes,ht(r.scope.search.events)),null,16)])],512),p("div",zs,[Y(p("button",{ref:"clearButton",disabled:s.disabled,type:"button",class:"vs__clear",title:"Clear Selected","aria-label":"Clear Selected",onClick:t[0]||(t[0]=(...l)=>r.clearSelection&&r.clearSelection(...l))},[(n(),O(ue(r.childComponents.Deselect)))],8,Js),[[Q,r.showClearButton]]),D(e.$slots,"open-indicator",N(q(r.scope.openIndicator)),()=>[s.noDrop?L("",!0):(n(),O(ue(r.childComponents.OpenIndicator),N(ye({key:0},r.scope.openIndicator.attributes)),null,16))]),D(e.$slots,"spinner",N(q(r.scope.spinner)),()=>[Y(p("div",Xs,"Loading...",512),[[Q,e.mutableLoading]])])],512)],40,Ks),S(de,{name:s.transition},{default:W(()=>[r.dropdownOpen?Y((n(),d("ul",{id:`vs${s.uid}__listbox`,ref:"dropdownMenu",key:`vs${s.uid}__listbox`,class:"vs__dropdown-menu",role:"listbox",tabindex:"-1",onMousedown:t[2]||(t[2]=P((...l)=>r.onMousedown&&r.onMousedown(...l),["prevent"])),onMouseup:t[3]||(t[3]=(...l)=>r.onMouseUp&&r.onMouseUp(...l))},[D(e.$slots,"list-header",N(q(r.scope.listHeader))),(n(!0),d(I,null,B(r.filteredOptions,(l,c)=>(n(),d("li",{id:`vs${s.uid}__option-${c}`,key:s.getOptionKey(l),role:"option",class:j(["vs__dropdown-option",{"vs__dropdown-option--deselect":r.isOptionDeselectable(l)&&c===e.typeAheadPointer,"vs__dropdown-option--selected":r.isOptionSelected(l),"vs__dropdown-option--highlight":c===e.typeAheadPointer,"vs__dropdown-option--disabled":!s.selectable(l)}]),"aria-selected":c===e.typeAheadPointer?!0:null,onMouseover:u=>s.selectable(l)?e.typeAheadPointer=c:null,onClick:P(u=>s.selectable(l)?r.select(l):null,["prevent","stop"])},[D(e.$slots,"option",N(q(r.normalizeOptionForSlot(l))),()=>[M(V(s.getOptionLabel(l)),1)])],42,Qs))),128)),r.filteredOptions.length===0?(n(),d("li",Zs,[D(e.$slots,"no-options",N(q(r.scope.noOptions)),()=>[eo])])):L("",!0),D(e.$slots,"list-footer",N(q(r.scope.listFooter)))],40,Ys)),[[i]]):(n(),d("ul",{key:1,id:`vs${s.uid}__listbox`,role:"listbox",style:{display:"none",visibility:"hidden"}},null,8,to))]),_:3},8,["name"]),D(e.$slots,"footer",N(q(r.scope.footer)))],10,Gs)}const oo=De(Ns,[["render",so]]);const ao=["src"],ro={key:1},io={__name:"DSelect",props:{withIcon:{type:Boolean,default:!0},modelValue:{type:Object,default:()=>({label:"",value:""})},options:{type:Array,default:()=>[]}},emits:["changeSidebarItems","update:selectedValue","update:model-value"],setup(e,{emit:t}){const{searchSelectIcon:s}=C("themeConfig"),o=i=>{t("changeSidebarItems",i),t("update:model-value",i)},a=k(),r=()=>{a.value&&(a.value.open=!1)};return J(()=>window.addEventListener("click",i=>{var l;(l=a.value)!=null&&l.$el.contains(i.target)||r()})),ie(()=>window.removeEventListener("click",r)),(i,l)=>(n(),O(w(oo),{ref_key:"dropdown",ref:a,"onUpdate:modelValue":o,"model-value":e.modelValue,label:"title",value:"link",clearable:!1,searchable:!1,options:e.options},{"open-indicator":W(({attributes:c})=>[e.withIcon?(n(),d("div",ye({key:0,class:"select-icon"},c),[p("img",{src:w(F)(w(s)),alt:"search Icon"},null,8,ao)],16)):(n(),d("span",ro))]),_:1},8,["model-value","options"]))}},et=A(io,[["__file","DSelect.vue"]]),lo={class:"sidebar-drawer__mobile"},no={class:"sidebar-header"},co=p("p",{class:"sidebar-header__paragraph"},"Select TuxCare docs",-1),uo=ve({__name:"SidebarDrawer",props:{allPages:{type:Array,required:!0,default:()=>[]},documents:{type:Array,required:!0,default:()=>[]},closeSidebarDrawer:{type:Function,default:()=>{}},modelValue:{type:Object,required:!0,default:()=>{}},isMobileWidth:{type:Boolean}},emits:["changeSidebarItems","update:model-value"],setup(e){return(t,s)=>(n(),d("div",lo,[S(Ze,{closeSidebarDrawer:e.closeSidebarDrawer,items:e.allPages,isMobileWidth:e.isMobileWidth},{top:W(()=>[p("div",no,[co,S(et,{modelValue:e.modelValue,"onUpdate:modelValue":s[0]||(s[0]=o=>t.$emit("update:model-value",o)),onChangeSidebarItems:s[1]||(s[1]=o=>t.$emit("changeSidebarItems",o)),"with-icon":"",options:e.documents},null,8,["modelValue","options"])])]),_:1},8,["closeSidebarDrawer","items","isMobileWidth"])]))}});const po=A(uo,[["__file","SidebarDrawer.vue"]]);const ho={class:"drawer-tabs__wrapper"},fo=["onClick"],vo={__name:"DrawerTabs",props:{data:{type:Array,required:!0,default:()=>({})},modelValue:{type:Number,default:-1}},emits:["update:modelValue"],setup(e,{emit:t}){const s=o=>{t("update:modelValue",o)};return(o,a)=>(n(),d("div",ho,[(n(!0),d(I,null,B(e.data,(r,i)=>(n(),d("div",{key:i,onClick:l=>s(i),class:j([{"drawer-tab__active":e.modelValue===i},"drawer-tab"])},[p("div",{class:j(["drawer-tab__text",{"drawer-tab__text__active":e.modelValue===i}])},V(r.title)+" ("+V(r==null?void 0:r.numberResults)+") ",3)],10,fo))),128))]))}},mo=A(vo,[["__scopeId","data-v-c60e280a"],["__file","DrawerTabs.vue"]]);const _o={key:0,class:"drawer-main__search-results"},go=["onClick"],bo=["innerHTML"],yo=["innerHTML"],wo=["innerHTML"],So={key:1},Lo={class:"hidden_results__text"},Oo=p("p",{class:"hidden_results__text"},"Collapse results",-1),Eo=[Oo],Do={key:2},$o={key:0,class:"no_results"},Vo={key:1,class:"no_results"},ko={key:0},xo=p("br",null,null,-1),Ao=p("a",{class:"no_results__link",href:" https://forum.cloudlinux.com/",target:"_blank"},"https://forum.cloudlinux.com/",-1),To={__name:"DrawerSearchResult",props:{data:{type:[Array,Object],required:!0},modelValue:{type:String,required:!0}},setup(e){const t=e;ft(g=>({aa1be2ec:w(o)}));const{MAX_ALGOLIA_VISIBLE_RESULT:s,MAX_ALGOLIA_VISIBLE_ROWS:o}=C("themeConfig"),a=k(!1),r=g=>{window.location.href=g},i=E(()=>{var g;return a.value?t.data:(g=t.data)==null?void 0:g.slice(0,s)}),l=E(()=>t.data.length-i.value.length),c=()=>{a.value=!0},u=()=>{a.value=!1},f=g=>{var h,v;for(const m in g)if(g[m].value!==null||g[m].value!==void 0)return((h=g.lvl1)==null?void 0:h.value)||((v=g.lvl0)==null?void 0:v.value);return null},_=g=>Object.values(g).slice(2).filter(Boolean).map(h=>h.value).join(" > ");return(g,h)=>(n(),d(I,null,[e.data.length?(n(),d("section",_o,[(n(!0),d(I,null,B(i.value,v=>{var m,y,x,$;return n(),d("div",{key:v,class:"search-result",onClick:H=>r((v==null?void 0:v.url)||"/")},[p("div",{class:"search-result__title",innerHTML:f((m=v._highlightResult)==null?void 0:m.hierarchy)},null,8,bo),p("div",{class:"search-result__breadcrumb",innerHTML:_((y=v._highlightResult)==null?void 0:y.hierarchy)},null,8,yo),p("div",{class:"search-result__text",innerHTML:($=(x=v._highlightResult)==null?void 0:x.content)==null?void 0:$.value},null,8,wo)],8,go)}),128))])):L("v-if",!0),e.data.length?(n(),d("div",So,[l.value?(n(),d("div",{key:0,class:"hidden_results",onClick:c},[p("p",Lo,"Show all results("+V(l.value)+")",1)])):!l.value&&a.value?(n(),d("div",{key:1,class:"hidden_results",onClick:u},Eo)):L("v-if",!0)])):(n(),d("div",Do,[e.modelValue.length?(n(),d("p",Vo,[M(" Sorry! No results found for "),e.modelValue?(n(),d("span",ko,'"'+V(e.modelValue)+'"',1)):L("v-if",!0),M(" 😞"),xo,M("Please try ask the community (link to the "),Ao,M("). ")])):(n(),d("p",$o,"What are you searching for?"))]))],64))}},Po=A(To,[["__file","DrawerSearchResult.vue"]]);const Co={class:"drawer-header"},Ro=p("div",{class:"drawer-header__wrapper"},[p("h2",{class:"drawer-header__paragraph"},"How can we help you?"),p("div",{id:"drawerSearch"})],-1),Io={class:"drawer-cross"},Mo=["src"],Bo={class:"drawer-main"},Ho={class:"drawer-main__wrapper"},jo={class:"drawer-main__breadcrumb"},Fo={key:0,class:"drawer-main__breadcrumb__text"},Wo=["src"],No={__name:"Drawer",props:{isOpenDrawer:{type:Boolean,required:!0,default:!1},isMobileWidth:{type:Boolean,required:!0,default:!1},modelValue:{type:String,required:!0,default:""},homeLayoutSearchResult:{type:Array,required:!0,default:()=>[]}},emits:["closeDrawer","update:modelValue"],setup(e,{emit:t}){const s=e,o=k(0),a=E(()=>{const l=s.homeLayoutSearchResult.reduce((c,u)=>{var _;const f=(_=u.hierarchy)==null?void 0:_.lvl0;return c[f]=c[f]||{title:f,numberResults:0},c[f].numberResults++,c},{});return Object.values(l)}),r=E(()=>{if(o.value===-1)return s.homeLayoutSearchResult||[];const l=a.value[o.value];return s.homeLayoutSearchResult.filter(c=>c.hierarchy.lvl0===(l==null?void 0:l.title))}),i=()=>{t("closeDrawer"),o.value=0};return re(()=>s.isOpenDrawer,()=>{document.body.classList.toggle("disable-scroll",s.isOpenDrawer)}),(l,c)=>(n(),d("div",null,[p("div",{class:j(["drawer",{"is-open":e.isOpenDrawer}])},[p("div",Co,[Ro,p("div",Io,[p("img",{onClick:i,class:"drawer-cross__img",src:w(F)("/global/cross.svg"),alt:"cross"},null,8,Mo),p("p",{onClick:i,class:"drawer-cross__text"},"close")])]),S(mo,{modelValue:o.value,"onUpdate:modelValue":c[0]||(c[0]=u=>o.value=u),data:a.value},null,8,["modelValue","data"]),p("main",null,[p("div",Bo,[p("div",Ho,[p("div",jo,[r.value.length?(n(),d("p",Fo,[M("Home "),p("img",{src:w(F)("/arrows/arrow-right-breadcrumb.svg"),alt:"breadcrumb icon"},null,8,Wo),M(" Documentation ")])):L("v-if",!0)]),S(Po,{modelValue:e.modelValue,data:r.value},null,8,["modelValue","data"])])]),e.isOpenDrawer&&e.isMobileWidth?(n(),O(pe,{key:0,class:"drawer-footer__mobile"})):L("v-if",!0)])],2),e.isOpenDrawer&&!e.isMobileWidth?(n(),O(pe,{key:0,class:"drawer-footer"})):L("v-if",!0)]))}},Go=A(No,[["__file","Drawer.vue"]]);const Ko={id:"search-form",class:"drawer-header__input"},qo=["value","placeholder"],Uo=["src"],zo={__name:"DrawerSearch",props:{options:{type:[Object,Array],required:!0},modelValue:{type:String,required:!0},isOpenDrawer:{type:Boolean,required:!0},isMobileWidth:{type:Boolean}},emits:["openDrawer","update:modelValue","result"],setup(e,{emit:t}){const s=e,{MAX_ALGOLIA_HITS_PER_PAGE:o}=C("themeConfig"),{headerDefaultSearchIcon:a,headerSearchIcon:r,headerSearchPlaceholder:i}=C("themeConfig"),l=ne(),c=E(()=>l.value.layout==="HomeLayout"),u=E(()=>s.isOpenDrawer?"drawer-header__search":c.value?"header-layout__search":"header-layout__search-default"),f=E(()=>s.isOpenDrawer?"drawer-header__search-icon":c.value?"header-layout__search-icon":"header-layout__search-icon-default"),_=E(()=>c.value||s.isOpenDrawer?r:a),g=E(()=>s.isOpenDrawer?"Search":c.value?i:"Search"),h=E(()=>s.isMobileWidth?"Search accross all Imunify Security support":g.value),v=async m=>{if(typeof window>"u")return;const[y]=await Promise.all([b(()=>import("./docsearch.min-de7e3b59.js").then($=>$.d),["assets/docsearch.min-de7e3b59.js","assets/framework-0ba8e1ea.js"]),b(()=>import("./docsearch.min-49eb4b49.js"),[])]),x=y.default;x(Object.assign({},m,{inputSelector:"#algolia-search-input",algoliaOptions:{hitsPerPage:o},handleSelected:()=>{t("openDrawer")},transformData:$=>{t("result",$)}}))};return re(()=>s.options,async m=>{await v(m)},{immediate:!0}),(m,y)=>(n(),d("form",Ko,[p("input",{value:e.modelValue,onInput:y[0]||(y[0]=x=>m.$emit("update:modelValue",x.target.value)),id:"algolia-search-input",placeholder:h.value,class:j(u.value),onKeypress:y[1]||(y[1]=G(P(x=>m.$emit("openDrawer"),["prevent"]),["enter"]))},null,42,qo),p("div",{class:j(f.value)},[p("img",{onClick:y[2]||(y[2]=x=>m.$emit("openDrawer")),alt:"search icon",src:w(F)(_.value)},null,8,Uo)],2)]))}},Pe=A(zo,[["__file","DrawerSearch.vue"]]);const Jo={class:"header-layout__search-container"},Xo={key:0,class:"header-layout__search-title"},Yo={__name:"HeaderLayoutSearch",props:{isMobileWidth:{type:Boolean,default:!1},closeSidebarDrawer:{type:Function}},setup(e,{expose:t}){const s=e,{headerSearch:o,algoliaOptions:a}=C("themeConfig"),r=ne(),i=k(!1),l=k(!1),c=k(""),u=k([]);re(()=>c.value,()=>{c.value||(u.value=[])});const f=v=>{u.value=v},_=E(()=>r.value.layout==="HomeLayout"),g=()=>{i.value=!0,l.value=!0,s.closeSidebarDrawer&&s.closeSidebarDrawer()},h=()=>{u.value.length=0,c.value="",i.value=!1,l.value=!1};return t({openDrawer:g,closeDrawer:h,mobileDrawerVisible:l}),(v,m)=>(n(),d("div",Jo,[_.value?(n(),d("h1",Xo,V(w(o)),1)):L("v-if",!0),i.value?(n(),O(Be,{key:1,to:"#drawerSearch"},[S(Pe,{options:w(a),modelValue:c.value,"onUpdate:modelValue":m[0]||(m[0]=y=>c.value=y),isMobileWidth:e.isMobileWidth,onOpenDrawer:g,isOpenDrawer:i.value,onResult:f},null,8,["options","modelValue","isMobileWidth","isOpenDrawer"])])):(n(),O(Pe,{key:2,isMobileWidth:e.isMobileWidth,options:w(a),modelValue:c.value,"onUpdate:modelValue":m[1]||(m[1]=y=>c.value=y),onOpenDrawer:g,isOpenDrawer:i.value,onResult:f},null,8,["isMobileWidth","options","modelValue","isOpenDrawer"])),S(Go,{homeLayoutSearchResult:u.value,modelValue:c.value,"onUpdate:modelValue":m[2]||(m[2]=y=>c.value=y),onCloseDrawer:h,isOpenDrawer:i.value,isMobileWidth:e.isMobileWidth},null,8,["homeLayoutSearchResult","modelValue","isOpenDrawer","isMobileWidth"])]))}},Ce=A(Yo,[["__file","HeaderLayoutSearch.vue"]]);const Qo={class:"header-products-wrapper"},Zo={key:0,class:"dropdown-wrapper"},ea=["href"],ta={key:1,class:"dropdown-wrapper"},sa=["href"],oa=["src"],aa={class:"header-products-wrapper-paragraph"},ra=["src"],ia={__name:"HeaderProducts",props:{isMobileWidth:{type:Boolean}},setup(e){const{productsTitle:t,arrowDownIcon:s,productsList:o,productsURLs:a}=C("themeConfig"),r=k(!1),i=k(null),l=c=>{!c.composedPath().includes(i.value)&&(r.value=!1)};return J(()=>{document.addEventListener("click",l)}),ie(()=>{document.removeEventListener("click",l)}),(c,u)=>(n(),d("div",Qo,[p("div",{ref_key:"menu",ref:i,class:"dropdown"},[e.isMobileWidth?(n(),O(Be,{key:0,to:"body"},[r.value?(n(),d("div",Zo,[(n(!0),d(I,null,B(w(o),(f,_)=>(n(),d("p",{class:"dropdown-content__paragraph",key:f},[p("a",{class:"dropdown-content__link",href:w(a)[_]},V(f),9,ea)]))),128))])):L("v-if",!0)])):L("v-if",!0),r.value&&!e.isMobileWidth?(n(),d("div",ta,[(n(!0),d(I,null,B(w(o),(f,_)=>(n(),d("p",{class:"dropdown-content__paragraph",key:f},[p("a",{class:"dropdown-content__link",href:w(a)[_]},V(f),9,sa)]))),128))])):L("v-if",!0),p("div",{onClick:u[0]||(u[0]=f=>r.value=!r.value),class:"header-products-container"},[p("img",{class:"header-products-container__img",alt:"hamburger menu",src:w(F)("/global/hamburger-menu.svg")},null,8,oa),p("p",aa,V(w(t)),1),p("img",{class:j(["products-icon__default",{"products-icon__rotate":r.value}]),width:"10",height:"8",src:w(F)(w(s)),alt:"arrow down icon"},null,10,ra)])],512)]))}},la=A(ia,[["__file","HeaderProducts.vue"]]);const na={class:"navbar-header"},ca={class:"navbar-header__logo-wrapper"},ua=["src"],da=["src"],pa=["href","onClick"],ha={__name:"HeaderLayout",props:{isMobileWidth:{type:Boolean},closeSidebarDrawer:{type:Function}},setup(e){const{siteLogo:t,defaultURL:s,locales:o,headerDefaultSearchIcon:a}=C("themeConfig"),r=k(null),i=ne(),l=ze(),c=k(null),u=()=>{var h;return(h=c==null?void 0:c.value)==null?void 0:h.openDrawer()},f=E(()=>i.value.layout==="HomeLayout"),_=E(()=>(l.value+s).replace(/\/+/g,"/")),g=h=>{if(h.type)switch(h.type){case"event":var h=new CustomEvent(h.name);document.dispatchEvent(h)}};return(h,v)=>{var y;const m=oe("router-link");return n(),d("header",{class:j(["navbar",{fixed:!f.value}])},[p("div",na,[p("div",ca,[S(m,{to:_.value,class:"home-link"},{default:W(()=>[w(t)?(n(),d("img",{key:0,class:"logo",src:w(F)(w(t)),alt:"logo header"},null,8,ua)):L("v-if",!0)]),_:1},8,["to"]),f.value?L("v-if",!0):(n(),O(Ce,{key:0,closeSidebarDrawer:e.closeSidebarDrawer,ref_key:"headerLayoutSearch",ref:c,class:j({"header-mobile__hidden":!((y=c.value)!=null&&y.mobileDrawerVisible)}),isMobileWidth:e.isMobileWidth},null,8,["closeSidebarDrawer","class","isMobileWidth"]))]),p("div",{class:"links",style:vt({"max-width":r.value+"px"})},[p("img",{onClick:u,class:"navbar-header__mobile-search",src:w(F)(w(a)),alt:"icon image"},null,8,da),S(la,{isMobileWidth:e.isMobileWidth},null,8,["isMobileWidth"]),(n(!0),d(I,null,B(w(o).navbarLinks,x=>(n(),d("a",{href:x.url,target:"_blank",class:j(x.class),onClick:$=>g(x.event)},V(x.text),11,pa))),256))],4)]),f.value?(n(),O(Ce,{key:0,closeSidebarDrawer:e.closeSidebarDrawer,ref_key:"headerLayoutSearch",ref:c,isMobileWidth:e.isMobileWidth},null,8,["closeSidebarDrawer","isMobileWidth"])):L("v-if",!0)],2)}}},tt=A(ha,[["__file","HeaderLayout.vue"]]);const fa=e=>(mt("data-v-1eb13e00"),e=e(),_t(),e),va={class:"back-to-top"},ma=fa(()=>p("span",{class:"back-to-top__link-span"},"Scroll up",-1)),_a=[ma],ga={__name:"BackToTop",props:{boundary:{type:Number,default:200}},setup(e){const t=e,s=k(!1),o=()=>{window&&(s.value=window.pageYOffset>t.boundary)},a=()=>{document.body.scrollTop=0,document.documentElement.scrollTop=0};return J(()=>{window&&(o(),window.addEventListener("scroll",o))}),ie(()=>{window&&window.removeEventListener("scroll",o)}),(r,i)=>(n(),d("div",va,[p("a",{class:j([{active:s.value},"nav-arrow top back-to-top__link"]),onClick:a},_a,2)]))}},ba=A(ga,[["__scopeId","data-v-1eb13e00"],["__file","BackToTop.vue"]]);const ya={class:"breadcrumb-wrapper"},wa={class:"breadcrumb-title"},Sa={__name:"Breadcrumb",setup(e){const t=Z(),{locales:{siteTitle:s}}=C("themeConfig"),o=E(()=>{const a=[];return t.value.path!=="/"&&a.push({path:t.value.path,title:t.value.title}),a});return(a,r)=>{const i=oe("router-link");return n(),d("div",ya,[p("span",wa,V(w(s))+":",1),(n(!0),d(I,null,B(o.value,l=>(n(),O(i,{class:"breadcrumb",key:l.path,to:l.path},{default:W(()=>[M(V(l.title),1)]),_:2},1032,["to"]))),128))])}}},La=A(Sa,[["__scopeId","data-v-9445381a"],["__file","Breadcrumb.vue"]]);const Oa={key:0,class:"page-nav"},Ea={__name:"PageNav",props:{sidebarItems:{type:Array,default:()=>[]},allPages:{type:Array}},setup(e){const t=e,s=ze(),o=Z(),a=E(()=>{const u=o.value.frontmatter.prev;return u===!1?null:u?fe(t.allPages,u,s):i(o.value,t.sidebarItems)}),r=E(()=>{const u=o.value.frontmatter.next;return u===!1?null:u?fe(t.allPages,u,s):l(o.value,t.sidebarItems)}),i=(u,f)=>c(u,f,-1),l=(u,f)=>c(u,f,1),c=(u,f,_)=>{const g=[];f.forEach(h=>{h.type==="group"?g.push(...h.children||[]):g.push(h)});for(let h=0;h{const _=oe("router-link");return a.value||r.value?(n(),d("div",Oa,[a.value?(n(),O(_,{key:0,class:"nav-arrow left",to:a.value.path},null,8,["to"])):L("v-if",!0),r.value?(n(),O(_,{key:1,class:"nav-arrow right",to:r.value.path},null,8,["to"])):L("v-if",!0)])):L("v-if",!0)}}},Da=A(Ea,[["__file","PageNav.vue"]]);const $a={class:"page"},Va=["src"],ka={class:"page-nav-wrapper"},xa={key:0,class:"page-edit"},Aa={class:"edit-link"},Ta=["src"],Pa=["href"],Ca={__name:"Page",props:{sidebarItems:{type:Array,default:()=>[]},allPages:{type:Array,default:()=>[]},isMobileWidth:{type:Boolean}},setup(e,{expose:t}){const s=e,{githubEditIcon:o,githubRepository:a,allowGithubEdit:r,githubMainDir:i="",githubBranch:l="master",docsRepo:c=a,editLinkText:u}=C("themeConfig"),f=Z();Ke();const _=ne(),g=k(s.isMobileWidth),h=()=>g.value=!0,v=()=>g.value=!1,m=E(()=>{if(_.value.editLink===!1)return;let $=ae(f.value.path);if(te.test($)?$+="README.md":$+=".md",c&&r)return x(a,c,i,l,$)}),y=E(()=>u||"Edit this page"),x=($,H,R,K,$e)=>/bitbucket.org/.test($)?(we.test(H)?H:$).replace(te,"")+`/${K}`+(R?"/"+R.replace(te,""):"")+$e+`?mode=edit&spa=0&at=${K}&fileviewer=file-view-default`:(we.test(H)?H:`https://github.com/${H}`).replace(te,"")+`/tree/${K}`+(R?"/"+R.replace(te,""):"")+$e;return t({isOpenMobileSidebarMenu:g,closeSidebarDrawer:v}),($,H)=>{const R=oe("Content");return n(),d("div",$a,[D($.$slots,"top"),S(La,{class:"page-breadcrumb"}),p("img",{onClick:h,class:"page-mobile__sidebar-menu",src:w(F)("/global/sidebar-menu.svg"),alt:"sidebar hamburger menu"},null,8,Va),p("div",ka,[S(Da,{"sidebar-items":e.sidebarItems,allPages:e.allPages},null,8,["sidebar-items","allPages"])]),S(R,{class:"content",custom:!1}),w(r)?(n(),d("div",xa,[p("div",Aa,[p("img",{src:w(F)(w(o)),alt:"icon pen"},null,8,Ta),p("a",{href:m.value,target:"_blank",rel:"noopener noreferrer"},V(y.value),9,Pa)])])):L("v-if",!0),S(ba),D($.$slots,"bottom")])}}},Ra=A(Ca,[["__file","Page.vue"]]);const Ia={class:"theme-container"},Ma={key:0,class:"sidebar-header"},Ba=p("p",{class:"sidebar-header__paragraph"},"Select TuxCare docs",-1),Ha={__name:"Layout",setup(e){const{documents:t,MOBILE_BREAKPOINT:s}=C("themeConfig"),o=k(null),a=k(null),r=_e(),i=me(),l=Z(),c=k([]),u=k(!1),f=E(()=>l.value&&c.value.length?Xe(l.value,i,c.value):[]),_=v=>r.push(v.link),g=()=>{var y;const v=(y=l.value)==null?void 0:y.path,m=v.indexOf("/",v.indexOf("/")+1);return v.substr(0,m)},h=()=>{u.value=window.innerWidth<=s};return J(()=>{Object.values(Le).map(v=>v().then(m=>{c.value.push(m)})),a.value=t.find(v=>{var m;return(m=v.link)==null?void 0:m.startsWith(g())}),window.addEventListener("resize",h),u.value=window.innerWidth<=s}),ie(()=>{window.removeEventListener("resize",h)}),(v,m)=>{var y,x,$,H,R;return n(),d("div",Ia,[S(tt,{closeSidebarDrawer:(y=o.value)==null?void 0:y.closeSidebarDrawer,isMobileWidth:u.value},null,8,["closeSidebarDrawer","isMobileWidth"]),c.value.length&&!((x=o.value)!=null&&x.isOpenMobileSidebarMenu)&&!u.value?(n(),O(Ze,{key:0,items:c.value,closeSidebarDrawer:($=o.value)==null?void 0:$.closeSidebarDrawer},{top:W(()=>[w(t)?(n(),d("div",Ma,[Ba,S(et,{"with-icon":"",modelValue:a.value,"onUpdate:modelValue":m[0]||(m[0]=K=>a.value=K),onChangeSidebarItems:_,options:w(t)},null,8,["modelValue","options"])])):L("v-if",!0)]),_:1},8,["items","closeSidebarDrawer"])):L("v-if",!0),S(Ra,{ref_key:"pageRef",ref:o,sidebarItems:f.value,allPages:c.value,isMobileWidth:u.value},null,8,["sidebarItems","allPages","isMobileWidth"]),c.value.length&&((H=o.value)!=null&&H.isOpenMobileSidebarMenu)&&u.value?(n(),O(po,{key:1,onChangeSidebarItems:_,"all-pages":c.value,documents:w(t),modelValue:a.value,"onUpdate:modelValue":m[1]||(m[1]=K=>a.value=K),closeSidebarDrawer:(R=o.value)==null?void 0:R.closeSidebarDrawer,isMobileWidth:u.value},null,8,["all-pages","documents","modelValue","closeSidebarDrawer","isMobileWidth"])):L("v-if",!0),S(pe)])}}},ja=A(Ha,[["__file","Layout.vue"]]);const Fa={class:"docs-card-container"},Wa={class:"docs-card-container__header"},Na=["src"],Ga={key:0,class:"docs-card-container__header-paragraph"},Ka={class:"docs-card-container__main"},qa={key:0,class:"docs-card-container__main-paragraph"},Ua={class:"docs-card-container__footer"},za={__name:"DocsCard",props:{card:{type:Object,default:null}},setup(e){const t=e,s=_e(),o=()=>{var a;return s.push((a=t.card)==null?void 0:a.link)};return(a,r)=>(n(),d("div",Fa,[p("div",Wa,[p("img",{width:"20",height:"20",src:w(F)("collections-bookmark.svg"),alt:"document icon"},null,8,Na),e.card.title?(n(),d("p",Ga,V(e.card.title),1)):L("v-if",!0)]),p("div",Ka,[e.card.description?(n(),d("p",qa,V(e.card.description),1)):L("v-if",!0)]),p("div",Ua,[p("button",{onClick:r[0]||(r[0]=i=>o()),class:"docs-card-container__footer-btn"},"View Documentation")])]))}},Ja=A(za,[["__file","DocsCard.vue"]]);const Xa={class:"docs-cards-wrapper"},Ya={__name:"DocsCardsWrapper",setup(e){const{documents:t}=C("themeConfig");return(s,o)=>(n(),d("div",Xa,[(n(!0),d(I,null,B(w(t),(a,r)=>(n(),O(Ja,{key:r,card:a},null,8,["card"]))),128))]))}},Qa=A(Ya,[["__file","DocsCardsWrapper.vue"]]),Za={class:"theme-container"},er={__name:"HomeLayout",setup(e){const{MOBILE_BREAKPOINT:t}=C("themeConfig"),s=k(!1),o=()=>s.value=window.innerWidth<=t;return J(()=>{window.addEventListener("resize",o),s.value=window.innerWidth<=t}),ie(()=>window.removeEventListener("resize",o)),(a,r)=>(n(),d("div",Za,[S(tt,{isMobileWidth:s.value},null,8,["isMobileWidth"]),S(Qa),S(pe)]))}},tr=A(er,[["__file","HomeLayout.vue"]]),sr={class:"theme-container"},or={__name:"NotFound",setup(e){const t=me(),s=_e();k([]);const o=[{from:"cloudlinux-os-plus/#get-started",to:"shared-pro/accelerate-wp/#get-started"},{from:"cloudlinux-os-plus/#setup-upgrade-url-for-acceleratewp-premium",to:"shared-pro/accelerate-wp/#setup-upgrade-url-for-acceleratewp-premium"},{from:"cloudlinux-os-plus",to:"shared-pro"},{from:"cagefs.html",to:"shared/cloudlinux_os_components/#cagefs"},{from:"index.html?cagefs_installation.html",to:"shared/cloudlinux_os_components/#installation-and-update-1"},{from:"mod_lsapi_troubleshooting.html",to:"shared/cloudlinux_os_components/#troubleshooting-3"}];return J(()=>{const a=t.path+t.hash,r=new RegExp(a,"gi");let i=!1;const l=(u,f)=>{var _;if(!i&&((_=u.children)==null?void 0:_.length)>0)for(let g of u.children){const h=f+"/"+g.link;if(h.search(r)!==-1){s.push(h),i=!0;return}u.children.length>0&&l(g,f)}};(async()=>{var _;const u=Object==null?void 0:Object.values(Le);let f=!1;for(let g of o)if(a.search(g.from)!==-1){const h=a.replace(g.from,g.to);s.push(h),f=!0;return}f||(window.location.href="/not-found.html");for(let g of u){const h=await g();let v=h.path;if(v.at(-1)==="/"&&(v=v.slice(0,-1)),((_=h.headers)==null?void 0:_.length)>0)for(let m of h.headers){const y=v+"/"+m.link;if(y.search(r)!==-1){s.push(y),i=!0;return}l(m,v)}}})()}),(a,r)=>(n(),d("div",sr))}},ar=A(or,[["__file","NotFound.vue"]]),rr=[{text:"Knowledge base",url:"https://cloudlinux.zendesk.com/hc/en-us/categories/360002375960-KernelCare"},{text:"Forum",url:"https://forum.cloudlinux.com/forum/tuxcare"},{text:"Blog",url:"https://blog.tuxcare.com/"},{text:"Privacy Policy",url:"https://www.cloudlinux.com/privacy-policy/"}],ir=[{text:"Ask GPT?",event:{type:"event",name:"botui-open"},class:"btn"},{text:"Submit support request",url:"https://www.tuxcare.com/support-portal/",class:"btn"},{text:"Submit your idea",url:"https://features.tuxcare.com/submit-idea/",class:"btn"}],lr=[{title:"TuxCare",description:"services automate, simplify, and enhance Linux operations, giving organizations more flexibility in managing Linux distro choices and versions, significant maintenance cost reductions, and greatly enhanced security and compliance postures.",link:"/tuxcare/"},{title:"Enterprise Support for AlmaLinux",description:"provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, delivers an extension of an additional 4.5 years of security fixes for Critical and High-risk vulnerabilities and FIPS-compliant security patches for select AlmaLinux minor versions, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.",link:"/enterprise-support-for-almalinux/"},{title:"KernelCare Enterprise",description:"is a live kernel patching service that provides security patches and bugfixes for a range of popular Linux kernels that can be installed without rebooting the system.",link:"/live-patching-services/"},{title:"KernelCare for IOT",description:"provides live security patching for ARM64-based embedded systems for enterprise IoT users and original equipment manufacturers.",link:"/kernelcare-for-iot/"},{title:"ePortal",description:"TuxCare ePortal is the web management console dedicated to KernelCare Enterprise live patch management.",link:"/eportal/"},{title:"ePortal API",description:"is a complete API for everyday use.",link:"/eportal-api/"},{title:"Extended Lifecycle Support",description:"allows you to continue running your Linux server after the operating system’s end of life.",link:"/extended-lifecycle-support/"},{title:"Extended Lifecycle Support for Languages",description:"provides security fixes for PHP and Python versions that have reached their end-of-life which allows to continue running Linux server vulnerability-free.",link:"/extended-lifecycle-support-for-languages/"},{title:"Subscription Management Portal",description:"The TuxCare subscription management portal is designed to easily manage your licenses of TuxCare products and services by means of a user-friendly interface.",link:"/tuxcare-cln/"},{title:"Service Descriptions",description:"AlmaCare service description",link:"/service-descriptions/"}],nr=[{url:"https://www.facebook.com/tuxcare/",icon:"footer-social/fb.png"},{url:"https://twitter.com/tuxcare_/",icon:"footer-social/tw.png"},{url:"https://linkedin.com/company/tuxcare",icon:"footer-social/in.png"},{url:"https://www.youtube.com/@TuxCare",icon:"footer-social/ytube.png"}];function ge(e){return e===0?!1:Array.isArray(e)&&e.length===0?!0:!e}function cr(e){return(...t)=>!e(...t)}function ur(e,t){return e===void 0&&(e="undefined"),e===null&&(e="null"),e===!1&&(e="false"),e.toString().toLowerCase().indexOf(t.trim())!==-1}function st(e,t,s,o){return t?e.filter(a=>ur(o(a,s),t)).sort((a,r)=>o(a,s).length-o(r,s).length):e}function dr(e){return e.filter(t=>!t.$isLabel)}function be(e,t){return s=>s.reduce((o,a)=>a[e]&&a[e].length?(o.push({$groupLabel:a[t],$isLabel:!0}),o.concat(a[e])):o,[])}function pr(e,t,s,o,a){return r=>r.map(i=>{if(!i[s])return console.warn("Options passed to vue-multiselect do not contain groups, despite the config."),[];const l=st(i[s],e,t,a);return l.length?{[o]:i[o],[s]:l}:[]})}const Re=(...e)=>t=>e.reduce((s,o)=>o(s),t);var hr={data(){return{search:"",isOpen:!1,preferredOpenDirection:"below",optimizedHeight:this.maxHeight}},props:{internalSearch:{type:Boolean,default:!0},options:{type:Array,required:!0},multiple:{type:Boolean,default:!1},trackBy:{type:String},label:{type:String},searchable:{type:Boolean,default:!0},clearOnSelect:{type:Boolean,default:!0},hideSelected:{type:Boolean,default:!1},placeholder:{type:String,default:"Select option"},allowEmpty:{type:Boolean,default:!0},resetAfter:{type:Boolean,default:!1},closeOnSelect:{type:Boolean,default:!0},customLabel:{type:Function,default(e,t){return ge(e)?"":t?e[t]:e}},taggable:{type:Boolean,default:!1},tagPlaceholder:{type:String,default:"Press enter to create a tag"},tagPosition:{type:String,default:"top"},max:{type:[Number,Boolean],default:!1},id:{default:null},optionsLimit:{type:Number,default:1e3},groupValues:{type:String},groupLabel:{type:String},groupSelect:{type:Boolean,default:!1},blockKeys:{type:Array,default(){return[]}},preserveSearch:{type:Boolean,default:!1},preselectFirst:{type:Boolean,default:!1},preventAutofocus:{type:Boolean,default:!1}},mounted(){!this.multiple&&this.max&&console.warn("[Vue-Multiselect warn]: Max prop should not be used when prop Multiple equals false."),this.preselectFirst&&!this.internalValue.length&&this.options.length&&this.select(this.filteredOptions[0])},computed:{internalValue(){return this.modelValue||this.modelValue===0?Array.isArray(this.modelValue)?this.modelValue:[this.modelValue]:[]},filteredOptions(){const e=this.search||"",t=e.toLowerCase().trim();let s=this.options.concat();return this.internalSearch?s=this.groupValues?this.filterAndFlat(s,t,this.label):st(s,t,this.label,this.customLabel):s=this.groupValues?be(this.groupValues,this.groupLabel)(s):s,s=this.hideSelected?s.filter(cr(this.isSelected)):s,this.taggable&&t.length&&!this.isExistingOption(t)&&(this.tagPosition==="bottom"?s.push({isTag:!0,label:e}):s.unshift({isTag:!0,label:e})),s.slice(0,this.optionsLimit)},valueKeys(){return this.trackBy?this.internalValue.map(e=>e[this.trackBy]):this.internalValue},optionKeys(){return(this.groupValues?this.flatAndStrip(this.options):this.options).map(t=>this.customLabel(t,this.label).toString().toLowerCase())},currentOptionLabel(){return this.multiple?this.searchable?"":this.placeholder:this.internalValue.length?this.getOptionLabel(this.internalValue[0]):this.searchable?"":this.placeholder}},watch:{internalValue:{handler(){this.resetAfter&&this.internalValue.length&&(this.search="",this.$emit("update:modelValue",this.multiple?[]:null))},deep:!0},search(){this.$emit("search-change",this.search)}},emits:["open","search-change","close","select","update:modelValue","remove","tag"],methods:{getValue(){return this.multiple?this.internalValue:this.internalValue.length===0?null:this.internalValue[0]},filterAndFlat(e,t,s){return Re(pr(t,s,this.groupValues,this.groupLabel,this.customLabel),be(this.groupValues,this.groupLabel))(e)},flatAndStrip(e){return Re(be(this.groupValues,this.groupLabel),dr)(e)},updateSearch(e){this.search=e},isExistingOption(e){return this.options?this.optionKeys.indexOf(e)>-1:!1},isSelected(e){const t=this.trackBy?e[this.trackBy]:e;return this.valueKeys.indexOf(t)>-1},isOptionDisabled(e){return!!e.$isDisabled},getOptionLabel(e){if(ge(e))return"";if(e.isTag)return e.label;if(e.$isLabel)return e.$groupLabel;const t=this.customLabel(e,this.label);return ge(t)?"":t},select(e,t){if(e.$isLabel&&this.groupSelect){this.selectGroup(e);return}if(!(this.blockKeys.indexOf(t)!==-1||this.disabled||e.$isDisabled||e.$isLabel)&&!(this.max&&this.multiple&&this.internalValue.length===this.max)&&!(t==="Tab"&&!this.pointerDirty)){if(e.isTag)this.$emit("tag",e.label,this.id),this.search="",this.closeOnSelect&&!this.multiple&&this.deactivate();else{if(this.isSelected(e)){t!=="Tab"&&this.removeElement(e);return}this.multiple?this.$emit("update:modelValue",this.internalValue.concat([e])):this.$emit("update:modelValue",e),this.$emit("select",e,this.id),this.clearOnSelect&&(this.search="")}this.closeOnSelect&&this.deactivate()}},selectGroup(e){const t=this.options.find(s=>s[this.groupLabel]===e.$groupLabel);if(t){if(this.wholeGroupSelected(t)){this.$emit("remove",t[this.groupValues],this.id);const s=this.internalValue.filter(o=>t[this.groupValues].indexOf(o)===-1);this.$emit("update:modelValue",s)}else{let s=t[this.groupValues].filter(o=>!(this.isOptionDisabled(o)||this.isSelected(o)));this.max&&s.splice(this.max-this.internalValue.length),this.$emit("select",s,this.id),this.$emit("update:modelValue",this.internalValue.concat(s))}this.closeOnSelect&&this.deactivate()}},wholeGroupSelected(e){return e[this.groupValues].every(t=>this.isSelected(t)||this.isOptionDisabled(t))},wholeGroupDisabled(e){return e[this.groupValues].every(this.isOptionDisabled)},removeElement(e,t=!0){if(this.disabled||e.$isDisabled)return;if(!this.allowEmpty&&this.internalValue.length<=1){this.deactivate();return}const s=typeof e=="object"?this.valueKeys.indexOf(e[this.trackBy]):this.valueKeys.indexOf(e);if(this.multiple){const o=this.internalValue.slice(0,s).concat(this.internalValue.slice(s+1));this.$emit("update:modelValue",o)}else this.$emit("update:modelValue",null);this.$emit("remove",e,this.id),this.closeOnSelect&&t&&this.deactivate()},removeLastElement(){this.blockKeys.indexOf("Delete")===-1&&this.search.length===0&&Array.isArray(this.internalValue)&&this.internalValue.length&&this.removeElement(this.internalValue[this.internalValue.length-1],!1)},activate(){this.isOpen||this.disabled||(this.adjustPosition(),this.groupValues&&this.pointer===0&&this.filteredOptions.length&&(this.pointer=1),this.isOpen=!0,this.searchable?(this.preserveSearch||(this.search=""),this.preventAutofocus||this.$nextTick(()=>this.$refs.search&&this.$refs.search.focus())):this.preventAutofocus||typeof this.$el<"u"&&this.$el.focus(),this.$emit("open",this.id))},deactivate(){this.isOpen&&(this.isOpen=!1,this.searchable?typeof this.$refs.search<"u"&&this.$refs.search.blur():typeof this.$el<"u"&&this.$el.blur(),this.preserveSearch||(this.search=""),this.$emit("close",this.getValue(),this.id))},toggle(){this.isOpen?this.deactivate():this.activate()},adjustPosition(){if(typeof window>"u")return;const e=this.$el.getBoundingClientRect().top,t=window.innerHeight-this.$el.getBoundingClientRect().bottom;t>this.maxHeight||t>e||this.openDirection==="below"||this.openDirection==="bottom"?(this.preferredOpenDirection="below",this.optimizedHeight=Math.min(t-40,this.maxHeight)):(this.preferredOpenDirection="above",this.optimizedHeight=Math.min(e-40,this.maxHeight))}}},fr={data(){return{pointer:0,pointerDirty:!1}},props:{showPointer:{type:Boolean,default:!0},optionHeight:{type:Number,default:40}},computed:{pointerPosition(){return this.pointer*this.optionHeight},visibleElements(){return this.optimizedHeight/this.optionHeight}},watch:{filteredOptions(){this.pointerAdjust()},isOpen(){this.pointerDirty=!1},pointer(){this.$refs.search&&this.$refs.search.setAttribute("aria-activedescendant",this.id+"-"+this.pointer.toString())}},methods:{optionHighlight(e,t){return{"multiselect__option--highlight":e===this.pointer&&this.showPointer,"multiselect__option--selected":this.isSelected(t)}},groupHighlight(e,t){if(!this.groupSelect)return["multiselect__option--disabled",{"multiselect__option--group":t.$isLabel}];const s=this.options.find(o=>o[this.groupLabel]===t.$groupLabel);return s&&!this.wholeGroupDisabled(s)?["multiselect__option--group",{"multiselect__option--highlight":e===this.pointer&&this.showPointer},{"multiselect__option--group-selected":this.wholeGroupSelected(s)}]:"multiselect__option--disabled"},addPointerElement({key:e}="Enter"){this.filteredOptions.length>0&&this.select(this.filteredOptions[this.pointer],e),this.pointerReset()},pointerForward(){this.pointer0?(this.pointer--,this.$refs.list.scrollTop>=this.pointerPosition&&(this.$refs.list.scrollTop=this.pointerPosition),this.filteredOptions[this.pointer]&&this.filteredOptions[this.pointer].$isLabel&&!this.groupSelect&&this.pointerBackward()):this.filteredOptions[this.pointer]&&this.filteredOptions[0].$isLabel&&!this.groupSelect&&this.pointerForward(),this.pointerDirty=!0},pointerReset(){this.closeOnSelect&&(this.pointer=0,this.$refs.list&&(this.$refs.list.scrollTop=0))},pointerAdjust(){this.pointer>=this.filteredOptions.length-1&&(this.pointer=this.filteredOptions.length?this.filteredOptions.length-1:0),this.filteredOptions.length>0&&this.filteredOptions[this.pointer].$isLabel&&!this.groupSelect&&this.pointerForward()},pointerSet(e){this.pointer=e,this.pointerDirty=!0}}},ot={name:"vue-multiselect",mixins:[hr,fr],compatConfig:{MODE:3,ATTR_ENUMERATED_COERCION:!1},props:{name:{type:String,default:""},modelValue:{type:null,default(){return[]}},selectLabel:{type:String,default:"Press enter to select"},selectGroupLabel:{type:String,default:"Press enter to select group"},selectedLabel:{type:String,default:"Selected"},deselectLabel:{type:String,default:"Press enter to remove"},deselectGroupLabel:{type:String,default:"Press enter to deselect group"},showLabels:{type:Boolean,default:!0},limit:{type:Number,default:99999},maxHeight:{type:Number,default:300},limitText:{type:Function,default:e=>`and ${e} more`},loading:{type:Boolean,default:!1},disabled:{type:Boolean,default:!1},openDirection:{type:String,default:""},showNoOptions:{type:Boolean,default:!0},showNoResults:{type:Boolean,default:!0},tabindex:{type:Number,default:0}},computed:{hasOptionGroup(){return this.groupValues&&this.groupLabel&&this.groupSelect},isSingleLabelVisible(){return(this.singleValue||this.singleValue===0)&&(!this.isOpen||!this.searchable)&&!this.visibleValues.length},isPlaceholderVisible(){return!this.internalValue.length&&(!this.searchable||!this.isOpen)},visibleValues(){return this.multiple?this.internalValue.slice(0,this.limit):[]},singleValue(){return this.internalValue[0]},deselectLabelText(){return this.showLabels?this.deselectLabel:""},deselectGroupLabelText(){return this.showLabels?this.deselectGroupLabel:""},selectLabelText(){return this.showLabels?this.selectLabel:""},selectGroupLabelText(){return this.showLabels?this.selectGroupLabel:""},selectedLabelText(){return this.showLabels?this.selectedLabel:""},inputStyle(){return this.searchable||this.multiple&&this.modelValue&&this.modelValue.length?this.isOpen?{width:"100%"}:{width:"0",position:"absolute",padding:"0"}:""},contentStyle(){return this.options.length?{display:"inline-block"}:{display:"block"}},isAbove(){return this.openDirection==="above"||this.openDirection==="top"?!0:this.openDirection==="below"||this.openDirection==="bottom"?!1:this.preferredOpenDirection==="above"},showSearchInput(){return this.searchable&&(this.hasSingleSelectedSlot&&(this.visibleSingleValue||this.visibleSingleValue===0)?this.isOpen:!0)}}};const vr={ref:"tags",class:"multiselect__tags"},mr={class:"multiselect__tags-wrap"},_r={class:"multiselect__spinner"},gr={key:0},br={class:"multiselect__option"},yr={class:"multiselect__option"},wr=M("No elements found. Consider changing the search query."),Sr={class:"multiselect__option"},Lr=M("List is empty.");function Or(e,t,s,o,a,r){return n(),O("div",{tabindex:e.searchable?-1:s.tabindex,class:[{"multiselect--active":e.isOpen,"multiselect--disabled":s.disabled,"multiselect--above":r.isAbove,"multiselect--has-options-group":r.hasOptionGroup},"multiselect"],onFocus:t[14]||(t[14]=i=>e.activate()),onBlur:t[15]||(t[15]=i=>e.searchable?!1:e.deactivate()),onKeydown:[t[16]||(t[16]=G(P(i=>e.pointerForward(),["self","prevent"]),["down"])),t[17]||(t[17]=G(P(i=>e.pointerBackward(),["self","prevent"]),["up"]))],onKeypress:t[18]||(t[18]=G(P(i=>e.addPointerElement(i),["stop","self"]),["enter","tab"])),onKeyup:t[19]||(t[19]=G(i=>e.deactivate(),["esc"])),role:"combobox","aria-owns":"listbox-"+e.id},[D(e.$slots,"caret",{toggle:e.toggle},()=>[S("div",{onMousedown:t[1]||(t[1]=P(i=>e.toggle(),["prevent","stop"])),class:"multiselect__select"},null,32)]),D(e.$slots,"clear",{search:e.search}),S("div",vr,[D(e.$slots,"selection",{search:e.search,remove:e.removeElement,values:r.visibleValues,isOpen:e.isOpen},()=>[Y(S("div",mr,[(n(!0),O(I,null,B(r.visibleValues,(i,l)=>D(e.$slots,"tag",{option:i,search:e.search,remove:e.removeElement},()=>[(n(),O("span",{class:"multiselect__tag",key:l},[S("span",{textContent:V(e.getOptionLabel(i))},null,8,["textContent"]),S("i",{tabindex:"1",onKeypress:G(P(c=>e.removeElement(i),["prevent"]),["enter"]),onMousedown:P(c=>e.removeElement(i),["prevent"]),class:"multiselect__tag-icon"},null,40,["onKeypress","onMousedown"])]))])),256))],512),[[Q,r.visibleValues.length>0]]),e.internalValue&&e.internalValue.length>s.limit?D(e.$slots,"limit",{key:0},()=>[S("strong",{class:"multiselect__strong",textContent:V(s.limitText(e.internalValue.length-s.limit))},null,8,["textContent"])]):L("v-if",!0)]),S(de,{name:"multiselect__loading"},{default:W(()=>[D(e.$slots,"loading",{},()=>[Y(S("div",_r,null,512),[[Q,s.loading]])])]),_:3}),e.searchable?(n(),O("input",{key:0,ref:"search",name:s.name,id:e.id,type:"text",autocomplete:"off",spellcheck:"false",placeholder:e.placeholder,style:r.inputStyle,value:e.search,disabled:s.disabled,tabindex:s.tabindex,onInput:t[2]||(t[2]=i=>e.updateSearch(i.target.value)),onFocus:t[3]||(t[3]=P(i=>e.activate(),["prevent"])),onBlur:t[4]||(t[4]=P(i=>e.deactivate(),["prevent"])),onKeyup:t[5]||(t[5]=G(i=>e.deactivate(),["esc"])),onKeydown:[t[6]||(t[6]=G(P(i=>e.pointerForward(),["prevent"]),["down"])),t[7]||(t[7]=G(P(i=>e.pointerBackward(),["prevent"]),["up"])),t[9]||(t[9]=G(P(i=>e.removeLastElement(),["stop"]),["delete"]))],onKeypress:t[8]||(t[8]=G(P(i=>e.addPointerElement(i),["prevent","stop","self"]),["enter"])),class:"multiselect__input","aria-controls":"listbox-"+e.id},null,44,["name","id","placeholder","value","disabled","tabindex","aria-controls"])):L("v-if",!0),r.isSingleLabelVisible?(n(),O("span",{key:1,class:"multiselect__single",onMousedown:t[10]||(t[10]=P((...i)=>e.toggle&&e.toggle(...i),["prevent"]))},[D(e.$slots,"singleLabel",{option:r.singleValue},()=>[M(V(e.currentOptionLabel),1)])],32)):L("v-if",!0),r.isPlaceholderVisible?(n(),O("span",{key:2,class:"multiselect__placeholder",onMousedown:t[11]||(t[11]=P((...i)=>e.toggle&&e.toggle(...i),["prevent"]))},[D(e.$slots,"placeholder",{},()=>[M(V(e.placeholder),1)])],32)):L("v-if",!0)],512),S(de,{name:"multiselect"},{default:W(()=>[Y(S("div",{class:"multiselect__content-wrapper",onFocus:t[12]||(t[12]=(...i)=>e.activate&&e.activate(...i)),tabindex:"-1",onMousedown:t[13]||(t[13]=P(()=>{},["prevent"])),style:{maxHeight:e.optimizedHeight+"px"},ref:"list"},[S("ul",{class:"multiselect__content",style:r.contentStyle,role:"listbox",id:"listbox-"+e.id},[D(e.$slots,"beforeList"),e.multiple&&e.max===e.internalValue.length?(n(),O("li",gr,[S("span",br,[D(e.$slots,"maxElements",{},()=>[M("Maximum of "+V(e.max)+" options selected. First remove a selected option to select another.",1)])])])):L("v-if",!0),!e.max||e.internalValue.length(n(),O("li",{class:"multiselect__element",key:l,id:e.id+"-"+l,role:i&&(i.$isLabel||i.$isDisabled)?null:"option"},[i&&(i.$isLabel||i.$isDisabled)?L("v-if",!0):(n(),O("span",{key:0,class:[e.optionHighlight(l,i),"multiselect__option"],onClick:P(c=>e.select(i),["stop"]),onMouseenter:P(c=>e.pointerSet(l),["self"]),"data-select":i&&i.isTag?e.tagPlaceholder:r.selectLabelText,"data-selected":r.selectedLabelText,"data-deselect":r.deselectLabelText},[D(e.$slots,"option",{option:i,search:e.search,index:l},()=>[S("span",null,V(e.getOptionLabel(i)),1)])],42,["onClick","onMouseenter","data-select","data-selected","data-deselect"])),i&&(i.$isLabel||i.$isDisabled)?(n(),O("span",{key:1,"data-select":e.groupSelect&&r.selectGroupLabelText,"data-deselect":e.groupSelect&&r.deselectGroupLabelText,class:[e.groupHighlight(l,i),"multiselect__option"],onMouseenter:P(c=>e.groupSelect&&e.pointerSet(l),["self"]),onMousedown:P(c=>e.selectGroup(i),["prevent"])},[D(e.$slots,"option",{option:i,search:e.search,index:l},()=>[S("span",null,V(e.getOptionLabel(i)),1)])],42,["data-select","data-deselect","onMouseenter","onMousedown"])):L("v-if",!0)],8,["id","role"]))),128)):L("v-if",!0),Y(S("li",null,[S("span",yr,[D(e.$slots,"noResult",{search:e.search},()=>[wr])])],512),[[Q,s.showNoResults&&e.filteredOptions.length===0&&e.search&&!s.loading]]),Y(S("li",null,[S("span",Sr,[D(e.$slots,"noOptions",{},()=>[Lr])])],512),[[Q,s.showNoOptions&&(e.options.length===0||r.hasOptionGroup===!0&&e.filteredOptions.length===0)&&!e.search&&!s.loading]]),D(e.$slots,"afterList")],12,["id"])],36),[[Q,e.isOpen]])]),_:3})],42,["tabindex","aria-owns"])}ot.render=Or;const Ie="/assets/bot-6afebef6.png";const Er={components:{BotIcon:Ie,Multiselect:ot},data(){return{dynamicComponent:null,messages:[],isConnected:!1,waitResponse:!1,botOptions:{botAvatarImg:Ie,botTitle:"AI Bot",colorScheme:"#314659",boardContentBg:"#f4f4f4",msgBubbleBgBot:"#fff",msgBubbleBgUser:"#314659",inputPlaceholder:"Ask a new question"},docName:"tuxcare-documentation",tags:[],options:[{name:"TuxCare",value:["level-0","tuxcare"]},{name:"AlmaCare",value:["level-0","almacare"]},{name:"KernelCare Enterprise",value:["level-0","live-patching-services"]},{name:"KernelCare for IOT",value:["level-0","kernelcare-for-iot"]},{name:"ePortal",value:["level-0","eportal"]},{name:"ePortal API",value:["level-0","eportal-api"]},{name:"Extended Lifecycle Support",value:["level-0","extended-lifecycle-support"]},{name:"Extended Lifecycle Support for Languages",value:["level-0","extended-lifecycle-support-for-languages"]},{name:"Subscription Management Portal",value:["level-0","tuxcare-cln"]},{name:"Service Descriptions",value:["level-0","service-descriptions"]}]}},mounted(){b(()=>import("./vue-bot-ui.common-605c2d08.js").then(e=>e.v),["assets/vue-bot-ui.common-605c2d08.js","assets/framework-0ba8e1ea.js"]).then(e=>{this.dynamicComponent=gt(e.VueBotUI)}),console.log("Starting connection..."),this.connection=new WebSocket("wss://doc-bot.cloudlinux.com:2096"),this.connection.onmessage=e=>{const t=JSON.parse(e.data);this.messages.push({agent:"bot",type:"markdown",text:t.text}),this.waitResponse=!1,setTimeout(()=>{this.messages.push({agent:"bot",type:"rate",id:t.id})},1e3)},this.connection.onclose=()=>{console.log("Connection closed"),this.isConnected=!1},this.connection.onopen=()=>{console.log("Successfully connected to the websocket server..."),this.isConnected=!0}},methods:{messageSendHandler(e){this.messages.push({agent:"user",type:"text",text:e.text});let t=[];this.tags.length!==this.options.length&&(t=this.tags.map(s=>s.value)),this.connection.send(JSON.stringify({type:"question",text:e.text,"doc-name":this.docName,tags:t})),this.waitResponse=!0},messageToServer(e){this.connection.send(JSON.stringify({"doc-name":this.docName,...e}))}}},Dr={id:"bot-ui"},$r={class:"qkb-board-header__title"},Vr={class:"qkb-board-header__select_field"};function kr(e,t,s,o,a,r){const i=oe("multiselect"),l=oe("ClientOnly");return n(),O(l,null,{default:W(()=>[p("div",Dr,[a.dynamicComponent&&a.isConnected?(n(),O(ue(a.dynamicComponent),{key:0,messages:a.messages,options:a.botOptions,"bot-typing":a.waitResponse,"input-disable":a.waitResponse,onMsgSend:r.messageSendHandler,onMsgToServer:r.messageToServer},{header:W(()=>[p("div",$r,V(a.botOptions.botTitle),1),p("div",Vr,[S(i,{modelValue:a.tags,"onUpdate:modelValue":t[0]||(t[0]=c=>a.tags=c),options:a.options,multiple:!0,"close-on-select":!0,limit:3,label:"name","track-by":"value",placeholder:"Select section"},null,8,["modelValue","options"])])]),_:1},40,["messages","options","bot-typing","input-disable","onMsgSend","onMsgToServer"])):L("v-if",!0)])]),_:1})}const xr=A(Er,[["render",kr],["__file","Chat.vue"]]),Ar=jt({rootComponents:[xr],async enhance({app:e}){e.config.globalProperties.$eventBus=Wt()},layouts:{Layout:ja,HomeLayout:tr,NotFound:ar},setup(){He("themeConfig",{cloudlinuxSite:"https://tuxcare.com",defaultURL:"/",githubBranch:"master",allowGithubEdit:!0,githubMainDir:"docs",githubRepository:"cloudlinux/tuxcare-documentation",MOBILE_BREAKPOINT:767,documents:lr,arrowDownIcon:"arrows/arrow-down.svg",githubEditIcon:"global/pen.svg",footerCustomLogo:"global/we-are-cloudlinux.svg",headerDefaultSearchIcon:"global/search.svg",siteLogo:"global/logo.svg",searchSelectIcon:"arrows/select-down.svg",headerSearchIcon:"global/header-search.svg",headerSearch:"TuxCare Product Documentation",headerSearchPlaceholder:"Search across the TuxCare product documentation",locales:{bottomLinks:rr,editLinkText:"Edit this page",sidebar:Je,siteTitle:"Documentation",stayInTouch:"Stay in touch",navbarLinks:ir},productsList:["CloudLinux","Imunify","TuxCare"],productsTitle:"Products",productsURLs:["https://docs.cloudlinux.com","https://docs.imunify360.com","https://docs.tuxcare.com"],social:nr,algoliaOptions:{apiKey:"17e673c12b93fbf7c4a00159b0ae2de0",indexName:"tuxcare",appId:"R7FCMJM4P7"},MAX_ALGOLIA_VISIBLE_RESULT:20,MAX_ALGOLIA_VISIBLE_ROWS:15,MAX_ALGOLIA_HITS_PER_PAGE:20})}}),ce=[Ft,Ar],Tr=[["v-8daa1a0e","/",{},["/index.html","/README.md"]],["v-b0d2ea62","/enterprise-support-for-almalinux/",{},["/enterprise-support-for-almalinux/index.html","/enterprise-support-for-almalinux/README.md"]],["v-89bfb992","/eportal/",{},["/eportal/index.html","/eportal/README.md"]],["v-1b6f4a0a","/eportal-api/",{},["/eportal-api/index.html","/eportal-api/README.md"]],["v-6c1fb884","/extended-lifecycle-support/",{},["/extended-lifecycle-support/index.html","/extended-lifecycle-support/README.md"]],["v-cadd6498","/extended-lifecycle-support-for-languages/",{},["/extended-lifecycle-support-for-languages/index.html","/extended-lifecycle-support-for-languages/README.md"]],["v-2d0a9a10","/jp/",{},["/jp/index.html","/jp/README.md"]],["v-33720eeb","/kernelcare-for-iot/",{},["/kernelcare-for-iot/index.html","/kernelcare-for-iot/README.md"]],["v-37e5fb86","/live-patching-services/",{},["/live-patching-services/index.html","/live-patching-services/README.md"]],["v-534e2916","/local-mirror-els/",{},["/local-mirror-els/index.html","/local-mirror-els/README.md"]],["v-c271a6b2","/service-descriptions/",{},["/service-descriptions/index.html","/service-descriptions/README.md"]],["v-2f5e7500","/tuxcare/",{},["/tuxcare/index.html","/tuxcare/README.md"]],["v-1f847a28","/tuxcare-cln/",{},["/tuxcare-cln/index.html","/tuxcare-cln/README.md"]],["v-ec0cad0c","/enterprise-support-for-almalinux/fips/",{},["/enterprise-support-for-almalinux/fips/index.html","/enterprise-support-for-almalinux/fips/README.md"]],["v-52e27964","/jp/eportal/",{},["/jp/eportal/index.html","/jp/eportal/README.md"]],["v-c05bf2be","/jp/eportal-api/",{},["/jp/eportal-api/index.html","/jp/eportal-api/README.md"]],["v-3d707372","/jp/extended-lifecycle-support/",{},["/jp/extended-lifecycle-support/index.html","/jp/extended-lifecycle-support/README.md"]],["v-7d514c7d","/jp/extended-lifecycle-support-for-languages/",{},["/jp/extended-lifecycle-support-for-languages/index.html","/jp/extended-lifecycle-support-for-languages/README.md"]],["v-50c7132c","/jp/linux-support-services/",{},["/jp/linux-support-services/index.html","/jp/linux-support-services/README.md"]],["v-fd036ae2","/jp/live-patching-services/",{},["/jp/live-patching-services/index.html","/jp/live-patching-services/README.md"]],["v-03bf6597","/jp/tuxcare/",{},["/jp/tuxcare/index.html","/jp/tuxcare/README.md"]],["v-b8319282","/jp/tuxcare-cln/",{},["/jp/tuxcare-cln/index.html","/jp/tuxcare-cln/README.md"]],["v-3706649a","/404.html",{},["/404"]]];var Me=ve({name:"Vuepress",setup(){const e=Pt();return()=>z(e.value)}}),Pr=()=>Tr.reduce((e,[t,s,o,a])=>(e.push({name:t,path:s,component:Me,meta:o},...a.map(r=>({path:r,redirect:s}))),e),[{name:"404",path:"/:catchAll(.*)",component:Me}]),Cr=Lt,Rr=()=>{const e=bt({history:Cr(yt("/")),routes:Pr(),scrollBehavior:(t,s,o)=>o||(t.hash?{el:t.hash}:{top:0})});return e.beforeResolve(async(t,s)=>{var o;(t.path!==s.path||s===wt)&&([X.value]=await Promise.all([U.resolvePageData(t.name),(o=je[t.name])==null?void 0:o.__asyncLoader()]))}),e},Ir=e=>{e.component("ClientOnly",Bt),e.component("Content",Ht)},Mr=(e,t,s)=>{const o=k(t.currentRoute.value.path);re(()=>t.currentRoute.value.path,g=>o.value=g);const a=E(()=>U.resolveLayouts(s)),r=E(()=>U.resolveRouteLocale(le.value.locales,o.value)),i=E(()=>U.resolveSiteLocaleData(le.value,r.value)),l=E(()=>U.resolvePageFrontmatter(X.value)),c=E(()=>U.resolvePageHeadTitle(X.value,i.value)),u=E(()=>U.resolvePageHead(c.value,l.value,i.value)),f=E(()=>U.resolvePageLang(X.value)),_=E(()=>U.resolvePageLayout(X.value,a.value));return e.provide(kt,a),e.provide(We,l),e.provide(Tt,c),e.provide(Ne,u),e.provide(Ge,f),e.provide(qe,_),e.provide(Ue,r),e.provide(Ct,i),Object.defineProperties(e.config.globalProperties,{$frontmatter:{get:()=>l.value},$head:{get:()=>u.value},$headTitle:{get:()=>c.value},$lang:{get:()=>f.value},$page:{get:()=>X.value},$routeLocale:{get:()=>r.value},$site:{get:()=>le.value},$siteLocale:{get:()=>i.value},$withBase:{get:()=>F}}),{layouts:a,pageData:X,pageFrontmatter:l,pageHead:u,pageHeadTitle:c,pageLang:f,pageLayout:_,routeLocale:r,siteData:le,siteLocaleData:i}},Br=()=>{const e=At(),t=Ke(),s=k([]),o=()=>{e.value.forEach(r=>{const i=Hr(r);i&&s.value.push(i)})},a=()=>{document.documentElement.lang=t.value,s.value.forEach(r=>{r.parentNode===document.head&&document.head.removeChild(r)}),s.value.splice(0,s.value.length),e.value.forEach(r=>{const i=jr(r);i!==null&&(document.head.appendChild(i),s.value.push(i))})};He(Rt,a),J(()=>{o(),a(),re(()=>e.value,()=>a())})},Hr=([e,t,s=""])=>{const o=Object.entries(t).map(([l,c])=>se(c)?`[${l}=${JSON.stringify(c)}]`:c===!0?`[${l}]`:"").join(""),a=`head > ${e}${o}`;return Array.from(document.querySelectorAll(a)).find(l=>l.innerText===s)||null},jr=([e,t,s])=>{if(!se(e))return null;const o=document.createElement(e);return Et(t)&&Object.entries(t).forEach(([a,r])=>{se(r)?o.setAttribute(a,r):r===!0&&o.setAttribute(a,"")}),se(s)&&o.appendChild(document.createTextNode(s)),o},Fr=St,Wr=async()=>{var s;const e=Fr({name:"VuepressApp",setup(){var o;Br();for(const a of ce)(o=a.setup)==null||o.call(a);return()=>[z(Ot),...ce.flatMap(({rootComponents:a=[]})=>a.map(r=>z(r)))]}}),t=Rr();Ir(e),Mr(e,t,ce);for(const o of ce)await((s=o.enhance)==null?void 0:s.call(o,{app:e,router:t,siteData:le}));return e.use(t),{app:e,router:t}};Wr().then(({app:e,router:t})=>{t.isReady().then(()=>{e.mount("#app")})});export{Wr as createVueApp}; +https://vue-select.org/api/props.html#getoptionkey`,e,t)}}},onTab:{type:Function,default:function(){this.selectOnTab&&!this.isComposing&&this.typeAheadSelect()}},taggable:{type:Boolean,default:!1},tabindex:{type:Number,default:null},pushTags:{type:Boolean,default:!1},filterable:{type:Boolean,default:!0},filterBy:{type:Function,default(e,t,s){return(t||"").toLocaleLowerCase().indexOf(s.toLocaleLowerCase())>-1}},filter:{type:Function,default(e,t){return e.filter(s=>{let o=this.getOptionLabel(s);return typeof o=="number"&&(o=o.toString()),this.filterBy(s,o,t)})}},createOption:{type:Function,default(e){return typeof this.optionList[0]=="object"?{[this.label]:e}:e}},resetOnOptionsChange:{default:!1,validator:e=>["function","boolean"].includes(typeof e)},clearSearchOnBlur:{type:Function,default:function({clearSearchOnSelect:e,multiple:t}){return e&&!t}},noDrop:{type:Boolean,default:!1},inputId:{type:String},dir:{type:String,default:"auto"},selectOnTab:{type:Boolean,default:!1},selectOnKeyCodes:{type:Array,default:()=>[13]},searchInputQuerySelector:{type:String,default:"[type=search]"},mapKeydown:{type:Function,default:(e,t)=>e},appendToBody:{type:Boolean,default:!1},calculatePosition:{type:Function,default(e,t,{width:s,top:o,left:a}){e.style.top=o,e.style.left=a,e.style.width=s}},dropdownShouldOpen:{type:Function,default({noDrop:e,open:t,mutableLoading:s}){return e?!1:t&&!s}},uid:{type:[String,Number],default:()=>Ws()}},data(){return{search:"",open:!1,isComposing:!1,pushedTags:[],_value:[],deselectButtons:[]}},computed:{isReducingValues(){return this.$props.reduce!==this.$options.props.reduce.default},isTrackingValues(){return typeof this.modelValue>"u"||this.isReducingValues},selectedValue(){let e=this.modelValue;return this.isTrackingValues&&(e=this.$data._value),e!=null&&e!==""?[].concat(e):[]},optionList(){return this.options.concat(this.pushTags?this.pushedTags:[])},searchEl(){return this.$slots.search?this.$refs.selectedOptions.querySelector(this.searchInputQuerySelector):this.$refs.search},scope(){const e={search:this.search,loading:this.loading,searching:this.searching,filteredOptions:this.filteredOptions};return{search:{attributes:ee({disabled:this.disabled,placeholder:this.searchPlaceholder,tabindex:this.tabindex,readonly:!this.searchable,id:this.inputId,"aria-autocomplete":"list","aria-labelledby":`vs${this.uid}__combobox`,"aria-controls":`vs${this.uid}__listbox`,ref:"search",type:"search",autocomplete:this.autocomplete,value:this.search},this.dropdownOpen&&this.filteredOptions[this.typeAheadPointer]?{"aria-activedescendant":`vs${this.uid}__option-${this.typeAheadPointer}`}:{}),events:{compositionstart:()=>this.isComposing=!0,compositionend:()=>this.isComposing=!1,keydown:this.onSearchKeyDown,blur:this.onSearchBlur,focus:this.onSearchFocus,input:t=>this.search=t.target.value}},spinner:{loading:this.mutableLoading},noOptions:{search:this.search,loading:this.mutableLoading,searching:this.searching},openIndicator:{attributes:{ref:"openIndicator",role:"presentation",class:"vs__open-indicator"}},listHeader:e,listFooter:e,header:Ae(ee({},e),{deselect:this.deselect}),footer:Ae(ee({},e),{deselect:this.deselect})}},childComponents(){return ee(ee({},Te),this.components)},stateClasses(){return{"vs--open":this.dropdownOpen,"vs--single":!this.multiple,"vs--multiple":this.multiple,"vs--searching":this.searching&&!this.noDrop,"vs--searchable":this.searchable&&!this.noDrop,"vs--unsearchable":!this.searchable,"vs--loading":this.mutableLoading,"vs--disabled":this.disabled}},searching(){return!!this.search},dropdownOpen(){return this.dropdownShouldOpen(this)},searchPlaceholder(){return this.isValueEmpty&&this.placeholder?this.placeholder:void 0},filteredOptions(){const e=[].concat(this.optionList);if(!this.filterable&&!this.taggable)return e;const t=this.search.length?this.filter(e,this.search,this):e;if(this.taggable&&this.search.length){const s=this.createOption(this.search);this.optionExists(s)||t.unshift(s)}return t},isValueEmpty(){return this.selectedValue.length===0},showClearButton(){return!this.multiple&&this.clearable&&!this.open&&!this.isValueEmpty}},watch:{options(e,t){const s=()=>typeof this.resetOnOptionsChange=="function"?this.resetOnOptionsChange(e,t,this.selectedValue):this.resetOnOptionsChange;!this.taggable&&s()&&this.clearSelection(),this.modelValue&&this.isTrackingValues&&this.setInternalValueFromOptions(this.modelValue)},modelValue:{immediate:!0,handler(e){this.isTrackingValues&&this.setInternalValueFromOptions(e)}},multiple(){this.clearSelection()},open(e){this.$emit(e?"open":"close")}},created(){this.mutableLoading=this.loading},methods:{setInternalValueFromOptions(e){Array.isArray(e)?this.$data._value=e.map(t=>this.findOptionFromReducedValue(t)):this.$data._value=this.findOptionFromReducedValue(e)},select(e){this.$emit("option:selecting",e),this.isOptionSelected(e)?this.deselectFromDropdown&&(this.clearable||this.multiple&&this.selectedValue.length>1)&&this.deselect(e):(this.taggable&&!this.optionExists(e)&&(this.$emit("option:created",e),this.pushTag(e)),this.multiple&&(e=this.selectedValue.concat(e)),this.updateValue(e),this.$emit("option:selected",e)),this.onAfterSelect(e)},deselect(e){this.$emit("option:deselecting",e),this.updateValue(this.selectedValue.filter(t=>!this.optionComparator(t,e))),this.$emit("option:deselected",e)},clearSelection(){this.updateValue(this.multiple?[]:null)},onAfterSelect(e){this.closeOnSelect&&(this.open=!this.open,this.searchEl.blur()),this.clearSearchOnSelect&&(this.search="")},updateValue(e){typeof this.modelValue>"u"&&(this.$data._value=e),e!==null&&(Array.isArray(e)?e=e.map(t=>this.reduce(t)):e=this.reduce(e)),this.$emit("update:modelValue",e)},toggleDropdown(e){const t=e.target!==this.searchEl;t&&e.preventDefault();const s=[...this.deselectButtons||[],this.$refs.clearButton];if(this.searchEl===void 0||s.filter(Boolean).some(o=>o.contains(e.target)||o===e.target)){e.preventDefault();return}this.open&&t?this.searchEl.blur():this.disabled||(this.open=!0,this.searchEl.focus())},isOptionSelected(e){return this.selectedValue.some(t=>this.optionComparator(t,e))},isOptionDeselectable(e){return this.isOptionSelected(e)&&this.deselectFromDropdown},optionComparator(e,t){return this.getOptionKey(e)===this.getOptionKey(t)},findOptionFromReducedValue(e){const t=o=>JSON.stringify(this.reduce(o))===JSON.stringify(e),s=[...this.options,...this.pushedTags].filter(t);return s.length===1?s[0]:s.find(o=>this.optionComparator(o,this.$data._value))||e},closeSearchOptions(){this.open=!1,this.$emit("search:blur")},maybeDeleteValue(){if(!this.searchEl.value.length&&this.selectedValue&&this.selectedValue.length&&this.clearable){let e=null;this.multiple&&(e=[...this.selectedValue.slice(0,this.selectedValue.length-1)]),this.updateValue(e)}},optionExists(e){return this.optionList.some(t=>this.optionComparator(t,e))},normalizeOptionForSlot(e){return typeof e=="object"?e:{[this.label]:e}},pushTag(e){this.pushedTags.push(e)},onEscape(){this.search.length?this.search="":this.searchEl.blur()},onSearchBlur(){if(this.mousedown&&!this.searching)this.mousedown=!1;else{const{clearSearchOnSelect:e,multiple:t}=this;this.clearSearchOnBlur({clearSearchOnSelect:e,multiple:t})&&(this.search=""),this.closeSearchOptions();return}if(this.search.length===0&&this.options.length===0){this.closeSearchOptions();return}},onSearchFocus(){this.open=!0,this.$emit("search:focus")},onMousedown(){this.mousedown=!0},onMouseUp(){this.mousedown=!1},onSearchKeyDown(e){const t=a=>(a.preventDefault(),!this.isComposing&&this.typeAheadSelect()),s={8:a=>this.maybeDeleteValue(),9:a=>this.onTab(),27:a=>this.onEscape(),38:a=>(a.preventDefault(),this.typeAheadUp()),40:a=>(a.preventDefault(),this.typeAheadDown())};this.selectOnKeyCodes.forEach(a=>s[a]=t);const o=this.mapKeydown(s,this);if(typeof o[e.keyCode]=="function")return o[e.keyCode](e)}}},Gs=["dir"],Ks=["id","aria-expanded","aria-owns"],qs={ref:"selectedOptions",class:"vs__selected-options"},Us=["disabled","title","aria-label","onClick"],zs={ref:"actions",class:"vs__actions"},Js=["disabled"],Xs={class:"vs__spinner"},Ys=["id"],Qs=["id","aria-selected","onMouseover","onClick"],Zs={key:0,class:"vs__no-options"},eo=M(" Sorry, no matching options. "),to=["id"];function so(e,t,s,o,a,r){const i=pt("append-to-body");return n(),d("div",{dir:s.dir,class:j(["v-select",r.stateClasses])},[D(e.$slots,"header",N(q(r.scope.header))),p("div",{id:`vs${s.uid}__combobox`,ref:"toggle",class:"vs__dropdown-toggle",role:"combobox","aria-expanded":r.dropdownOpen.toString(),"aria-owns":`vs${s.uid}__listbox`,"aria-label":"Search for option",onMousedown:t[1]||(t[1]=l=>r.toggleDropdown(l))},[p("div",qs,[(n(!0),d(I,null,B(r.selectedValue,(l,c)=>D(e.$slots,"selected-option-container",{option:r.normalizeOptionForSlot(l),deselect:r.deselect,multiple:s.multiple,disabled:s.disabled},()=>[(n(),d("span",{key:s.getOptionKey(l),class:"vs__selected"},[D(e.$slots,"selected-option",N(q(r.normalizeOptionForSlot(l))),()=>[M(V(s.getOptionLabel(l)),1)]),s.multiple?(n(),d("button",{key:0,ref_for:!0,ref:u=>a.deselectButtons[c]=u,disabled:s.disabled,type:"button",class:"vs__deselect",title:`Deselect ${s.getOptionLabel(l)}`,"aria-label":`Deselect ${s.getOptionLabel(l)}`,onClick:u=>r.deselect(l)},[(n(),O(ue(r.childComponents.Deselect)))],8,Us)):L("",!0)]))])),256)),D(e.$slots,"search",N(q(r.scope.search)),()=>[p("input",ye({class:"vs__search"},r.scope.search.attributes,ht(r.scope.search.events)),null,16)])],512),p("div",zs,[Y(p("button",{ref:"clearButton",disabled:s.disabled,type:"button",class:"vs__clear",title:"Clear Selected","aria-label":"Clear Selected",onClick:t[0]||(t[0]=(...l)=>r.clearSelection&&r.clearSelection(...l))},[(n(),O(ue(r.childComponents.Deselect)))],8,Js),[[Q,r.showClearButton]]),D(e.$slots,"open-indicator",N(q(r.scope.openIndicator)),()=>[s.noDrop?L("",!0):(n(),O(ue(r.childComponents.OpenIndicator),N(ye({key:0},r.scope.openIndicator.attributes)),null,16))]),D(e.$slots,"spinner",N(q(r.scope.spinner)),()=>[Y(p("div",Xs,"Loading...",512),[[Q,e.mutableLoading]])])],512)],40,Ks),S(de,{name:s.transition},{default:W(()=>[r.dropdownOpen?Y((n(),d("ul",{id:`vs${s.uid}__listbox`,ref:"dropdownMenu",key:`vs${s.uid}__listbox`,class:"vs__dropdown-menu",role:"listbox",tabindex:"-1",onMousedown:t[2]||(t[2]=P((...l)=>r.onMousedown&&r.onMousedown(...l),["prevent"])),onMouseup:t[3]||(t[3]=(...l)=>r.onMouseUp&&r.onMouseUp(...l))},[D(e.$slots,"list-header",N(q(r.scope.listHeader))),(n(!0),d(I,null,B(r.filteredOptions,(l,c)=>(n(),d("li",{id:`vs${s.uid}__option-${c}`,key:s.getOptionKey(l),role:"option",class:j(["vs__dropdown-option",{"vs__dropdown-option--deselect":r.isOptionDeselectable(l)&&c===e.typeAheadPointer,"vs__dropdown-option--selected":r.isOptionSelected(l),"vs__dropdown-option--highlight":c===e.typeAheadPointer,"vs__dropdown-option--disabled":!s.selectable(l)}]),"aria-selected":c===e.typeAheadPointer?!0:null,onMouseover:u=>s.selectable(l)?e.typeAheadPointer=c:null,onClick:P(u=>s.selectable(l)?r.select(l):null,["prevent","stop"])},[D(e.$slots,"option",N(q(r.normalizeOptionForSlot(l))),()=>[M(V(s.getOptionLabel(l)),1)])],42,Qs))),128)),r.filteredOptions.length===0?(n(),d("li",Zs,[D(e.$slots,"no-options",N(q(r.scope.noOptions)),()=>[eo])])):L("",!0),D(e.$slots,"list-footer",N(q(r.scope.listFooter)))],40,Ys)),[[i]]):(n(),d("ul",{key:1,id:`vs${s.uid}__listbox`,role:"listbox",style:{display:"none",visibility:"hidden"}},null,8,to))]),_:3},8,["name"]),D(e.$slots,"footer",N(q(r.scope.footer)))],10,Gs)}const oo=De(Ns,[["render",so]]);const ao=["src"],ro={key:1},io={__name:"DSelect",props:{withIcon:{type:Boolean,default:!0},modelValue:{type:Object,default:()=>({label:"",value:""})},options:{type:Array,default:()=>[]}},emits:["changeSidebarItems","update:selectedValue","update:model-value"],setup(e,{emit:t}){const{searchSelectIcon:s}=C("themeConfig"),o=i=>{t("changeSidebarItems",i),t("update:model-value",i)},a=k(),r=()=>{a.value&&(a.value.open=!1)};return J(()=>window.addEventListener("click",i=>{var l;(l=a.value)!=null&&l.$el.contains(i.target)||r()})),ie(()=>window.removeEventListener("click",r)),(i,l)=>(n(),O(w(oo),{ref_key:"dropdown",ref:a,"onUpdate:modelValue":o,"model-value":e.modelValue,label:"title",value:"link",clearable:!1,searchable:!1,options:e.options},{"open-indicator":W(({attributes:c})=>[e.withIcon?(n(),d("div",ye({key:0,class:"select-icon"},c),[p("img",{src:w(F)(w(s)),alt:"search Icon"},null,8,ao)],16)):(n(),d("span",ro))]),_:1},8,["model-value","options"]))}},et=A(io,[["__file","DSelect.vue"]]),lo={class:"sidebar-drawer__mobile"},no={class:"sidebar-header"},co=p("p",{class:"sidebar-header__paragraph"},"Select TuxCare docs",-1),uo=ve({__name:"SidebarDrawer",props:{allPages:{type:Array,required:!0,default:()=>[]},documents:{type:Array,required:!0,default:()=>[]},closeSidebarDrawer:{type:Function,default:()=>{}},modelValue:{type:Object,required:!0,default:()=>{}},isMobileWidth:{type:Boolean}},emits:["changeSidebarItems","update:model-value"],setup(e){return(t,s)=>(n(),d("div",lo,[S(Ze,{closeSidebarDrawer:e.closeSidebarDrawer,items:e.allPages,isMobileWidth:e.isMobileWidth},{top:W(()=>[p("div",no,[co,S(et,{modelValue:e.modelValue,"onUpdate:modelValue":s[0]||(s[0]=o=>t.$emit("update:model-value",o)),onChangeSidebarItems:s[1]||(s[1]=o=>t.$emit("changeSidebarItems",o)),"with-icon":"",options:e.documents},null,8,["modelValue","options"])])]),_:1},8,["closeSidebarDrawer","items","isMobileWidth"])]))}});const po=A(uo,[["__file","SidebarDrawer.vue"]]);const ho={class:"drawer-tabs__wrapper"},fo=["onClick"],vo={__name:"DrawerTabs",props:{data:{type:Array,required:!0,default:()=>({})},modelValue:{type:Number,default:-1}},emits:["update:modelValue"],setup(e,{emit:t}){const s=o=>{t("update:modelValue",o)};return(o,a)=>(n(),d("div",ho,[(n(!0),d(I,null,B(e.data,(r,i)=>(n(),d("div",{key:i,onClick:l=>s(i),class:j([{"drawer-tab__active":e.modelValue===i},"drawer-tab"])},[p("div",{class:j(["drawer-tab__text",{"drawer-tab__text__active":e.modelValue===i}])},V(r.title)+" ("+V(r==null?void 0:r.numberResults)+") ",3)],10,fo))),128))]))}},mo=A(vo,[["__scopeId","data-v-c60e280a"],["__file","DrawerTabs.vue"]]);const _o={key:0,class:"drawer-main__search-results"},go=["onClick"],bo=["innerHTML"],yo=["innerHTML"],wo=["innerHTML"],So={key:1},Lo={class:"hidden_results__text"},Oo=p("p",{class:"hidden_results__text"},"Collapse results",-1),Eo=[Oo],Do={key:2},$o={key:0,class:"no_results"},Vo={key:1,class:"no_results"},ko={key:0},xo=p("br",null,null,-1),Ao=p("a",{class:"no_results__link",href:" https://forum.cloudlinux.com/",target:"_blank"},"https://forum.cloudlinux.com/",-1),To={__name:"DrawerSearchResult",props:{data:{type:[Array,Object],required:!0},modelValue:{type:String,required:!0}},setup(e){const t=e;ft(g=>({aa1be2ec:w(o)}));const{MAX_ALGOLIA_VISIBLE_RESULT:s,MAX_ALGOLIA_VISIBLE_ROWS:o}=C("themeConfig"),a=k(!1),r=g=>{window.location.href=g},i=E(()=>{var g;return a.value?t.data:(g=t.data)==null?void 0:g.slice(0,s)}),l=E(()=>t.data.length-i.value.length),c=()=>{a.value=!0},u=()=>{a.value=!1},f=g=>{var h,v;for(const m in g)if(g[m].value!==null||g[m].value!==void 0)return((h=g.lvl1)==null?void 0:h.value)||((v=g.lvl0)==null?void 0:v.value);return null},_=g=>Object.values(g).slice(2).filter(Boolean).map(h=>h.value).join(" > ");return(g,h)=>(n(),d(I,null,[e.data.length?(n(),d("section",_o,[(n(!0),d(I,null,B(i.value,v=>{var m,y,x,$;return n(),d("div",{key:v,class:"search-result",onClick:H=>r((v==null?void 0:v.url)||"/")},[p("div",{class:"search-result__title",innerHTML:f((m=v._highlightResult)==null?void 0:m.hierarchy)},null,8,bo),p("div",{class:"search-result__breadcrumb",innerHTML:_((y=v._highlightResult)==null?void 0:y.hierarchy)},null,8,yo),p("div",{class:"search-result__text",innerHTML:($=(x=v._highlightResult)==null?void 0:x.content)==null?void 0:$.value},null,8,wo)],8,go)}),128))])):L("v-if",!0),e.data.length?(n(),d("div",So,[l.value?(n(),d("div",{key:0,class:"hidden_results",onClick:c},[p("p",Lo,"Show all results("+V(l.value)+")",1)])):!l.value&&a.value?(n(),d("div",{key:1,class:"hidden_results",onClick:u},Eo)):L("v-if",!0)])):(n(),d("div",Do,[e.modelValue.length?(n(),d("p",Vo,[M(" Sorry! No results found for "),e.modelValue?(n(),d("span",ko,'"'+V(e.modelValue)+'"',1)):L("v-if",!0),M(" 😞"),xo,M("Please try ask the community (link to the "),Ao,M("). ")])):(n(),d("p",$o,"What are you searching for?"))]))],64))}},Po=A(To,[["__file","DrawerSearchResult.vue"]]);const Co={class:"drawer-header"},Ro=p("div",{class:"drawer-header__wrapper"},[p("h2",{class:"drawer-header__paragraph"},"How can we help you?"),p("div",{id:"drawerSearch"})],-1),Io={class:"drawer-cross"},Mo=["src"],Bo={class:"drawer-main"},Ho={class:"drawer-main__wrapper"},jo={class:"drawer-main__breadcrumb"},Fo={key:0,class:"drawer-main__breadcrumb__text"},Wo=["src"],No={__name:"Drawer",props:{isOpenDrawer:{type:Boolean,required:!0,default:!1},isMobileWidth:{type:Boolean,required:!0,default:!1},modelValue:{type:String,required:!0,default:""},homeLayoutSearchResult:{type:Array,required:!0,default:()=>[]}},emits:["closeDrawer","update:modelValue"],setup(e,{emit:t}){const s=e,o=k(0),a=E(()=>{const l=s.homeLayoutSearchResult.reduce((c,u)=>{var _;const f=(_=u.hierarchy)==null?void 0:_.lvl0;return c[f]=c[f]||{title:f,numberResults:0},c[f].numberResults++,c},{});return Object.values(l)}),r=E(()=>{if(o.value===-1)return s.homeLayoutSearchResult||[];const l=a.value[o.value];return s.homeLayoutSearchResult.filter(c=>c.hierarchy.lvl0===(l==null?void 0:l.title))}),i=()=>{t("closeDrawer"),o.value=0};return re(()=>s.isOpenDrawer,()=>{document.body.classList.toggle("disable-scroll",s.isOpenDrawer)}),(l,c)=>(n(),d("div",null,[p("div",{class:j(["drawer",{"is-open":e.isOpenDrawer}])},[p("div",Co,[Ro,p("div",Io,[p("img",{onClick:i,class:"drawer-cross__img",src:w(F)("/global/cross.svg"),alt:"cross"},null,8,Mo),p("p",{onClick:i,class:"drawer-cross__text"},"close")])]),S(mo,{modelValue:o.value,"onUpdate:modelValue":c[0]||(c[0]=u=>o.value=u),data:a.value},null,8,["modelValue","data"]),p("main",null,[p("div",Bo,[p("div",Ho,[p("div",jo,[r.value.length?(n(),d("p",Fo,[M("Home "),p("img",{src:w(F)("/arrows/arrow-right-breadcrumb.svg"),alt:"breadcrumb icon"},null,8,Wo),M(" Documentation ")])):L("v-if",!0)]),S(Po,{modelValue:e.modelValue,data:r.value},null,8,["modelValue","data"])])]),e.isOpenDrawer&&e.isMobileWidth?(n(),O(pe,{key:0,class:"drawer-footer__mobile"})):L("v-if",!0)])],2),e.isOpenDrawer&&!e.isMobileWidth?(n(),O(pe,{key:0,class:"drawer-footer"})):L("v-if",!0)]))}},Go=A(No,[["__file","Drawer.vue"]]);const Ko={id:"search-form",class:"drawer-header__input"},qo=["value","placeholder"],Uo=["src"],zo={__name:"DrawerSearch",props:{options:{type:[Object,Array],required:!0},modelValue:{type:String,required:!0},isOpenDrawer:{type:Boolean,required:!0},isMobileWidth:{type:Boolean}},emits:["openDrawer","update:modelValue","result"],setup(e,{emit:t}){const s=e,{MAX_ALGOLIA_HITS_PER_PAGE:o}=C("themeConfig"),{headerDefaultSearchIcon:a,headerSearchIcon:r,headerSearchPlaceholder:i}=C("themeConfig"),l=ne(),c=E(()=>l.value.layout==="HomeLayout"),u=E(()=>s.isOpenDrawer?"drawer-header__search":c.value?"header-layout__search":"header-layout__search-default"),f=E(()=>s.isOpenDrawer?"drawer-header__search-icon":c.value?"header-layout__search-icon":"header-layout__search-icon-default"),_=E(()=>c.value||s.isOpenDrawer?r:a),g=E(()=>s.isOpenDrawer?"Search":c.value?i:"Search"),h=E(()=>s.isMobileWidth?"Search accross all Imunify Security support":g.value),v=async m=>{if(typeof window>"u")return;const[y]=await Promise.all([b(()=>import("./docsearch.min-de7e3b59.js").then($=>$.d),["assets/docsearch.min-de7e3b59.js","assets/framework-0ba8e1ea.js"]),b(()=>import("./docsearch.min-49eb4b49.js"),[])]),x=y.default;x(Object.assign({},m,{inputSelector:"#algolia-search-input",algoliaOptions:{hitsPerPage:o},handleSelected:()=>{t("openDrawer")},transformData:$=>{t("result",$)}}))};return re(()=>s.options,async m=>{await v(m)},{immediate:!0}),(m,y)=>(n(),d("form",Ko,[p("input",{value:e.modelValue,onInput:y[0]||(y[0]=x=>m.$emit("update:modelValue",x.target.value)),id:"algolia-search-input",placeholder:h.value,class:j(u.value),onKeypress:y[1]||(y[1]=G(P(x=>m.$emit("openDrawer"),["prevent"]),["enter"]))},null,42,qo),p("div",{class:j(f.value)},[p("img",{onClick:y[2]||(y[2]=x=>m.$emit("openDrawer")),alt:"search icon",src:w(F)(_.value)},null,8,Uo)],2)]))}},Pe=A(zo,[["__file","DrawerSearch.vue"]]);const Jo={class:"header-layout__search-container"},Xo={key:0,class:"header-layout__search-title"},Yo={__name:"HeaderLayoutSearch",props:{isMobileWidth:{type:Boolean,default:!1},closeSidebarDrawer:{type:Function}},setup(e,{expose:t}){const s=e,{headerSearch:o,algoliaOptions:a}=C("themeConfig"),r=ne(),i=k(!1),l=k(!1),c=k(""),u=k([]);re(()=>c.value,()=>{c.value||(u.value=[])});const f=v=>{u.value=v},_=E(()=>r.value.layout==="HomeLayout"),g=()=>{i.value=!0,l.value=!0,s.closeSidebarDrawer&&s.closeSidebarDrawer()},h=()=>{u.value.length=0,c.value="",i.value=!1,l.value=!1};return t({openDrawer:g,closeDrawer:h,mobileDrawerVisible:l}),(v,m)=>(n(),d("div",Jo,[_.value?(n(),d("h1",Xo,V(w(o)),1)):L("v-if",!0),i.value?(n(),O(Be,{key:1,to:"#drawerSearch"},[S(Pe,{options:w(a),modelValue:c.value,"onUpdate:modelValue":m[0]||(m[0]=y=>c.value=y),isMobileWidth:e.isMobileWidth,onOpenDrawer:g,isOpenDrawer:i.value,onResult:f},null,8,["options","modelValue","isMobileWidth","isOpenDrawer"])])):(n(),O(Pe,{key:2,isMobileWidth:e.isMobileWidth,options:w(a),modelValue:c.value,"onUpdate:modelValue":m[1]||(m[1]=y=>c.value=y),onOpenDrawer:g,isOpenDrawer:i.value,onResult:f},null,8,["isMobileWidth","options","modelValue","isOpenDrawer"])),S(Go,{homeLayoutSearchResult:u.value,modelValue:c.value,"onUpdate:modelValue":m[2]||(m[2]=y=>c.value=y),onCloseDrawer:h,isOpenDrawer:i.value,isMobileWidth:e.isMobileWidth},null,8,["homeLayoutSearchResult","modelValue","isOpenDrawer","isMobileWidth"])]))}},Ce=A(Yo,[["__file","HeaderLayoutSearch.vue"]]);const Qo={class:"header-products-wrapper"},Zo={key:0,class:"dropdown-wrapper"},ea=["href"],ta={key:1,class:"dropdown-wrapper"},sa=["href"],oa=["src"],aa={class:"header-products-wrapper-paragraph"},ra=["src"],ia={__name:"HeaderProducts",props:{isMobileWidth:{type:Boolean}},setup(e){const{productsTitle:t,arrowDownIcon:s,productsList:o,productsURLs:a}=C("themeConfig"),r=k(!1),i=k(null),l=c=>{!c.composedPath().includes(i.value)&&(r.value=!1)};return J(()=>{document.addEventListener("click",l)}),ie(()=>{document.removeEventListener("click",l)}),(c,u)=>(n(),d("div",Qo,[p("div",{ref_key:"menu",ref:i,class:"dropdown"},[e.isMobileWidth?(n(),O(Be,{key:0,to:"body"},[r.value?(n(),d("div",Zo,[(n(!0),d(I,null,B(w(o),(f,_)=>(n(),d("p",{class:"dropdown-content__paragraph",key:f},[p("a",{class:"dropdown-content__link",href:w(a)[_]},V(f),9,ea)]))),128))])):L("v-if",!0)])):L("v-if",!0),r.value&&!e.isMobileWidth?(n(),d("div",ta,[(n(!0),d(I,null,B(w(o),(f,_)=>(n(),d("p",{class:"dropdown-content__paragraph",key:f},[p("a",{class:"dropdown-content__link",href:w(a)[_]},V(f),9,sa)]))),128))])):L("v-if",!0),p("div",{onClick:u[0]||(u[0]=f=>r.value=!r.value),class:"header-products-container"},[p("img",{class:"header-products-container__img",alt:"hamburger menu",src:w(F)("/global/hamburger-menu.svg")},null,8,oa),p("p",aa,V(w(t)),1),p("img",{class:j(["products-icon__default",{"products-icon__rotate":r.value}]),width:"10",height:"8",src:w(F)(w(s)),alt:"arrow down icon"},null,10,ra)])],512)]))}},la=A(ia,[["__file","HeaderProducts.vue"]]);const na={class:"navbar-header"},ca={class:"navbar-header__logo-wrapper"},ua=["src"],da=["src"],pa=["href","onClick"],ha={__name:"HeaderLayout",props:{isMobileWidth:{type:Boolean},closeSidebarDrawer:{type:Function}},setup(e){const{siteLogo:t,defaultURL:s,locales:o,headerDefaultSearchIcon:a}=C("themeConfig"),r=k(null),i=ne(),l=ze(),c=k(null),u=()=>{var h;return(h=c==null?void 0:c.value)==null?void 0:h.openDrawer()},f=E(()=>i.value.layout==="HomeLayout"),_=E(()=>(l.value+s).replace(/\/+/g,"/")),g=h=>{if(h.type)switch(h.type){case"event":var h=new CustomEvent(h.name);document.dispatchEvent(h)}};return(h,v)=>{var y;const m=oe("router-link");return n(),d("header",{class:j(["navbar",{fixed:!f.value}])},[p("div",na,[p("div",ca,[S(m,{to:_.value,class:"home-link"},{default:W(()=>[w(t)?(n(),d("img",{key:0,class:"logo",src:w(F)(w(t)),alt:"logo header"},null,8,ua)):L("v-if",!0)]),_:1},8,["to"]),f.value?L("v-if",!0):(n(),O(Ce,{key:0,closeSidebarDrawer:e.closeSidebarDrawer,ref_key:"headerLayoutSearch",ref:c,class:j({"header-mobile__hidden":!((y=c.value)!=null&&y.mobileDrawerVisible)}),isMobileWidth:e.isMobileWidth},null,8,["closeSidebarDrawer","class","isMobileWidth"]))]),p("div",{class:"links",style:vt({"max-width":r.value+"px"})},[p("img",{onClick:u,class:"navbar-header__mobile-search",src:w(F)(w(a)),alt:"icon image"},null,8,da),S(la,{isMobileWidth:e.isMobileWidth},null,8,["isMobileWidth"]),(n(!0),d(I,null,B(w(o).navbarLinks,x=>(n(),d("a",{href:x.url,target:"_blank",class:j(x.class),onClick:$=>g(x.event)},V(x.text),11,pa))),256))],4)]),f.value?(n(),O(Ce,{key:0,closeSidebarDrawer:e.closeSidebarDrawer,ref_key:"headerLayoutSearch",ref:c,isMobileWidth:e.isMobileWidth},null,8,["closeSidebarDrawer","isMobileWidth"])):L("v-if",!0)],2)}}},tt=A(ha,[["__file","HeaderLayout.vue"]]);const fa=e=>(mt("data-v-1eb13e00"),e=e(),_t(),e),va={class:"back-to-top"},ma=fa(()=>p("span",{class:"back-to-top__link-span"},"Scroll up",-1)),_a=[ma],ga={__name:"BackToTop",props:{boundary:{type:Number,default:200}},setup(e){const t=e,s=k(!1),o=()=>{window&&(s.value=window.pageYOffset>t.boundary)},a=()=>{document.body.scrollTop=0,document.documentElement.scrollTop=0};return J(()=>{window&&(o(),window.addEventListener("scroll",o))}),ie(()=>{window&&window.removeEventListener("scroll",o)}),(r,i)=>(n(),d("div",va,[p("a",{class:j([{active:s.value},"nav-arrow top back-to-top__link"]),onClick:a},_a,2)]))}},ba=A(ga,[["__scopeId","data-v-1eb13e00"],["__file","BackToTop.vue"]]);const ya={class:"breadcrumb-wrapper"},wa={class:"breadcrumb-title"},Sa={__name:"Breadcrumb",setup(e){const t=Z(),{locales:{siteTitle:s}}=C("themeConfig"),o=E(()=>{const a=[];return t.value.path!=="/"&&a.push({path:t.value.path,title:t.value.title}),a});return(a,r)=>{const i=oe("router-link");return n(),d("div",ya,[p("span",wa,V(w(s))+":",1),(n(!0),d(I,null,B(o.value,l=>(n(),O(i,{class:"breadcrumb",key:l.path,to:l.path},{default:W(()=>[M(V(l.title),1)]),_:2},1032,["to"]))),128))])}}},La=A(Sa,[["__scopeId","data-v-9445381a"],["__file","Breadcrumb.vue"]]);const Oa={key:0,class:"page-nav"},Ea={__name:"PageNav",props:{sidebarItems:{type:Array,default:()=>[]},allPages:{type:Array}},setup(e){const t=e,s=ze(),o=Z(),a=E(()=>{const u=o.value.frontmatter.prev;return u===!1?null:u?fe(t.allPages,u,s):i(o.value,t.sidebarItems)}),r=E(()=>{const u=o.value.frontmatter.next;return u===!1?null:u?fe(t.allPages,u,s):l(o.value,t.sidebarItems)}),i=(u,f)=>c(u,f,-1),l=(u,f)=>c(u,f,1),c=(u,f,_)=>{const g=[];f.forEach(h=>{h.type==="group"?g.push(...h.children||[]):g.push(h)});for(let h=0;h{const _=oe("router-link");return a.value||r.value?(n(),d("div",Oa,[a.value?(n(),O(_,{key:0,class:"nav-arrow left",to:a.value.path},null,8,["to"])):L("v-if",!0),r.value?(n(),O(_,{key:1,class:"nav-arrow right",to:r.value.path},null,8,["to"])):L("v-if",!0)])):L("v-if",!0)}}},Da=A(Ea,[["__file","PageNav.vue"]]);const $a={class:"page"},Va=["src"],ka={class:"page-nav-wrapper"},xa={key:0,class:"page-edit"},Aa={class:"edit-link"},Ta=["src"],Pa=["href"],Ca={__name:"Page",props:{sidebarItems:{type:Array,default:()=>[]},allPages:{type:Array,default:()=>[]},isMobileWidth:{type:Boolean}},setup(e,{expose:t}){const s=e,{githubEditIcon:o,githubRepository:a,allowGithubEdit:r,githubMainDir:i="",githubBranch:l="master",docsRepo:c=a,editLinkText:u}=C("themeConfig"),f=Z();Ke();const _=ne(),g=k(s.isMobileWidth),h=()=>g.value=!0,v=()=>g.value=!1,m=E(()=>{if(_.value.editLink===!1)return;let $=ae(f.value.path);if(te.test($)?$+="README.md":$+=".md",c&&r)return x(a,c,i,l,$)}),y=E(()=>u||"Edit this page"),x=($,H,R,K,$e)=>/bitbucket.org/.test($)?(we.test(H)?H:$).replace(te,"")+`/${K}`+(R?"/"+R.replace(te,""):"")+$e+`?mode=edit&spa=0&at=${K}&fileviewer=file-view-default`:(we.test(H)?H:`https://github.com/${H}`).replace(te,"")+`/tree/${K}`+(R?"/"+R.replace(te,""):"")+$e;return t({isOpenMobileSidebarMenu:g,closeSidebarDrawer:v}),($,H)=>{const R=oe("Content");return n(),d("div",$a,[D($.$slots,"top"),S(La,{class:"page-breadcrumb"}),p("img",{onClick:h,class:"page-mobile__sidebar-menu",src:w(F)("/global/sidebar-menu.svg"),alt:"sidebar hamburger menu"},null,8,Va),p("div",ka,[S(Da,{"sidebar-items":e.sidebarItems,allPages:e.allPages},null,8,["sidebar-items","allPages"])]),S(R,{class:"content",custom:!1}),w(r)?(n(),d("div",xa,[p("div",Aa,[p("img",{src:w(F)(w(o)),alt:"icon pen"},null,8,Ta),p("a",{href:m.value,target:"_blank",rel:"noopener noreferrer"},V(y.value),9,Pa)])])):L("v-if",!0),S(ba),D($.$slots,"bottom")])}}},Ra=A(Ca,[["__file","Page.vue"]]);const Ia={class:"theme-container"},Ma={key:0,class:"sidebar-header"},Ba=p("p",{class:"sidebar-header__paragraph"},"Select TuxCare docs",-1),Ha={__name:"Layout",setup(e){const{documents:t,MOBILE_BREAKPOINT:s}=C("themeConfig"),o=k(null),a=k(null),r=_e(),i=me(),l=Z(),c=k([]),u=k(!1),f=E(()=>l.value&&c.value.length?Xe(l.value,i,c.value):[]),_=v=>r.push(v.link),g=()=>{var y;const v=(y=l.value)==null?void 0:y.path,m=v.indexOf("/",v.indexOf("/")+1);return v.substr(0,m)},h=()=>{u.value=window.innerWidth<=s};return J(()=>{Object.values(Le).map(v=>v().then(m=>{c.value.push(m)})),a.value=t.find(v=>{var m;return(m=v.link)==null?void 0:m.startsWith(g())}),window.addEventListener("resize",h),u.value=window.innerWidth<=s}),ie(()=>{window.removeEventListener("resize",h)}),(v,m)=>{var y,x,$,H,R;return n(),d("div",Ia,[S(tt,{closeSidebarDrawer:(y=o.value)==null?void 0:y.closeSidebarDrawer,isMobileWidth:u.value},null,8,["closeSidebarDrawer","isMobileWidth"]),c.value.length&&!((x=o.value)!=null&&x.isOpenMobileSidebarMenu)&&!u.value?(n(),O(Ze,{key:0,items:c.value,closeSidebarDrawer:($=o.value)==null?void 0:$.closeSidebarDrawer},{top:W(()=>[w(t)?(n(),d("div",Ma,[Ba,S(et,{"with-icon":"",modelValue:a.value,"onUpdate:modelValue":m[0]||(m[0]=K=>a.value=K),onChangeSidebarItems:_,options:w(t)},null,8,["modelValue","options"])])):L("v-if",!0)]),_:1},8,["items","closeSidebarDrawer"])):L("v-if",!0),S(Ra,{ref_key:"pageRef",ref:o,sidebarItems:f.value,allPages:c.value,isMobileWidth:u.value},null,8,["sidebarItems","allPages","isMobileWidth"]),c.value.length&&((H=o.value)!=null&&H.isOpenMobileSidebarMenu)&&u.value?(n(),O(po,{key:1,onChangeSidebarItems:_,"all-pages":c.value,documents:w(t),modelValue:a.value,"onUpdate:modelValue":m[1]||(m[1]=K=>a.value=K),closeSidebarDrawer:(R=o.value)==null?void 0:R.closeSidebarDrawer,isMobileWidth:u.value},null,8,["all-pages","documents","modelValue","closeSidebarDrawer","isMobileWidth"])):L("v-if",!0),S(pe)])}}},ja=A(Ha,[["__file","Layout.vue"]]);const Fa={class:"docs-card-container"},Wa={class:"docs-card-container__header"},Na=["src"],Ga={key:0,class:"docs-card-container__header-paragraph"},Ka={class:"docs-card-container__main"},qa={key:0,class:"docs-card-container__main-paragraph"},Ua={class:"docs-card-container__footer"},za={__name:"DocsCard",props:{card:{type:Object,default:null}},setup(e){const t=e,s=_e(),o=()=>{var a;return s.push((a=t.card)==null?void 0:a.link)};return(a,r)=>(n(),d("div",Fa,[p("div",Wa,[p("img",{width:"20",height:"20",src:w(F)("collections-bookmark.svg"),alt:"document icon"},null,8,Na),e.card.title?(n(),d("p",Ga,V(e.card.title),1)):L("v-if",!0)]),p("div",Ka,[e.card.description?(n(),d("p",qa,V(e.card.description),1)):L("v-if",!0)]),p("div",Ua,[p("button",{onClick:r[0]||(r[0]=i=>o()),class:"docs-card-container__footer-btn"},"View Documentation")])]))}},Ja=A(za,[["__file","DocsCard.vue"]]);const Xa={class:"docs-cards-wrapper"},Ya={__name:"DocsCardsWrapper",setup(e){const{documents:t}=C("themeConfig");return(s,o)=>(n(),d("div",Xa,[(n(!0),d(I,null,B(w(t),(a,r)=>(n(),O(Ja,{key:r,card:a},null,8,["card"]))),128))]))}},Qa=A(Ya,[["__file","DocsCardsWrapper.vue"]]),Za={class:"theme-container"},er={__name:"HomeLayout",setup(e){const{MOBILE_BREAKPOINT:t}=C("themeConfig"),s=k(!1),o=()=>s.value=window.innerWidth<=t;return J(()=>{window.addEventListener("resize",o),s.value=window.innerWidth<=t}),ie(()=>window.removeEventListener("resize",o)),(a,r)=>(n(),d("div",Za,[S(tt,{isMobileWidth:s.value},null,8,["isMobileWidth"]),S(Qa),S(pe)]))}},tr=A(er,[["__file","HomeLayout.vue"]]),sr={class:"theme-container"},or={__name:"NotFound",setup(e){const t=me(),s=_e();k([]);const o=[{from:"cloudlinux-os-plus/#get-started",to:"shared-pro/accelerate-wp/#get-started"},{from:"cloudlinux-os-plus/#setup-upgrade-url-for-acceleratewp-premium",to:"shared-pro/accelerate-wp/#setup-upgrade-url-for-acceleratewp-premium"},{from:"cloudlinux-os-plus",to:"shared-pro"},{from:"cagefs.html",to:"shared/cloudlinux_os_components/#cagefs"},{from:"index.html?cagefs_installation.html",to:"shared/cloudlinux_os_components/#installation-and-update-1"},{from:"mod_lsapi_troubleshooting.html",to:"shared/cloudlinux_os_components/#troubleshooting-3"}];return J(()=>{const a=t.path+t.hash,r=new RegExp(a,"gi");let i=!1;const l=(u,f)=>{var _;if(!i&&((_=u.children)==null?void 0:_.length)>0)for(let g of u.children){const h=f+"/"+g.link;if(h.search(r)!==-1){s.push(h),i=!0;return}u.children.length>0&&l(g,f)}};(async()=>{var _;const u=Object==null?void 0:Object.values(Le);let f=!1;for(let g of o)if(a.search(g.from)!==-1){const h=a.replace(g.from,g.to);s.push(h),f=!0;return}f||(window.location.href="/not-found.html");for(let g of u){const h=await g();let v=h.path;if(v.at(-1)==="/"&&(v=v.slice(0,-1)),((_=h.headers)==null?void 0:_.length)>0)for(let m of h.headers){const y=v+"/"+m.link;if(y.search(r)!==-1){s.push(y),i=!0;return}l(m,v)}}})()}),(a,r)=>(n(),d("div",sr))}},ar=A(or,[["__file","NotFound.vue"]]),rr=[{text:"Knowledge base",url:"https://cloudlinux.zendesk.com/hc/en-us/categories/360002375960-KernelCare"},{text:"Forum",url:"https://forum.cloudlinux.com/forum/tuxcare"},{text:"Blog",url:"https://blog.tuxcare.com/"},{text:"Privacy Policy",url:"https://www.cloudlinux.com/privacy-policy/"}],ir=[{text:"Ask GPT?",event:{type:"event",name:"botui-open"},class:"btn"},{text:"Submit support request",url:"https://www.tuxcare.com/support-portal/",class:"btn"},{text:"Submit your idea",url:"https://features.tuxcare.com/submit-idea/",class:"btn"}],lr=[{title:"TuxCare",description:"services automate, simplify, and enhance Linux operations, giving organizations more flexibility in managing Linux distro choices and versions, significant maintenance cost reductions, and greatly enhanced security and compliance postures.",link:"/tuxcare/"},{title:"Enterprise Support for AlmaLinux",description:"provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, delivers an extension of an additional 4.5 years of security fixes for Critical and High-risk vulnerabilities and FIPS-compliant security patches for select AlmaLinux minor versions, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.",link:"/enterprise-support-for-almalinux/"},{title:"KernelCare",description:"is a live kernel patching service that provides security patches and bugfixes for a range of popular Linux kernels that can be installed without rebooting the system.",link:"/live-patching-services/"},{title:"KernelCare for IOT",description:"provides live security patching for ARM64-based embedded systems for enterprise IoT users and original equipment manufacturers.",link:"/kernelcare-for-iot/"},{title:"ePortal",description:"TuxCare ePortal is the web management console dedicated to KernelCare Enterprise live patch management.",link:"/eportal/"},{title:"ePortal API",description:"is a complete API for everyday use.",link:"/eportal-api/"},{title:"Extended Lifecycle Support",description:"allows you to continue running your Linux server after the operating system’s end of life.",link:"/extended-lifecycle-support/"},{title:"Extended Lifecycle Support for Languages",description:"provides security fixes for PHP and Python versions that have reached their end-of-life which allows to continue running Linux server vulnerability-free.",link:"/extended-lifecycle-support-for-languages/"},{title:"Subscription Management Portal",description:"The TuxCare subscription management portal is designed to easily manage your licenses of TuxCare products and services by means of a user-friendly interface.",link:"/tuxcare-cln/"},{title:"Service Descriptions",description:"AlmaCare service description",link:"/service-descriptions/"}],nr=[{url:"https://www.facebook.com/tuxcare/",icon:"footer-social/fb.png"},{url:"https://twitter.com/tuxcare_/",icon:"footer-social/tw.png"},{url:"https://linkedin.com/company/tuxcare",icon:"footer-social/in.png"},{url:"https://www.youtube.com/@TuxCare",icon:"footer-social/ytube.png"}];function ge(e){return e===0?!1:Array.isArray(e)&&e.length===0?!0:!e}function cr(e){return(...t)=>!e(...t)}function ur(e,t){return e===void 0&&(e="undefined"),e===null&&(e="null"),e===!1&&(e="false"),e.toString().toLowerCase().indexOf(t.trim())!==-1}function st(e,t,s,o){return t?e.filter(a=>ur(o(a,s),t)).sort((a,r)=>o(a,s).length-o(r,s).length):e}function dr(e){return e.filter(t=>!t.$isLabel)}function be(e,t){return s=>s.reduce((o,a)=>a[e]&&a[e].length?(o.push({$groupLabel:a[t],$isLabel:!0}),o.concat(a[e])):o,[])}function pr(e,t,s,o,a){return r=>r.map(i=>{if(!i[s])return console.warn("Options passed to vue-multiselect do not contain groups, despite the config."),[];const l=st(i[s],e,t,a);return l.length?{[o]:i[o],[s]:l}:[]})}const Re=(...e)=>t=>e.reduce((s,o)=>o(s),t);var hr={data(){return{search:"",isOpen:!1,preferredOpenDirection:"below",optimizedHeight:this.maxHeight}},props:{internalSearch:{type:Boolean,default:!0},options:{type:Array,required:!0},multiple:{type:Boolean,default:!1},trackBy:{type:String},label:{type:String},searchable:{type:Boolean,default:!0},clearOnSelect:{type:Boolean,default:!0},hideSelected:{type:Boolean,default:!1},placeholder:{type:String,default:"Select option"},allowEmpty:{type:Boolean,default:!0},resetAfter:{type:Boolean,default:!1},closeOnSelect:{type:Boolean,default:!0},customLabel:{type:Function,default(e,t){return ge(e)?"":t?e[t]:e}},taggable:{type:Boolean,default:!1},tagPlaceholder:{type:String,default:"Press enter to create a tag"},tagPosition:{type:String,default:"top"},max:{type:[Number,Boolean],default:!1},id:{default:null},optionsLimit:{type:Number,default:1e3},groupValues:{type:String},groupLabel:{type:String},groupSelect:{type:Boolean,default:!1},blockKeys:{type:Array,default(){return[]}},preserveSearch:{type:Boolean,default:!1},preselectFirst:{type:Boolean,default:!1},preventAutofocus:{type:Boolean,default:!1}},mounted(){!this.multiple&&this.max&&console.warn("[Vue-Multiselect warn]: Max prop should not be used when prop Multiple equals false."),this.preselectFirst&&!this.internalValue.length&&this.options.length&&this.select(this.filteredOptions[0])},computed:{internalValue(){return this.modelValue||this.modelValue===0?Array.isArray(this.modelValue)?this.modelValue:[this.modelValue]:[]},filteredOptions(){const e=this.search||"",t=e.toLowerCase().trim();let s=this.options.concat();return this.internalSearch?s=this.groupValues?this.filterAndFlat(s,t,this.label):st(s,t,this.label,this.customLabel):s=this.groupValues?be(this.groupValues,this.groupLabel)(s):s,s=this.hideSelected?s.filter(cr(this.isSelected)):s,this.taggable&&t.length&&!this.isExistingOption(t)&&(this.tagPosition==="bottom"?s.push({isTag:!0,label:e}):s.unshift({isTag:!0,label:e})),s.slice(0,this.optionsLimit)},valueKeys(){return this.trackBy?this.internalValue.map(e=>e[this.trackBy]):this.internalValue},optionKeys(){return(this.groupValues?this.flatAndStrip(this.options):this.options).map(t=>this.customLabel(t,this.label).toString().toLowerCase())},currentOptionLabel(){return this.multiple?this.searchable?"":this.placeholder:this.internalValue.length?this.getOptionLabel(this.internalValue[0]):this.searchable?"":this.placeholder}},watch:{internalValue:{handler(){this.resetAfter&&this.internalValue.length&&(this.search="",this.$emit("update:modelValue",this.multiple?[]:null))},deep:!0},search(){this.$emit("search-change",this.search)}},emits:["open","search-change","close","select","update:modelValue","remove","tag"],methods:{getValue(){return this.multiple?this.internalValue:this.internalValue.length===0?null:this.internalValue[0]},filterAndFlat(e,t,s){return Re(pr(t,s,this.groupValues,this.groupLabel,this.customLabel),be(this.groupValues,this.groupLabel))(e)},flatAndStrip(e){return Re(be(this.groupValues,this.groupLabel),dr)(e)},updateSearch(e){this.search=e},isExistingOption(e){return this.options?this.optionKeys.indexOf(e)>-1:!1},isSelected(e){const t=this.trackBy?e[this.trackBy]:e;return this.valueKeys.indexOf(t)>-1},isOptionDisabled(e){return!!e.$isDisabled},getOptionLabel(e){if(ge(e))return"";if(e.isTag)return e.label;if(e.$isLabel)return e.$groupLabel;const t=this.customLabel(e,this.label);return ge(t)?"":t},select(e,t){if(e.$isLabel&&this.groupSelect){this.selectGroup(e);return}if(!(this.blockKeys.indexOf(t)!==-1||this.disabled||e.$isDisabled||e.$isLabel)&&!(this.max&&this.multiple&&this.internalValue.length===this.max)&&!(t==="Tab"&&!this.pointerDirty)){if(e.isTag)this.$emit("tag",e.label,this.id),this.search="",this.closeOnSelect&&!this.multiple&&this.deactivate();else{if(this.isSelected(e)){t!=="Tab"&&this.removeElement(e);return}this.multiple?this.$emit("update:modelValue",this.internalValue.concat([e])):this.$emit("update:modelValue",e),this.$emit("select",e,this.id),this.clearOnSelect&&(this.search="")}this.closeOnSelect&&this.deactivate()}},selectGroup(e){const t=this.options.find(s=>s[this.groupLabel]===e.$groupLabel);if(t){if(this.wholeGroupSelected(t)){this.$emit("remove",t[this.groupValues],this.id);const s=this.internalValue.filter(o=>t[this.groupValues].indexOf(o)===-1);this.$emit("update:modelValue",s)}else{let s=t[this.groupValues].filter(o=>!(this.isOptionDisabled(o)||this.isSelected(o)));this.max&&s.splice(this.max-this.internalValue.length),this.$emit("select",s,this.id),this.$emit("update:modelValue",this.internalValue.concat(s))}this.closeOnSelect&&this.deactivate()}},wholeGroupSelected(e){return e[this.groupValues].every(t=>this.isSelected(t)||this.isOptionDisabled(t))},wholeGroupDisabled(e){return e[this.groupValues].every(this.isOptionDisabled)},removeElement(e,t=!0){if(this.disabled||e.$isDisabled)return;if(!this.allowEmpty&&this.internalValue.length<=1){this.deactivate();return}const s=typeof e=="object"?this.valueKeys.indexOf(e[this.trackBy]):this.valueKeys.indexOf(e);if(this.multiple){const o=this.internalValue.slice(0,s).concat(this.internalValue.slice(s+1));this.$emit("update:modelValue",o)}else this.$emit("update:modelValue",null);this.$emit("remove",e,this.id),this.closeOnSelect&&t&&this.deactivate()},removeLastElement(){this.blockKeys.indexOf("Delete")===-1&&this.search.length===0&&Array.isArray(this.internalValue)&&this.internalValue.length&&this.removeElement(this.internalValue[this.internalValue.length-1],!1)},activate(){this.isOpen||this.disabled||(this.adjustPosition(),this.groupValues&&this.pointer===0&&this.filteredOptions.length&&(this.pointer=1),this.isOpen=!0,this.searchable?(this.preserveSearch||(this.search=""),this.preventAutofocus||this.$nextTick(()=>this.$refs.search&&this.$refs.search.focus())):this.preventAutofocus||typeof this.$el<"u"&&this.$el.focus(),this.$emit("open",this.id))},deactivate(){this.isOpen&&(this.isOpen=!1,this.searchable?typeof this.$refs.search<"u"&&this.$refs.search.blur():typeof this.$el<"u"&&this.$el.blur(),this.preserveSearch||(this.search=""),this.$emit("close",this.getValue(),this.id))},toggle(){this.isOpen?this.deactivate():this.activate()},adjustPosition(){if(typeof window>"u")return;const e=this.$el.getBoundingClientRect().top,t=window.innerHeight-this.$el.getBoundingClientRect().bottom;t>this.maxHeight||t>e||this.openDirection==="below"||this.openDirection==="bottom"?(this.preferredOpenDirection="below",this.optimizedHeight=Math.min(t-40,this.maxHeight)):(this.preferredOpenDirection="above",this.optimizedHeight=Math.min(e-40,this.maxHeight))}}},fr={data(){return{pointer:0,pointerDirty:!1}},props:{showPointer:{type:Boolean,default:!0},optionHeight:{type:Number,default:40}},computed:{pointerPosition(){return this.pointer*this.optionHeight},visibleElements(){return this.optimizedHeight/this.optionHeight}},watch:{filteredOptions(){this.pointerAdjust()},isOpen(){this.pointerDirty=!1},pointer(){this.$refs.search&&this.$refs.search.setAttribute("aria-activedescendant",this.id+"-"+this.pointer.toString())}},methods:{optionHighlight(e,t){return{"multiselect__option--highlight":e===this.pointer&&this.showPointer,"multiselect__option--selected":this.isSelected(t)}},groupHighlight(e,t){if(!this.groupSelect)return["multiselect__option--disabled",{"multiselect__option--group":t.$isLabel}];const s=this.options.find(o=>o[this.groupLabel]===t.$groupLabel);return s&&!this.wholeGroupDisabled(s)?["multiselect__option--group",{"multiselect__option--highlight":e===this.pointer&&this.showPointer},{"multiselect__option--group-selected":this.wholeGroupSelected(s)}]:"multiselect__option--disabled"},addPointerElement({key:e}="Enter"){this.filteredOptions.length>0&&this.select(this.filteredOptions[this.pointer],e),this.pointerReset()},pointerForward(){this.pointer0?(this.pointer--,this.$refs.list.scrollTop>=this.pointerPosition&&(this.$refs.list.scrollTop=this.pointerPosition),this.filteredOptions[this.pointer]&&this.filteredOptions[this.pointer].$isLabel&&!this.groupSelect&&this.pointerBackward()):this.filteredOptions[this.pointer]&&this.filteredOptions[0].$isLabel&&!this.groupSelect&&this.pointerForward(),this.pointerDirty=!0},pointerReset(){this.closeOnSelect&&(this.pointer=0,this.$refs.list&&(this.$refs.list.scrollTop=0))},pointerAdjust(){this.pointer>=this.filteredOptions.length-1&&(this.pointer=this.filteredOptions.length?this.filteredOptions.length-1:0),this.filteredOptions.length>0&&this.filteredOptions[this.pointer].$isLabel&&!this.groupSelect&&this.pointerForward()},pointerSet(e){this.pointer=e,this.pointerDirty=!0}}},ot={name:"vue-multiselect",mixins:[hr,fr],compatConfig:{MODE:3,ATTR_ENUMERATED_COERCION:!1},props:{name:{type:String,default:""},modelValue:{type:null,default(){return[]}},selectLabel:{type:String,default:"Press enter to select"},selectGroupLabel:{type:String,default:"Press enter to select group"},selectedLabel:{type:String,default:"Selected"},deselectLabel:{type:String,default:"Press enter to remove"},deselectGroupLabel:{type:String,default:"Press enter to deselect group"},showLabels:{type:Boolean,default:!0},limit:{type:Number,default:99999},maxHeight:{type:Number,default:300},limitText:{type:Function,default:e=>`and ${e} more`},loading:{type:Boolean,default:!1},disabled:{type:Boolean,default:!1},openDirection:{type:String,default:""},showNoOptions:{type:Boolean,default:!0},showNoResults:{type:Boolean,default:!0},tabindex:{type:Number,default:0}},computed:{hasOptionGroup(){return this.groupValues&&this.groupLabel&&this.groupSelect},isSingleLabelVisible(){return(this.singleValue||this.singleValue===0)&&(!this.isOpen||!this.searchable)&&!this.visibleValues.length},isPlaceholderVisible(){return!this.internalValue.length&&(!this.searchable||!this.isOpen)},visibleValues(){return this.multiple?this.internalValue.slice(0,this.limit):[]},singleValue(){return this.internalValue[0]},deselectLabelText(){return this.showLabels?this.deselectLabel:""},deselectGroupLabelText(){return this.showLabels?this.deselectGroupLabel:""},selectLabelText(){return this.showLabels?this.selectLabel:""},selectGroupLabelText(){return this.showLabels?this.selectGroupLabel:""},selectedLabelText(){return this.showLabels?this.selectedLabel:""},inputStyle(){return this.searchable||this.multiple&&this.modelValue&&this.modelValue.length?this.isOpen?{width:"100%"}:{width:"0",position:"absolute",padding:"0"}:""},contentStyle(){return this.options.length?{display:"inline-block"}:{display:"block"}},isAbove(){return this.openDirection==="above"||this.openDirection==="top"?!0:this.openDirection==="below"||this.openDirection==="bottom"?!1:this.preferredOpenDirection==="above"},showSearchInput(){return this.searchable&&(this.hasSingleSelectedSlot&&(this.visibleSingleValue||this.visibleSingleValue===0)?this.isOpen:!0)}}};const vr={ref:"tags",class:"multiselect__tags"},mr={class:"multiselect__tags-wrap"},_r={class:"multiselect__spinner"},gr={key:0},br={class:"multiselect__option"},yr={class:"multiselect__option"},wr=M("No elements found. Consider changing the search query."),Sr={class:"multiselect__option"},Lr=M("List is empty.");function Or(e,t,s,o,a,r){return n(),O("div",{tabindex:e.searchable?-1:s.tabindex,class:[{"multiselect--active":e.isOpen,"multiselect--disabled":s.disabled,"multiselect--above":r.isAbove,"multiselect--has-options-group":r.hasOptionGroup},"multiselect"],onFocus:t[14]||(t[14]=i=>e.activate()),onBlur:t[15]||(t[15]=i=>e.searchable?!1:e.deactivate()),onKeydown:[t[16]||(t[16]=G(P(i=>e.pointerForward(),["self","prevent"]),["down"])),t[17]||(t[17]=G(P(i=>e.pointerBackward(),["self","prevent"]),["up"]))],onKeypress:t[18]||(t[18]=G(P(i=>e.addPointerElement(i),["stop","self"]),["enter","tab"])),onKeyup:t[19]||(t[19]=G(i=>e.deactivate(),["esc"])),role:"combobox","aria-owns":"listbox-"+e.id},[D(e.$slots,"caret",{toggle:e.toggle},()=>[S("div",{onMousedown:t[1]||(t[1]=P(i=>e.toggle(),["prevent","stop"])),class:"multiselect__select"},null,32)]),D(e.$slots,"clear",{search:e.search}),S("div",vr,[D(e.$slots,"selection",{search:e.search,remove:e.removeElement,values:r.visibleValues,isOpen:e.isOpen},()=>[Y(S("div",mr,[(n(!0),O(I,null,B(r.visibleValues,(i,l)=>D(e.$slots,"tag",{option:i,search:e.search,remove:e.removeElement},()=>[(n(),O("span",{class:"multiselect__tag",key:l},[S("span",{textContent:V(e.getOptionLabel(i))},null,8,["textContent"]),S("i",{tabindex:"1",onKeypress:G(P(c=>e.removeElement(i),["prevent"]),["enter"]),onMousedown:P(c=>e.removeElement(i),["prevent"]),class:"multiselect__tag-icon"},null,40,["onKeypress","onMousedown"])]))])),256))],512),[[Q,r.visibleValues.length>0]]),e.internalValue&&e.internalValue.length>s.limit?D(e.$slots,"limit",{key:0},()=>[S("strong",{class:"multiselect__strong",textContent:V(s.limitText(e.internalValue.length-s.limit))},null,8,["textContent"])]):L("v-if",!0)]),S(de,{name:"multiselect__loading"},{default:W(()=>[D(e.$slots,"loading",{},()=>[Y(S("div",_r,null,512),[[Q,s.loading]])])]),_:3}),e.searchable?(n(),O("input",{key:0,ref:"search",name:s.name,id:e.id,type:"text",autocomplete:"off",spellcheck:"false",placeholder:e.placeholder,style:r.inputStyle,value:e.search,disabled:s.disabled,tabindex:s.tabindex,onInput:t[2]||(t[2]=i=>e.updateSearch(i.target.value)),onFocus:t[3]||(t[3]=P(i=>e.activate(),["prevent"])),onBlur:t[4]||(t[4]=P(i=>e.deactivate(),["prevent"])),onKeyup:t[5]||(t[5]=G(i=>e.deactivate(),["esc"])),onKeydown:[t[6]||(t[6]=G(P(i=>e.pointerForward(),["prevent"]),["down"])),t[7]||(t[7]=G(P(i=>e.pointerBackward(),["prevent"]),["up"])),t[9]||(t[9]=G(P(i=>e.removeLastElement(),["stop"]),["delete"]))],onKeypress:t[8]||(t[8]=G(P(i=>e.addPointerElement(i),["prevent","stop","self"]),["enter"])),class:"multiselect__input","aria-controls":"listbox-"+e.id},null,44,["name","id","placeholder","value","disabled","tabindex","aria-controls"])):L("v-if",!0),r.isSingleLabelVisible?(n(),O("span",{key:1,class:"multiselect__single",onMousedown:t[10]||(t[10]=P((...i)=>e.toggle&&e.toggle(...i),["prevent"]))},[D(e.$slots,"singleLabel",{option:r.singleValue},()=>[M(V(e.currentOptionLabel),1)])],32)):L("v-if",!0),r.isPlaceholderVisible?(n(),O("span",{key:2,class:"multiselect__placeholder",onMousedown:t[11]||(t[11]=P((...i)=>e.toggle&&e.toggle(...i),["prevent"]))},[D(e.$slots,"placeholder",{},()=>[M(V(e.placeholder),1)])],32)):L("v-if",!0)],512),S(de,{name:"multiselect"},{default:W(()=>[Y(S("div",{class:"multiselect__content-wrapper",onFocus:t[12]||(t[12]=(...i)=>e.activate&&e.activate(...i)),tabindex:"-1",onMousedown:t[13]||(t[13]=P(()=>{},["prevent"])),style:{maxHeight:e.optimizedHeight+"px"},ref:"list"},[S("ul",{class:"multiselect__content",style:r.contentStyle,role:"listbox",id:"listbox-"+e.id},[D(e.$slots,"beforeList"),e.multiple&&e.max===e.internalValue.length?(n(),O("li",gr,[S("span",br,[D(e.$slots,"maxElements",{},()=>[M("Maximum of "+V(e.max)+" options selected. First remove a selected option to select another.",1)])])])):L("v-if",!0),!e.max||e.internalValue.length(n(),O("li",{class:"multiselect__element",key:l,id:e.id+"-"+l,role:i&&(i.$isLabel||i.$isDisabled)?null:"option"},[i&&(i.$isLabel||i.$isDisabled)?L("v-if",!0):(n(),O("span",{key:0,class:[e.optionHighlight(l,i),"multiselect__option"],onClick:P(c=>e.select(i),["stop"]),onMouseenter:P(c=>e.pointerSet(l),["self"]),"data-select":i&&i.isTag?e.tagPlaceholder:r.selectLabelText,"data-selected":r.selectedLabelText,"data-deselect":r.deselectLabelText},[D(e.$slots,"option",{option:i,search:e.search,index:l},()=>[S("span",null,V(e.getOptionLabel(i)),1)])],42,["onClick","onMouseenter","data-select","data-selected","data-deselect"])),i&&(i.$isLabel||i.$isDisabled)?(n(),O("span",{key:1,"data-select":e.groupSelect&&r.selectGroupLabelText,"data-deselect":e.groupSelect&&r.deselectGroupLabelText,class:[e.groupHighlight(l,i),"multiselect__option"],onMouseenter:P(c=>e.groupSelect&&e.pointerSet(l),["self"]),onMousedown:P(c=>e.selectGroup(i),["prevent"])},[D(e.$slots,"option",{option:i,search:e.search,index:l},()=>[S("span",null,V(e.getOptionLabel(i)),1)])],42,["data-select","data-deselect","onMouseenter","onMousedown"])):L("v-if",!0)],8,["id","role"]))),128)):L("v-if",!0),Y(S("li",null,[S("span",yr,[D(e.$slots,"noResult",{search:e.search},()=>[wr])])],512),[[Q,s.showNoResults&&e.filteredOptions.length===0&&e.search&&!s.loading]]),Y(S("li",null,[S("span",Sr,[D(e.$slots,"noOptions",{},()=>[Lr])])],512),[[Q,s.showNoOptions&&(e.options.length===0||r.hasOptionGroup===!0&&e.filteredOptions.length===0)&&!e.search&&!s.loading]]),D(e.$slots,"afterList")],12,["id"])],36),[[Q,e.isOpen]])]),_:3})],42,["tabindex","aria-owns"])}ot.render=Or;const Ie="/assets/bot-6afebef6.png";const Er={components:{BotIcon:Ie,Multiselect:ot},data(){return{dynamicComponent:null,messages:[],isConnected:!1,waitResponse:!1,botOptions:{botAvatarImg:Ie,botTitle:"AI Bot",colorScheme:"#314659",boardContentBg:"#f4f4f4",msgBubbleBgBot:"#fff",msgBubbleBgUser:"#314659",inputPlaceholder:"Ask a new question"},docName:"tuxcare-documentation",tags:[],options:[{name:"TuxCare",value:["level-0","tuxcare"]},{name:"AlmaCare",value:["level-0","almacare"]},{name:"KernelCare Enterprise",value:["level-0","live-patching-services"]},{name:"KernelCare for IOT",value:["level-0","kernelcare-for-iot"]},{name:"ePortal",value:["level-0","eportal"]},{name:"ePortal API",value:["level-0","eportal-api"]},{name:"Extended Lifecycle Support",value:["level-0","extended-lifecycle-support"]},{name:"Extended Lifecycle Support for Languages",value:["level-0","extended-lifecycle-support-for-languages"]},{name:"Subscription Management Portal",value:["level-0","tuxcare-cln"]},{name:"Service Descriptions",value:["level-0","service-descriptions"]}]}},mounted(){b(()=>import("./vue-bot-ui.common-605c2d08.js").then(e=>e.v),["assets/vue-bot-ui.common-605c2d08.js","assets/framework-0ba8e1ea.js"]).then(e=>{this.dynamicComponent=gt(e.VueBotUI)}),console.log("Starting connection..."),this.connection=new WebSocket("wss://doc-bot.cloudlinux.com:2096"),this.connection.onmessage=e=>{const t=JSON.parse(e.data);this.messages.push({agent:"bot",type:"markdown",text:t.text}),this.waitResponse=!1,setTimeout(()=>{this.messages.push({agent:"bot",type:"rate",id:t.id})},1e3)},this.connection.onclose=()=>{console.log("Connection closed"),this.isConnected=!1},this.connection.onopen=()=>{console.log("Successfully connected to the websocket server..."),this.isConnected=!0}},methods:{messageSendHandler(e){this.messages.push({agent:"user",type:"text",text:e.text});let t=[];this.tags.length!==this.options.length&&(t=this.tags.map(s=>s.value)),this.connection.send(JSON.stringify({type:"question",text:e.text,"doc-name":this.docName,tags:t})),this.waitResponse=!0},messageToServer(e){this.connection.send(JSON.stringify({"doc-name":this.docName,...e}))}}},Dr={id:"bot-ui"},$r={class:"qkb-board-header__title"},Vr={class:"qkb-board-header__select_field"};function kr(e,t,s,o,a,r){const i=oe("multiselect"),l=oe("ClientOnly");return n(),O(l,null,{default:W(()=>[p("div",Dr,[a.dynamicComponent&&a.isConnected?(n(),O(ue(a.dynamicComponent),{key:0,messages:a.messages,options:a.botOptions,"bot-typing":a.waitResponse,"input-disable":a.waitResponse,onMsgSend:r.messageSendHandler,onMsgToServer:r.messageToServer},{header:W(()=>[p("div",$r,V(a.botOptions.botTitle),1),p("div",Vr,[S(i,{modelValue:a.tags,"onUpdate:modelValue":t[0]||(t[0]=c=>a.tags=c),options:a.options,multiple:!0,"close-on-select":!0,limit:3,label:"name","track-by":"value",placeholder:"Select section"},null,8,["modelValue","options"])])]),_:1},40,["messages","options","bot-typing","input-disable","onMsgSend","onMsgToServer"])):L("v-if",!0)])]),_:1})}const xr=A(Er,[["render",kr],["__file","Chat.vue"]]),Ar=jt({rootComponents:[xr],async enhance({app:e}){e.config.globalProperties.$eventBus=Wt()},layouts:{Layout:ja,HomeLayout:tr,NotFound:ar},setup(){He("themeConfig",{cloudlinuxSite:"https://tuxcare.com",defaultURL:"/",githubBranch:"master",allowGithubEdit:!0,githubMainDir:"docs",githubRepository:"cloudlinux/tuxcare-documentation",MOBILE_BREAKPOINT:767,documents:lr,arrowDownIcon:"arrows/arrow-down.svg",githubEditIcon:"global/pen.svg",footerCustomLogo:"global/we-are-cloudlinux.svg",headerDefaultSearchIcon:"global/search.svg",siteLogo:"global/logo.svg",searchSelectIcon:"arrows/select-down.svg",headerSearchIcon:"global/header-search.svg",headerSearch:"TuxCare Product Documentation",headerSearchPlaceholder:"Search across the TuxCare product documentation",locales:{bottomLinks:rr,editLinkText:"Edit this page",sidebar:Je,siteTitle:"Documentation",stayInTouch:"Stay in touch",navbarLinks:ir},productsList:["CloudLinux","Imunify","TuxCare"],productsTitle:"Products",productsURLs:["https://docs.cloudlinux.com","https://docs.imunify360.com","https://docs.tuxcare.com"],social:nr,algoliaOptions:{apiKey:"17e673c12b93fbf7c4a00159b0ae2de0",indexName:"tuxcare",appId:"R7FCMJM4P7"},MAX_ALGOLIA_VISIBLE_RESULT:20,MAX_ALGOLIA_VISIBLE_ROWS:15,MAX_ALGOLIA_HITS_PER_PAGE:20})}}),ce=[Ft,Ar],Tr=[["v-8daa1a0e","/",{},["/index.html","/README.md"]],["v-89bfb992","/eportal/",{},["/eportal/index.html","/eportal/README.md"]],["v-b0d2ea62","/enterprise-support-for-almalinux/",{},["/enterprise-support-for-almalinux/index.html","/enterprise-support-for-almalinux/README.md"]],["v-1b6f4a0a","/eportal-api/",{},["/eportal-api/index.html","/eportal-api/README.md"]],["v-6c1fb884","/extended-lifecycle-support/",{},["/extended-lifecycle-support/index.html","/extended-lifecycle-support/README.md"]],["v-cadd6498","/extended-lifecycle-support-for-languages/",{},["/extended-lifecycle-support-for-languages/index.html","/extended-lifecycle-support-for-languages/README.md"]],["v-2d0a9a10","/jp/",{},["/jp/index.html","/jp/README.md"]],["v-33720eeb","/kernelcare-for-iot/",{},["/kernelcare-for-iot/index.html","/kernelcare-for-iot/README.md"]],["v-37e5fb86","/live-patching-services/",{},["/live-patching-services/index.html","/live-patching-services/README.md"]],["v-534e2916","/local-mirror-els/",{},["/local-mirror-els/index.html","/local-mirror-els/README.md"]],["v-c271a6b2","/service-descriptions/",{},["/service-descriptions/index.html","/service-descriptions/README.md"]],["v-2f5e7500","/tuxcare/",{},["/tuxcare/index.html","/tuxcare/README.md"]],["v-1f847a28","/tuxcare-cln/",{},["/tuxcare-cln/index.html","/tuxcare-cln/README.md"]],["v-ec0cad0c","/enterprise-support-for-almalinux/fips/",{},["/enterprise-support-for-almalinux/fips/index.html","/enterprise-support-for-almalinux/fips/README.md"]],["v-52e27964","/jp/eportal/",{},["/jp/eportal/index.html","/jp/eportal/README.md"]],["v-c05bf2be","/jp/eportal-api/",{},["/jp/eportal-api/index.html","/jp/eportal-api/README.md"]],["v-3d707372","/jp/extended-lifecycle-support/",{},["/jp/extended-lifecycle-support/index.html","/jp/extended-lifecycle-support/README.md"]],["v-7d514c7d","/jp/extended-lifecycle-support-for-languages/",{},["/jp/extended-lifecycle-support-for-languages/index.html","/jp/extended-lifecycle-support-for-languages/README.md"]],["v-50c7132c","/jp/linux-support-services/",{},["/jp/linux-support-services/index.html","/jp/linux-support-services/README.md"]],["v-fd036ae2","/jp/live-patching-services/",{},["/jp/live-patching-services/index.html","/jp/live-patching-services/README.md"]],["v-03bf6597","/jp/tuxcare/",{},["/jp/tuxcare/index.html","/jp/tuxcare/README.md"]],["v-b8319282","/jp/tuxcare-cln/",{},["/jp/tuxcare-cln/index.html","/jp/tuxcare-cln/README.md"]],["v-3706649a","/404.html",{},["/404"]]];var Me=ve({name:"Vuepress",setup(){const e=Pt();return()=>z(e.value)}}),Pr=()=>Tr.reduce((e,[t,s,o,a])=>(e.push({name:t,path:s,component:Me,meta:o},...a.map(r=>({path:r,redirect:s}))),e),[{name:"404",path:"/:catchAll(.*)",component:Me}]),Cr=Lt,Rr=()=>{const e=bt({history:Cr(yt("/")),routes:Pr(),scrollBehavior:(t,s,o)=>o||(t.hash?{el:t.hash}:{top:0})});return e.beforeResolve(async(t,s)=>{var o;(t.path!==s.path||s===wt)&&([X.value]=await Promise.all([U.resolvePageData(t.name),(o=je[t.name])==null?void 0:o.__asyncLoader()]))}),e},Ir=e=>{e.component("ClientOnly",Bt),e.component("Content",Ht)},Mr=(e,t,s)=>{const o=k(t.currentRoute.value.path);re(()=>t.currentRoute.value.path,g=>o.value=g);const a=E(()=>U.resolveLayouts(s)),r=E(()=>U.resolveRouteLocale(le.value.locales,o.value)),i=E(()=>U.resolveSiteLocaleData(le.value,r.value)),l=E(()=>U.resolvePageFrontmatter(X.value)),c=E(()=>U.resolvePageHeadTitle(X.value,i.value)),u=E(()=>U.resolvePageHead(c.value,l.value,i.value)),f=E(()=>U.resolvePageLang(X.value)),_=E(()=>U.resolvePageLayout(X.value,a.value));return e.provide(kt,a),e.provide(We,l),e.provide(Tt,c),e.provide(Ne,u),e.provide(Ge,f),e.provide(qe,_),e.provide(Ue,r),e.provide(Ct,i),Object.defineProperties(e.config.globalProperties,{$frontmatter:{get:()=>l.value},$head:{get:()=>u.value},$headTitle:{get:()=>c.value},$lang:{get:()=>f.value},$page:{get:()=>X.value},$routeLocale:{get:()=>r.value},$site:{get:()=>le.value},$siteLocale:{get:()=>i.value},$withBase:{get:()=>F}}),{layouts:a,pageData:X,pageFrontmatter:l,pageHead:u,pageHeadTitle:c,pageLang:f,pageLayout:_,routeLocale:r,siteData:le,siteLocaleData:i}},Br=()=>{const e=At(),t=Ke(),s=k([]),o=()=>{e.value.forEach(r=>{const i=Hr(r);i&&s.value.push(i)})},a=()=>{document.documentElement.lang=t.value,s.value.forEach(r=>{r.parentNode===document.head&&document.head.removeChild(r)}),s.value.splice(0,s.value.length),e.value.forEach(r=>{const i=jr(r);i!==null&&(document.head.appendChild(i),s.value.push(i))})};He(Rt,a),J(()=>{o(),a(),re(()=>e.value,()=>a())})},Hr=([e,t,s=""])=>{const o=Object.entries(t).map(([l,c])=>se(c)?`[${l}=${JSON.stringify(c)}]`:c===!0?`[${l}]`:"").join(""),a=`head > ${e}${o}`;return Array.from(document.querySelectorAll(a)).find(l=>l.innerText===s)||null},jr=([e,t,s])=>{if(!se(e))return null;const o=document.createElement(e);return Et(t)&&Object.entries(t).forEach(([a,r])=>{se(r)?o.setAttribute(a,r):r===!0&&o.setAttribute(a,"")}),se(s)&&o.appendChild(document.createTextNode(s)),o},Fr=St,Wr=async()=>{var s;const e=Fr({name:"VuepressApp",setup(){var o;Br();for(const a of ce)(o=a.setup)==null||o.call(a);return()=>[z(Ot),...ce.flatMap(({rootComponents:a=[]})=>a.map(r=>z(r)))]}}),t=Rr();Ir(e),Mr(e,t,ce);for(const o of ce)await((s=o.enhance)==null?void 0:s.call(o,{app:e,router:t,siteData:le}));return e.use(t),{app:e,router:t}};Wr().then(({app:e,router:t})=>{t.isReady().then(()=>{e.mount("#app")})});export{Wr as createVueApp}; diff --git a/assets/index.html-4de0b0ec.js b/assets/index.html-0f1aeece.js similarity index 61% rename from assets/index.html-4de0b0ec.js rename to assets/index.html-0f1aeece.js index 873cbbe7..b42b398e 100644 --- a/assets/index.html-4de0b0ec.js +++ b/assets/index.html-0f1aeece.js @@ -1,4 +1,4 @@ -import{_ as s,a as l,b as o,c as d,d as c,e as u,f as h,g as p,h as m,i as v,j as g,k as b,l as f,m as y,n as x,o as k,p as w,q as _,r as C,s as T,t as S,u as E,v as K,w as I,x as P,y as L}from"./uchecker-31d683fa.js";import{_ as A}from"./eportal-qemu-feed-7c9efdb9.js";import{_ as O,V as M,n as D,p as U,v as Y,q as e,J as a,C as n,A as r,a7 as t}from"./framework-0ba8e1ea.js";const N={},R=t(`

KernelCare Enterprise

KernelCare Enterprise live patching enhances customers' vulnerability patching programs by providing live patches to the Linux kernel and, optionally (with an add-on), to critical userspace components. The systems are patched according to your patch deployment policy, allowing you to customize your patch management to align with the needs of your unique environment, whether online or air-gapped.

KernelCare Enterprise can be extended with the following add-ons:

  • LibCare - for live patching of critical userspace components.
  • QEMUCare - for live patching of QEMU-based virtualization systems.

The sections below describe KernelCare and LibCare live patching in more detail.

KernelCare

Introduction

KernelCare Enterprise is a live kernel patching product that provides security patches for a range of popular Linux kernels that can be installed without rebooting the system. It supports kernels of Enterprise Linux operating systems, i.e., RHEL, Oracle, Rocky, AlmaLinux, and CentOS, as well as Ubuntu and Debian. Each individual kernel receives new live patches for as long as the kernel vendor releases security updates for the series.

The KernelCare Enterprise offering consists of the client application, the live patching service hosted by TuxCare, and an optional on-prem management server. The client application runs on machines, periodically checks for available patches, downloads, verifies, and installs them.

At the same time, complex enterprise environments often follow policies that require a gradual roll-out of updates to reduce risk or have high-security isolated environments that need to be updated. ePortal is an on-prem management server allowing organizations to define their rollout policy and remain in full control of which machines will get updated and when.

The live patching process

When a new vulnerability is detected in the Linux kernel, TuxCare creates a live patch addressing the vulnerability. After the live patch is made available, it is tested in TuxCare’s internal server farm and then promoted gradually to a series of testing tiers, ensuring that any released live patch has been tested sufficient time on live systems. Once the patch is released, systems that enable the KernelCare Enterprise client will receive the patch over an authenticated channel and apply it.

ePortal

Many organizations have a gradual patch roll-out policy or maintain a strict policy on which systems get upgraded and when. With ePortal, an on-prem management server, you can use the patch roll-out policy of your choice while automatically deploying patches in your air-gapped environment - all with a simple user interface.

Live patching testing tiers

KernelCare Enterprise delivers live patches to “tiers”. A tier is a target audience for the delivery of a patch. Your tier depends on whether your systems receive updates directly from the TuxCare Portal repository or use ePortal as a proxy to gradually roll out patches according to your patching policy. The differences are outlined below.

TIERDESCRIPTION
InternalFor internal TuxCare use. Updates are first tested and then applied across TuxCare infrastructure to decrease the odds of a faulty patch making it to customer machines.
TuxCare PortalPatches are delivered to these machines next.
ePortal CustomersPatches become available in the ePortal last. However, ePortal customers can customize the updates to receive them as soon as they become available in the test feed.

Our kernel team closely monitors the patch health internally before promoting it to the TuxCare Portal and further monitoring is done before promoting the patch to ePortal servers.

Kernel patching lifetime

KernelCare Enterprise offers live patches for each individual kernel for as long as the kernel vendor releases security updates for the series. This allows you to enjoy continuous protection for your existing kernels without being bound by the kernel vendor’s release schedule when planning your maintenance windows.

Vulnerability coverage

During the lifecycle of an operating system, TuxCare makes commercially reasonable efforts to provide live patches for all vulnerability fixes provided by the vendor, irrespective of their vulnerability rating. We may also address vulnerabilities that haven't been addressed by the OS vendor if they gained significant attention and were being actively discussed, exploited (according to the CISA list), or researched by the cybersecurity community.

Target response rates

TuxCare is committed to delivering timely security updates. We aim to deliver live patches for all CVEs patched by the vendor within 10 days from when the vulnerability is publicly disclosed. This rapid response time significantly reduces the opportunity window for a potential attack and meets most security regulation requirements. However, a live patch for a vulnerability can be significantly more complex than an ordinary kernel patch, and due to the additional complexity, can take more time to develop and test.

Supported architectures

KernelCare is available for both x86-64 (Intel and AMD) and ARM64 architectures.

Supported Linux distros and kernels

Customers can find detailed information about supported kernels, Linux distributions, specific vulnerabilities, and live patches provided by KernelCare and LibCare for each of the supported Linux distributions at https://patches.kernelcare.com/.

End-of-life (EOL) policy

TuxCare will stop supporting live patching for specific distros if there are no security advisories provided by the distro's vendor for the last 365 days. In this case, all customers running the affected distributions are notified about the upcoming EOL. Existing live patches for EOL distributions are available for the next 6 years after the EOL date.

Technical Support

All TuxCare live patching products include technical support provided according to the TuxCare support policy. It delivers 24/7/365 access to our engineers through the TuxCare Support Portal and to our online knowledge base.

Getting a trial license

You will need a trial activation key to be able to use the KernelCare Enterprise. The trial license subscription will work for 7 days.

If you have any issues getting an activation key or if you have any questions regarding using your trial subscription, contact sales@cloudlinux.com and we will help.

Installation

KernelCare Enterprise is compatible with 64-bit versions of CloudLinuxOS/CentOS 6, 7 and 8, AlmaLinux/RHEL 6, 7, 8 and 9, Oracle Linux 6 and 7, Amazon Linux 1 and 2, Virtuozzo/PCS/OpenVZ 2.6.32, Debian 8, 9 and 10, Proxmox VE 5 and 6, Virt-SIG/Xen4CentOS 6 and 7, Ubuntu 14.04, 15.04, 16.04, 18.04 and 20.04 kernels. The list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

To install KernelCare Enterprise, run the following as root:

# curl -s -L https://kernelcare.com/installer | bash
+import{_ as v,a as g,b,c as l,d,e as o,f as c,g as u,h,i as p,j as s,k as f,l as m,m as y,n as x,o as k,p as w,q as C,r as _,s as T,t as S,u as P,v as K,w as E,x as I,y as L}from"./uchecker-31d683fa.js";import{_ as A}from"./eportal-qemu-feed-7c9efdb9.js";import{_ as O,V as D,n as M,p as U,v as R,q as e,J as t,C as n,A as r,a7 as a}from"./framework-0ba8e1ea.js";const N={},Y=a(`

KernelCare Enterprise

KernelCare Enterprise live patching enhances customers' vulnerability patching programs by providing live patches to the Linux kernel and, optionally (with an add-on), to critical userspace components. The systems are patched according to your patch deployment policy, allowing you to customize your patch management to align with the needs of your unique environment, whether online or air-gapped.

KernelCare Enterprise can be extended with the following add-ons:

  • LibCare - for live patching of critical userspace components.
  • QEMUCare - for live patching of QEMU-based virtualization systems.

The sections below describe KernelCare and LibCare live patching in more detail.

KernelCare

Introduction

KernelCare Enterprise is a live kernel patching product that provides security patches for a range of popular Linux kernels that can be installed without rebooting the system. It supports kernels of Enterprise Linux operating systems, i.e., RHEL, Oracle, Rocky, AlmaLinux, and CentOS, as well as Ubuntu and Debian. Each individual kernel receives new live patches for as long as the kernel vendor releases security updates for the series.

The KernelCare Enterprise offering consists of the client application, the live patching service hosted by TuxCare, and an optional on-prem management server. The client application runs on machines, periodically checks for available patches, downloads, verifies, and installs them.

At the same time, complex enterprise environments often follow policies that require a gradual roll-out of updates to reduce risk or have high-security isolated environments that need to be updated. ePortal is an on-prem management server allowing organizations to define their rollout policy and remain in full control of which machines will get updated and when.

The live patching process

When a new vulnerability is detected in the Linux kernel, TuxCare creates a live patch addressing the vulnerability. After the live patch is made available, it is tested in TuxCare’s internal server farm and then promoted gradually to a series of testing tiers, ensuring that any released live patch has been tested sufficient time on live systems. Once the patch is released, systems that enable the KernelCare Enterprise client will receive the patch over an authenticated channel and apply it.

ePortal

Many organizations have a gradual patch roll-out policy or maintain a strict policy on which systems get upgraded and when. With ePortal, an on-prem management server, you can use the patch roll-out policy of your choice while automatically deploying patches in your air-gapped environment - all with a simple user interface.

Live patching testing tiers

KernelCare Enterprise delivers live patches to “tiers”. A tier is a target audience for the delivery of a patch. Your tier depends on whether your systems receive updates directly from the TuxCare Portal repository or use ePortal as a proxy to gradually roll out patches according to your patching policy. The differences are outlined below.

TIERDESCRIPTION
InternalFor internal TuxCare use. Updates are first tested and then applied across TuxCare infrastructure to decrease the odds of a faulty patch making it to customer machines.
TuxCare PortalPatches are delivered to these machines next.
ePortal CustomersPatches become available in the ePortal last. However, ePortal customers can customize the updates to receive them as soon as they become available in the test feed.

Our kernel team closely monitors the patch health internally before promoting it to the TuxCare Portal and further monitoring is done before promoting the patch to ePortal servers.

Kernel patching lifetime

KernelCare Enterprise offers live patches for each individual kernel for as long as the kernel vendor releases security updates for the series. This allows you to enjoy continuous protection for your existing kernels without being bound by the kernel vendor’s release schedule when planning your maintenance windows.

Vulnerability coverage

During the lifecycle of an operating system, TuxCare makes commercially reasonable efforts to provide live patches for all vulnerability fixes provided by the vendor, irrespective of their vulnerability rating. We may also address vulnerabilities that haven't been addressed by the OS vendor if they gained significant attention and were being actively discussed, exploited (according to the CISA list), or researched by the cybersecurity community.

Target response rates

TuxCare is committed to delivering timely security updates. We aim to deliver live patches for all CVEs patched by the vendor within 10 days from when the vulnerability is publicly disclosed. This rapid response time significantly reduces the opportunity window for a potential attack and meets most security regulation requirements. However, a live patch for a vulnerability can be significantly more complex than an ordinary kernel patch, and due to the additional complexity, can take more time to develop and test.

Supported architectures

KernelCare is available for both x86-64 (Intel and AMD) and ARM64 architectures.

Supported Linux distros and kernels

Customers can find detailed information about supported kernels, Linux distributions, specific vulnerabilities, and live patches provided by KernelCare and LibCare for each of the supported Linux distributions at https://patches.kernelcare.com/.

End-of-life (EOL) policy

TuxCare will stop supporting live patching for specific distros if there are no security advisories provided by the distro's vendor for the last 365 days. In this case, all customers running the affected distributions are notified about the upcoming EOL. Existing live patches for EOL distributions are available for the next 6 years after the EOL date.

Technical Support

All TuxCare live patching products include technical support provided according to the TuxCare support policy. It delivers 24/7/365 access to our engineers through the TuxCare Support Portal and to our online knowledge base.

Getting a trial license

You will need a trial activation key to be able to use the KernelCare Enterprise. The trial license subscription will work for 7 days.

If you have any issues getting an activation key or if you have any questions regarding using your trial subscription, contact sales@cloudlinux.com and we will help.

Installation

KernelCare Enterprise is compatible with 64-bit versions of CloudLinuxOS/CentOS 6, 7 and 8, AlmaLinux/RHEL 6, 7, 8 and 9, Oracle Linux 6 and 7, Amazon Linux 1 and 2, Virtuozzo/PCS/OpenVZ 2.6.32, Debian 8, 9 and 10, Proxmox VE 5 and 6, Virt-SIG/Xen4CentOS 6 and 7, Ubuntu 14.04, 15.04, 16.04, 18.04 and 20.04 kernels. The list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

To install KernelCare Enterprise, run the following as root:

# curl -s -L https://kernelcare.com/installer | bash
 

or:

# wget -qq -O - https://kernelcare.com/installer | bash
 

If you are using an IP-based license, nothing else is required to be done.

If you are using a key-based license, run:

# kcarectl --register <KEY>
 

Where KEY is the registration key code string provided when you sign up for purchase or trial of the product.

If you are experiencing a Key limit reached error after the end of the trial period, you should first unregister the server by running:

# kcarectl --unregister
@@ -19,13 +19,13 @@ import{_ as s,a as l,b as o,c as d,d as c,e as u,f as h,g as p,h as m,i as v,j a
 

You have to add an IP license for that server, and it is just the two letters IP, not your actual IP address.

By default the script will attempt 3 times to uninstall Ksplice, waiting 60 seconds in between. You can run it using nohup if you don't want to wait.

You can change that by editing the script and changing RETRY and SLEEP values.

The script will exit with exit code 0 and message Done on success. Otherwise, it will produce exit code -1

The complete log file can be found at /var/log/ksplice2kcare.log

Canonical Livepatch

KernelCare Enterprise is not compatible with Canonical Livepatch and should not be used on the same system.

Basic management

To disable automatic updates, edit the file /etc/sysconfig/kcare/kcare.conf

AUTO_UPDATE=False
 

To check the updated 'effective' version, run:

# kcarectl --uname
 

We provide a convenience script /usr/bin/kcare-uname that has same syntax as uname

To see applied patches, run:

# kcarectl --patch-info
-

Command line tools

/usr/bin/kcarectl - Manage KernelCare Enterprise patches for your kernel.

/usr/bin/kcare-uname - Print certain system information.

kcarectl

`,106),F=e("thead",null,[e("tr",null,[e("th"),e("th")])],-1),q=e("tr",null,[e("td",null,[e("code",null,"-i, --info")]),e("td",null,"Display information about patches installed by KernelCare Enterprise.")],-1),H=e("tr",null,[e("td",null,[e("code",null,"-u, --update")]),e("td",null,"Download latest patches, and apply them to current kernel.")],-1),z=e("td",null,[e("code",null,"--smart-update [since 1.6]")],-1),V=e("tr",null,[e("td",null,[e("code",null,"--unload")]),e("td",null,"Unload patches.")],-1),$=e("tr",null,[e("td",null,[e("code",null,"--auto-update")]),e("td",null,"Check if update is needed and update.")],-1),W=e("tr",null,[e("td",null,[e("code",null,"--patch-info")]),e("td",null,"Lists applied patches.")],-1),Q=e("tr",null,[e("td",null,[e("code",null,"--status")]),e("td",null,[a("Return a status of an update. Refer to the exit code: "),e("code",null,"0"),a(" - host is updated to latest patch level, "),e("code",null,"1"),a(" - there are no applied patches, "),e("code",null,"2"),a(" - there are new not applied patches, "),e("code",null,"3"),a(" - kernel is unsupported")])],-1),B=e("tr",null,[e("td",null,[e("code",null,"--force [since 2.3]")]),e("td",null,"When used with update, forces applying the patch even if unable to freeze some threads.")],-1),G=e("tr",null,[e("td",null,[e("code",null,"--uname")]),e("td",null,"Prints safe kernel version.")],-1),j=e("tr",null,[e("td",null,[e("code",null,"--license-info")]),e("td",null,"Output current license info.")],-1),X=e("tr",null,[e("td",null,[e("code",null,"--register KEY")]),e("td",null,"Register using KernelCare Enterprise Key.")],-1),Z=e("tr",null,[e("td",null,[e("code",null,"--register-autoretry [since 2.5]")]),e("td",null,"If registration fails retries registration indefinitely.")],-1),J=e("tr",null,[e("td",null,[e("code",null,"--unregister")]),e("td",null,"Unregister from KernelCare Enterprise for Key based servers.")],-1),ee=e("tr",null,[e("td",null,[e("code",null,"--userspace-update [PATCHES]")]),e("td",null,"Download latest patches and apply them to the corresponding userspace processes. Сan be set so that only certain types of patches are applied.")],-1),ae=e("tr",null,[e("td",null,[e("code",null,"--test")]),e("td",null,"Try test builds instead of production builds (deprecated, use --prefix=test instead).")],-1),te=e("tr",null,[e("td",null,[e("code",null,"--prefix")]),e("td",null,"Patch source prefix, used to test different builds, by downloading builds from a different location, based on prefix (v2.2+)")],-1),ie=e("tr",null,[e("td",null,[e("code",null,"--version")]),e("td",null,"Print KernelCare Enterprise version.")],-1),ne=e("tr",null,[e("td",null,[e("code",null,"--import-key PATH")]),e("td",null,"Import gpg key.")],-1),re=e("tr",null,[e("td",null,[e("code",null,"--set-monitoring-key")]),e("td",null,"Set monitoring key for IP based licenses. 16 to 32 characters, alphanumeric only [version 2.1+]")],-1),se=e("tr",null,[e("td",null,[e("code",null,"--freezer [since 2.3]")]),e("td",null,"none: don't freeze any threads; full: freeze all threads; smart: freezes only threads that need to be frozen for patching. If option is not selected, best freezer method is chosen automatically.")],-1),le=e("tr",null,[e("td",null,[e("code",null,"--check [since 2.4-1]")]),e("td",null,"Check if new patchset is available, without updating. Exit code 0 means there is a new kernel. 1 when there is no new kernel.")],-1),oe=e("tr",null,[e("td",null,[e("code",null,"--doctor [since 2.6]")]),e("td",null,"Send a report to the TuxCare support staff for diagnostics.")],-1),de=e("tr",null,[e("td",null,[e("code",null,"--set-patch-type extra")]),e("td",null,"To enable extra patches.")],-1),ce=e("tr",null,[e("td",null,[e("code",null,"--set-patch-type free")]),e("td",null,"To enable free patches.")],-1),ue=e("td",null,[e("code",null,"--set-sticky-patch SET_STICKY_PATCH")],-1),he=e("tr",null,[e("td",null,[e("code",null,"--tag COMMAND")]),e("td",null,[a("Adds an extra "),e("em",null,"Tag"),a(" field for a server. COMMAND is a user-defined parameter.")])],-1),pe=t(`

Note

Currently available userspace patch types are libs and qemu. To apply patches only for shared libraries, use --userspace-update libs

kcare-uname

Print certain system information. Default is -s

-a, --allprint all information in the following order, except omit -p and -i if unknown
-s, --kernel-nameprint the kernel name
-n, --nodenameprint the network node hostname
-r, --kernel-releaseprint the kernel release
-v, --kernel-versionprint the kernel version
-m, --machineprint the machine hardware name
-p, --processorprint the processor type or unknown
-i, --hardware-platformprint the hardware platform or unknown
-o, --operating-systemprint the operating system
--helpdisplay this help and exit
--versionoutput version information and exit

kernelcare doctor

This tool collects essential information about the KernelCare environment and sends it to the support team.

# kcarectl --doctor
+

Command line tools

/usr/bin/kcarectl - Manage KernelCare Enterprise patches for your kernel.

/usr/bin/kcare-uname - Print certain system information.

kcarectl

`,106),F=e("thead",null,[e("tr",null,[e("th"),e("th")])],-1),q=e("tr",null,[e("td",null,[e("code",null,"-i, --info")]),e("td",null,"Display information about patches installed by KernelCare Enterprise.")],-1),H=e("tr",null,[e("td",null,[e("code",null,"-u, --update")]),e("td",null,"Download latest patches, and apply them to current kernel.")],-1),z=e("td",null,[e("code",null,"--smart-update [since 1.6]")],-1),V=e("tr",null,[e("td",null,[e("code",null,"--unload")]),e("td",null,"Unload patches.")],-1),W=e("tr",null,[e("td",null,[e("code",null,"--auto-update")]),e("td",null,"Check if update is needed and update.")],-1),B=e("tr",null,[e("td",null,[e("code",null,"--patch-info")]),e("td",null,"Lists applied patches.")],-1),$=e("tr",null,[e("td",null,[e("code",null,"--status")]),e("td",null,[t("Return a status of an update. Refer to the exit code: "),e("code",null,"0"),t(" - host is updated to latest patch level, "),e("code",null,"1"),t(" - there are no applied patches, "),e("code",null,"2"),t(" - there are new not applied patches, "),e("code",null,"3"),t(" - kernel is unsupported")])],-1),G=e("tr",null,[e("td",null,[e("code",null,"--force [since 2.3]")]),e("td",null,"When used with update, forces applying the patch even if unable to freeze some threads.")],-1),Q=e("tr",null,[e("td",null,[e("code",null,"--uname")]),e("td",null,"Prints safe kernel version.")],-1),X=e("tr",null,[e("td",null,[e("code",null,"--license-info")]),e("td",null,"Output current license info.")],-1),j=e("tr",null,[e("td",null,[e("code",null,"--register KEY")]),e("td",null,"Register using KernelCare Enterprise Key.")],-1),Z=e("tr",null,[e("td",null,[e("code",null,"--register-autoretry [since 2.5]")]),e("td",null,"If registration fails retries registration indefinitely.")],-1),J=e("tr",null,[e("td",null,[e("code",null,"--unregister")]),e("td",null,"Unregister from KernelCare Enterprise for Key based servers.")],-1),ee=e("tr",null,[e("td",null,[e("code",null,"--userspace-update [PATCHES]")]),e("td",null,"Download latest patches and apply them to the corresponding userspace processes. Сan be set so that only certain types of patches are applied.")],-1),te=e("tr",null,[e("td",null,[e("code",null,"--test")]),e("td",null,"Try test builds instead of production builds (deprecated, use --prefix=test instead).")],-1),ae=e("tr",null,[e("td",null,[e("code",null,"--prefix")]),e("td",null,"Patch source prefix, used to test different builds, by downloading builds from a different location, based on prefix (v2.2+)")],-1),ie=e("tr",null,[e("td",null,[e("code",null,"--version")]),e("td",null,"Print KernelCare Enterprise version.")],-1),ne=e("tr",null,[e("td",null,[e("code",null,"--import-key PATH")]),e("td",null,"Import gpg key.")],-1),re=e("tr",null,[e("td",null,[e("code",null,"--set-monitoring-key")]),e("td",null,"Set monitoring key for IP based licenses. 16 to 32 characters, alphanumeric only [version 2.1+]")],-1),se=e("tr",null,[e("td",null,[e("code",null,"--freezer [since 2.3]")]),e("td",null,"none: don't freeze any threads; full: freeze all threads; smart: freezes only threads that need to be frozen for patching. If option is not selected, best freezer method is chosen automatically.")],-1),le=e("tr",null,[e("td",null,[e("code",null,"--check [since 2.4-1]")]),e("td",null,"Check if new patchset is available, without updating. Exit code 0 means there is a new kernel. 1 when there is no new kernel.")],-1),de=e("tr",null,[e("td",null,[e("code",null,"--doctor [since 2.6]")]),e("td",null,"Send a report to the TuxCare support staff for diagnostics.")],-1),oe=e("tr",null,[e("td",null,[e("code",null,"--set-patch-type extra")]),e("td",null,"To enable extra patches.")],-1),ce=e("tr",null,[e("td",null,[e("code",null,"--set-patch-type free")]),e("td",null,"To enable free patches.")],-1),ue=e("td",null,[e("code",null,"--set-sticky-patch SET_STICKY_PATCH")],-1),he=e("tr",null,[e("td",null,[e("code",null,"--tag COMMAND")]),e("td",null,[t("Adds an extra "),e("em",null,"Tag"),t(" field for a server. COMMAND is a user-defined parameter.")])],-1),pe=a(`

Note

Currently available userspace patch types are libs and qemu. To apply patches only for shared libraries, use --userspace-update libs

kcare-uname

Print certain system information. Default is -s

-a, --allprint all information in the following order, except omit -p and -i if unknown
-s, --kernel-nameprint the kernel name
-n, --nodenameprint the network node hostname
-r, --kernel-releaseprint the kernel release
-v, --kernel-versionprint the kernel version
-m, --machineprint the machine hardware name
-p, --processorprint the processor type or unknown
-i, --hardware-platformprint the hardware platform or unknown
-o, --operating-systemprint the operating system
--helpdisplay this help and exit
--versionoutput version information and exit

kernelcare doctor

This tool collects essential information about the KernelCare environment and sends it to the support team.

# kcarectl --doctor
 
 Generating report...
 Uploading...
 Key: FRWf74Zw11111111.83991334-1111-1111-1111-681ddd653e5f
 Please, provide above mentioned key to KernelCare Support Team
-

The command generates a report and prints out the ID which could be linked to a support ticket.

Note

If there was a connection problem during uploading the report, the report will be stored locally as /root/cl-report. This file should be sent to the support team manually.

Config options

kcarectl behavior can be configured using /etc/sysconfig/kcare/kcare.conf

`,11),me=e("thead",null,[e("tr",null,[e("th"),e("th")])],-1),ve=e("tr",null,[e("td",null,[e("code",null,"AUTO_UPDATE=YES|NO")]),e("td",null,[e("code",null,"YES"),a(" - enable auto-update; "),e("code",null,"NO"),a(" - disable auto-update.")])],-1),ge=e("tr",null,[e("td",null,[e("code",null,"PATCH_METHOD=normal|nofreeze|smart")]),e("td",null,[e("code",null,"Normal"),a(" - (default) use freezer;"),e("br"),e("code",null,"Nofreeze"),a(" - don't use freezer to freeze processes;"),e("br"),a(),e("code",null,"Smart"),a(" - smart freezer freezes only threads that need to be frozen for patching [kernelcare 2.3+].")])],-1),be=e("tr",null,[e("td",null,[e("code",null,"PATCH_SERVER")]),e("td",null,"Server to use to download patches.")],-1),fe=e("tr",null,[e("td",null,[e("code",null,"REGISTRATION_URL")]),e("td",null,"Licensing server.")],-1),ye=e("tr",null,[e("td",null,[e("code",null,"PREFIX=prefix")]),e("td",null,"Patch source prefix, used to test different builds, by downloading builds from a different location, based on prefix [kernelcare 2.2+]")],-1),xe=e("tr",null,[e("td",null,[e("code",null,"UPDATE_POLICY=REMOTE|LOCAL|LOCAL_FIRST")]),e("td",null,[a("Depending on the policy, on server startup, use:"),e("br"),e("code",null,"REMOTE"),a(" - (default) patches from patch server."),e("br"),e("code",null,"LOCAL"),a(" - only locally cached patches, if none cached (caching is done automatically) - do nothing."),e("br"),e("code",null,"LOCAL_FIRST"),a(" - see if locally cached patches exist, and load them. If not, try getting them from remote server.")])],-1),ke=e("tr",null,[e("td",null,[e("code",null,"IGNORE_UNKNOWN_KERNEL=True|False")]),e("td",null,"Don't provide notification if unknown kernel on auto-update. [kernelcare 2.5+]")],-1),we=e("tr",null,[e("td",null,[e("code",null,"LOAD_KCARE_SYSCTL")]),e("td",null,[a("Controls if "),e("code",null,"/etc/sysconfig/kcare/sysctl.conf"),a(" will be loaded on patchset load. True by default. [kernelcare 2.7+]")])],-1),_e=e("tr",null,[e("td",null,[e("code",null,"STICKY_PATCH=KEY")]),e("td",null,[a("Retrieve sticky patch from "),e("code",null,"KEY"),a(" (see CLN, Key Edit); not supported for IP based servers or ePortal.")])],-1),Ce=e("td",null,[e("code",null,"STICKY_PATCH=DDMMYY")],-1),Te=e("tr",null,[e("td",null,[e("code",null,"[AUTO_]UPDATE_DELAY=h|d")]),e("td",null,[a("Use patchsets not newer than specified time. For example "),e("code",null,"24h"),a(" or "),e("code",null,"2d"),a(". "),e("code",null,"AUTO_UPDATE_DELAY"),a(" works for "),e("code",null,"auto"),a(" and "),e("code",null,"smart"),a(" modes. "),e("code",null,"UPDATE_DELAY"),a(" works for all modes. [kernelcare 2.82+]")])],-1),Se=e("tr",null,[e("td",null,[e("code",null,"[AUTO_]STICKY_PATCHSET=")]),e("td",null,[a("Use patchsets not newer than specified value. For example "),e("code",null,"K20230908_02"),a(". "),e("code",null,"AUTO_STICKY_PATCHSET"),a(" works for "),e("code",null,"auto"),a(" and "),e("code",null,"smart"),a(" modes. "),e("code",null,"STICKY_PATCHSET"),a(" works for all modes. [kernelcare 2.82+]")])],-1),Ee=e("tr",null,[e("td",null,[e("code",null,"REPORT_FQDN=True|False")]),e("td",null,"Force using Fully Qualified Domain as a hostname. False by default.")],-1),Ke=e("tr",null,[e("td",null,[e("code",null,"FORCE_GID=N")]),e("td",null,[a("Use this group ID for symlink protection patch. By default, it's 48 (default Apache user GID) or 99 ("),e("code",null,"nobody"),a(" user)")])],-1),Ie=e("tr",null,[e("td",null,[e("code",null,"USERSPACE_PATCHES=libs,qemu")]),e("td",null,"Define which userspace patches will be applyed by default")],-1),Pe=t(`

Disabling some patches

Some patches might affect the functioning of the system, and we created a way to disable them.

This is done via the sysctl command.

When new patchsets load, KernelCare Enterprise sysctl options get reset. To prevent that we added a file:

/etc/sysconfig/kcare/sysctl.conf

Options in this file will be loaded automatically on new patchset load.

To disable loading these options, specify LOAD_KCARE_SYSCTL=0 in /etc/sysconfig/kcare/kcare.conf

To disable the patch, set the corresponding kcare option to 1

Patches that can be disabled:

Patchsysctl option
CVE-2015-5157kcare_modify_ldt

Extra patchset

Note

KernelCare Enterprise 2.12-5 or higher

KernelCare Enterprise Extra patchset includes all the security fixes from KernelCare Enterprise for AlmaLinux, CentOS 6, CentOS 7, and CentOS 8 as well as symlink protection and the IPSet bugfix for CentOS 6.

To enable extra patches and apply updates, run:

# kcarectl --set-patch-type extra --update
+

The command generates a report and prints out the ID which could be linked to a support ticket.

Note

If there was a connection problem during uploading the report, the report will be stored locally as /root/cl-report. This file should be sent to the support team manually.

Config options

kcarectl behavior can be configured using /etc/sysconfig/kcare/kcare.conf

`,11),me=e("thead",null,[e("tr",null,[e("th"),e("th")])],-1),ve=e("tr",null,[e("td",null,[e("code",null,"AUTO_UPDATE=YES|NO")]),e("td",null,[e("code",null,"YES"),t(" - enable auto-update; "),e("code",null,"NO"),t(" - disable auto-update.")])],-1),ge=e("tr",null,[e("td",null,[e("code",null,"PATCH_METHOD=normal|nofreeze|smart")]),e("td",null,[e("code",null,"Normal"),t(" - (default) use freezer;"),e("br"),e("code",null,"Nofreeze"),t(" - don't use freezer to freeze processes;"),e("br"),t(),e("code",null,"Smart"),t(" - smart freezer freezes only threads that need to be frozen for patching [kernelcare 2.3+].")])],-1),be=e("tr",null,[e("td",null,[e("code",null,"PATCH_SERVER")]),e("td",null,"Server to use to download patches.")],-1),fe=e("tr",null,[e("td",null,[e("code",null,"REGISTRATION_URL")]),e("td",null,"Licensing server.")],-1),ye=e("tr",null,[e("td",null,[e("code",null,"PREFIX=prefix")]),e("td",null,"Patch source prefix, used to test different builds, by downloading builds from a different location, based on prefix [kernelcare 2.2+]")],-1),xe=e("tr",null,[e("td",null,[e("code",null,"UPDATE_POLICY=REMOTE|LOCAL|LOCAL_FIRST")]),e("td",null,[t("Depending on the policy, on server startup, use:"),e("br"),e("code",null,"REMOTE"),t(" - (default) patches from patch server."),e("br"),e("code",null,"LOCAL"),t(" - only locally cached patches, if none cached (caching is done automatically) - do nothing."),e("br"),e("code",null,"LOCAL_FIRST"),t(" - see if locally cached patches exist, and load them. If not, try getting them from remote server.")])],-1),ke=e("tr",null,[e("td",null,[e("code",null,"IGNORE_UNKNOWN_KERNEL=True|False")]),e("td",null,"Don't provide notification if unknown kernel on auto-update. [kernelcare 2.5+]")],-1),we=e("tr",null,[e("td",null,[e("code",null,"LOAD_KCARE_SYSCTL")]),e("td",null,[t("Controls if "),e("code",null,"/etc/sysconfig/kcare/sysctl.conf"),t(" will be loaded on patchset load. True by default. [kernelcare 2.7+]")])],-1),Ce=e("tr",null,[e("td",null,[e("code",null,"STICKY_PATCH=KEY")]),e("td",null,[t("Retrieve sticky patch from "),e("code",null,"KEY"),t(" (see CLN, Key Edit); not supported for IP based servers or ePortal.")])],-1),_e=e("td",null,[e("code",null,"STICKY_PATCH=DDMMYY")],-1),Te=e("tr",null,[e("td",null,[e("code",null,"[AUTO_]UPDATE_DELAY=h|d")]),e("td",null,[t("Use patchsets not newer than specified time. For example "),e("code",null,"24h"),t(" or "),e("code",null,"2d"),t(". "),e("code",null,"AUTO_UPDATE_DELAY"),t(" works for "),e("code",null,"auto"),t(" and "),e("code",null,"smart"),t(" modes. "),e("code",null,"UPDATE_DELAY"),t(" works for all modes. [kernelcare 2.82+]")])],-1),Se=e("tr",null,[e("td",null,[e("code",null,"[AUTO_]STICKY_PATCHSET=")]),e("td",null,[t("Use patchsets not newer than specified value. For example "),e("code",null,"K20230908_02"),t(". "),e("code",null,"AUTO_STICKY_PATCHSET"),t(" works for "),e("code",null,"auto"),t(" and "),e("code",null,"smart"),t(" modes. "),e("code",null,"STICKY_PATCHSET"),t(" works for all modes. [kernelcare 2.82+]")])],-1),Pe=e("tr",null,[e("td",null,[e("code",null,"REPORT_FQDN=True|False")]),e("td",null,"Force using Fully Qualified Domain as a hostname. False by default.")],-1),Ke=e("tr",null,[e("td",null,[e("code",null,"FORCE_GID=N")]),e("td",null,[t("Use this group ID for symlink protection patch. By default, it's 48 (default Apache user GID) or 99 ("),e("code",null,"nobody"),t(" user)")])],-1),Ee=e("tr",null,[e("td",null,[e("code",null,"USERSPACE_PATCHES=libs,qemu")]),e("td",null,"Define which userspace patches will be applyed by default")],-1),Ie=a(`

Disabling some patches

Some patches might affect the functioning of the system, and we created a way to disable them.

This is done via the sysctl command.

When new patchsets load, KernelCare Enterprise sysctl options get reset. To prevent that we added a file:

/etc/sysconfig/kcare/sysctl.conf

Options in this file will be loaded automatically on new patchset load.

To disable loading these options, specify LOAD_KCARE_SYSCTL=0 in /etc/sysconfig/kcare/kcare.conf

To disable the patch, set the corresponding kcare option to 1

Patches that can be disabled:

Patchsysctl option
CVE-2015-5157kcare_modify_ldt

Extra patchset

Note

KernelCare Enterprise 2.12-5 or higher

KernelCare Enterprise Extra patchset includes all the security fixes from KernelCare Enterprise for AlmaLinux, CentOS 6, CentOS 7, and CentOS 8 as well as symlink protection and the IPSet bugfix for CentOS 6.

To enable extra patches and apply updates, run:

# kcarectl --set-patch-type extra --update
 

To enable extra patches without an update, run:

# kcarectl --set-patch-type extra
 

The 'extra' patch will be applied on the next automatic update.

To see details, run:

# kcarectl --patch-info
 

You should see something similar to:

OS: centos6
@@ -57,7 +57,7 @@ kpatch-cvss: N/A
 kpatch-cve-url: N/A
 kpatch-patch-url: https://bugs.centos.org/view.php?id=13499
 

To enable Symlink Owner Match Protection, add fs.enforce_symlinksifowner=1 to /etc/sysconfig/kcare/sysctl.conf and run:

# sysctl -p /etc/sysconfig/kcare/sysctl.conf
-

Sticky patches

`,25),Le={class:"tip custom-block"},Ae=e("p",{class:"custom-block-title"},"Note",-1),Oe=t('

Note

Since v2.82 there is a more convenient way to specify the latest available release via the [AUTO_]STICKY_PATCHSET and [AUTO_]UPDATE_DELAY configuration options. It also works with recent ePortal versions (v2.3+).

Sometimes you don't want to use the latest patches, and you'd like to control which patches are get installed instead. For example, you have tested the patch released on 25th of May 2018 and want to use that patch across all servers.

You can do it by setting STICKY_PATCH=25052018 (DDMMYYYY format, DDMMYY and YYYY-mm-dd are also valid) in /etc/sysconfig/kcare/kcare.conf, this guarantees that when kcarectl --update or kcarectl --auto-update is called, you will get patches from that date and not the newest patches.

Alternatively, you can set STICKY_PATCH=KEY, this way you can control the date from which patches will be applied using KernelCare keys in CLN. On update, the actual date will be retrieved from CLN (from Key settings) for the key used to register a particular server (not supported for IP based servers).

This is very useful if you want to test patches in QA first and later roll them out to production without doing any changes on the systems.

Here is how you can do that:

  • Set STICKY_PATCH=KEY on all your servers.
  • Register QA servers with one KEY, and Production servers with ANOTHER key.
  • Then, stop new updates for Production servers. In CLN set Sticky Tag to yesterday. You can do it by editing KEY in CLN in DDMMYY format.
  • Now, for example, let's use patches as of 03052018 (DDMMYYYY format). Set them for your QA server key. On the next auto-update, your QA servers will get those patches (auto-updates are typically every 4 hours).

Once you are happy with these patches, set the same Sticky Tag for Production servers key. In 4 hours your production servers should be updated to the same patches that QA servers were.

How to find a proper sticky patch name

Let's assume that you have a kernel patch that you want to "stick" with. All you need is to find a proper label for that patch.

sticky-proper-label

As you can see, the patch was released at 2020-09-16 (16th September 2020). And if you apply a supported date format, it becomes 16092020, that will be the sticky patch value.

Scanning for vulnerabilities

Identifying the vulnerabilities that apply to your systems is an important task for IT and InfoSec teams, and at TuxCare we make it easy. KernelCare live patching is integrated natively with vulnerability scanners including Tenable Nessus, Qualys, Rapid7 and many others.

How to use a vulnerability scanner with KernelCare

It's rather simple. New scan results after installing a package and applying a patchset should not show any kernel CVEs that are handled by KernelCare Enterprise.

For example, Nessus for an old kernel shows a lot of detected CVEs before apply live patches:

before

After the live patches were applied, there are no kernel-related CVEs:

after

What if my scanner is producing false positives?

If your scanner produces incorrect results due to not being KernelCare aware, we have a solution that works at the OS level to report the correct information to the rpm/dpkg/uname commands; namely kcare-scanner-interface

If you are using a scanner agent the defaults usually work and you can configure the scanner interface like so:

# kcare-scanner-interface init
+

Sticky patches

`,25),Le={class:"tip custom-block"},Ae=e("p",{class:"custom-block-title"},"Note",-1),Oe=a('

Note

Since v2.82 there is a more convenient way to specify the latest available release via the [AUTO_]STICKY_PATCHSET and [AUTO_]UPDATE_DELAY configuration options. It also works with recent ePortal versions (v2.3+).

Sometimes you don't want to use the latest patches, and you'd like to control which patches are get installed instead. For example, you have tested the patch released on 25th of May 2018 and want to use that patch across all servers.

You can do it by setting STICKY_PATCH=25052018 (DDMMYYYY format, DDMMYY and YYYY-mm-dd are also valid) in /etc/sysconfig/kcare/kcare.conf, this guarantees that when kcarectl --update or kcarectl --auto-update is called, you will get patches from that date and not the newest patches.

Alternatively, you can set STICKY_PATCH=KEY, this way you can control the date from which patches will be applied using KernelCare keys in CLN. On update, the actual date will be retrieved from CLN (from Key settings) for the key used to register a particular server (not supported for IP based servers).

This is very useful if you want to test patches in QA first and later roll them out to production without doing any changes on the systems.

Here is how you can do that:

  • Set STICKY_PATCH=KEY on all your servers.
  • Register QA servers with one KEY, and Production servers with ANOTHER key.
  • Then, stop new updates for Production servers. In CLN set Sticky Tag to yesterday. You can do it by editing KEY in CLN in DDMMYY format.
  • Now, for example, let's use patches as of 03052018 (DDMMYYYY format). Set them for your QA server key. On the next auto-update, your QA servers will get those patches (auto-updates are typically every 4 hours).

Once you are happy with these patches, set the same Sticky Tag for Production servers key. In 4 hours your production servers should be updated to the same patches that QA servers were.

How to find a proper sticky patch name

Let's assume that you have a kernel patch that you want to "stick" with. All you need is to find a proper label for that patch.

sticky-proper-label

As you can see, the patch was released at 2020-09-16 (16th September 2020). And if you apply a supported date format, it becomes 16092020, that will be the sticky patch value.

Scanning for vulnerabilities

Identifying the vulnerabilities that apply to your systems is an important task for IT and InfoSec teams, and at TuxCare we make it easy. KernelCare live patching is integrated natively with vulnerability scanners including Tenable Nessus, Qualys, Rapid7 and many others.

How to use a vulnerability scanner with KernelCare

It's rather simple. New scan results after installing a package and applying a patchset should not show any kernel CVEs that are handled by KernelCare Enterprise.

For example, Nessus for an old kernel shows a lot of detected CVEs before apply live patches:

before

After the live patches were applied, there are no kernel-related CVEs:

after

What if my scanner is producing false positives?

If your scanner produces incorrect results due to not being KernelCare aware, we have a solution that works at the OS level to report the correct information to the rpm/dpkg/uname commands; namely kcare-scanner-interface

If you are using a scanner agent the defaults usually work and you can configure the scanner interface like so:

# kcare-scanner-interface init
 
 Resetting.
 Setting up scanner agents
@@ -78,14 +78,14 @@ $ oscap oval eval --report report.htm com.kernelcare.\${ID}.\${VERSION_ID}.xml
 
 input password:
 input password again:
-

It doesn't have a MOK password, and mokutil will ask you to create one. The password is temporary and will be used on the next boot.

  1. Reboot your machine to enter the MOK manager EFI utility.

First, go down to 'Enroll Mok':

enroll mok

Then the firmware gives you the option of viewing the new MOK or continuing. Let's continue.

select continue

It then asks you to confirm the enrollment.

yes

Then you will need to enter the password you used when running mokutil --import.

enter password

Finally, the firmware will ask you to reboot.

select ok

  1. Verify the key has been loaded by finding it in the output of the following command:
# mokutil --list-enrolled | egrep -i 'SHA1|Issuer'
+

It doesn't have a MOK password, and mokutil will ask you to create one. The password is temporary and will be used on the next boot.

  1. Reboot your machine to enter the MOK manager EFI utility.

First, go down to 'Enroll Mok':

enroll mok

Then the firmware gives you the option of viewing the new MOK or continuing. Let's continue.

select continue

It then asks you to confirm the enrollment.

yes

Then you will need to enter the password you used when running mokutil --import.

enter password

Finally, the firmware will ask you to reboot.

select ok

  1. Verify the key has been loaded by finding it in the output of the following command:
# mokutil --list-enrolled | egrep -i 'SHA1|Issuer'
 

In some cases the enrolled key will not be shown but could be verified by the following command:

# dmesg | grep -i 'cloud linux'
 
 [   0.722149] EFI: Loaded cert 'Cloud Linux Software, Inc: Kernel Module Signing Key: 12ff0613c0f80cfba3b2f8eba71ebc27c5a76170' linked to '.system_keyring'
 

That's it. Now you should be able to apply patches as usual.

To get more information about signing kernel modules for secure boot, see https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/managing_monitoring_and_updating_the_kernel/signing-kernel-modules-for-secure-boot_managing-monitoring-and-updating-the-kernel.

Live patching and FIPS compliance

The FIPS-140 certification of a Linux kernel validates that the cryptography contained within a Linux kernel complies with the US government FIPS-140 data protection standard. Meaning that algorithms like AES, the random generator and other cryptographic aspects of the kernel are implemented as the standard defines.

At the same time the certification is a lengthy process --a typical validation can take almost a year-- and for that reason only some of each vendor's kernels are validated. That is because vendors release new kernels with security and feature updates on a regular cadence some as often as weekly, irrespective of their FIPS validation status. This means users of FIPS validated kernels need to choose between: (a) strict compliance by staying on the same kernel without updating until the next validated kernel is available and (b) reducing their security risk by installing new kernels with security updates even if they are not validated. The same story applies to the vendor's live patching solutions.

With KernelCare Enterprise it is possible to live patch FIPS-140 validated Linux kernels, for example at the Red Hat Enterprise Linux operating system. The live patches applied to these kernels, in this example, consist of the same RHEL kernel patches but are limited to the ones addressing security vulnerabilities. That way, a live patched kernel contains the same security fixes as a vendor update without any feature or bug-fix updates, e.g. updates that may change the cryptographic subsystem for performance or other non-security related reasons.

In this way, security-conscious users of FIPS-validated Linux kernels that today apply their vendor's security patches can rely on KernelCare live patching the same way they do with their vendor's security updates. Furthermore, KernelCare live patching applies the minimum possible updates to the validated kernel by explicitly excluding any non-security updates.

Firewall and Proxy Settings

Patching servers through firewall

As long as your servers have access to the Internet, even behind NAT - you will be able to use KernelCare patch server without any problems.

Generally, KernelCare requires connection to only two servers to work:

cln.cloudlinux.com
 patches.kernelcare.com
 

An additional address is used for KernelCare agent installation/update:

repo.cloudlinux.com
-

through firewall

Patching servers through proxy

If your servers don't have direct Internet access but can gain access to the Internet using proxy, the configuration is not that different. KernelCare can pick up standard environment variables for a proxy.

Make sure you have environment settings for proxy setup, and everything else will be the same as if servers were directly connected to the Internet:

# export http_proxy=http://proxy.domain.com:port
+

through firewall

Patching servers through proxy

If your servers don't have direct Internet access but can gain access to the Internet using proxy, the configuration is not that different. KernelCare can pick up standard environment variables for a proxy.

Make sure you have environment settings for proxy setup, and everything else will be the same as if servers were directly connected to the Internet:

# export http_proxy=http://proxy.domain.com:port
 # export https_proxy=http://proxy.domain.com:port
 

Note

Settings defined by export are case-insensitive, so the example above could be as follows for certain software:

# export HTTP_PROXY=http://proxy.domain.com:port
 # export HTTPS_PROXY=http://proxy.domain.com:port
@@ -93,30 +93,30 @@ patches.kernelcare.com
 
 AUTO_UPDATE=True
 HTTPS_PROXY=http://myproxy.com:59794
-

If you define these settings in the config, you don't need to export them each kcarectl launch and don't need to edit cron jobs.

All kcarectl launches will be aware of proxy settings from the config. In this case, you need to set proxy settings only once.

through proxy

KernelCare on AWS - Deployment User Guide

Introductory Material

The Linux kernel is the most important piece of software on your server, as a security flaw in it can expose all of your services and customer data. KernelCare is a technology that allows you to keep the Linux kernel safe at all times, automatically, without ever having to stop the server and rebooting it causing downtime and inconvenient scheduling of maintenance windows. This improves availability, security, stability, operational costs, and customer satisfaction. It works with almost all mainstream distributions of Linux. It is simple, fast, and very easy to deploy while being able to handle very complex patches and customized kernels if you need them.

Prerequisites and Requirements

KernelCare can be installed on any x86_64 compatible server or VM running one of the following distributions:

  • Amazon Linux 1, 2
  • CentOS 6, 7, Xen4CentOS, CentOS-Plus, ElRepo
  • CloudLinux 6, 7
  • Debian 7, 8, 9, 8-backports
  • Oracle Linux 6, 7
  • ProxmoxVE 3,4,5
  • RedHat EL 6, 7
  • Ubuntu 14.04, 16.04, 18.04
  • Virtuozzo 6

The exact list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

Standard OS kernels are required in most cases unless the custom kernel is supported.

The software can be installed on a running server and doesn't require a reboot.

Basic Linux skills are sufficient to deploy KernelCare on AWS. Simple deployments involve just an EC2 instance. KernelCare is available using the BYOL model. You need to register in our customer portal to get a trial license. Once you get the trial license, you need to register your running EC2 instance with the activation key.

Architectural Design

As long as your servers have access to the Internet, even behind NAT - you will be able to use KernelCare without any problems.

Generally, KernelCare requires connection to only two servers to work:

cln.cloudlinux.com
+

If you define these settings in the config, you don't need to export them each kcarectl launch and don't need to edit cron jobs.

All kcarectl launches will be aware of proxy settings from the config. In this case, you need to set proxy settings only once.

through proxy

KernelCare on AWS - Deployment User Guide

Introductory Material

The Linux kernel is the most important piece of software on your server, as a security flaw in it can expose all of your services and customer data. KernelCare is a technology that allows you to keep the Linux kernel safe at all times, automatically, without ever having to stop the server and rebooting it causing downtime and inconvenient scheduling of maintenance windows. This improves availability, security, stability, operational costs, and customer satisfaction. It works with almost all mainstream distributions of Linux. It is simple, fast, and very easy to deploy while being able to handle very complex patches and customized kernels if you need them.

Prerequisites and Requirements

KernelCare can be installed on any x86_64 compatible server or VM running one of the following distributions:

  • Amazon Linux 1, 2
  • CentOS 6, 7, Xen4CentOS, CentOS-Plus, ElRepo
  • CloudLinux 6, 7
  • Debian 7, 8, 9, 8-backports
  • Oracle Linux 6, 7
  • ProxmoxVE 3,4,5
  • RedHat EL 6, 7
  • Ubuntu 14.04, 16.04, 18.04
  • Virtuozzo 6

The exact list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

Standard OS kernels are required in most cases unless the custom kernel is supported.

The software can be installed on a running server and doesn't require a reboot.

Basic Linux skills are sufficient to deploy KernelCare on AWS. Simple deployments involve just an EC2 instance. KernelCare is available using the BYOL model. You need to register in our customer portal to get a trial license. Once you get the trial license, you need to register your running EC2 instance with the activation key.

Architectural Design

As long as your servers have access to the Internet, even behind NAT - you will be able to use KernelCare without any problems.

Generally, KernelCare requires connection to only two servers to work:

cln.cloudlinux.com
 patches.kernelcare.com
-

aws arch

If your servers don't have direct Internet access but can gain access to the Internet using a proxy, the configuration is not that different. KernelCare can pick up standard environment variables for proxies.

aws proxy

Make sure you have environment settings for your proxy setup, and everything else will be the same as if the servers were directly connected to the Internet:

# export http_proxy=http://proxy.domain.com:port
+

aws arch

If your servers don't have direct Internet access but can gain access to the Internet using a proxy, the configuration is not that different. KernelCare can pick up standard environment variables for proxies.

aws proxy

Make sure you have environment settings for your proxy setup, and everything else will be the same as if the servers were directly connected to the Internet:

# export http_proxy=http://proxy.domain.com:port
 # export https_proxy=http://proxy.domain.com:port
 

Security

The only thing you need to be able to install/control your KernelCare deployment is SSH access (root credentials, key-based authentication/sudo or similar mechanisms are preferred).

Costs

KernelCare is billed as a subscription service, for volume pricing please contact sales@cloudlinux.com

Sizing

KernelCare agent has a tiny RAM footprint - binary patches usually require less than 1 MB.

Deployment Guidance

To install KernelCare, run:

# curl -s -L https://kernelcare.com/installer | bash
 

or:

# wget -qq -O - https://kernelcare.com/installer | bash
 

If you are using IP-based license, nothing else required to be done. If you are using key-based license, run:

# kcarectl --register <KEY>
-

Where KEY is the registration key code string provided when you signed up for a trial or pruchased the product.

You can easily automate KernelCare deployment with Ansible, Puppet, Chef or other orchestration tools. Here are the steps that may be automated:

  1. Distribute KernelCare agent package (optional - required only for servers with no access to the Internet) and a KernelCare agent configuration file (/etc/sysconfig/kcare/kcare.conf);
  2. Set required environmental variables (optional);
  3. Install KernelCare agent from either locally available package or central KernelCare download location;
  4. Register KernelCare with either license key or IP-based license.

Health Check

Systems protected by KernelCare can be monitored by means of CloudLinux Network (CLN) portal available at https://cln.cloudlinux.com. Registered KernelCare installations are grouped by license keys. Kernels that are marked with the exclamation sign in amber do not have the latest patches installed.

monit

In either case, you can check whether the latest available patch has been applied by running the following command on a system protected by KernelCare:

# kcarectl --check
+

Where KEY is the registration key code string provided when you signed up for a trial or pruchased the product.

You can easily automate KernelCare deployment with Ansible, Puppet, Chef or other orchestration tools. Here are the steps that may be automated:

  1. Distribute KernelCare agent package (optional - required only for servers with no access to the Internet) and a KernelCare agent configuration file (/etc/sysconfig/kcare/kcare.conf);
  2. Set required environmental variables (optional);
  3. Install KernelCare agent from either locally available package or central KernelCare download location;
  4. Register KernelCare with either license key or IP-based license.

Health Check

Systems protected by KernelCare can be monitored by means of CloudLinux Network (CLN) portal available at https://cln.cloudlinux.com. Registered KernelCare installations are grouped by license keys. Kernels that are marked with the exclamation sign in amber do not have the latest patches installed.

monit

In either case, you can check whether the latest available patch has been applied by running the following command on a system protected by KernelCare:

# kcarectl --check
 

Backup and Recovery

There is no reason to backup KernelCare. KernelCare doesn't store any data. You can always re-install and re-register KernelCare. To backup the configuration file of KernelCare if you have modified it, backup the /etc/sysconfig/kcare/ folder.

Routine Maintenance

KernelCare is packaged in RPM/DEB packages (depending on Linux distribution) and will update any time system packages are updated. No additional maintenance is needed.

Emergency Maintenance

If one of your instances degraded, once you start another instance based on EBS or snapshot - KernelCare will continue working as before, no additional work is needed. If you set up a new server instead, re-register KernelCare on the new server. If you decide to uninstall patches, run the command:

# kcarectl --unload
 

Or to completely remove the kernelcare package run one of the following commands:

  • on RPM-based systems:
# yum remove kernelcare
 
  • or on DEB-based systems:
# apt-get remove kernelcare
 

Patch Feed Advanced Options

Test and Delayed Feeds

The KernelCare Patch Server has several patch feeds available in addition to the standard (production) feed:

  • Test feed - the newest patches (test builds) that have not undergone the complete testing process. Test feed makes it possible to start testing new patches earlier.
  • Delayed feeds - instructs KernelCare to skip loading patches that were released within the last 12/24/48 hours.

The alternate feed option is enabled by setting PREFIX variable in /etc/sysconfig/kcare/kcare.conf to one of test/12h/24h/48h.

Feed Management With Sticky Patch Feature

The best way to handle QA and Production environments is to use Sticky tag feature of KernelCare license keys issued from CloudLinux Network (CLN) portal. To use this tag, go to CLN portal -> KernelCare tab -> click on the target key -> Edit Key Info window.

activation keys

key details

You should provide a separate key for each environment and set them to a particular sticky tag which is actually the date to which all the servers in an environment have to be patched.

edit key

The date in the Sticky tag field can be any date from May 28, 2018 up to one day before today. To use the Sticky tag feature on the servers to be patched, run:

$ kcarectl --set-sticky-patch=KEY
 

Alternatively, you can do the same by adding STICKY_PATCH=KEY to the /etc/sysconfig/kcare/kcare.conf file.

Warning

Do Not replace the KEY word with the actual KernelCare license key used to register the server, you should just use the word KEY

When the Sticky tag feature is enabled for particular servers, all such servers will get patches only released before the date specified in the Sticky tag field. This way, you can add new patches to all the servers in an environment (i.e. registered with the same KernelCare license key) by updating only a single field in the CLN portal.

Support

We offer unlimited, 24x7x365 support. Submit a request or email us at support@cloudlinux.com

  • We answer all support questions within one business day and most within a couple of hours. To expedite the support, run the following command on your server (as root):
# kcarectl --doctor
-

Then paste the generated key into the support request.

Support Costs

Your KernelCare subscription includes free 24/7 support.

Reference Materials

Localization

KernelCare is available in the English language only.

Reseller Partner UI

Once you have got the reseller partner access, in the IP Reseller Partner UI you can view and manage IP licenses, billing options and profile details. Here you can track your balance, license count and license prices as well as using an IP address search to find customers. You can find more information about KernelCare licensing here.

Server Section

As soon as you have added funds (See Billing Info/Add Funds below) to your account you can immediately add new licenses for clients. To add an IP KernelCare license:

  1. Enter IP address in the Add IP License field, choose a license type in the pull-down menu (KernelCare) and click Add license.

reseller ui

  1. To delete a license click Delete in front of the needed IP address.

  2. To add a KernelCare Key license go to the KernelCare Keys tab, enter the number of servers allowed for the license in Max Servers, add a description if needed and click Add. The key will be generated and appear in the list below.

In the Operations List you are able to edit or delete the key.

reseller ops

Billing Info/Add Funds

To add funds:

  1. Click Add Funds near your balance or go to Billing Info/Add Funds on the top of the starting page of your account.

  2. Click Add to add credit card details, then enter funds amount and click TopUp or Process to Checkout to pay via PayPal.

reseller billing

While adding credit card details, you can also choose the Auto add funds option - the funds amount you choose in the pull down menu will be automatically added when your balance is below $100.

If you choose Auto repay, your card will be automatically charged when your balance becomes negative. The minimum charge is $20 (e.g. for a balance of -$15 you will be charged at $20, for a balance of -$134.2 you will be charged at $134.2).

add funds

Note

If your balance is shown as negative, it means that you have to deposit more funds.

API Section

CloudLinux and KernelCare IP license adding and removing is compatible with different hosting and domain management and billing systems and platforms. You can find comprehensive information on all possible CloudLinux modules and plug-ins APIs in API Section.

reseller api

Profile

You can edit your profile information by clicking on Profile section. Edit the necessary info and click Update Account.

profilecontacts

How To

How to disable HyperThreading (SMT) without reboot: KernelCare case

This article explains how to disable or enable SMT (Simultaneous multithreading) without rebooting using KernelCare, to help mitigate the recent MDS/Zombieload vulnerability.

Disabling CPU simultaneous multithreading (SMT) is one of the mitigations needed to counter the recent MDS vulnerability (also known as ‘Zombieload'). There is a performance impact that depends on the configuration of the hosting platform and its workload patterns. You should also consider the impact of other mitigation strategies, such as assigning dedicated cores to guests (e.g. VMs).

You can control and get the status of SMT with the kernel's sysfs interface. There are two files, both in the /sys/devices/system/cpu/smt directory:

  • control
  • active

If you cannot find the /sys/devices/system/cpu/smt directory, this means your running kernel does not support SMT. In this case, you need to apply KernelCare patches so the SMT controls become available to your system. Use the kcarectrl command:

# kcarectl --update
+

Then paste the generated key into the support request.

Support Costs

Your KernelCare subscription includes free 24/7 support.

Reference Materials

Localization

KernelCare is available in the English language only.

Reseller Partner UI

Once you have got the reseller partner access, in the IP Reseller Partner UI you can view and manage IP licenses, billing options and profile details. Here you can track your balance, license count and license prices as well as using an IP address search to find customers. You can find more information about KernelCare licensing here.

Server Section

As soon as you have added funds (See Billing Info/Add Funds below) to your account you can immediately add new licenses for clients. To add an IP KernelCare license:

  1. Enter IP address in the Add IP License field, choose a license type in the pull-down menu (KernelCare) and click Add license.

reseller ui

  1. To delete a license click Delete in front of the needed IP address.

  2. To add a KernelCare Key license go to the KernelCare Keys tab, enter the number of servers allowed for the license in Max Servers, add a description if needed and click Add. The key will be generated and appear in the list below.

In the Operations List you are able to edit or delete the key.

reseller ops

Billing Info/Add Funds

To add funds:

  1. Click Add Funds near your balance or go to Billing Info/Add Funds on the top of the starting page of your account.

  2. Click Add to add credit card details, then enter funds amount and click TopUp or Process to Checkout to pay via PayPal.

reseller billing

While adding credit card details, you can also choose the Auto add funds option - the funds amount you choose in the pull down menu will be automatically added when your balance is below $100.

If you choose Auto repay, your card will be automatically charged when your balance becomes negative. The minimum charge is $20 (e.g. for a balance of -$15 you will be charged at $20, for a balance of -$134.2 you will be charged at $134.2).

add funds

Note

If your balance is shown as negative, it means that you have to deposit more funds.

API Section

CloudLinux and KernelCare IP license adding and removing is compatible with different hosting and domain management and billing systems and platforms. You can find comprehensive information on all possible CloudLinux modules and plug-ins APIs in API Section.

reseller api

Profile

You can edit your profile information by clicking on Profile section. Edit the necessary info and click Update Account.

profilecontacts

How To

How to disable HyperThreading (SMT) without reboot: KernelCare case

This article explains how to disable or enable SMT (Simultaneous multithreading) without rebooting using KernelCare, to help mitigate the recent MDS/Zombieload vulnerability.

Disabling CPU simultaneous multithreading (SMT) is one of the mitigations needed to counter the recent MDS vulnerability (also known as ‘Zombieload'). There is a performance impact that depends on the configuration of the hosting platform and its workload patterns. You should also consider the impact of other mitigation strategies, such as assigning dedicated cores to guests (e.g. VMs).

You can control and get the status of SMT with the kernel's sysfs interface. There are two files, both in the /sys/devices/system/cpu/smt directory:

  • control
  • active

If you cannot find the /sys/devices/system/cpu/smt directory, this means your running kernel does not support SMT. In this case, you need to apply KernelCare patches so the SMT controls become available to your system. Use the kcarectrl command:

# kcarectl --update
 
 Kernel is safe
 
# ls -l /sys/devices/system/cpu/smt
 
 -r--r--r-- 1 root root 4096 May 17 13:06 active
 -rw-r--r-- 1 root root 4096 May 17 13:06 control
-

As soon as you have these files in place, it is possible to proceed with disabling SMT.

`,195),Me=e("iframe",{width:"560",height:"315",src:"https://www.youtube.com/embed/RUGCvEO1hAE",frameborder:"0",allow:"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture",allowfullscreen:""},null,-1),De=t(`

SMT Control

/sys/devices/system/cpu/smt/control

This file lets you enable or disable SMT, and shows its state. There are three values:

  1. on: The CPU supports SMT and it is enabled. All logical CPUs can be taken offline or online without restriction.
  2. off: The CPU supports SMT but it is disabled. Only so-called primary SMT threads can be taken offline/online without restriction. Attempts to put a non-primary sibling thread online will be rejected.
  3. notsupported: The CPU does not support SMT. You will not be able to write to the control file.

SMT Status

/sys/devices/system/cpu/smt/active

The contents of this file show the status of SMT (e.g. if two or more sibling threads are active on the same physical core the contents of this file is 1, if not: 0).

Here are some commands to control SMT support (root permissions are required):

Check the SMT state

$ cat /sys/devices/system/cpu/smt/active
+

As soon as you have these files in place, it is possible to proceed with disabling SMT.

`,195),De=e("iframe",{width:"560",height:"315",src:"https://www.youtube.com/embed/RUGCvEO1hAE",frameborder:"0",allow:"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture",allowfullscreen:""},null,-1),Me=a(`

SMT Control

/sys/devices/system/cpu/smt/control

This file lets you enable or disable SMT, and shows its state. There are three values:

  1. on: The CPU supports SMT and it is enabled. All logical CPUs can be taken offline or online without restriction.
  2. off: The CPU supports SMT but it is disabled. Only so-called primary SMT threads can be taken offline/online without restriction. Attempts to put a non-primary sibling thread online will be rejected.
  3. notsupported: The CPU does not support SMT. You will not be able to write to the control file.

SMT Status

/sys/devices/system/cpu/smt/active

The contents of this file show the status of SMT (e.g. if two or more sibling threads are active on the same physical core the contents of this file is 1, if not: 0).

Here are some commands to control SMT support (root permissions are required):

Check the SMT state

$ cat /sys/devices/system/cpu/smt/active
 

Enable SMT

# echo on > /sys/devices/system/cpu/smt/control
 

Disable SMT

# echo off > /sys/devices/system/cpu/smt/control
-
`,14),Ue=t(`

How to update Microcode without reboot with vendor-provided package

This article shows how to update the microcode of Intel CPUs running Linux.

Warning

To avoid possible issues with Microcode updating, enable SMT before the update.

Note

This article is subject to change and will be updated with instructions for other distributions.

Notes

  • These steps must be done as root.
  • The examples shown are for Debian.
  • If you have doubts your systems are fully protected against CPU- and kernel-related vulnerabilities, please get in touch with us.

Updating microcode on Ubuntu and Debian

  1. Find the microcode package download link for your platform

  2. Download the package

Note

Example shown for Debian 9

$ cd <a temporary directory, e.g. /tmp>
+
`,14),Ue=a(`

How to update Microcode without reboot with vendor-provided package

This article shows how to update the microcode of Intel CPUs running Linux.

Warning

To avoid possible issues with Microcode updating, enable SMT before the update.

Note

This article is subject to change and will be updated with instructions for other distributions.

Notes

  • These steps must be done as root.
  • The examples shown are for Debian.
  • If you have doubts your systems are fully protected against CPU- and kernel-related vulnerabilities, please get in touch with us.

Updating microcode on Ubuntu and Debian

  1. Find the microcode package download link for your platform

  2. Download the package

Note

Example shown for Debian 9

$ cd <a temporary directory, e.g. /tmp>
 $ mkdir firmware
 $ cd firmware
 $ wget http://security.debian.org/debian-security/pool/updates/non-free/i/intel-microcode/intel-microcode_3.20190514.1~deb9u1_amd64.deb
@@ -212,7 +212,7 @@ microcode       : 17
 microcode       : 17
 microcode       : 17
 microcode       : 17
-
`,73),Ye=e("iframe",{width:"560",height:"315",src:"https://www.youtube.com/embed/EydWy-b9uns",frameborder:"0",allow:"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture",allowfullscreen:""},null,-1),Ne=t('

How to get a KernelCare activation key from the extended Plesk license

Often our clients purchase KernelCare licenses through Plesk/Odin and in such cases, they get a universal key which includes the KernelCare license and other additional keys for Plesk plugins. Such a key has the following syntax - A00B00-0CDE00-F0G000-HIGK00-LM0N00, and initially, it is installed through Plesk automatically and the license gets activated successfully.

However, if it is required to re-register the agent for some reason or simply get the KernelCare activation key separately, it would be impossible to apply the above-mentioned one - we would need to deal with the KernelCare service separately.

To get the KernelCare activation key from the extended Plesk license key, you will need to proceed with the following.

  1. Navigate to Tools & Settings -> Plesk -> License Management -> Additional License Keys

plesk keys

more keys

  1. Click Download key next to the KernelCare license listed on the page and open the file downloaded in some text editor

  2. Find the following abstract:

<!--Key body-->
+
`,73),Re=e("iframe",{width:"560",height:"315",src:"https://www.youtube.com/embed/EydWy-b9uns",frameborder:"0",allow:"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture",allowfullscreen:""},null,-1),Ne=a('

How to get a KernelCare activation key from the extended Plesk license

Often our clients purchase KernelCare licenses through Plesk/Odin and in such cases, they get a universal key which includes the KernelCare license and other additional keys for Plesk plugins. Such a key has the following syntax - A00B00-0CDE00-F0G000-HIGK00-LM0N00, and initially, it is installed through Plesk automatically and the license gets activated successfully.

However, if it is required to re-register the agent for some reason or simply get the KernelCare activation key separately, it would be impossible to apply the above-mentioned one - we would need to deal with the KernelCare service separately.

To get the KernelCare activation key from the extended Plesk license key, you will need to proceed with the following.

  1. Navigate to Tools & Settings -> Plesk -> License Management -> Additional License Keys

plesk keys

more keys

  1. Click Download key next to the KernelCare license listed on the page and open the file downloaded in some text editor

  2. Find the following abstract:

<!--Key body-->
 <aps-3:key-body core:encoding="base64" core:type="binary">YOUR_BASE64_ENCODED_LICENSE_KEY==</aps-3:key-body>
 <!--Information about additional key-->
 
  1. This is your base64-encoded key, and it should be decoded using a CLI utility or an online base64 decoder into UTF-8, e.g. https://www.base64decode.org. The new license key should have the following format: xxxxxxxxxxxxxxxx. It will contain lower and upper case letters and numbers.

  2. Use the new key decoded to activate the service:

# kcarectl --register DECODED_KEY_HERE
@@ -257,4 +257,81 @@ optional arguments:
 

This command will deploy and enable the U20210818_01-qemu patchset in to the test feed.

Vulnerability Scanner Integration with KernelCare

This document is made for developers of vulnerability scanners to correctly report live patched vulnerabilities as delivered by KernelCare. There are several approaches that vendors might take to identify vulnerabilities patched by KernelCare correctly.

Easiest: Identifying correctly the effective kernel

KernelCare provides "effective kernel" information in

/proc/kcare/effective_version
 

Security scanners can check if the file is present, and if it is, use it instead of /proc/version to identify the kernel. This will provide an effective kernel version from a security standpoint.

Alternatively, the command /usr/bin/kcarectl --uname can be run instead of the uname command to detect effective kernel version

Comprehensive: Using OVAL data

KernelCare comes with OVAL data that provides instructions to the scanner to identify the vulnerabilities addressed by the installed live patches. OVAL data are available for the operating systems supported by KernelCare Enterprise, including AlmaLinux, Red Hat Enterprise Linux, Oracle Linux, CentOS, Debian, and Ubuntu.

The OVAL data cover all KernelCare enterprise products and add-ons, including LibCare and QEMUCare.

The OVAL data for KernelCare live patching are available at patches.kernelcare.com/oval.

Comprehensive & local: Using the local CVELIST file on each scanned node

KernelCare provides two files listing the vulnerabilities the currently installed live patches address. These files contain a list of CVEs separated by a new line.

The list of vulnerabilities addressed by Kernel live patches is available at:

/proc/kcare/cvelist
 

The list of vulnerabilities addressed by system live patching (LibCare, QEMUCare, etc.) is available at:

/var/cache/kcare/libcare_cvelist
-
`,110);function Re(Fe,qe){const i=M("RouterLink");return D(),U("div",null,[Y(" markdownlint-disable MD014 MD033 MD029 MD049 "),R,e("table",null,[F,e("tbody",null,[q,H,e("tr",null,[z,e("td",null,[a("The same as --update, but uses "),n(i,{to:"/live-patching-services/#config-options"},{default:r(()=>[a("UPDATE_POLICY")]),_:1}),a(" to decide where to get patches.")])]),V,$,W,Q,B,G,j,X,Z,J,ee,ae,te,ie,ne,re,se,le,oe,de,ce,e("tr",null,[ue,e("td",null,[a("Set patch to stick to date in format DDMMYY or retrieve it from KEY if set to KEY (no support for ePortal). Empty to unstick. More info at "),n(i,{to:"/live-patching-services/#sticky-patches"},{default:r(()=>[a("Sticky Patches")]),_:1}),a(".")])]),he])]),pe,e("table",null,[me,e("tbody",null,[ve,ge,be,fe,ye,xe,ke,we,_e,e("tr",null,[Ce,e("td",null,[a("Stick patch to a particular date. More info at "),n(i,{to:"/live-patching-services/#sticky-patches"},{default:r(()=>[a("Sticky Patches")]),_:1}),a(".")])]),Te,Se,Ee,Ke,Ie])]),Pe,e("div",Le,[Ae,e("p",null,[a("This functionality is not available for ePortal customers. If you are using ePortal, please use "),n(i,{to:"/eportal/#feed-management"},{default:r(()=>[a("Feeds")]),_:1}),a(" instead.")])]),Oe,Me,De,e("p",null,[a("Disabling SMT, "),n(i,{to:"/how-to/#how-to-update-microcode-without-reboot-with-vendor-provided-package"},{default:r(()=>[a("updating microcode")]),_:1}),a(", and applying KernelCare patches will protect your systems against the ZombieLoad vulnerability. Note, only the latter action is applicable to virtual systems (e.g. VMs, VPS and other cloud instance types).")]),Ue,Ye,Ne])}const $e=O(N,[["render",Re],["__file","index.html.vue"]]);export{$e as default}; +

KernelCare SimplePatch

Introduction

KernelCare SimplePatch is a kernel live patching product that provides security patches for a range of popular Linux kernels that can be installed without rebooting the system. It supports kernels of Enterprise Linux operating systems, i.e., RHEL, Oracle, Rocky, AlmaLinux, and CentOS, as well as Ubuntu and Debian. Each individual kernel receives new live patches for as long as the kernel vendor releases security updates for the series.

The KernelCare SimplePatch offering consists of the client application, and the live patching service hosted by TuxCare. The client application runs on machines, periodically checks for available patches, downloads, verifies, and installs them.

The live patching process

When a new vulnerability is detected in the Linux kernel, TuxCare creates a live patch addressing the vulnerability. After the live patch is made available, it is tested in TuxCare’s internal server farm and then promoted gradually to a series of testing tiers, ensuring that any released live patch has been tested sufficient time on live systems. Once the patch is released, systems that enable the KernelCare SimplePatch client will receive the patch over an authenticated channel and apply it.

Kernel patching lifetime

KernelCare SimplePatch offers live patches for each individual kernel for as long as the kernel vendor releases security updates for the series. This allows you to enjoy continuous protection for your existing kernels without being bound by the kernel vendor’s release schedule when planning your maintenance windows.

Vulnerability coverage

During the lifecycle of an operating system, TuxCare makes commercially reasonable efforts to provide live patches for all vulnerability fixes provided by the vendor, irrespective of their vulnerability rating. We may also address vulnerabilities that haven't been addressed by the OS vendor if they gained significant attention and were being actively discussed, exploited (according to the CISA list), or researched by the cybersecurity community.

Target response rates

TuxCare is committed to delivering timely security updates. We aim to deliver live patches for all CVEs patched by the vendor within 10 days from when the vulnerability is publicly disclosed. This rapid response time significantly reduces the opportunity window for a potential attack and meets most security regulation requirements. However, a live patch for a vulnerability can be significantly more complex than an ordinary kernel patch, and due to the additional complexity, can take more time to develop and test.

Supported architectures

KernelCare is available for both x86-64 (Intel and AMD) and ARM64 architectures.

Supported Linux distros and kernels

Customers can find detailed information about supported kernels, Linux distributions, specific vulnerabilities, and live patches provided by KernelCare SimplePatch for each of the supported Linux distributions at https://patches.kernelcare.com/.

End-of-life (EOL) policy

TuxCare will stop supporting live patching for specific distros if there are no security advisories provided by the distro's vendor for the last 365 days. In this case, all customers running the affected distributions are notified about the upcoming EOL. Existing live patches for EOL distributions are available for the next 6 years after the EOL date.

Technical Support

All TuxCare live patching products include technical support provided according to the TuxCare support policy. It delivers 24/7/365 access to our engineers through the TuxCare Support Portal and to our online knowledge base.

Installation

KernelCare SimplePatch is compatible with 64-bit versions of CloudLinuxOS/CentOS 6, 7 and 8, AlmaLinux/RHEL 6, 7, 8 and 9, Oracle Linux 6 and 7, Amazon Linux 1 and 2, Virtuozzo/PCS/OpenVZ 2.6.32, Debian 8, 9 and 10, 11, 12, Proxmox VE 5 and 6, Virt-SIG/Xen4CentOS 6 and 7, Ubuntu 14.04, 15.04, 16.04, 18.04 and 20.04 kernels. The list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

To install KernelCare SimplePatch, run the following as root:

curl -s -L https://kernelcare.com/installer | bash 
+

or:

wget -qq -O - https://kernelcare.com/installer | bash
+

If you are using an IP-based license, nothing else is required to be done. If you are using a key-based license, run:

kcarectl --register <KEY>
+

Where KEY is the registration key code string provided when you sign up for purchase or trial of the product. If you are experiencing a Key limit reached error after the end of the trial period, you should first unregister the server by running:

kcarectl --unregister
+

To check if patches applied, run:

kcarectl --info
+

The software will automatically check for new patches every 4 hours. If you would like to run update manually:

kcarectl --update
+

To check current kernel compatibility with KernelCare SimplePatch, use the following script by running:

curl -s -L https://kernelcare.com/checker | python
+

or:

wget -qq -O - https://kernelcare.com/checker | python
+

Update

To update the agent package to the latest version use:

  • For rpm-based distributions (CentOS, RedHat, etc):
yum install -y kernelcare
+

or:

dnf install -y kernelcare
+
  • For apt-based distributions (Debian, Ubuntu, etc):
apt-get install kernelcare
+

or:

apt install kernelcare
+

Uninstalling

To uninstall KernelCare SimplePatch, run the following as root: *For CloudLinux, CentOS, RHEL, Virtuozzo, OpenVZ:

yum remove kernelcare
+

or:

dnf remove kernelcare
+
  • For Ubuntu, Debian, Proxmox VE:
apt-get remove kernelcare 
+

or:

apt purge kernelcare
+

This will also unlink the system from its activation key (provided there is network connectivity to the CLN Portal). However, you'll need to remove the license from the CLN Portal manually if you don't plan to use the service anymore.

Switching from Ksplice

To switch from Ksplice to KernelCare SimplePatch, use the following script that uninstalls Ksplice and installs KernelCare SimplePatch instead.

It will automatically detect and abort if the system is not 64-bit (as KernelCare SimplePatch doesn't support it).

It will also detect when the Ksplice module cannot be uninstalled and retries multiple times.

Download the script here: https://patches.kernelcare.com/ksplice2kcare

Run the command:

bash ksplice2kcare <KERNELCARE_KEY> 
+

The key can be created/retrieved in KernelCare SimplePatch Keys section of CLN.

If you want to use IP based licenses, run:

bash ksplice2kcare IP 
+

You have to add an IP license for that server, and it is just the two letters IP, not your actual IP address.

By default the script will attempt 3 times to uninstall Ksplice, waiting 60 seconds in between. You can run it using nohup if you don't want to wait.

You can change that by editing the script and changing RETRY and SLEEP values.

The script will exit with exit code 0 and message Done on success. Otherwise, it will produce exit code -1.

The complete log file can be found at /var/log/ksplice2kcare.log

Canonical Livepatch

KernelCare SimplePatch is not compatible with Canonical Livepatch and should not be used on the same system.

Basic management

To disable automatic updates, edit the file /etc/sysconfig/kcare/kcare.conf

AUTO_UPDATE=False
+

To check the updated 'effective' version, run:

kcarectl --uname
+

We provide a convenience script /usr/bin/kcare-uname that has same syntax as uname.

To see applied patches, run:

kcarectl --patch-info 
+

Command line tools

  • /usr/bin/kcarectl - Manage KernelCare SimplePatch patches for your kernel.
  • /usr/bin/kcare-uname - Print certain system information.

kcarectl

OptionDescription
-i,--infoDisplays information about patches installed by KernelCare SimplePatch.
-u, --updatedDownloads the latest patches and applies them to current kernel.
--smart-update [since 1.6]The same as --update but is used to decide where to get pathches
--unloadUnloads pathces.
--auto-updateChecks if update is needed and performs an update
--patch-infoLists applied patches.
--statusReturns a status of an update. Refer to the exit code:
- host is updated to the latests patch level
- there are no applied patches
- there are new but not applied patches
- kernel is unsupported
--force [since 2.3]When used with update, forces applying the patch even if unable to freeze some threads.
--unamePrints safe kernel version.
--license-infoOutputs the current license info.
--register KEYRegisters using KernelCare SimplePatch Key.
--register-autoretry [since 2.5]If the registration fails, retries the registration indefinitely.
--unregisterUnregisters from KernelCare SimplePatch for the Key-based servers.
--testTries the test builds instead of the production builds (deprecated, use --prefix=test instead).
--prefixPatches thesource prefix. Used to test different builds by downloading builds from a different location based on prefix (v2.2+).
--versionPrints the KernelCare SimplePatch version.
--import-key PATHImports the gpg key.
--set-monitoring-keySets the monitoring key for IP-based licenses. 16 to 32 characters, alphanumeric only [version 2.1+]
--freezer [since 2.3]none: don't freeze any threads; full: freeze all threads; smart: freezes only threads that need to be frozen for patching. If option is not selected, best freezer method is chosen automatically.
--check [since 2.4]Checks if new patchset is available, without updating. Exit code 0 means there is a new kernel. 1 when there is no new kernel.
--doctor [since 2.6]Sends a report to the TuxCare support staff for diagnostics.
--set-patch-type extraTo enable extra patches.
--set-patch-type freeTo enable free patches.
--tag COMMANDAdds an extra field for a server. COMMAND is a user-defined parameter.

kcare-uname

Print certain system information. Default is -s.

ArgumentDescription
-a, --allprint all information in the following order, except omit and if unknown
-s, --kernel-nameprint the kernel name
-n, --nodenameprint the network node hostname
-r, --kernel-releaseprint the kernel release
-v, --kernel-versionprint the kernel version
-m, --machineprint the machine hardware name
-p, --processorprint the processor type
-i, --hardware-platformprint the hardware platform
-o, --operating-systemprint the operating system
--helpdisplay this help and exit
--versionoutput the version information and exit

kernelcare doctor

This tool collects essential information about the KernelCare SimplePatch environment and sends it to the support team.

kcarectl --doctor  
+
Generating report... 
+Uploading... 
+Key: FRWf74Zw11111111.83991334-1111-1111-1111-681ddd653e5f 
+Please, provide above mentioned key to KernelCare Support Team 
+

The command generates a report and prints out the ID which could be linked to a support ticket.

Note

If there was a connection problem during uploading the report, the report will be stored locally as /root/cl-report. This file should be sent to the support team manually.

Config options

The kcarectl behavior can be configured using /etc/sysconfig/kcare/kcare.conf.

ParameterDescription
AUTO_UPDATE=YES/NOYESNO
PATCH_METHOD=normal/nofreeze/smartSmart
PATCH_SERVERServer to use to download patches.
REGISTRATION_URLLicensing server.
PREFIX=prefixPatch source prefix, used to test different builds, by downloading builds from a different location, based on prefix [kernelcare 2.2+]
UPDATE_POLICY=REMOTE/LOCAL/LOCAL_FIRSTDepending on the policy, on server startup, use:
- (default) patches from patch server
- only locally cached patches, if none cached (caching is done automatically) - do nothing.
- see if locally cached patches exist, and load them. If not, try getting them from remote server.
IGNORE_UNKNOWN_KERNEL=True/FalseDon't provide notification if unknown kernel on auto-update. [kernelcare 2.5+]
LOAD_KCARE_SYSCTLControls if will be loaded on patchset load. True by default. [kernelcare 2.7+]
[AUTO_]UPDATE_DELAY=<num>h/<num>dUse patchsets not newer than specified time. [kernelcare 2.82+]
REPORT_FQDN=True/FalseForce using Fully Qualified Domain as a hostname. False by default.
FORCE_GID=NUse this group ID for symlink protection patch. By default, it's 48 (default Apache user GID) or 99 (user)

Disabling some patches

Some patches might affect the functioning of the system, and we created a way to disable them.

This is done via the sysctl command.

When new patchsets load, KernelCare SimplePatch sysctl options get reset. To prevent that we added a file:

/etc/sysconfig/kcare/sysctl.conf 
+

Options in this file will be loaded automatically on new patchset load.

To disable loading these options, specify LOAD_KCARE_SYSCTL=0 in /etc/sysconfig/kcare/kcare.conf To disable the patch, set the corresponding kcare option to 1.

Patches that can be disabled:

Patchsysctl
CVE-2015-5157kcare_modify_ldt

Extra patchset

Note:

KernelCare SimplePatch 2.12-5 or higher

KernelCare SimplePatch Extra patchset includes all the security fixes from KernelCare SimplePatch for AlmaLinux, CentOS 6, CentOS 7, and CentOS 8 as well as symlink protection and the IPSet bugfix for CentOS 6.

To enable extra patches and apply updates, run:

kcarectl --set-patch-type extra --update
+

To enable extra patches without an update, run:

kcarectl --set-patch-type extra
+

The 'extra' patch will be applied on the next automatic update. To see details, run:

kcarectl --patch-info 
+

You should see something similar to:

OS: centos6 
+kernel: kernel-2.6.32-696.6.3.el6 
+time: 2017-07-31 22:46:22 
+uname: 2.6.32-696.6.3.el6 
+kpatch-name: 2.6.32
+/symlink-protection.patch 
+kpatch-description: symlink protection // If you see this patch, it mean that you can enable symlink protection. 
+kpatch-kernel: kernel-2.6.32-279.2.1.el6 
+kpatch-cve: N/A 
+kpatch-cvss: N/A 
+kpatch-cve-url: N/A 
+kpatch-patch-url: https://gerrit.cloudlinux.com/#/c/16508/ 
+kpatch-name: 2.6.32/symlink-protection.kpatch-1.patch 
+kpatch-description: symlink protection (kpatch adaptation) 
+kpatch-kernel: kernel-2.6.32-279.2.1.el6 
+kpatch-cve: N/A 
+kpatch-cvss: N/A 
+kpatch-cve-url: N/A 
+kpatch-patch-url: https://gerrit.cloudlinux.com/#/c/16508/ 
+kpatch-name: 2.6.32/ipset-fix-list-shrinking.patch 
+kpatch-description: fix ipset list shrinking for no reason 
+kpatch-kernel: N/A 
+kpatch-cve: N/A 
+kpatch-cvss: N/A 
+kpatch-cve-url: N/A 
+kpatch-patch-url: https://bugs.centos.org/view.php?id=13499 
+

To enable Symlink Owner Match Protection, add fs.enforce_symlinksifowner=1 to /etc/sysconfig/kcare/sysctl.conf and run:

sysctl -p /etc/sysconfig/kcare/sysctl.conf
+

UEFI Secure Boot Support

Note:

This feature is an early stage of adoption. Not all the distribution will be able to support it.

This new functionality lets KernelCare SimplePatch work on systems with secure boot set up in their UEFI firmware. We are going to add a public certificate to the MOK (Machine Owner Keys) database that KernelCare SimplePatch will use to sign modules.

The latest KernelCare SimplePatch package contains a public certificate and will be available in the /usr/libexec/kcare/kernelcare_pub.der. For older versions, it could be downloaded from the https://patches.kernelcare.com/kernelcare_pub.der to that location. For example:

curl -o /usr/libexec/kcare/kernelcare_pub.der https://patches.kernelcare.com/kernelcare_pub.der 
+

Use mokutil as root to add this new MOK to the UEFI firmware.

mokutil --import /usr/libexec/kcare/kernelcare_pub.der 
+input password: 
+input password again:
+

It doesn't have a MOK password, and mokutil will ask you to create one. The password is temporary and will be used on the next boot.

  1. Reboot your machine to enter the MOK manager EFI utility.

  2. First, go down to 'Enroll Mok':

  3. Then the firmware gives you the option of viewing the new MOK or continuing. Let's continue.

  4. It then asks you to confirm the enrollment.

  5. Then you will need to enter the password you used when running mokutil --import.

  6. Finally, the firmware will ask you to reboot.

  7. Verify the key has been loaded by finding it in the output of the following command:

mokutil --list-enrolled | egrep -i 'SHA1|Issuer'
+

In some cases the enrolled key will not be shown but could be verified by the following command:

dmesg | grep -i 'cloud linux' [   0.722149] EFI: Loaded cert 'Cloud Linux Software, Inc: Kernel Module Signing Key: 12ff0613c0f80cfba3b2f8eba71ebc27c5a76170' linked to '.system_keyring'
+

That's it. Now you should be able to apply patches as usual.

To get more information about signing kernel modules for secure boot, see.

Live patching and FIPS compliance

The FIPS-140 certification of a Linux kernel validates that the cryptography contained within a Linux kernel complies with the US government FIPS-140 data protection standard. Meaning that algorithms like AES, the random generator and other cryptographic aspects of the kernel are implemented as the standard defines.

At the same time the certification is a lengthy process --a typical validation can take almost a year-- and for that reason only some of each vendor's kernels are validated. That is because vendors release new kernels with security and feature updates on a regular cadence some as often as weekly, irrespective of their FIPS validation status. This means users of FIPS validated kernels need to choose between: (a) strict compliance by staying on the same kernel without updating until the next validated kernel is available and (b) reducing their security risk by installing new kernels with security updates even if they are not validated. The same story applies to the vendor's live patching solutions.

With KernelCare SimplePatch it is possible to live patch FIPS-140 validated Linux kernels, for example at the Red Hat Enterprise Linux operating system. The live patches applied to these kernels, in this example, consist of the same RHEL kernel patches but are limited to the ones addressing security vulnerabilities. That way, a live patched kernel contains the same security fixes as a vendor update without any feature or bug-fix updates, e.g. updates that may change the cryptographic subsystem for performance or other non-security related reasons.

In this way, security-conscious users of FIPS-validated Linux kernels that today apply their vendor's security patches can rely on KernelCare SimplePatch live patching the same way they do with their vendor's security updates. Furthermore, KernelCare live patching applies the minimum possible updates to the validated kernel by explicitly excluding any non-security updates.

Firewall and Proxy Settings

Patching servers through firewall

As long as your servers have access to the Internet, even behind NAT - you will be able to use KernelCare SimplePatch patch server without any problems.

Generally, KernelCare SimplePatch requires connection to only two servers to work:

cln.cloudlinux.com patches.kernelcare.com 
+

An additional address is used for KernelCare SimplePatch agent installation/update:

repo.cloudlinux.com 
+

Patching servers through proxy

If your servers don't have direct Internet access but can gain access to the Internet using proxy, the configuration is not that different. KernelCare SimplePatch can pick up standard environment variables for a proxy.

Make sure you have environment settings for proxy setup, and everything else will be the same as if servers were directly connected to the Internet:

export http_proxy=http://proxy.domain.com:port # export https_proxy=http://proxy.domain.com:port 
+

NoteSettings defined by export are case-insensitive, so the example above could be as follows for certain software:

export HTTP_PROXY=http://proxy.domain.com:port # export HTTPS_PROXY=http://proxy.domain.com:port 
+

You can define these settings in the KernelCare SimplePatch config /etc/sysconfig/kcare/kcare.conf, for example:

cat /etc/sysconfig/kcare/kcare.conf AUTO_UPDATE=True HTTPS_PROXY=http://myproxy.com:59794 
+

If you define these settings in the config, you don't need to export them each kcarectl launch and don't need to edit cron jobs.

All kcarectl launches will be aware of proxy settings from the config. In this case, you need to set proxy settings only once.

KernelCare on AWS - Deployment User Guide

Prerequisites and Requirements

KernelCare can be installed on any x86_64 compatible server or VM running one of the following distributions:

  • Amazon Linux 1, 2
  • CentOS 6, 7, Xen4CentOS, CentOS-Plus, ElRepo
  • CloudLinux 6, 7
  • Debian 7, 8, 9, 8-backports
  • Oracle Linux 6, 7
  • ProxmoxVE 3,4,5
  • RedHat EL 6, 7
  • Ubuntu 14.04, 16.04, 18.04
  • Virtuozzo 6

The exact list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

Standard OS kernels are required in most cases unless the custom kernel is supported.

The software can be installed on a running server and doesn't require a reboot.

Basic Linux skills are sufficient to deploy KernelCare on AWS. Simple deployments involve just an EC2 instance. KernelCare is available using the BYOL model. You need to register in our customer portal to get a trial license. Once you get the trial license, you need to register your running EC2 instance with the activation key.

Architectural Design

As long as your servers have access to the Internet, even behind NAT - you will be able to use KernelCare without any problems.

Generally, KernelCare requires a connection to only two servers to work:

cln.cloudlinux.com patches.kernelcare.com
+

If your servers don't have direct Internet access but can gain access to the Internet using a proxy, the configuration is not that different. KernelCare can pick up standard environment variables for proxies.

Make sure you have environment settings for your proxy setup, and everything else will be the same as if the servers were directly connected to the Internet:

export http_proxy=http://proxy.domain.com:port # export https_proxy=http://proxy.domain.com:port 
+

Security

The only thing you need to be able to install/control your KernelCare SimplePatch deployment is SSH access (root credentials, key-based authentication/sudo, or similar mechanisms are preferred).

Sizing

KernelCare SimplePatch agent has a tiny RAM footprint - binary patches usually require less than 1 MB.

Deployment Guidance

To install KernelCare SimplePatch, run:

curl -s -L https://kernelcare.com/installer | bash 
+

or:

wget -qq -O - https://kernelcare.com/installer | bash 
+

If you are using IP-based license, nothing else required to be done. If you are using key-based license, run:

kcarectl --register <KEY> 
+

Where KEY is the registration key code string provided when you signed up for a trial or purchased the product.

You can easily automate KernelCare SimplePatch deployment with Ansible, Puppet, Chef or other orchestration tools. Here are the steps that may be automated:

  1. Distribute KernelCare SimplePatch agent package (optional - required only for servers with no access to the Internet) and a KernelCare SimplePatch agent configuration file (/etc/sysconfig/kcare/kcare.conf);
  2. Set required environmental variables (optional);
  3. Install KernelCare SimplePatch agent from either locally available package or central KernelCare download location;
  4. Register KernelCare SimplePatch with either license key or IP-based license.

Health Check

Systems protected by KernelCare SimplePatch can be monitored using TuxCare Portal available at https://portal.tuxcare.com/. Registered KernelCare SimplePatch installations are grouped by license keys. Kernels that are marked with the exclamation sign in amber do not have the latest patches installed.

In either case, you can check whether the latest available patch has been applied by running the following command on a system protected by KernelCare SimplePatch:

kcarectl --check 
+

Backup and Recovery

There is no reason to backup KernelCare SimplePatch. KernelCare SimplePatch doesn't store any data. You can always re-install and re-register KernelCare SimplePatch. To backup the configuration file of KernelCare SimplePatch if you have modified it, backup the /etc/sysconfig/kcare/ folder.

Routine Maintenance

KernelCare SimplePatch is packaged in RPM/DEB packages (depending on Linux distribution) and will update any time system packages are updated. No additional maintenance is needed.

Emergency Maintenance

If one of your instances degraded, once you start another instance based on EBS or snapshot - KernelCare SimplePatch will continue working as before, no additional work is needed. If you set up a new server instead, re-register KernelCare SimplePatch on the new server. If you decide to uninstall patches, run the command:

kcarectl --unload
+

Or to completely remove the KernelCare SimplePatch package run one of the following commands:

  • on RPM-based systems:
yum remove kernelcare
+
  • or on DEB-based systems:
apt-get remove kernelcare 
+

Patch Feed Advanced Options

Delayed Feeds

The KernelCare SimplePatch patch server provides the option to delay the installation of patches:

  • Delayed feeds - instructs KernelCare to skip loading patches that were released within the last 12/24/48 hours. The alternate feed option is enabled by setting the PREFIX variable in /etc/sysconfig/kcare/kcare.conf to one of test/12h/24h/48h.
`,321);function Ye(Fe,qe){const i=D("RouterLink");return M(),U("div",null,[R(" markdownlint-disable MD014 MD033 MD029 MD049 "),Y,e("table",null,[F,e("tbody",null,[q,H,e("tr",null,[z,e("td",null,[t("The same as --update, but uses "),n(i,{to:"/live-patching-services/#config-options"},{default:r(()=>[t("UPDATE_POLICY")]),_:1}),t(" to decide where to get patches.")])]),V,W,B,$,G,Q,X,j,Z,J,ee,te,ae,ie,ne,re,se,le,de,oe,ce,e("tr",null,[ue,e("td",null,[t("Set patch to stick to date in format DDMMYY or retrieve it from KEY if set to KEY (no support for ePortal). Empty to unstick. More info at "),n(i,{to:"/live-patching-services/#sticky-patches"},{default:r(()=>[t("Sticky Patches")]),_:1}),t(".")])]),he])]),pe,e("table",null,[me,e("tbody",null,[ve,ge,be,fe,ye,xe,ke,we,Ce,e("tr",null,[_e,e("td",null,[t("Stick patch to a particular date. More info at "),n(i,{to:"/live-patching-services/#sticky-patches"},{default:r(()=>[t("Sticky Patches")]),_:1}),t(".")])]),Te,Se,Pe,Ke,Ee])]),Ie,e("div",Le,[Ae,e("p",null,[t("This functionality is not available for ePortal customers. If you are using ePortal, please use "),n(i,{to:"/eportal/#feed-management"},{default:r(()=>[t("Feeds")]),_:1}),t(" instead.")])]),Oe,De,Me,e("p",null,[t("Disabling SMT, "),n(i,{to:"/how-to/#how-to-update-microcode-without-reboot-with-vendor-provided-package"},{default:r(()=>[t("updating microcode")]),_:1}),t(", and applying KernelCare patches will protect your systems against the ZombieLoad vulnerability. Note, only the latter action is applicable to virtual systems (e.g. VMs, VPS and other cloud instance types).")]),Ue,Re,Ne])}const We=O(N,[["render",Ye],["__file","index.html.vue"]]);export{We as default}; diff --git a/assets/index.html-b10d24f8.js b/assets/index.html-f5c3f0ca.js similarity index 72% rename from assets/index.html-b10d24f8.js rename to assets/index.html-f5c3f0ca.js index d34e57fb..d98623ab 100644 --- a/assets/index.html-b10d24f8.js +++ b/assets/index.html-f5c3f0ca.js @@ -1 +1 @@ -const e=JSON.parse('{"key":"v-37e5fb86","path":"/live-patching-services/","title":"KernelCare Enterprise","lang":"en-US","frontmatter":{"sidebarDepth":4},"headers":[{"level":2,"title":"KernelCare","slug":"kernelcare","link":"#kernelcare","children":[{"level":3,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":3,"title":"The live patching process","slug":"the-live-patching-process","link":"#the-live-patching-process","children":[]},{"level":3,"title":"ePortal","slug":"eportal","link":"#eportal","children":[]},{"level":3,"title":"Live patching testing tiers","slug":"live-patching-testing-tiers","link":"#live-patching-testing-tiers","children":[]},{"level":3,"title":"Kernel patching lifetime","slug":"kernel-patching-lifetime","link":"#kernel-patching-lifetime","children":[]},{"level":3,"title":"Vulnerability coverage","slug":"vulnerability-coverage","link":"#vulnerability-coverage","children":[]},{"level":3,"title":"Target response rates","slug":"target-response-rates","link":"#target-response-rates","children":[]},{"level":3,"title":"Supported architectures","slug":"supported-architectures","link":"#supported-architectures","children":[]},{"level":3,"title":"Supported Linux distros and kernels","slug":"supported-linux-distros-and-kernels","link":"#supported-linux-distros-and-kernels","children":[]},{"level":3,"title":"End-of-life (EOL) policy","slug":"end-of-life-eol-policy","link":"#end-of-life-eol-policy","children":[]},{"level":3,"title":"Technical Support","slug":"technical-support","link":"#technical-support","children":[]},{"level":3,"title":"Getting a trial license","slug":"getting-a-trial-license","link":"#getting-a-trial-license","children":[]},{"level":3,"title":"Installation","slug":"installation","link":"#installation","children":[]},{"level":3,"title":"Update","slug":"update","link":"#update","children":[]},{"level":3,"title":"Uninstalling","slug":"uninstalling","link":"#uninstalling","children":[]},{"level":3,"title":"Switching from Ksplice","slug":"switching-from-ksplice","link":"#switching-from-ksplice","children":[{"level":4,"title":"Canonical Livepatch","slug":"canonical-livepatch","link":"#canonical-livepatch","children":[]}]},{"level":3,"title":"Basic management","slug":"basic-management","link":"#basic-management","children":[]},{"level":3,"title":"Command line tools","slug":"command-line-tools","link":"#command-line-tools","children":[{"level":4,"title":"kcarectl","slug":"kcarectl","link":"#kcarectl","children":[]},{"level":4,"title":"kcare-uname","slug":"kcare-uname","link":"#kcare-uname","children":[]},{"level":4,"title":"kernelcare doctor","slug":"kernelcare-doctor","link":"#kernelcare-doctor","children":[]}]},{"level":3,"title":"Config options","slug":"config-options","link":"#config-options","children":[]},{"level":3,"title":"Disabling some patches","slug":"disabling-some-patches","link":"#disabling-some-patches","children":[]},{"level":3,"title":"Extra patchset","slug":"extra-patchset","link":"#extra-patchset","children":[]},{"level":3,"title":"Sticky patches","slug":"sticky-patches","link":"#sticky-patches","children":[{"level":4,"title":"How to find a proper sticky patch name","slug":"how-to-find-a-proper-sticky-patch-name","link":"#how-to-find-a-proper-sticky-patch-name","children":[]}]},{"level":3,"title":"Scanning for vulnerabilities","slug":"scanning-for-vulnerabilities","link":"#scanning-for-vulnerabilities","children":[{"level":4,"title":"How to use a vulnerability scanner with KernelCare","slug":"how-to-use-a-vulnerability-scanner-with-kernelcare","link":"#how-to-use-a-vulnerability-scanner-with-kernelcare","children":[]},{"level":4,"title":"What if my scanner is producing false positives?","slug":"what-if-my-scanner-is-producing-false-positives","link":"#what-if-my-scanner-is-producing-false-positives","children":[]},{"level":4,"title":"How to use OpenSCAP with KernelCare","slug":"how-to-use-openscap-with-kernelcare","link":"#how-to-use-openscap-with-kernelcare","children":[]}]},{"level":3,"title":"UEFI Secure Boot Support","slug":"uefi-secure-boot-support","link":"#uefi-secure-boot-support","children":[]},{"level":3,"title":"Live patching and FIPS compliance","slug":"live-patching-and-fips-compliance","link":"#live-patching-and-fips-compliance","children":[]},{"level":3,"title":"Firewall and Proxy Settings","slug":"firewall-and-proxy-settings","link":"#firewall-and-proxy-settings","children":[{"level":4,"title":"Patching servers through firewall","slug":"patching-servers-through-firewall","link":"#patching-servers-through-firewall","children":[]},{"level":4,"title":"Patching servers through proxy","slug":"patching-servers-through-proxy","link":"#patching-servers-through-proxy","children":[]}]},{"level":3,"title":"KernelCare on AWS - Deployment User Guide","slug":"kernelcare-on-aws-deployment-user-guide","link":"#kernelcare-on-aws-deployment-user-guide","children":[{"level":4,"title":"Introductory Material","slug":"introductory-material","link":"#introductory-material","children":[]},{"level":4,"title":"Prerequisites and Requirements","slug":"prerequisites-and-requirements","link":"#prerequisites-and-requirements","children":[]},{"level":4,"title":"Architectural Design","slug":"architectural-design","link":"#architectural-design","children":[]},{"level":4,"title":"Security","slug":"security","link":"#security","children":[]},{"level":4,"title":"Costs","slug":"costs","link":"#costs","children":[]},{"level":4,"title":"Sizing","slug":"sizing","link":"#sizing","children":[]},{"level":4,"title":"Deployment Guidance","slug":"deployment-guidance","link":"#deployment-guidance","children":[]},{"level":4,"title":"Health Check","slug":"health-check","link":"#health-check","children":[]},{"level":4,"title":"Backup and Recovery","slug":"backup-and-recovery","link":"#backup-and-recovery","children":[]},{"level":4,"title":"Routine Maintenance","slug":"routine-maintenance","link":"#routine-maintenance","children":[]},{"level":4,"title":"Emergency Maintenance","slug":"emergency-maintenance","link":"#emergency-maintenance","children":[]}]},{"level":3,"title":"Patch Feed Advanced Options","slug":"patch-feed-advanced-options","link":"#patch-feed-advanced-options","children":[{"level":4,"title":"Test and Delayed Feeds","slug":"test-and-delayed-feeds","link":"#test-and-delayed-feeds","children":[]},{"level":4,"title":"Feed Management With Sticky Patch Feature","slug":"feed-management-with-sticky-patch-feature","link":"#feed-management-with-sticky-patch-feature","children":[]},{"level":4,"title":"Support","slug":"support","link":"#support","children":[]},{"level":4,"title":"Support Costs","slug":"support-costs","link":"#support-costs","children":[]},{"level":4,"title":"Reference Materials","slug":"reference-materials","link":"#reference-materials","children":[]},{"level":4,"title":"Localization","slug":"localization","link":"#localization","children":[]}]},{"level":3,"title":"Reseller Partner UI","slug":"reseller-partner-ui","link":"#reseller-partner-ui","children":[{"level":4,"title":"Server Section","slug":"server-section","link":"#server-section","children":[]},{"level":4,"title":"Billing Info/Add Funds","slug":"billing-info-add-funds","link":"#billing-info-add-funds","children":[]},{"level":4,"title":"API Section","slug":"api-section","link":"#api-section","children":[]},{"level":4,"title":"Profile","slug":"profile","link":"#profile","children":[]}]},{"level":3,"title":"How To","slug":"how-to","link":"#how-to","children":[{"level":4,"title":"How to disable HyperThreading (SMT) without reboot: KernelCare case","slug":"how-to-disable-hyperthreading-smt-without-reboot-kernelcare-case","link":"#how-to-disable-hyperthreading-smt-without-reboot-kernelcare-case","children":[]},{"level":4,"title":"SMT Control","slug":"smt-control","link":"#smt-control","children":[]},{"level":4,"title":"SMT Status","slug":"smt-status","link":"#smt-status","children":[]},{"level":4,"title":"Check the SMT state","slug":"check-the-smt-state","link":"#check-the-smt-state","children":[]},{"level":4,"title":"Enable SMT","slug":"enable-smt","link":"#enable-smt","children":[]},{"level":4,"title":"Disable SMT","slug":"disable-smt","link":"#disable-smt","children":[]},{"level":4,"title":"How to update Microcode without reboot with vendor-provided package","slug":"how-to-update-microcode-without-reboot-with-vendor-provided-package","link":"#how-to-update-microcode-without-reboot-with-vendor-provided-package","children":[]},{"level":4,"title":"Updating microcode on Ubuntu and Debian","slug":"updating-microcode-on-ubuntu-and-debian","link":"#updating-microcode-on-ubuntu-and-debian","children":[]},{"level":4,"title":"Updating Microcode on Red Hat and CentOS","slug":"updating-microcode-on-red-hat-and-centos","link":"#updating-microcode-on-red-hat-and-centos","children":[]},{"level":4,"title":"Updating Microcode on CentOS 6","slug":"updating-microcode-on-centos-6","link":"#updating-microcode-on-centos-6","children":[]},{"level":4,"title":"Plesk related","slug":"plesk-related","link":"#plesk-related","children":[]},{"level":4,"title":"How to get a KernelCare activation key from the extended Plesk license","slug":"how-to-get-a-kernelcare-activation-key-from-the-extended-plesk-license","link":"#how-to-get-a-kernelcare-activation-key-from-the-extended-plesk-license","children":[]}]}]},{"level":2,"title":"LibCare","slug":"libcare","link":"#libcare","children":[{"level":3,"title":"Library Patching Lifetime","slug":"library-patching-lifetime","link":"#library-patching-lifetime","children":[]},{"level":3,"title":"Supported Architectures","slug":"supported-architectures-1","link":"#supported-architectures-1","children":[]},{"level":3,"title":"Installation and upgrade","slug":"installation-and-upgrade","link":"#installation-and-upgrade","children":[]},{"level":3,"title":"Usage","slug":"usage","link":"#usage","children":[{"level":4,"title":"Blacklisting","slug":"blacklisting","link":"#blacklisting","children":[]},{"level":4,"title":"Auto update","slug":"auto-update","link":"#auto-update","children":[]}]},{"level":3,"title":"Usage in containers","slug":"usage-in-containers","link":"#usage-in-containers","children":[{"level":4,"title":"Disposable container servers","slug":"disposable-container-servers","link":"#disposable-container-servers","children":[]},{"level":4,"title":"Persistent container servers","slug":"persistent-container-servers","link":"#persistent-container-servers","children":[]}]},{"level":3,"title":"Troubleshooting","slug":"troubleshooting","link":"#troubleshooting","children":[{"level":4,"title":"Auditd logs","slug":"auditd-logs","link":"#auditd-logs","children":[]}]},{"level":3,"title":"Unpatched Library Detector (UChecker)","slug":"unpatched-library-detector-uchecker","link":"#unpatched-library-detector-uchecker","children":[{"level":4,"title":"Description","slug":"description","link":"#description","children":[]},{"level":4,"title":"How UChecker works","slug":"how-uchecker-works","link":"#how-uchecker-works","children":[]},{"level":4,"title":"UChecker Usage","slug":"uchecker-usage","link":"#uchecker-usage","children":[]},{"level":4,"title":"UChecker Troubleshooting","slug":"uchecker-troubleshooting","link":"#uchecker-troubleshooting","children":[]}]}]},{"level":2,"title":"QEMUCare","slug":"qemucare","link":"#qemucare","children":[{"level":3,"title":"How QEMUCare works","slug":"how-qemucare-works","link":"#how-qemucare-works","children":[]},{"level":3,"title":"QEMU PatchSet Deployment","slug":"qemu-patchset-deployment","link":"#qemu-patchset-deployment","children":[{"level":4,"title":"CLI to install the latest patchsets","slug":"cli-to-install-the-latest-patchsets","link":"#cli-to-install-the-latest-patchsets","children":[]},{"level":4,"title":"CLI to deploy patchset from archive","slug":"cli-to-deploy-patchset-from-archive","link":"#cli-to-deploy-patchset-from-archive","children":[]}]}]},{"level":2,"title":"Vulnerability Scanner Integration with KernelCare","slug":"vulnerability-scanner-integration-with-kernelcare","link":"#vulnerability-scanner-integration-with-kernelcare","children":[{"level":3,"title":"Easiest: Identifying correctly the effective kernel","slug":"easiest-identifying-correctly-the-effective-kernel","link":"#easiest-identifying-correctly-the-effective-kernel","children":[]},{"level":3,"title":"Comprehensive: Using OVAL data","slug":"comprehensive-using-oval-data","link":"#comprehensive-using-oval-data","children":[]},{"level":3,"title":"Comprehensive & local: Using the local CVELIST file on each scanned node","slug":"comprehensive-local-using-the-local-cvelist-file-on-each-scanned-node","link":"#comprehensive-local-using-the-local-cvelist-file-on-each-scanned-node","children":[]}]}]}');export{e as data}; +const e=JSON.parse('{"key":"v-37e5fb86","path":"/live-patching-services/","title":"KernelCare Enterprise","lang":"en-US","frontmatter":{"sidebarDepth":4},"headers":[{"level":2,"title":"KernelCare","slug":"kernelcare","link":"#kernelcare","children":[{"level":3,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":3,"title":"The live patching process","slug":"the-live-patching-process","link":"#the-live-patching-process","children":[]},{"level":3,"title":"ePortal","slug":"eportal","link":"#eportal","children":[]},{"level":3,"title":"Live patching testing tiers","slug":"live-patching-testing-tiers","link":"#live-patching-testing-tiers","children":[]},{"level":3,"title":"Kernel patching lifetime","slug":"kernel-patching-lifetime","link":"#kernel-patching-lifetime","children":[]},{"level":3,"title":"Vulnerability coverage","slug":"vulnerability-coverage","link":"#vulnerability-coverage","children":[]},{"level":3,"title":"Target response rates","slug":"target-response-rates","link":"#target-response-rates","children":[]},{"level":3,"title":"Supported architectures","slug":"supported-architectures","link":"#supported-architectures","children":[]},{"level":3,"title":"Supported Linux distros and kernels","slug":"supported-linux-distros-and-kernels","link":"#supported-linux-distros-and-kernels","children":[]},{"level":3,"title":"End-of-life (EOL) policy","slug":"end-of-life-eol-policy","link":"#end-of-life-eol-policy","children":[]},{"level":3,"title":"Technical Support","slug":"technical-support","link":"#technical-support","children":[]},{"level":3,"title":"Getting a trial license","slug":"getting-a-trial-license","link":"#getting-a-trial-license","children":[]},{"level":3,"title":"Installation","slug":"installation","link":"#installation","children":[]},{"level":3,"title":"Update","slug":"update","link":"#update","children":[]},{"level":3,"title":"Uninstalling","slug":"uninstalling","link":"#uninstalling","children":[]},{"level":3,"title":"Switching from Ksplice","slug":"switching-from-ksplice","link":"#switching-from-ksplice","children":[{"level":4,"title":"Canonical Livepatch","slug":"canonical-livepatch","link":"#canonical-livepatch","children":[]}]},{"level":3,"title":"Basic management","slug":"basic-management","link":"#basic-management","children":[]},{"level":3,"title":"Command line tools","slug":"command-line-tools","link":"#command-line-tools","children":[{"level":4,"title":"kcarectl","slug":"kcarectl","link":"#kcarectl","children":[]},{"level":4,"title":"kcare-uname","slug":"kcare-uname","link":"#kcare-uname","children":[]},{"level":4,"title":"kernelcare doctor","slug":"kernelcare-doctor","link":"#kernelcare-doctor","children":[]}]},{"level":3,"title":"Config options","slug":"config-options","link":"#config-options","children":[]},{"level":3,"title":"Disabling some patches","slug":"disabling-some-patches","link":"#disabling-some-patches","children":[]},{"level":3,"title":"Extra patchset","slug":"extra-patchset","link":"#extra-patchset","children":[]},{"level":3,"title":"Sticky patches","slug":"sticky-patches","link":"#sticky-patches","children":[{"level":4,"title":"How to find a proper sticky patch name","slug":"how-to-find-a-proper-sticky-patch-name","link":"#how-to-find-a-proper-sticky-patch-name","children":[]}]},{"level":3,"title":"Scanning for vulnerabilities","slug":"scanning-for-vulnerabilities","link":"#scanning-for-vulnerabilities","children":[{"level":4,"title":"How to use a vulnerability scanner with KernelCare","slug":"how-to-use-a-vulnerability-scanner-with-kernelcare","link":"#how-to-use-a-vulnerability-scanner-with-kernelcare","children":[]},{"level":4,"title":"What if my scanner is producing false positives?","slug":"what-if-my-scanner-is-producing-false-positives","link":"#what-if-my-scanner-is-producing-false-positives","children":[]},{"level":4,"title":"How to use OpenSCAP with KernelCare","slug":"how-to-use-openscap-with-kernelcare","link":"#how-to-use-openscap-with-kernelcare","children":[]}]},{"level":3,"title":"UEFI Secure Boot Support","slug":"uefi-secure-boot-support","link":"#uefi-secure-boot-support","children":[]},{"level":3,"title":"Live patching and FIPS compliance","slug":"live-patching-and-fips-compliance","link":"#live-patching-and-fips-compliance","children":[]},{"level":3,"title":"Firewall and Proxy Settings","slug":"firewall-and-proxy-settings","link":"#firewall-and-proxy-settings","children":[{"level":4,"title":"Patching servers through firewall","slug":"patching-servers-through-firewall","link":"#patching-servers-through-firewall","children":[]},{"level":4,"title":"Patching servers through proxy","slug":"patching-servers-through-proxy","link":"#patching-servers-through-proxy","children":[]}]},{"level":3,"title":"KernelCare on AWS - Deployment User Guide","slug":"kernelcare-on-aws-deployment-user-guide","link":"#kernelcare-on-aws-deployment-user-guide","children":[{"level":4,"title":"Introductory Material","slug":"introductory-material","link":"#introductory-material","children":[]},{"level":4,"title":"Prerequisites and Requirements","slug":"prerequisites-and-requirements","link":"#prerequisites-and-requirements","children":[]},{"level":4,"title":"Architectural Design","slug":"architectural-design","link":"#architectural-design","children":[]},{"level":4,"title":"Security","slug":"security","link":"#security","children":[]},{"level":4,"title":"Costs","slug":"costs","link":"#costs","children":[]},{"level":4,"title":"Sizing","slug":"sizing","link":"#sizing","children":[]},{"level":4,"title":"Deployment Guidance","slug":"deployment-guidance","link":"#deployment-guidance","children":[]},{"level":4,"title":"Health Check","slug":"health-check","link":"#health-check","children":[]},{"level":4,"title":"Backup and Recovery","slug":"backup-and-recovery","link":"#backup-and-recovery","children":[]},{"level":4,"title":"Routine Maintenance","slug":"routine-maintenance","link":"#routine-maintenance","children":[]},{"level":4,"title":"Emergency Maintenance","slug":"emergency-maintenance","link":"#emergency-maintenance","children":[]}]},{"level":3,"title":"Patch Feed Advanced Options","slug":"patch-feed-advanced-options","link":"#patch-feed-advanced-options","children":[{"level":4,"title":"Test and Delayed Feeds","slug":"test-and-delayed-feeds","link":"#test-and-delayed-feeds","children":[]},{"level":4,"title":"Feed Management With Sticky Patch Feature","slug":"feed-management-with-sticky-patch-feature","link":"#feed-management-with-sticky-patch-feature","children":[]},{"level":4,"title":"Support","slug":"support","link":"#support","children":[]},{"level":4,"title":"Support Costs","slug":"support-costs","link":"#support-costs","children":[]},{"level":4,"title":"Reference Materials","slug":"reference-materials","link":"#reference-materials","children":[]},{"level":4,"title":"Localization","slug":"localization","link":"#localization","children":[]}]},{"level":3,"title":"Reseller Partner UI","slug":"reseller-partner-ui","link":"#reseller-partner-ui","children":[{"level":4,"title":"Server Section","slug":"server-section","link":"#server-section","children":[]},{"level":4,"title":"Billing Info/Add Funds","slug":"billing-info-add-funds","link":"#billing-info-add-funds","children":[]},{"level":4,"title":"API Section","slug":"api-section","link":"#api-section","children":[]},{"level":4,"title":"Profile","slug":"profile","link":"#profile","children":[]}]},{"level":3,"title":"How To","slug":"how-to","link":"#how-to","children":[{"level":4,"title":"How to disable HyperThreading (SMT) without reboot: KernelCare case","slug":"how-to-disable-hyperthreading-smt-without-reboot-kernelcare-case","link":"#how-to-disable-hyperthreading-smt-without-reboot-kernelcare-case","children":[]},{"level":4,"title":"SMT Control","slug":"smt-control","link":"#smt-control","children":[]},{"level":4,"title":"SMT Status","slug":"smt-status","link":"#smt-status","children":[]},{"level":4,"title":"Check the SMT state","slug":"check-the-smt-state","link":"#check-the-smt-state","children":[]},{"level":4,"title":"Enable SMT","slug":"enable-smt","link":"#enable-smt","children":[]},{"level":4,"title":"Disable SMT","slug":"disable-smt","link":"#disable-smt","children":[]},{"level":4,"title":"How to update Microcode without reboot with vendor-provided package","slug":"how-to-update-microcode-without-reboot-with-vendor-provided-package","link":"#how-to-update-microcode-without-reboot-with-vendor-provided-package","children":[]},{"level":4,"title":"Updating microcode on Ubuntu and Debian","slug":"updating-microcode-on-ubuntu-and-debian","link":"#updating-microcode-on-ubuntu-and-debian","children":[]},{"level":4,"title":"Updating Microcode on Red Hat and CentOS","slug":"updating-microcode-on-red-hat-and-centos","link":"#updating-microcode-on-red-hat-and-centos","children":[]},{"level":4,"title":"Updating Microcode on CentOS 6","slug":"updating-microcode-on-centos-6","link":"#updating-microcode-on-centos-6","children":[]},{"level":4,"title":"Plesk related","slug":"plesk-related","link":"#plesk-related","children":[]},{"level":4,"title":"How to get a KernelCare activation key from the extended Plesk license","slug":"how-to-get-a-kernelcare-activation-key-from-the-extended-plesk-license","link":"#how-to-get-a-kernelcare-activation-key-from-the-extended-plesk-license","children":[]}]}]},{"level":2,"title":"LibCare","slug":"libcare","link":"#libcare","children":[{"level":3,"title":"Library Patching Lifetime","slug":"library-patching-lifetime","link":"#library-patching-lifetime","children":[]},{"level":3,"title":"Supported Architectures","slug":"supported-architectures-1","link":"#supported-architectures-1","children":[]},{"level":3,"title":"Installation and upgrade","slug":"installation-and-upgrade","link":"#installation-and-upgrade","children":[]},{"level":3,"title":"Usage","slug":"usage","link":"#usage","children":[{"level":4,"title":"Blacklisting","slug":"blacklisting","link":"#blacklisting","children":[]},{"level":4,"title":"Auto update","slug":"auto-update","link":"#auto-update","children":[]}]},{"level":3,"title":"Usage in containers","slug":"usage-in-containers","link":"#usage-in-containers","children":[{"level":4,"title":"Disposable container servers","slug":"disposable-container-servers","link":"#disposable-container-servers","children":[]},{"level":4,"title":"Persistent container servers","slug":"persistent-container-servers","link":"#persistent-container-servers","children":[]}]},{"level":3,"title":"Troubleshooting","slug":"troubleshooting","link":"#troubleshooting","children":[{"level":4,"title":"Auditd logs","slug":"auditd-logs","link":"#auditd-logs","children":[]}]},{"level":3,"title":"Unpatched Library Detector (UChecker)","slug":"unpatched-library-detector-uchecker","link":"#unpatched-library-detector-uchecker","children":[{"level":4,"title":"Description","slug":"description","link":"#description","children":[]},{"level":4,"title":"How UChecker works","slug":"how-uchecker-works","link":"#how-uchecker-works","children":[]},{"level":4,"title":"UChecker Usage","slug":"uchecker-usage","link":"#uchecker-usage","children":[]},{"level":4,"title":"UChecker Troubleshooting","slug":"uchecker-troubleshooting","link":"#uchecker-troubleshooting","children":[]}]}]},{"level":2,"title":"QEMUCare","slug":"qemucare","link":"#qemucare","children":[{"level":3,"title":"How QEMUCare works","slug":"how-qemucare-works","link":"#how-qemucare-works","children":[]},{"level":3,"title":"QEMU PatchSet Deployment","slug":"qemu-patchset-deployment","link":"#qemu-patchset-deployment","children":[{"level":4,"title":"CLI to install the latest patchsets","slug":"cli-to-install-the-latest-patchsets","link":"#cli-to-install-the-latest-patchsets","children":[]},{"level":4,"title":"CLI to deploy patchset from archive","slug":"cli-to-deploy-patchset-from-archive","link":"#cli-to-deploy-patchset-from-archive","children":[]}]}]},{"level":2,"title":"Vulnerability Scanner Integration with KernelCare","slug":"vulnerability-scanner-integration-with-kernelcare","link":"#vulnerability-scanner-integration-with-kernelcare","children":[{"level":3,"title":"Easiest: Identifying correctly the effective kernel","slug":"easiest-identifying-correctly-the-effective-kernel","link":"#easiest-identifying-correctly-the-effective-kernel","children":[]},{"level":3,"title":"Comprehensive: Using OVAL data","slug":"comprehensive-using-oval-data","link":"#comprehensive-using-oval-data","children":[]},{"level":3,"title":"Comprehensive & local: Using the local CVELIST file on each scanned node","slug":"comprehensive-local-using-the-local-cvelist-file-on-each-scanned-node","link":"#comprehensive-local-using-the-local-cvelist-file-on-each-scanned-node","children":[]}]},{"level":2,"title":"KernelCare SimplePatch","slug":"kernelcare-simplepatch","link":"#kernelcare-simplepatch","children":[{"level":3,"title":"Introduction","slug":"introduction-1","link":"#introduction-1","children":[]},{"level":3,"title":"The live patching process","slug":"the-live-patching-process-1","link":"#the-live-patching-process-1","children":[]},{"level":3,"title":"Kernel patching lifetime","slug":"kernel-patching-lifetime-1","link":"#kernel-patching-lifetime-1","children":[]},{"level":3,"title":"Vulnerability coverage","slug":"vulnerability-coverage-1","link":"#vulnerability-coverage-1","children":[]},{"level":3,"title":"Target response rates","slug":"target-response-rates-1","link":"#target-response-rates-1","children":[]},{"level":3,"title":"Supported architectures","slug":"supported-architectures-2","link":"#supported-architectures-2","children":[]},{"level":3,"title":"Supported Linux distros and kernels","slug":"supported-linux-distros-and-kernels-1","link":"#supported-linux-distros-and-kernels-1","children":[]},{"level":3,"title":"End-of-life (EOL) policy","slug":"end-of-life-eol-policy-1","link":"#end-of-life-eol-policy-1","children":[]},{"level":3,"title":"Technical Support","slug":"technical-support-1","link":"#technical-support-1","children":[]},{"level":3,"title":"Installation","slug":"installation-1","link":"#installation-1","children":[]},{"level":3,"title":"Update","slug":"update-1","link":"#update-1","children":[]},{"level":3,"title":"Uninstalling","slug":"uninstalling-1","link":"#uninstalling-1","children":[]},{"level":3,"title":"Switching from Ksplice","slug":"switching-from-ksplice-1","link":"#switching-from-ksplice-1","children":[]},{"level":3,"title":"Canonical Livepatch","slug":"canonical-livepatch-1","link":"#canonical-livepatch-1","children":[]},{"level":3,"title":"Basic management","slug":"basic-management-1","link":"#basic-management-1","children":[]},{"level":3,"title":"Command line tools","slug":"command-line-tools-1","link":"#command-line-tools-1","children":[{"level":4,"title":"kcarectl","slug":"kcarectl-1","link":"#kcarectl-1","children":[]},{"level":4,"title":"kcare-uname","slug":"kcare-uname-1","link":"#kcare-uname-1","children":[]},{"level":4,"title":"kernelcare doctor","slug":"kernelcare-doctor-1","link":"#kernelcare-doctor-1","children":[]},{"level":4,"title":"Config options","slug":"config-options-1","link":"#config-options-1","children":[]}]},{"level":3,"title":"Disabling some patches","slug":"disabling-some-patches-1","link":"#disabling-some-patches-1","children":[]},{"level":3,"title":"Extra patchset","slug":"extra-patchset-1","link":"#extra-patchset-1","children":[]},{"level":3,"title":"UEFI Secure Boot Support","slug":"uefi-secure-boot-support-1","link":"#uefi-secure-boot-support-1","children":[]},{"level":3,"title":"Live patching and FIPS compliance","slug":"live-patching-and-fips-compliance-1","link":"#live-patching-and-fips-compliance-1","children":[]},{"level":3,"title":"Firewall and Proxy Settings","slug":"firewall-and-proxy-settings-1","link":"#firewall-and-proxy-settings-1","children":[{"level":4,"title":"Patching servers through firewall","slug":"patching-servers-through-firewall-1","link":"#patching-servers-through-firewall-1","children":[]},{"level":4,"title":"Patching servers through proxy","slug":"patching-servers-through-proxy-1","link":"#patching-servers-through-proxy-1","children":[]}]},{"level":3,"title":"KernelCare on AWS - Deployment User Guide","slug":"kernelcare-on-aws-deployment-user-guide-1","link":"#kernelcare-on-aws-deployment-user-guide-1","children":[{"level":4,"title":"Prerequisites and Requirements","slug":"prerequisites-and-requirements-1","link":"#prerequisites-and-requirements-1","children":[]},{"level":4,"title":"Architectural Design","slug":"architectural-design-1","link":"#architectural-design-1","children":[]},{"level":4,"title":"Security","slug":"security-1","link":"#security-1","children":[]},{"level":4,"title":"Sizing","slug":"sizing-1","link":"#sizing-1","children":[]},{"level":4,"title":"Deployment Guidance","slug":"deployment-guidance-1","link":"#deployment-guidance-1","children":[]},{"level":4,"title":"Health Check","slug":"health-check-1","link":"#health-check-1","children":[]},{"level":4,"title":"Backup and Recovery","slug":"backup-and-recovery-1","link":"#backup-and-recovery-1","children":[]},{"level":4,"title":"Routine Maintenance","slug":"routine-maintenance-1","link":"#routine-maintenance-1","children":[]},{"level":4,"title":"Emergency Maintenance","slug":"emergency-maintenance-1","link":"#emergency-maintenance-1","children":[]}]},{"level":3,"title":"Patch Feed Advanced Options","slug":"patch-feed-advanced-options-1","link":"#patch-feed-advanced-options-1","children":[{"level":4,"title":"Delayed Feeds","slug":"delayed-feeds","link":"#delayed-feeds","children":[]}]}]}]}');export{e as data}; diff --git a/enterprise-support-for-almalinux/fips/index.html b/enterprise-support-for-almalinux/fips/index.html index aa320ed8..fa362252 100644 --- a/enterprise-support-for-almalinux/fips/index.html +++ b/enterprise-support-for-almalinux/fips/index.html @@ -39,7 +39,7 @@ })(); FIPS packages for AlmaLinux Community - +
sidebar hamburger menu

FIPS packages for AlmaLinux Community

Below are the instructions for installing the TuxCare FIPS 140-3 validated modules for AlmaLinux 9.2, they should be run as root.

For commercial customers of our ESU product, please use the instructions here instead.

By installing this software, you agree to be bound by the terms of the TuxCare Community EULA.

# dnf -y install https://repo.tuxcare.com/fips/tuxcare-fips-release-latest-9.noarch.rpm
@@ -55,6 +55,6 @@
 # dnf versionlock add openssl*tuxcare* kernel*tuxcare*
 

To revert to the previous behaviour of getting updated kernel/openssl packages from AlmaLinux, run the following as root:

# dnf versionlock delete openssl*tuxcare* kernel*tuxcare*
 
- + diff --git a/enterprise-support-for-almalinux/index.html b/enterprise-support-for-almalinux/index.html index 83551dd2..66a237d2 100644 --- a/enterprise-support-for-almalinux/index.html +++ b/enterprise-support-for-almalinux/index.html @@ -39,7 +39,7 @@ })(); Enterprise Support for AlmaLinux - +
sidebar hamburger menu

Enterprise Support for AlmaLinux

This guide describes Enterprise Support for AlmaLinux and how to set it up on your AlmaLinux system.

What is Enterprise Support for AlmaLinux?

Enterprise Support for AlmaLinux provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.

Available services:

  • Essential Support: TuxCare-vetted repository of AlmaLinux updates with guaranteed uptime, expedited break-and-fix support and up to 16 years of support coverage
  • Extended Security Updates deliver an extension of an additional 4.5 years of security fixes for Critical and High-risk vulnerabilities and FIPS-compliant security patches for select AlmaLinux minor versions
  • Live Patching (KernelCare and LibCare): automated live patches for the kernel and critical userspace packages with zero downtime
  • Enhanced Support: Enterprise-grade support for AlmaLinux and open-source applications with pay-as-you-go pricing in 5, 10, and 20-hour bundles

Learn more at https://tuxcare.com/almalinux-enterprise-support/

Extended Security Updates

Extended Security Updates (ESU) for AlmaLinux extend the lifecycle of specific AlmaLinux minor versions by delivering both prolonged security updates for High and Critical vulnerabilities as well as FIPS-compliant security patches enabling greater stability and security for AlmaLinux deployments.

ESU lifecycle

AlmaLinux provides a 10-year lifecycle with a new minor release arriving every 6 months, bringing new features until the fifth year. Each of the minor releases is supported for 6 months. Customers who want to remain with the specific AlmaLinux minor release for longer can opt for Extended Security Updates (ESU). ESU delivers an extension of an additional 4.5 years of security fixes for Critical and High-risk vulnerabilities as well as FIPS-compliant security patches for select AlmaLinux minor versions. The service is currently available for AlmaLinux 9.2 with planned support for AlmaLinux 9.6 and 9.10. This provision ensures that a given minor release continues to receive essential updates, allowing customers to avoid upgrading every 6 months and test/certify their applications against the next minor version at their own pace.

esu lifecycle

Disclaimer: AlmaLinux minor releases planned for ESU are subject to change. TuxCare reserves the right to change them at any time without prior notice.

Vulnerability coverage

TuxCare employs the Common Vulnerability Scoring System (CVSS v3) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we give priority to the NVD score. ESU provides security patches for High and Critical vulnerabilities (with a 7+ CVSS score) and urgent priority bug fixes. This strategy aims to reduce changes in the environment, prioritizing stability without compromising critical security.

FIPS-compliant security patches

ESU enables continuous security for FIPS-certified AlmaLinux 9.2 deployments by offering FIPS-compliant security patches for the FIPS-validated kernel and OpenSSL packages. These patches do not change the validated cryptography and are suitable for organizations that don't require strict FIPS-certified implementations that are static and never patched (i.e. military or intelligence agencies). In case of a cryptographic vulnerability that will require a security patch that changes the validated cryptography, we will fix it by delivering a new packaged kernel. This kernel will undergo an expedited FIPS 140-3 recertification to ensure it is attested to conform to FIPS 140-3 requirements.

Target response times

Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare organizations or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements. We aim to deliver security patches for Critical and High-risk vulnerabilities (CVSS 7+) within 14 days from when the vulnerabilities become publicly disclosed. This rapid response time significantly reduces the window of opportunity for potential attackers and meets most security regulation requirements.

Supported packages

ESU provides updates for a comprehensive list of packages integral to server operations (100+ packages), providing maximum security for your operating system. You can view the full list of supported packages, as well as get detailed information on the patched CVEs, here https://cve.tuxcare.com/. Support for additional packages can be provided on request.

Errata advisories

ESU provides qualified security and selected bug-fix errata advisories across all architectures. They can help users track which Common Vulnerabilities and Exposures (CVE) are resolved and which bugs have been addressed. You can view the full list of released advisories here https://cve.tuxcare.com/els/releases.

OVAL patch definitions

Leveraging Open Vulnerability and Assessment Language (OVAL) patch definitions with OVAL-compatible tools, e.g. OpenSCAP, users can accurately check their systems for the presence of vulnerabilities.

Technical support

All TuxCare products include technical support provided according to the support policy https://tuxcare.com/TuxCare-support-policy.pdf. It delivers 24/7/365 access to our engineers through the TuxCare Support Portal https://tuxcare.com/support-portal/ and to our online knowledge base. Technical Support for Extended Security Updates provides assistance with:

  • ESU repository setup issues
  • Package update problems (package conflicts, missing dependencies)
  • FIPS and CVE-related questions
  • ePortal issues
  • AlmaLinux kernel crash issues (root cause analysis)

GnuPG Keys

The TuxCare ESU/FIPS packages and repositories are cryptographically signed with a GPG key, so you can verify the legitimacy of the software you download and the source of the download. The details of our key are below:

  • Public key: rsa4096/8D50EB66 (2023-03-06)
    • Fingerprint: FAD7 8590 81D0 738B 7A82 8496 D07B F2A0 8D50 EB66
    • ID: TuxCare (Software Signing Key) packager@tuxcare.com
    • Installation location: /etc/pki/rpm-gpg/RPM-GPG-KEY-TuxCare
    • Download link: RPM-GPG-KEY-TuxCare

Installing tuxctl

Requirements

  • AlmaLinux 9.2 operating system
  • x86_64 or aarch64 architecture
  • Enterprise Support license key (should be obtained from portal.tuxcare.com)
  • Internet access

tuxctl is the setup tool for TuxCare's Enterprise Support for AlmaLinux, which will configure your system to receive patches from the TuxCare repositories. To install tuxctl you need to install the tuxcare-release package first. This package contains the TuxCare repo definitions, TuxCare GPG key and the tuxctl setup tool. Run the following as root:

# dnf install -y https://repo.tuxcare.com/tuxcare/tuxcare-release-latest-$(rpm --eval %almalinux).noarch.rpm
@@ -104,6 +104,6 @@
   -e 's|^baseurl|# baseurl|' \
   /etc/yum.repos.d/almalinux*.repo
 

Note that if you upgrade past 9.2 you won't be able to upgrade to ESU without a reinstall. ESU customers can find instructions above

- + diff --git a/eportal-api/index.html b/eportal-api/index.html index e2b0c92a..624e1b44 100644 --- a/eportal-api/index.html +++ b/eportal-api/index.html @@ -39,7 +39,7 @@ })(); ePortal API - +
sidebar hamburger menu

ePortal API

You may need to create a separate ePortal account for API usage with:

kc.eportal user -a api-user -p <password>
@@ -255,6 +255,6 @@
 
  • Now your plan is ready and can be called directly with:
    bolt plan run eportal_puppet:unregister_server -t <TARGETS>
     
  • Ad hoc run example with:

    bolt plan run eportal_puppet::unregister_server -t 192.168.246.110
     

    This can be called during machine tear down to properly remove the server from ePortal.

    - + diff --git a/eportal/index.html b/eportal/index.html index 4d25621b..dfa7f691 100644 --- a/eportal/index.html +++ b/eportal/index.html @@ -39,7 +39,7 @@ })(); ePortal - +
    sidebar hamburger menu

    ePortal

    TuxCare ePortal is the web management console dedicated to KernelCare Enterprise live patch management.

    ePortal software can help protect servers located behind the firewall (i.e. with no internet access) and can be installed both on-premises and in the cloud.

    Overview

    ePortal Hardware Requirements

    Disk:

    • 100 GB minimum, 200 GB recommended (20GB in case of cache mode)
    • SSD with at least 100 IOPS

    Note

    SSD based storage is a crucial requirement for ePortal server.

    CPU:

    As far as other requirements concerned, we have tested the following configuration and the following number of connected servers:

    • 10k of connected machines is the maximum for the following requirements:

      • VM
      • 1 VCPU
      • 1 GB RAM
    • 75k of connected machines is the maximum for the following requirements:

      • Core i5
      • 1 CPU
      • 4 GB RAM

    Installation

    ePortal is compatible with 64-bit versions of EL7/8/9 based distros like CentOS 7/8, AlmaLinux 8/9 and Ubuntu 20.04/22.04

    RHEL-based distros

    For installation and workability of ePortal the Nginx web server is required. We recommend to use stable version from the official Nginx repository:

    # cat > /etc/yum.repos.d/nginx.repo <<EOL
    @@ -370,6 +370,6 @@
     

    Run:

    # kc.eportal sync-nginx-conf
     

    It initializes storage and makes corresponding modifications to nginx config to serve patches from a new place.

    And restart nginx and eportal services to apply changes:

    # systemctl restart eportal nginx
     
    - + diff --git a/extended-lifecycle-support-for-languages/index.html b/extended-lifecycle-support-for-languages/index.html index 6db875c4..13823c2f 100644 --- a/extended-lifecycle-support-for-languages/index.html +++ b/extended-lifecycle-support-for-languages/index.html @@ -39,7 +39,7 @@ })(); Extended Lifecycle Support for Languages - +
    sidebar hamburger menu

    Extended Lifecycle Support for Languages

    Extended Lifecycle Support for PHP

    Extended Lifecycle Support (ELS) for PHP from TuxCare provides security fixes for PHP versions that have reached their end-of-life. This allows to continue running Linux server vulnerability-free.

    Supported OS

    TuxCare provides Extended Lifecycle Support through four years after the EOL date.

    OSVersion
    CentOS, CloudLinux, OracleLinux, etc.6.x 64-bit, 7.x 64-bit, 8.x 64-bit, 9.x 64-bit
    AlmaLinux8.x 64-bit, 9.x 64-bit
    Ubuntu16.04 64-bit, 18.04 64-bit, 20.04 64-bit, 22.04 64-bit

    Supported versions

    CentOS, CloudLinux, AlmaLinux, Oracle Linux, etc.: 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 7.0, 7.1, 7.2, 7.3, 7.4, 8.0, 8.1, 8.2

    Ubuntu: 5.6, 7.0, 7.1, 7.2, 7.3, 7.4, 8.0, 8.1, 8.2

    Installation instructions of yum repositories

    RHEL based systems

    1. Download an installer script:
    wget https://repo.cloudlinux.com/php-els/install-php-els-repo.sh
    @@ -258,6 +258,6 @@
     
    1. Download OVAL stream:
    wget https://repo.cloudlinux.com/python-els/almalinux9-els-python-oval.xml
     
    1. Run scanning:
    oscap oval eval --results result.xml --report report.xml almalinux9-els-python-oval.xml
     
    - + diff --git a/extended-lifecycle-support/index.html b/extended-lifecycle-support/index.html index b1f14108..21dadce3 100644 --- a/extended-lifecycle-support/index.html +++ b/extended-lifecycle-support/index.html @@ -39,7 +39,7 @@ })(); Extended Lifecycle Support - +
    sidebar hamburger menu

    Extended Lifecycle Support

    TuxCare's Extended Lifecycle Support (ELS) service provides security updates, system enhancement patches, and selected bug fixes for older versions of a variety of Linux distributions, including CentOS 6, Oracle Linux 6, CloudLinux 6, CentOS 7, CentOS 8, Ubuntu 16.04, and Ubuntu 18.04. These distributions have either reached their end of standard support from vendors or have reached End of Life (EOL).

    Our ELS service is designed to provide solutions for organizations that are not yet ready to migrate to newer versions and that are seeking long-term stability for their out-of-date operating systems. The service coverage includes updates for the Linux kernel and a list of essential packages that are integral to server operations.

    Vulnerability coverage

    TuxCare employs the Common Vulnerability Scoring System (CVSS v3) to assess the severity of security vulnerabilities. Our severity rating system for patching vulnerabilities integrates both NVD scoring and vendor scoring (when available). When the vendor's score is lower than the NVD score, we give priority to the NVD score.

    TuxCare Extended Lifecycle Support, by default, provides security patches for High and Critical vulnerabilities (with a 7+ CVSS score). For vulnerabilities rated as Medium (4.0 to 6.9), and/or when patches are required for FIPS-certified deployments, custom coverage options are available. Specific details regarding these coverage options and their pricing can be obtained by contacting our sales team.

    Target response times

    Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.

    We aim to deliver security patches for critical and high-risk vulnerabilities (CVSS 7+) within 14 days from when the vulnerabilities become publicly disclosed. This rapid response time significantly reduces the window of opportunity for potential attackers and meets most security regulation requirements.

    Duration of support

    TuxCare provides Extended Lifecycle Support (ELS) for up to four years (except for CentOS 7 which is supported for up to five years). This support is offered after the Linux distribution has reached its End of Life (EOL) or no longer receives standard support.

    DistributionEOLELS
    CentOS 6November 2020November 2026
    CentOS 7June 2024June 2029
    CentOS 8January 2022January 2026
    Oracle Linux 6December 2020December 2024
    Ubuntu 16.04April 2021April 2025
    Ubuntu 18.04May 2023May 2028

    Supported packages

    TuxCare's Extended Lifecycle Support provides updates for a comprehensive list of packages integral to server operations (100+ packages), providing maximum security for your operating system. You can view the full list of supported packages for each operating system, as well as get detailed information on the patched Common Vulnerabilities and Exposures (CVEs), here. Support for additional packages can be provided on request.

    Errata advisories

    TuxCare Extended Lifecycle Support provides qualified security and selected bug-fix errata advisories across all architectures. They can help users track which CVEs are resolved and which bugs have been addressed. You can view the full list of released advisories here.

    OVAL patch definitions

    Leveraging the Open Vulnerability and Assessment Language (OVAL) patch definitions with OVAL-compatible tools, e.g. OpenSCAP, users can accurately check their systems for the presence of vulnerabilities.

    Connection to ELS repository

    To install the Extended Lifecycle Support repository on a server, you just need to download an installer script and run the script with a key. The installation script will register the server in the CLN with the key, add a PGP key to the server, and create the ELS repository.

    In order to use Extended Lifecycle Support, you will need to open TCP port 443 to the following destinations:

    Outbound Firewall Settings

    You need to open the TCP port 443 to the following destinations in order to use ELS for:

    • CentOS 6 ELS:
    cln.cloudlinux.com
    @@ -183,6 +183,6 @@
     # rm /etc/yum.repos.d/centos6-els.repo
     
    1. Remove the els-define package:
    # yum remove els-define
     
    - + diff --git a/index.html b/index.html index 581f164a..6ccd5121 100644 --- a/index.html +++ b/index.html @@ -39,10 +39,10 @@ })(); - + -
    document icon

    TuxCare

    services automate, simplify, and enhance Linux operations, giving organizations more flexibility in managing Linux distro choices and versions, significant maintenance cost reductions, and greatly enhanced security and compliance postures.

    document icon

    Enterprise Support for AlmaLinux

    provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, delivers an extension of an additional 4.5 years of security fixes for Critical and High-risk vulnerabilities and FIPS-compliant security patches for select AlmaLinux minor versions, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.

    document icon

    KernelCare Enterprise

    is a live kernel patching service that provides security patches and bugfixes for a range of popular Linux kernels that can be installed without rebooting the system.

    document icon

    KernelCare for IOT

    provides live security patching for ARM64-based embedded systems for enterprise IoT users and original equipment manufacturers.

    document icon

    ePortal

    TuxCare ePortal is the web management console dedicated to KernelCare Enterprise live patch management.

    document icon

    ePortal API

    is a complete API for everyday use.

    document icon

    Extended Lifecycle Support

    allows you to continue running your Linux server after the operating system’s end of life.

    document icon

    Extended Lifecycle Support for Languages

    provides security fixes for PHP and Python versions that have reached their end-of-life which allows to continue running Linux server vulnerability-free.

    document icon

    Subscription Management Portal

    The TuxCare subscription management portal is designed to easily manage your licenses of TuxCare products and services by means of a user-friendly interface.

    document icon

    Service Descriptions

    AlmaCare service description

    - +
    document icon

    TuxCare

    services automate, simplify, and enhance Linux operations, giving organizations more flexibility in managing Linux distro choices and versions, significant maintenance cost reductions, and greatly enhanced security and compliance postures.

    document icon

    Enterprise Support for AlmaLinux

    provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, delivers an extension of an additional 4.5 years of security fixes for Critical and High-risk vulnerabilities and FIPS-compliant security patches for select AlmaLinux minor versions, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.

    document icon

    KernelCare

    is a live kernel patching service that provides security patches and bugfixes for a range of popular Linux kernels that can be installed without rebooting the system.

    document icon

    KernelCare for IOT

    provides live security patching for ARM64-based embedded systems for enterprise IoT users and original equipment manufacturers.

    document icon

    ePortal

    TuxCare ePortal is the web management console dedicated to KernelCare Enterprise live patch management.

    document icon

    ePortal API

    is a complete API for everyday use.

    document icon

    Extended Lifecycle Support

    allows you to continue running your Linux server after the operating system’s end of life.

    document icon

    Extended Lifecycle Support for Languages

    provides security fixes for PHP and Python versions that have reached their end-of-life which allows to continue running Linux server vulnerability-free.

    document icon

    Subscription Management Portal

    The TuxCare subscription management portal is designed to easily manage your licenses of TuxCare products and services by means of a user-friendly interface.

    document icon

    Service Descriptions

    AlmaCare service description

    + diff --git a/jp/eportal-api/index.html b/jp/eportal-api/index.html index 7320389b..79af978b 100644 --- a/jp/eportal-api/index.html +++ b/jp/eportal-api/index.html @@ -39,7 +39,7 @@ })(); ePortal API - +
    sidebar hamburger menu

    ePortal API

    以下のコマンドで、API使用のための別のePortalアカウントを作成する必要がある場合があります。

    kc.eportal user -a api-user -p <password>
    @@ -239,6 +239,6 @@
     }
     

    例:

    mainフィードとtest-feedフィードで、libcareパッチセットU20200506_01を有効にします。

    curl -X POST -u admin 'https://eportal.corp.com/admin/api/patchsets/manage?patchset=U20200506_01&feed=main&feed=test-feed&product=user&action=enable'
     
    - + diff --git a/jp/eportal/index.html b/jp/eportal/index.html index 92e7a9fd..68b8663a 100644 --- a/jp/eportal/index.html +++ b/jp/eportal/index.html @@ -39,7 +39,7 @@ })(); ePortal - +
    sidebar hamburger menu

    ePortal

    TuxCare ePortalは、KernelCare Enterpriseライブ パッチ管理専用のWeb管理コンソールです。

    ePortalソフトウェアは、ファイアウォールの内側にある(つまり、インターネットにアクセスできない)サーバーを保護するのに役立ちます。また、オンプレミスにもクラウドにもインストールできます。

    Overview

    ePortalハードウェア要件

    ディスク

    • 最小100 GB、推奨200 GB(キャッシュモードの場合は、20 GB)
    • 100 IOPS以上のSSD

    SSDベースのストレージは、ePortalサーバーに必須の要件です。

    CPU

    その他の要件に関して、以下の構成と接続サーバー数をテストしました。

    • 以下の要件では、最大接続マシン数は10kです。

      • VM
      • 1 vCPU
      • 1 GB RAM
    • 以下の要件では、最大接続マシン数は75kです。

      • Core i5
      • 1 CPU
      • 4 GB RAM

    インストール

    ePortalは、CentOS 7/8、AlmaLinux 8、Ubuntu 20.04/22.04などのEL7/8ベースのディストリビューションの64bit版と互換性があります。

    RHELベースのディストリビューション

    ePortalをインストールして実行するには、NginxのWebサーバーが必要です。Nginxの公式リポジトリからインストールした安定版を使用することをお勧めします。

    cat > /etc/yum.repos.d/nginx.repo <<EOL
    @@ -358,6 +358,6 @@
     

    以下を実行します。

    kc.eportal sync-nginx-conf
     

    ストレージが初期化され、新しい場所からパッチが提供されるように、nginx構成ファイルに対応する変更が行われます。

    nginxePortalサービスを再起動して、変更を適用します。

    systemctl restart eportal nginx
     
    - + diff --git a/jp/extended-lifecycle-support-for-languages/index.html b/jp/extended-lifecycle-support-for-languages/index.html index 6405d7a2..d3f24b78 100644 --- a/jp/extended-lifecycle-support-for-languages/index.html +++ b/jp/extended-lifecycle-support-for-languages/index.html @@ -39,7 +39,7 @@ })(); 言語向け延長ライフサイクルサポート - +
    sidebar hamburger menu

    言語向け延長ライフサイクルサポート

    HP向け延長ライフサイクルサポート

    TuxCareは、PHP向け延長ライフサイクルサポート(ELS)によって、ライフサイクルが終了したPHPバージョンにセキュリティ修正を提供しています。これにより、脆弱性なしでLinuxサーバーを実行し続けることができます。

    対応OS

    TuxCareは、EOL日から4年間延長ライフサイクルサポートを提供します。

    OSバージョン
    CentOS、CloudLinux、OracleLinuxなど.6.x 64-bit、7.x 64-bit、8.x 64-bit
    AlmaLinux8.x 64-bit
    Ubuntu16.04 64-bit、18.04 64-bit、20.04 64-bit

    サポートバージョン

    CentOS、CloudLinux、AlmaLinux、OracleLinuxなど:5.1、5.2、5.3、5.4、5.5、5.6、7.0、7.1、7.2、7.3、7.4、8.0、8.1

    Ubuntu: 5.6、7.0、7.1、7.2、7.3、7.4、8.0、8.1

    yumリポジトリのインストール説明

    RHELベースのシステム

    1. インストールスクリプトをダウンロードします。
    wget https://repo.cloudlinux.com/php-els/install-php-els-repo.sh
    @@ -258,6 +258,6 @@
     
    1. OVALストリームをダウンロードします。
    wget https://repo.cloudlinux.com/python-els/almalinux9-els-python-oval.xml
     
    1. スキャンを実行します。
    oscap oval eval --results result.xml --report report.xml almalinux9-els-python-oval.xml
     
    - + diff --git a/jp/extended-lifecycle-support/index.html b/jp/extended-lifecycle-support/index.html index c7dd3b75..3467557a 100644 --- a/jp/extended-lifecycle-support/index.html +++ b/jp/extended-lifecycle-support/index.html @@ -39,7 +39,7 @@ })(); 延長ライフサイクルサポート - +
    sidebar hamburger menu

    延長ライフサイクルサポート

    TuxCareの延長ライフサイクルサポート(ELS)をご利用いただければ、オペレーティングシステムのライフサイクル終了後も引き続きLinuxサーバーを稼働できます。

    他のバージョンのディストリビューションのサポートをご希望の場合は、SLA対象のサポートに他のパッケージを追加してください。ご不明な点がございましたら、FAQ欄をお読みください。ご意見がございましたら、sales@tuxcare.comまでご連絡ください。

    サポート期間

    TuxCareは、EOL日から4年間延長ライフサイクルサポートを提供します。

    ディストリビューションEOLELS
    CentOS 62020年12月2024年12月
    Oracle Linux 62020年12月2024年12月
    Ubuntu 16.042021年4月2025年4月
    CentOS 8.42022年1月2026年1月
    CentOS 8.52022年1月2026年1月

    対応パッケージ

    TuxCareは、カーネル、Apache、PHP、Glibc、OpenSSL、OpenSSH、Pythonパッケージを継続的にアップデートします。

    アップデート情報の入手方法

    CVEダッシュボードを使用して、アップデートを受信するように登録できます。CVEダッシュボードでは、各CVEに対する当社の進捗状況、CVEに関する情報、CVEの既知の悪用事例の詳細などに関する詳しい情報を確認できます。

    ダッシュボードをより良く、より便利にするためのご意見がございましたら、sales@tuxcare.comまでご連絡ください。

    また、TuxCareブログを購読して、パッチされた脆弱性の詳細な分析や、TuxCareチームのメンバーが作成したその他のサイバーセキュリティコンテンツを読むこともできます。

    ELSへの移行

    TuxCareの延長ライフサイクルサポートサービスでは、移行の必要がありません。新しいリポジトリ ファイルを追加するインストールスクリプトを実行するだけです。再起動は必要ありません。

    ELSリポジトリのインストール方法

    サーバーに延長ライフサイクルサポートリポジトリをインストールするには、インストールスクリプトをダウンロードして、キーを使用してスクリプトを実行するだけです。インストールスクリプトを実行すると、そのキーと一緒にCLNにサーバーが登録され、サーバーにPGPキーが追加され、ELSリポジトリが作成されます。

    延長ライフサイクルサポートのご利用には、以下の宛先に対してTCP ポート443を開く必要があります。

    • cln.cloudlinux.com
    • repo.cloudlinux.com

    yumリポジトリのインストール手順

    CentOS 6 ELS

    1. インストールスクリプトをダウンロードします。
    wget https://repo.cloudlinux.com/centos6-els/install-centos6-els-repo.py
    @@ -164,6 +164,6 @@
     

    Ubuntu 16.04の場合

    OVALを使用するには、システムがELSとして定義されていることを確認してください。

    1. 以下のコマンドを実行します。
    $ apt list els-define | grep -o "installed"
     

    コマンドの結果がinstalledの場合、ご利用のシステムはELSとして定義されていますので、OVALを使用できます。

    1. それ以外の場合は、以下のコマンドを使用して、els-defineパッケージをインストールする必要があります。
    $ apt-get install els-define
     
    - + diff --git a/jp/index.html b/jp/index.html index 125cc4d9..da6ece52 100644 --- a/jp/index.html +++ b/jp/index.html @@ -39,10 +39,10 @@ })(); - +
    - + diff --git a/jp/linux-support-services/index.html b/jp/linux-support-services/index.html index 84e7ea86..970bf0e8 100644 --- a/jp/linux-support-services/index.html +++ b/jp/linux-support-services/index.html @@ -39,10 +39,10 @@ })(); Linuxサポートサービス - +
    sidebar hamburger menu

    Linuxサポートサービス

    TuxCareは、「エッセンシャル」ティア、「プレミアム」ティア、「製品OEMサポート」ティアでサブスクリプションパッケージを提供しています。AlmaLinux OS 8やその他の一般的なEnterprise Linuxディストリビューションでご利用いただけます。

    AlmaLinux OS 8向け「エッセンシャル」サポート

    生産インフラストラクチャでAlmaLinux OSをご利用の企業向けに基本的なサポートパッケージを提供しています。

    • Linuxカーネルとコアパッケージ向けの定期的なパッチとアップデート
    • CVSSと高CVEに14営業日でパッチを配信
    • 24時間年中無休のEメールサポート

    AlmaLinux OS8とその他のLinuxディストリビューション向け「プレミアム」サポート

    カスタムベースの、さまざまなLinuxディストリビューション向けパッチとアップデート、プレミアムSLA、年中無休のインシデントサポート、コンサルティングサービスへのアクセスの提供

    • AlmaLinux OS、CentOS、Oracle、Ubuntu、Debian、Suse、Linuxディストリビューションに含まれていないその他のオープンソースソフトウェアのサポート
    • 24時間365日のEメールによるインシデントサポート、ライブチャットと電話も利用可能
    • 他のLinuxディストリビューション向けの、ニーズに応じた、リポジトリ外のセキュリティ/バグ修正(作業範囲記述書の一部)

    AlmaLinux OS 8向け製品NodeOSサポート

    顧客に出荷中の製品のNodeOSとして、AlmaLinux 8をご利用のエンタープライズ企業向けに、カスタマイズされたLinuxサポートパッケージを提供しています。特定のパッケージセット、カスタムSLA、迅速なインシデント対応のための専任サポートチーム。

    • 各契約向けに特別に交渉されたパッチ配信とインシデント対応
    • CVSSと高CVEに10営業日でパッチを配信
    • 24時間365日対応のEメールサポート。重大インシデント用ライブチャットも利用可能
    • 指名された専任サポートマネージャー
    • 個々の作業範囲記述書(SOW)ベースでのコンサルティングサービスへのアクセス

    詳細については、TuxCare LinuxサポートサービスWebサイトを参照してください。

    - + diff --git a/jp/live-patching-services/index.html b/jp/live-patching-services/index.html index c0370de6..f2913c85 100644 --- a/jp/live-patching-services/index.html +++ b/jp/live-patching-services/index.html @@ -39,7 +39,7 @@ })(); ライブパッチ適用サービス - +
    sidebar hamburger menu

    ライブパッチ適用サービス

    ライブパッチ適用サービスの一環として、TuxCareは以下のサービスを提供します。

    • KernelCare Enterprise
    • LibCare
    • KernelCare for IOT
    • QEMUCare
    • DBCare(ベータ版で利用可能)

    KernelCare Enterprise

    概要

    KernelCare Enterpriseは、さまざまな人気のLinuxカーネルに、システムを再起動することなしにインストール可能なセキュリティパッチとバグ修正を提供するライブカーネルパッチ適用サービスです。

    メリット

    現在、システム管理者は、最新のカーネルアップデートを適用するのに、サーバーを再起動する必要があります。このアップデートは、セキュリティ上の問題を防ぐために必要です。ただし、再起動に伴うダウンタイムのせいで、このようなアップデートは遅れがちで、深夜の時間帯になりがちです。ダウンタイムを回避するために、サーバーの所有者が数ヶ月、数年もシステムをアップデートせずに、脆弱なシステムを実行し続けることはめずらしいことではありません。マネージドサービスプロバイダは、ダウンタイムを計画し、リソースを圧迫しながら短時間に数千台のサーバーのアップデートと再起動をする問題に直面しています。KernelCareは、再起動不要のライブカーネルパッチ適用サービスを提供することで、このアップデートと再起動の問題を解決します。

    主な機能

    • 再起動不要のLinuxカーネルパッチ適用とカスタムパッチ適用
    • オンプレミスでも、クラウドでも利用可能
    • 保護されたインフラストラクチャ用のプライベートパッチサーバー、ePortal
    • 追加設定不要で、パッチ管理・脆弱性評価ツールと統合

    試用ライセンスの取得

    KernelCare Enterpriseのご利用には、試用版アクティベーションキーが必要です。試用ライセンスは7日間有効です。

    アクティベーションキーの取得に問題がある場合や試用版の使用に関してご不明点がある場合は、sales@cloudlinux.com までご連絡ください。私たちがお助けします。

    インストール

    KernelCare Enterpriseは、64ビット版のAlmaLinux/CloudLinuxOS/CentOS/RHEL 6、7、8、Oracle Linux 6、7、Amazon Linux 1、2、Virtuozzo/PCS/OpenVZ 2.6.32、Debian 8、9、10、Proxmox VE 5 、6、Virt-SIG/Xen 4CentOS 6、7、Ubuntu 14.04、15.04、16.04、18.04、20.04カーネルと互換性があります。互換性のあるカーネル一覧は、https://patches.kernelcare.com/ からご覧いただけます。

    KernelCare Enterpriseをインストールするには、以下を実行します。

    curl -s -L https://kernelcare.com/installer | bash
    @@ -253,6 +253,6 @@
       --disabled   do not enable patchset after deploy
     

    例えば、

    kc.eportal qemu deploy --feed test /tmp/U20210818_01-qemu.tar.bz2
     

    このコマンドは、U20210818_01-qemuパッチセットをtestフィードにデプロイして、有効にします。

    DBCare

    DBCareのベータテストが利用可能です!こちらからお申し込みください。

    概要

    DBCareは、MariaDB向けのライブパッチ適用サービスです。 DBCareを使用すると、データベースのバックエンドがアップデートされている間もアプリケーションを実行し続けることができるので、データベースのパフォーマンス、信頼性、セキュリティ、コンプライアンスが強化されます。

    メリット

    データベースのアップデートは、バグの修正、システムパフォーマンスの向上、脆弱性数の削減のために行われますが、これらの活動には多大な影響と労力が必要になります。DBCareを使用すると、データベースのダウンタイム一切不要で、パッチがメモリに適用されます。

    ライブパッチ適用は、メンテナンスウィンドウまでの待機不要で、迅速にセキュリティアップデートを適用します。実は、DBCareを導入している組織は、データベースシステムのほとんどのメンテナンスウィンドウを完全に削除していて、それでいて、これまで以上に安全になっています。

    主な機能

    • 現時点で、MariaDBをサポート
    • 高可用性環境におけるデータベースのフェイルオーバーの回避
    • ダウンタイム中のワークロードの移行の回避

    DBCareの仕組み

    • データベースサーバーにエージェントがインストールされ、当社のリポジトリから直接パッチがインストールされます。
    • このエージェントは、すべてのTuxCare製品にわたって、パッチをダウンロードして適用するために使用されます。そのため、複数のTuxCare製品を使用する場合でも、実行中のエージェントは1つだけです。

    DBCareの詳細については、こちらのページにアクセスしてください

    - + diff --git a/jp/tuxcare-cln/index.html b/jp/tuxcare-cln/index.html index 6b1a073e..ddc817e4 100644 --- a/jp/tuxcare-cln/index.html +++ b/jp/tuxcare-cln/index.html @@ -39,10 +39,10 @@ })(); サブスクリプション管理ポータル - +
    sidebar hamburger menu

    サブスクリプション管理ポータル

    TuxCareサブスクリプション管理ポータル(CLN)は、TuxCareの製品とサービスのライセンスをユーザーフレンドリーなインターフェイスで簡単に管理できるように設計されています。

    概要

    CLNでは、以下のことができます。

    • ライセンスの追加、削除、編集
    • サーバーの追加、削除、編集
    • お支払い方法の選択とライセンスの購入
    • 関連するすべての費用の追跡

    新しいアカウントの作成

    初めてのユーザーの方は、https://portal.tuxcare.comにアクセスして、簡単な登録フォームに記入して、アカウントを作成してください。ログイン名とパスワードは、登録確認メールでご案内しています。

    ログイン

    https://portal.tuxcare.comにアクセスして、ログイン名とパスワードでログインします。

    Dashboard

    Dashboardは、Productsに迅速にアクセスするのに役立ちます。以下のタブがあります。

    Products

    Dashboardをクリックすると、My Productsページにリダイレクトされます。

    以下のアクションをご利用いただけます。

    • Manage licenses and billing cycle。リンクをクリックすると、当社セールスチームに連絡できます。ライセンス数や製品クォータを変更したり、請求サイクルを管理したりする際にご利用ください。
    • Manage activation keysExtended Support Services | Activation Keysページへのショートカット。

    Servers

    Dashboard → Serversの順にクリックして、All Serversページに移動します。このアカウントに属する全サーバーが、各サーバーにインストールされている製品とともにリスト表示されます。

    表には、アカウント内の全製品のアクティブ化されたサーバーがすべて含まれています。表には、以下の列が含まれています。

    • Server name — サーバーのホスト名
    • IP — サーバーのIPアドレス
    • Registered — サーバーがアクティブ化された日付。サーバーは、この情報をCLNに送信します
    • Group — サーバーグループ(サーバーグループの詳細については、CLNのドキュメントを参照してください)
    • Installed products — サーバー上でアクティブ化された製品のロゴの表示
    • Actions
      • アイテムを削除するには、 をクリックしてください

    サーバーの詳細を表示するには、サーバー名をクリックしてください。

    • Installed products — インストール済み製品の完全な名前
    • Last check-in — サーバーが正常にチェックインに応答した最後の日付

    以下のフィルターを利用できます。

    • ProductProductボタンをクリックすると、1つ以上の製品を選択できま
    • Registered dateRegistered dateをクリックすると、カレンダーが表示されます。選択した日付または期間でフィルタリングできます
    • Search — クエリを入力します。検索は、Server nameActivation keyエンティティで実行されます

    Live Patching Services

    Live Patching Servicesをクリックすると、Server License Typesページにリダイレクトされます。

    このページでは、サーバーライセンス数を確認できます。また、TuxCareセールスチームに連絡して、ライセンスと請求サイクルを管理できます。

    Extended Support Services

    Extended Support Servicesをクリックすると、Server License Typesページにリダイレクトされます。

    Server License Types

    このページでは、各製品のサーバーライセンス数を確認できます。

    Activation Keys

    Extended Support Services → Activation Keysの順にクリックすると、Activation Keysページにリダイレクトされます。

    表には、アカウント内の全製品のアクティベーションキーがすべて含まれています。表には、以下の列が含まれています。

    • Activation key — 製品のアクティベーションに使用される英数字の文字列です
    • License type — 使用されるサーバーライセンスの種類です。サーバーユーザーの制限を決定します
    • Note — このアクティベーションキーに追加した情報
    • Servers (used/limits) — このキーですでにアクティブ化されたサーバー数(used)と、この特定のキーで登録できるサーバーの総数(limits)
    • チェック — 1つ以上のアクティベーションキーにチェックを入れて、削除アクションを実行します((use ) を使用)

    注意

    デフォルトのアクティベーションキーは削除できません。

    以下のフィルターを利用できます。

    • Server limits — サーバー制限/無制限でフィルタリング
    • License type — ライセンスの種類でフィルタリング

    アクティベーションキーをクリックすると、そのキーのActivation Key Details(アクティベーションキー詳細)ページに移動します。

    製品別アクティベーションキー

    Extended Support ServicesProductの順にクリックすると、そのProduct Activation Keysページにリダイレクトされます。

    • 製品のアクティベーションキーがない場合は、Create activation keyをクリックしてキーを作成できます。
    • 製品のデフォルトのアクティベーションキーがある場合は、Generate new activation keyをクリックして、新しいキーを生成できます。新しいキーは自動的に作成され、表に追加されます。
    • Copyをクリックすると、アクティベーションキーをコピーできます。

    この表には、製品のすべてのアクティベーションキーが含まれています。表には、以下の列が含まれます。

    • Activation key — 製品のアクティベーションに使用される英数字の文字列です。
    • Note — このアクティベーションキーに追加した情報
    • Servers (used/limits) – このキーですでにアクティブ化されているサーバー数(used)と、この特定のキーで登録できるサーバーの総数(limits)

    キーを削除するには、キーを選択して をクリックしてください。

    以下のフィルターを利用できます。

    • Server limits — サーバー制限/無制限でフィルタリング
    • 検索

    キーをクリックして、このキーのActivation Key Detailsページに移動します。

    Activation Key Details

    このページでは、以下のことができます。

    • アクティベーションキーの完全な情報の閲覧
    • キーの編集。 Edit keyをクリックしてください
    • キーの削除。 をクリックしてください
    • サーバーリストの確認

    表には、そのキーで登録されたすべてのサーバーが含まれています。表には以下の列があります。

    • Server name — サーバーのホスト名
    • IP — サーバーのIPアドレス
    • Registered — サーバーがアクティブ化された日付。サーバーはこの情報をCLNに送信します
    • Last check-in — サーバーがチェックインに正常に応答した最後の日付

    以下のフィルターを利用できます。

    • Server limits — サーバー制限/無制限でフィルタリング
    • 検索欄

    サーバー

    Extended Support ServicesServersの順にクリックすると、Serversページにリダイレクトされます。

    表には、延長ライフサイクルサポート内のあらゆる製品に対してアクティブ化されたすべてのサーバーが含まれています。表には以下の列があります。

    • Server name — サーバーのホスト名
    • IP — サーバーのIPアドレス
    • Registered — サーバーがアクティブ化された日付。サーバーは、この情報をCLNに送信します
    • Installed products — サーバー上でアクティブ化された製品のロゴの表示
    • Actions
      • アイテムを削除するには、 をクリックしてください

    サーバーの詳細を表示するには、サーバー名をクリックしてください。

    • Installed products – インストール済み製品の完全な名前
    • Last check-in — サーバーが正常にチェックインに応答した最後の日付

    以下のフィルターを利用できます。

    • ProductProductボタンをクリックして、1つ以上の製品を選択します
    • Registered dateRegistered dateをクリックすると、カレンダーが表示されます。選択した日付または期間でフィルタリングできます
    • 検索 — クエリを入力します

    製品別サーバー

    Extended Support Services → ServersProductの順にクリックすると、その製品のProduct Serversページにリダイレクトされます。

    表には、延長ライフサイクルサポート内でその製品用にアクティブ化されたすべてのサーバーが含まれています。表には以下の列があります。

    • Server name — サーバーのホスト名
    • IP — サーバーのIPアドレス
    • Registered — サーバーがアクティブ化された日付。サーバーは、この情報をCLNに送信します
    • Installed products — サーバー上でアクティブ化された製品のロゴの表示
    • Actions
      • アイテムを削除するには、 をクリックしてください

    サーバーの詳細を表示するには、サーバー名をクリックしてください。

    • Installed products — インストール済み製品の完全な名前
    • Last check-in — サーバーが正常にチェックインに応答した最後の日付

    以下のフィルターを利用できます。

    • Registered dateRegistered dateをクリックすると、カレンダーが表示されます。選択した日付または期間でフィルタリングできます
    • 検索 — クエリを入力します

    Get servers listをクリックすると、サーバーリストをダウンロードできます。

    Billing

    Balance & Top up

    Billingをクリックすると、Balance & Top upページにリダイレクトされます。

    このページでは、以下のことがわかります。

    • 現在のプランと価格
    • 残高

    金額を入力してTop upをクリックすると、アカウントに入金できます。

    Payment methods

    BillingPayment methodsの順にクリックすると、Payment methodsページにリダイレクトされます。

    以下のタブを使用できます。

    • Billing information
    • Payment methods
    • Autopayment

    Billing information

    ここでは、請求先のEメールアドレスを変更できます。 変更を適用するには、Saveをクリックしてください。

    Payment methods

    ここでは、支払い方法を管理できます。変更を適用するには、Saveをクリックしてください。

    Autopayment

    ここでは、自動支払いの種類を変更できます。

    • Auto add funds(自動資金追加)
    • Auto repay(自動支払)
    • Do not add funds automatically(自動で資金を追加しない)

    変更を適用するには、Saveをクリックしてください。

    Invoices

    表には以下の列があります。

    • Invoice id — 一意の請求書番号
    • Created — 請求書の発行日
    • Type — 支払いの種類:請求書または支払いの受領
    • Pay period — 発行された請求書の対象期間の開始日
    • Total — 受領済み/支払う必要がある合計金額
    • Balance — 現在の残高
    • Actions — 以下のアクションを利用できます。
      • 請求書の閲覧 — — 請求書の詳細を閲覧するには、をクリックしてください。詳細は、新しいポップアップで開きます。
      • 請求書のダウンロード — — 請求書をダウンロードするには、をクリックしてください。

    請求書の詳細を表示するには、 をクリックしてください。

    Settings

    アカウントの詳細に移動するには、右上隅にある Userアイコン → Settingsをクリックします。Account detailsページにリダイレクトされます。

    Account details

    以下のタブを使用できます。

    • Personal information(個人情報)
    • Company information(企業情報)
    • Billing contact information(請求連絡先情報)

    P個人情報

    *の付いた入力欄はすべて必須です。

    • API secret key – この鍵をCLN APIで使用します
    • IM Upgrade URL – Imunify製品をアップグレードするためのURL(URLがデフォルトのものではない場合)

    パスワードを変更するには、Change passwordをクリックします。

    2要素認証を有効にするには、スイッチをOnにします。

    変更を適用するには、Saveをクリックしてください。

    企業情報

    変更を適用するには、Saveをクリックしてください。

    請求連絡先

    変更を適用するには、Saveをクリックしてください。

    Account sublogins

    Eメールアドレスの形式で、ご利用のアカウントに追加のログイン名を作成できます。サブログイン名は、以下に一覧表示されている、さまざまな権限がある任意の役割を持つことができます。マスターサーバー管理者アカウントには、すべての権限があり、アカウントサブログイン名を作成できます。

    変更を適用するには、Saveをクリックしてください。

    #役割

    Full Access/Admin

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング
    • サーバーの追加/削除
    • アクティベーションキーの作成
    • ライセンスの注文/削除
    • 請求書の閲覧
    • 請求情報の閲覧
    • クレジットカード情報の編集
    • アカウント情報の編集
    • 請求情報の編集/再販業者用入金
    • 料金の閲覧
    • アカウント情報の表示
    • パスワードの変更

    Billing

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • 請求書の閲覧
    • 請求情報の閲覧
    • クレジットカード情報の編集
    • アカウント情報の編集
    • 請求情報の編集/再販業者用入金
    • 料金の閲覧
    • アカウント情報の閲覧

    Server and License Management

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング
    • サーバーの追加/削除
    • アクティベーションキーの作成
    • ライセンスの注文/削除

    Server Management Only

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング
    • サーバーの追加/削除
    • アクティベーションキーの作成

    Read Only — Billing

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング
    • 請求書の閲覧
    • 請求情報の閲覧

    Read Only — Server Management

    • 製品の閲覧
    • サーバー/ライセンス情報の閲覧
    • レポーティング

    Reports

    ご希望のEメールアドレスにアカウントのレポートを受信するように設定できます。

    新しいレポートの設定を追加するには、Add configをクリックしてください。

    - + diff --git a/jp/tuxcare/index.html b/jp/tuxcare/index.html index eec9809b..d916e94a 100644 --- a/jp/tuxcare/index.html +++ b/jp/tuxcare/index.html @@ -39,10 +39,10 @@ })(); TuxCare - +
    sidebar hamburger menu

    TuxCare

    TuxCareサービスは、Linuxの運用を自動化し、簡略化し、改善します。TuxCareサービスによって、組織は、Linuxディストリビューションの選択とバージョンをより柔軟に管理でき、メンテナンス費用を大幅に削減でき、セキュリティとコンプライアンス体制を大幅に強化できます。

    TuxCareは、CloudLinuxのKernelCareブランドと延長ライフサイクルサポートブランドが拡張されたものです。組織がEnterprise Linuxシステムのサポート、メンテナンス、セキュリティを管理するのに役立ちます。

    TuxCareライブパッチ適用サービスにより、Linuxカーネル、ライブラリ、データベース、仮想化プラットフォーム、IoT端末に、ダウンタイムなしで自動的にセキュリティパッチが適用されます。

    TuxCare延長ライフサイクルサポートサービスを使用すると、ライフサイクルが終了したディストリビューションを実行する一般的なリスクから保護された状態を維持しながら、ご自身の都合に合わせて最新バージョンのLinuxに移行できます。

    Linuxサポートサービスは、特定のベンダーに依存しないテクノロジーパートナーシップの特典がある、エンタープライズクラスのLinuxサポートを幅広く提供しています。手頃な価格で、柔軟に、現在ご利用のバージョンのLinuxシステムを継続的に更新して安全に保つことができるサービスです。

    - + diff --git a/kernelcare-for-iot/index.html b/kernelcare-for-iot/index.html index 62129a6d..54ab5917 100644 --- a/kernelcare-for-iot/index.html +++ b/kernelcare-for-iot/index.html @@ -39,10 +39,10 @@ })(); KernelCare for IOT - +
    sidebar hamburger menu

    KernelCare for IOT

    Provides live security patching for ARM64-based embedded systems for enterprise IoT users and original equipment manufacturers.

    For the list of supported distributions and chipsets, visit this page.

    How KernelCare IoT works

    • The KernelCare team is constantly monitoring security mailing lists to check for vulnerabilities. As soon as one is found, the team prepares a patch and then sends it to distribution servers.
    • An agent will run a process on your device, checking with the distribution servers every 4 hours until it finds a new patch and then safely apply it to the running kernel without needing to stop it.
    • A special kernel module is used to apply the patches. It first loads the update into the kernel address space, then it places relocations on the original code/data to make sure the code block doesn’t execute during the update. Once finished, it will safely switch the execution path from the original to the updated code and then make sure the old code will never run again.
    • KernelCare does all of this instantly, automatically, and without service interruptions.

    For more information about KernelCare for IOT, visit this page.

    - + diff --git a/live-patching-services/index.html b/live-patching-services/index.html index 1cb13726..e47fdfca 100644 --- a/live-patching-services/index.html +++ b/live-patching-services/index.html @@ -39,7 +39,7 @@ })(); KernelCare Enterprise - +
    sidebar hamburger menu

    KernelCare Enterprise

    KernelCare Enterprise live patching enhances customers' vulnerability patching programs by providing live patches to the Linux kernel and, optionally (with an add-on), to critical userspace components. The systems are patched according to your patch deployment policy, allowing you to customize your patch management to align with the needs of your unique environment, whether online or air-gapped.

    KernelCare Enterprise can be extended with the following add-ons:

    • LibCare - for live patching of critical userspace components.
    • QEMUCare - for live patching of QEMU-based virtualization systems.

    The sections below describe KernelCare and LibCare live patching in more detail.

    KernelCare

    Introduction

    KernelCare Enterprise is a live kernel patching product that provides security patches for a range of popular Linux kernels that can be installed without rebooting the system. It supports kernels of Enterprise Linux operating systems, i.e., RHEL, Oracle, Rocky, AlmaLinux, and CentOS, as well as Ubuntu and Debian. Each individual kernel receives new live patches for as long as the kernel vendor releases security updates for the series.

    The KernelCare Enterprise offering consists of the client application, the live patching service hosted by TuxCare, and an optional on-prem management server. The client application runs on machines, periodically checks for available patches, downloads, verifies, and installs them.

    At the same time, complex enterprise environments often follow policies that require a gradual roll-out of updates to reduce risk or have high-security isolated environments that need to be updated. ePortal is an on-prem management server allowing organizations to define their rollout policy and remain in full control of which machines will get updated and when.

    The live patching process

    When a new vulnerability is detected in the Linux kernel, TuxCare creates a live patch addressing the vulnerability. After the live patch is made available, it is tested in TuxCare’s internal server farm and then promoted gradually to a series of testing tiers, ensuring that any released live patch has been tested sufficient time on live systems. Once the patch is released, systems that enable the KernelCare Enterprise client will receive the patch over an authenticated channel and apply it.

    ePortal

    Many organizations have a gradual patch roll-out policy or maintain a strict policy on which systems get upgraded and when. With ePortal, an on-prem management server, you can use the patch roll-out policy of your choice while automatically deploying patches in your air-gapped environment - all with a simple user interface.

    Live patching testing tiers

    KernelCare Enterprise delivers live patches to “tiers”. A tier is a target audience for the delivery of a patch. Your tier depends on whether your systems receive updates directly from the TuxCare Portal repository or use ePortal as a proxy to gradually roll out patches according to your patching policy. The differences are outlined below.

    TIERDESCRIPTION
    InternalFor internal TuxCare use. Updates are first tested and then applied across TuxCare infrastructure to decrease the odds of a faulty patch making it to customer machines.
    TuxCare PortalPatches are delivered to these machines next.
    ePortal CustomersPatches become available in the ePortal last. However, ePortal customers can customize the updates to receive them as soon as they become available in the test feed.

    Our kernel team closely monitors the patch health internally before promoting it to the TuxCare Portal and further monitoring is done before promoting the patch to ePortal servers.

    Kernel patching lifetime

    KernelCare Enterprise offers live patches for each individual kernel for as long as the kernel vendor releases security updates for the series. This allows you to enjoy continuous protection for your existing kernels without being bound by the kernel vendor’s release schedule when planning your maintenance windows.

    Vulnerability coverage

    During the lifecycle of an operating system, TuxCare makes commercially reasonable efforts to provide live patches for all vulnerability fixes provided by the vendor, irrespective of their vulnerability rating. We may also address vulnerabilities that haven't been addressed by the OS vendor if they gained significant attention and were being actively discussed, exploited (according to the CISA list), or researched by the cybersecurity community.

    Target response rates

    TuxCare is committed to delivering timely security updates. We aim to deliver live patches for all CVEs patched by the vendor within 10 days from when the vulnerability is publicly disclosed. This rapid response time significantly reduces the opportunity window for a potential attack and meets most security regulation requirements. However, a live patch for a vulnerability can be significantly more complex than an ordinary kernel patch, and due to the additional complexity, can take more time to develop and test.

    Supported architectures

    KernelCare is available for both x86-64 (Intel and AMD) and ARM64 architectures.

    Supported Linux distros and kernels

    Customers can find detailed information about supported kernels, Linux distributions, specific vulnerabilities, and live patches provided by KernelCare and LibCare for each of the supported Linux distributions at https://patches.kernelcare.com/.

    End-of-life (EOL) policy

    TuxCare will stop supporting live patching for specific distros if there are no security advisories provided by the distro's vendor for the last 365 days. In this case, all customers running the affected distributions are notified about the upcoming EOL. Existing live patches for EOL distributions are available for the next 6 years after the EOL date.

    Technical Support

    All TuxCare live patching products include technical support provided according to the TuxCare support policy. It delivers 24/7/365 access to our engineers through the TuxCare Support Portal and to our online knowledge base.

    Getting a trial license

    You will need a trial activation key to be able to use the KernelCare Enterprise. The trial license subscription will work for 7 days.

    If you have any issues getting an activation key or if you have any questions regarding using your trial subscription, contact sales@cloudlinux.com and we will help.

    Installation

    KernelCare Enterprise is compatible with 64-bit versions of CloudLinuxOS/CentOS 6, 7 and 8, AlmaLinux/RHEL 6, 7, 8 and 9, Oracle Linux 6 and 7, Amazon Linux 1 and 2, Virtuozzo/PCS/OpenVZ 2.6.32, Debian 8, 9 and 10, Proxmox VE 5 and 6, Virt-SIG/Xen4CentOS 6 and 7, Ubuntu 14.04, 15.04, 16.04, 18.04 and 20.04 kernels. The list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

    To install KernelCare Enterprise, run the following as root:

    # curl -s -L https://kernelcare.com/installer | bash
    @@ -301,7 +301,84 @@
     

    This command will deploy and enable the U20210818_01-qemu patchset in to the test feed.

    Vulnerability Scanner Integration with KernelCare

    This document is made for developers of vulnerability scanners to correctly report live patched vulnerabilities as delivered by KernelCare. There are several approaches that vendors might take to identify vulnerabilities patched by KernelCare correctly.

    Easiest: Identifying correctly the effective kernel

    KernelCare provides "effective kernel" information in

    /proc/kcare/effective_version
     

    Security scanners can check if the file is present, and if it is, use it instead of /proc/version to identify the kernel. This will provide an effective kernel version from a security standpoint.

    Alternatively, the command /usr/bin/kcarectl --uname can be run instead of the uname command to detect effective kernel version

    Comprehensive: Using OVAL data

    KernelCare comes with OVAL data that provides instructions to the scanner to identify the vulnerabilities addressed by the installed live patches. OVAL data are available for the operating systems supported by KernelCare Enterprise, including AlmaLinux, Red Hat Enterprise Linux, Oracle Linux, CentOS, Debian, and Ubuntu.

    The OVAL data cover all KernelCare enterprise products and add-ons, including LibCare and QEMUCare.

    The OVAL data for KernelCare live patching are available at patches.kernelcare.com/oval.

    Comprehensive & local: Using the local CVELIST file on each scanned node

    KernelCare provides two files listing the vulnerabilities the currently installed live patches address. These files contain a list of CVEs separated by a new line.

    The list of vulnerabilities addressed by Kernel live patches is available at:

    /proc/kcare/cvelist
     

    The list of vulnerabilities addressed by system live patching (LibCare, QEMUCare, etc.) is available at:

    /var/cache/kcare/libcare_cvelist
    -
    - +

    KernelCare SimplePatch

    Introduction

    KernelCare SimplePatch is a kernel live patching product that provides security patches for a range of popular Linux kernels that can be installed without rebooting the system. It supports kernels of Enterprise Linux operating systems, i.e., RHEL, Oracle, Rocky, AlmaLinux, and CentOS, as well as Ubuntu and Debian. Each individual kernel receives new live patches for as long as the kernel vendor releases security updates for the series.

    The KernelCare SimplePatch offering consists of the client application, and the live patching service hosted by TuxCare. The client application runs on machines, periodically checks for available patches, downloads, verifies, and installs them.

    The live patching process

    When a new vulnerability is detected in the Linux kernel, TuxCare creates a live patch addressing the vulnerability. After the live patch is made available, it is tested in TuxCare’s internal server farm and then promoted gradually to a series of testing tiers, ensuring that any released live patch has been tested sufficient time on live systems. Once the patch is released, systems that enable the KernelCare SimplePatch client will receive the patch over an authenticated channel and apply it.

    Kernel patching lifetime

    KernelCare SimplePatch offers live patches for each individual kernel for as long as the kernel vendor releases security updates for the series. This allows you to enjoy continuous protection for your existing kernels without being bound by the kernel vendor’s release schedule when planning your maintenance windows.

    Vulnerability coverage

    During the lifecycle of an operating system, TuxCare makes commercially reasonable efforts to provide live patches for all vulnerability fixes provided by the vendor, irrespective of their vulnerability rating. We may also address vulnerabilities that haven't been addressed by the OS vendor if they gained significant attention and were being actively discussed, exploited (according to the CISA list), or researched by the cybersecurity community.

    Target response rates

    TuxCare is committed to delivering timely security updates. We aim to deliver live patches for all CVEs patched by the vendor within 10 days from when the vulnerability is publicly disclosed. This rapid response time significantly reduces the opportunity window for a potential attack and meets most security regulation requirements. However, a live patch for a vulnerability can be significantly more complex than an ordinary kernel patch, and due to the additional complexity, can take more time to develop and test.

    Supported architectures

    KernelCare is available for both x86-64 (Intel and AMD) and ARM64 architectures.

    Supported Linux distros and kernels

    Customers can find detailed information about supported kernels, Linux distributions, specific vulnerabilities, and live patches provided by KernelCare SimplePatch for each of the supported Linux distributions at https://patches.kernelcare.com/.

    End-of-life (EOL) policy

    TuxCare will stop supporting live patching for specific distros if there are no security advisories provided by the distro's vendor for the last 365 days. In this case, all customers running the affected distributions are notified about the upcoming EOL. Existing live patches for EOL distributions are available for the next 6 years after the EOL date.

    Technical Support

    All TuxCare live patching products include technical support provided according to the TuxCare support policy. It delivers 24/7/365 access to our engineers through the TuxCare Support Portal and to our online knowledge base.

    Installation

    KernelCare SimplePatch is compatible with 64-bit versions of CloudLinuxOS/CentOS 6, 7 and 8, AlmaLinux/RHEL 6, 7, 8 and 9, Oracle Linux 6 and 7, Amazon Linux 1 and 2, Virtuozzo/PCS/OpenVZ 2.6.32, Debian 8, 9 and 10, 11, 12, Proxmox VE 5 and 6, Virt-SIG/Xen4CentOS 6 and 7, Ubuntu 14.04, 15.04, 16.04, 18.04 and 20.04 kernels. The list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

    To install KernelCare SimplePatch, run the following as root:

    curl -s -L https://kernelcare.com/installer | bash 
    +

    or:

    wget -qq -O - https://kernelcare.com/installer | bash
    +

    If you are using an IP-based license, nothing else is required to be done. If you are using a key-based license, run:

    kcarectl --register <KEY>
    +

    Where KEY is the registration key code string provided when you sign up for purchase or trial of the product. If you are experiencing a Key limit reached error after the end of the trial period, you should first unregister the server by running:

    kcarectl --unregister
    +

    To check if patches applied, run:

    kcarectl --info
    +

    The software will automatically check for new patches every 4 hours. If you would like to run update manually:

    kcarectl --update
    +

    To check current kernel compatibility with KernelCare SimplePatch, use the following script by running:

    curl -s -L https://kernelcare.com/checker | python
    +

    or:

    wget -qq -O - https://kernelcare.com/checker | python
    +

    Update

    To update the agent package to the latest version use:

    • For rpm-based distributions (CentOS, RedHat, etc):
    yum install -y kernelcare
    +

    or:

    dnf install -y kernelcare
    +
    • For apt-based distributions (Debian, Ubuntu, etc):
    apt-get install kernelcare
    +

    or:

    apt install kernelcare
    +

    Uninstalling

    To uninstall KernelCare SimplePatch, run the following as root: *For CloudLinux, CentOS, RHEL, Virtuozzo, OpenVZ:

    yum remove kernelcare
    +

    or:

    dnf remove kernelcare
    +
    • For Ubuntu, Debian, Proxmox VE:
    apt-get remove kernelcare 
    +

    or:

    apt purge kernelcare
    +

    This will also unlink the system from its activation key (provided there is network connectivity to the CLN Portal). However, you'll need to remove the license from the CLN Portal manually if you don't plan to use the service anymore.

    Switching from Ksplice

    To switch from Ksplice to KernelCare SimplePatch, use the following script that uninstalls Ksplice and installs KernelCare SimplePatch instead.

    It will automatically detect and abort if the system is not 64-bit (as KernelCare SimplePatch doesn't support it).

    It will also detect when the Ksplice module cannot be uninstalled and retries multiple times.

    Download the script here: https://patches.kernelcare.com/ksplice2kcare

    Run the command:

    bash ksplice2kcare <KERNELCARE_KEY> 
    +

    The key can be created/retrieved in KernelCare SimplePatch Keys section of CLN.

    If you want to use IP based licenses, run:

    bash ksplice2kcare IP 
    +

    You have to add an IP license for that server, and it is just the two letters IP, not your actual IP address.

    By default the script will attempt 3 times to uninstall Ksplice, waiting 60 seconds in between. You can run it using nohup if you don't want to wait.

    You can change that by editing the script and changing RETRY and SLEEP values.

    The script will exit with exit code 0 and message Done on success. Otherwise, it will produce exit code -1.

    The complete log file can be found at /var/log/ksplice2kcare.log

    Canonical Livepatch

    KernelCare SimplePatch is not compatible with Canonical Livepatch and should not be used on the same system.

    Basic management

    To disable automatic updates, edit the file /etc/sysconfig/kcare/kcare.conf

    AUTO_UPDATE=False
    +

    To check the updated 'effective' version, run:

    kcarectl --uname
    +

    We provide a convenience script /usr/bin/kcare-uname that has same syntax as uname.

    To see applied patches, run:

    kcarectl --patch-info 
    +

    Command line tools

    • /usr/bin/kcarectl - Manage KernelCare SimplePatch patches for your kernel.
    • /usr/bin/kcare-uname - Print certain system information.

    kcarectl

    OptionDescription
    -i,--infoDisplays information about patches installed by KernelCare SimplePatch.
    -u, --updatedDownloads the latest patches and applies them to current kernel.
    --smart-update [since 1.6]The same as --update but is used to decide where to get pathches
    --unloadUnloads pathces.
    --auto-updateChecks if update is needed and performs an update
    --patch-infoLists applied patches.
    --statusReturns a status of an update. Refer to the exit code:
    - host is updated to the latests patch level
    - there are no applied patches
    - there are new but not applied patches
    - kernel is unsupported
    --force [since 2.3]When used with update, forces applying the patch even if unable to freeze some threads.
    --unamePrints safe kernel version.
    --license-infoOutputs the current license info.
    --register KEYRegisters using KernelCare SimplePatch Key.
    --register-autoretry [since 2.5]If the registration fails, retries the registration indefinitely.
    --unregisterUnregisters from KernelCare SimplePatch for the Key-based servers.
    --testTries the test builds instead of the production builds (deprecated, use --prefix=test instead).
    --prefixPatches thesource prefix. Used to test different builds by downloading builds from a different location based on prefix (v2.2+).
    --versionPrints the KernelCare SimplePatch version.
    --import-key PATHImports the gpg key.
    --set-monitoring-keySets the monitoring key for IP-based licenses. 16 to 32 characters, alphanumeric only [version 2.1+]
    --freezer [since 2.3]none: don't freeze any threads; full: freeze all threads; smart: freezes only threads that need to be frozen for patching. If option is not selected, best freezer method is chosen automatically.
    --check [since 2.4]Checks if new patchset is available, without updating. Exit code 0 means there is a new kernel. 1 when there is no new kernel.
    --doctor [since 2.6]Sends a report to the TuxCare support staff for diagnostics.
    --set-patch-type extraTo enable extra patches.
    --set-patch-type freeTo enable free patches.
    --tag COMMANDAdds an extra field for a server. COMMAND is a user-defined parameter.

    kcare-uname

    Print certain system information. Default is -s.

    ArgumentDescription
    -a, --allprint all information in the following order, except omit and if unknown
    -s, --kernel-nameprint the kernel name
    -n, --nodenameprint the network node hostname
    -r, --kernel-releaseprint the kernel release
    -v, --kernel-versionprint the kernel version
    -m, --machineprint the machine hardware name
    -p, --processorprint the processor type
    -i, --hardware-platformprint the hardware platform
    -o, --operating-systemprint the operating system
    --helpdisplay this help and exit
    --versionoutput the version information and exit

    kernelcare doctor

    This tool collects essential information about the KernelCare SimplePatch environment and sends it to the support team.

    kcarectl --doctor  
    +
    Generating report... 
    +Uploading... 
    +Key: FRWf74Zw11111111.83991334-1111-1111-1111-681ddd653e5f 
    +Please, provide above mentioned key to KernelCare Support Team 
    +

    The command generates a report and prints out the ID which could be linked to a support ticket.

    Note

    If there was a connection problem during uploading the report, the report will be stored locally as /root/cl-report. This file should be sent to the support team manually.

    Config options

    The kcarectl behavior can be configured using /etc/sysconfig/kcare/kcare.conf.

    ParameterDescription
    AUTO_UPDATE=YES/NOYESNO
    PATCH_METHOD=normal/nofreeze/smartSmart
    PATCH_SERVERServer to use to download patches.
    REGISTRATION_URLLicensing server.
    PREFIX=prefixPatch source prefix, used to test different builds, by downloading builds from a different location, based on prefix [kernelcare 2.2+]
    UPDATE_POLICY=REMOTE/LOCAL/LOCAL_FIRSTDepending on the policy, on server startup, use:
    - (default) patches from patch server
    - only locally cached patches, if none cached (caching is done automatically) - do nothing.
    - see if locally cached patches exist, and load them. If not, try getting them from remote server.
    IGNORE_UNKNOWN_KERNEL=True/FalseDon't provide notification if unknown kernel on auto-update. [kernelcare 2.5+]
    LOAD_KCARE_SYSCTLControls if will be loaded on patchset load. True by default. [kernelcare 2.7+]
    [AUTO_]UPDATE_DELAY=<num>h/<num>dUse patchsets not newer than specified time. [kernelcare 2.82+]
    REPORT_FQDN=True/FalseForce using Fully Qualified Domain as a hostname. False by default.
    FORCE_GID=NUse this group ID for symlink protection patch. By default, it's 48 (default Apache user GID) or 99 (user)

    Disabling some patches

    Some patches might affect the functioning of the system, and we created a way to disable them.

    This is done via the sysctl command.

    When new patchsets load, KernelCare SimplePatch sysctl options get reset. To prevent that we added a file:

    /etc/sysconfig/kcare/sysctl.conf 
    +

    Options in this file will be loaded automatically on new patchset load.

    To disable loading these options, specify LOAD_KCARE_SYSCTL=0 in /etc/sysconfig/kcare/kcare.conf To disable the patch, set the corresponding kcare option to 1.

    Patches that can be disabled:

    Patchsysctl
    CVE-2015-5157kcare_modify_ldt

    Extra patchset

    Note:

    KernelCare SimplePatch 2.12-5 or higher

    KernelCare SimplePatch Extra patchset includes all the security fixes from KernelCare SimplePatch for AlmaLinux, CentOS 6, CentOS 7, and CentOS 8 as well as symlink protection and the IPSet bugfix for CentOS 6.

    To enable extra patches and apply updates, run:

    kcarectl --set-patch-type extra --update
    +

    To enable extra patches without an update, run:

    kcarectl --set-patch-type extra
    +

    The 'extra' patch will be applied on the next automatic update. To see details, run:

    kcarectl --patch-info 
    +

    You should see something similar to:

    OS: centos6 
    +kernel: kernel-2.6.32-696.6.3.el6 
    +time: 2017-07-31 22:46:22 
    +uname: 2.6.32-696.6.3.el6 
    +kpatch-name: 2.6.32
    +/symlink-protection.patch 
    +kpatch-description: symlink protection // If you see this patch, it mean that you can enable symlink protection. 
    +kpatch-kernel: kernel-2.6.32-279.2.1.el6 
    +kpatch-cve: N/A 
    +kpatch-cvss: N/A 
    +kpatch-cve-url: N/A 
    +kpatch-patch-url: https://gerrit.cloudlinux.com/#/c/16508/ 
    +kpatch-name: 2.6.32/symlink-protection.kpatch-1.patch 
    +kpatch-description: symlink protection (kpatch adaptation) 
    +kpatch-kernel: kernel-2.6.32-279.2.1.el6 
    +kpatch-cve: N/A 
    +kpatch-cvss: N/A 
    +kpatch-cve-url: N/A 
    +kpatch-patch-url: https://gerrit.cloudlinux.com/#/c/16508/ 
    +kpatch-name: 2.6.32/ipset-fix-list-shrinking.patch 
    +kpatch-description: fix ipset list shrinking for no reason 
    +kpatch-kernel: N/A 
    +kpatch-cve: N/A 
    +kpatch-cvss: N/A 
    +kpatch-cve-url: N/A 
    +kpatch-patch-url: https://bugs.centos.org/view.php?id=13499 
    +

    To enable Symlink Owner Match Protection, add fs.enforce_symlinksifowner=1 to /etc/sysconfig/kcare/sysctl.conf and run:

    sysctl -p /etc/sysconfig/kcare/sysctl.conf
    +

    UEFI Secure Boot Support

    Note:

    This feature is an early stage of adoption. Not all the distribution will be able to support it.

    This new functionality lets KernelCare SimplePatch work on systems with secure boot set up in their UEFI firmware. We are going to add a public certificate to the MOK (Machine Owner Keys) database that KernelCare SimplePatch will use to sign modules.

    The latest KernelCare SimplePatch package contains a public certificate and will be available in the /usr/libexec/kcare/kernelcare_pub.der. For older versions, it could be downloaded from the https://patches.kernelcare.com/kernelcare_pub.der to that location. For example:

    curl -o /usr/libexec/kcare/kernelcare_pub.der https://patches.kernelcare.com/kernelcare_pub.der 
    +

    Use mokutil as root to add this new MOK to the UEFI firmware.

    mokutil --import /usr/libexec/kcare/kernelcare_pub.der 
    +input password: 
    +input password again:
    +

    It doesn't have a MOK password, and mokutil will ask you to create one. The password is temporary and will be used on the next boot.

    1. Reboot your machine to enter the MOK manager EFI utility.

    2. First, go down to 'Enroll Mok':

    3. Then the firmware gives you the option of viewing the new MOK or continuing. Let's continue.

    4. It then asks you to confirm the enrollment.

    5. Then you will need to enter the password you used when running mokutil --import.

    6. Finally, the firmware will ask you to reboot.

    7. Verify the key has been loaded by finding it in the output of the following command:

    mokutil --list-enrolled | egrep -i 'SHA1|Issuer'
    +

    In some cases the enrolled key will not be shown but could be verified by the following command:

    dmesg | grep -i 'cloud linux' [   0.722149] EFI: Loaded cert 'Cloud Linux Software, Inc: Kernel Module Signing Key: 12ff0613c0f80cfba3b2f8eba71ebc27c5a76170' linked to '.system_keyring'
    +

    That's it. Now you should be able to apply patches as usual.

    To get more information about signing kernel modules for secure boot, see.

    Live patching and FIPS compliance

    The FIPS-140 certification of a Linux kernel validates that the cryptography contained within a Linux kernel complies with the US government FIPS-140 data protection standard. Meaning that algorithms like AES, the random generator and other cryptographic aspects of the kernel are implemented as the standard defines.

    At the same time the certification is a lengthy process --a typical validation can take almost a year-- and for that reason only some of each vendor's kernels are validated. That is because vendors release new kernels with security and feature updates on a regular cadence some as often as weekly, irrespective of their FIPS validation status. This means users of FIPS validated kernels need to choose between: (a) strict compliance by staying on the same kernel without updating until the next validated kernel is available and (b) reducing their security risk by installing new kernels with security updates even if they are not validated. The same story applies to the vendor's live patching solutions.

    With KernelCare SimplePatch it is possible to live patch FIPS-140 validated Linux kernels, for example at the Red Hat Enterprise Linux operating system. The live patches applied to these kernels, in this example, consist of the same RHEL kernel patches but are limited to the ones addressing security vulnerabilities. That way, a live patched kernel contains the same security fixes as a vendor update without any feature or bug-fix updates, e.g. updates that may change the cryptographic subsystem for performance or other non-security related reasons.

    In this way, security-conscious users of FIPS-validated Linux kernels that today apply their vendor's security patches can rely on KernelCare SimplePatch live patching the same way they do with their vendor's security updates. Furthermore, KernelCare live patching applies the minimum possible updates to the validated kernel by explicitly excluding any non-security updates.

    Firewall and Proxy Settings

    Patching servers through firewall

    As long as your servers have access to the Internet, even behind NAT - you will be able to use KernelCare SimplePatch patch server without any problems.

    Generally, KernelCare SimplePatch requires connection to only two servers to work:

    cln.cloudlinux.com patches.kernelcare.com 
    +

    An additional address is used for KernelCare SimplePatch agent installation/update:

    repo.cloudlinux.com 
    +

    Patching servers through proxy

    If your servers don't have direct Internet access but can gain access to the Internet using proxy, the configuration is not that different. KernelCare SimplePatch can pick up standard environment variables for a proxy.

    Make sure you have environment settings for proxy setup, and everything else will be the same as if servers were directly connected to the Internet:

    export http_proxy=http://proxy.domain.com:port # export https_proxy=http://proxy.domain.com:port 
    +

    NoteSettings defined by export are case-insensitive, so the example above could be as follows for certain software:

    export HTTP_PROXY=http://proxy.domain.com:port # export HTTPS_PROXY=http://proxy.domain.com:port 
    +

    You can define these settings in the KernelCare SimplePatch config /etc/sysconfig/kcare/kcare.conf, for example:

    cat /etc/sysconfig/kcare/kcare.conf AUTO_UPDATE=True HTTPS_PROXY=http://myproxy.com:59794 
    +

    If you define these settings in the config, you don't need to export them each kcarectl launch and don't need to edit cron jobs.

    All kcarectl launches will be aware of proxy settings from the config. In this case, you need to set proxy settings only once.

    KernelCare on AWS - Deployment User Guide

    Prerequisites and Requirements

    KernelCare can be installed on any x86_64 compatible server or VM running one of the following distributions:

    • Amazon Linux 1, 2
    • CentOS 6, 7, Xen4CentOS, CentOS-Plus, ElRepo
    • CloudLinux 6, 7
    • Debian 7, 8, 9, 8-backports
    • Oracle Linux 6, 7
    • ProxmoxVE 3,4,5
    • RedHat EL 6, 7
    • Ubuntu 14.04, 16.04, 18.04
    • Virtuozzo 6

    The exact list of compatible kernels can be found at the following link: https://patches.kernelcare.com/

    Standard OS kernels are required in most cases unless the custom kernel is supported.

    The software can be installed on a running server and doesn't require a reboot.

    Basic Linux skills are sufficient to deploy KernelCare on AWS. Simple deployments involve just an EC2 instance. KernelCare is available using the BYOL model. You need to register in our customer portal to get a trial license. Once you get the trial license, you need to register your running EC2 instance with the activation key.

    Architectural Design

    As long as your servers have access to the Internet, even behind NAT - you will be able to use KernelCare without any problems.

    Generally, KernelCare requires a connection to only two servers to work:

    cln.cloudlinux.com patches.kernelcare.com
    +

    If your servers don't have direct Internet access but can gain access to the Internet using a proxy, the configuration is not that different. KernelCare can pick up standard environment variables for proxies.

    Make sure you have environment settings for your proxy setup, and everything else will be the same as if the servers were directly connected to the Internet:

    export http_proxy=http://proxy.domain.com:port # export https_proxy=http://proxy.domain.com:port 
    +

    Security

    The only thing you need to be able to install/control your KernelCare SimplePatch deployment is SSH access (root credentials, key-based authentication/sudo, or similar mechanisms are preferred).

    Sizing

    KernelCare SimplePatch agent has a tiny RAM footprint - binary patches usually require less than 1 MB.

    Deployment Guidance

    To install KernelCare SimplePatch, run:

    curl -s -L https://kernelcare.com/installer | bash 
    +

    or:

    wget -qq -O - https://kernelcare.com/installer | bash 
    +

    If you are using IP-based license, nothing else required to be done. If you are using key-based license, run:

    kcarectl --register <KEY> 
    +

    Where KEY is the registration key code string provided when you signed up for a trial or purchased the product.

    You can easily automate KernelCare SimplePatch deployment with Ansible, Puppet, Chef or other orchestration tools. Here are the steps that may be automated:

    1. Distribute KernelCare SimplePatch agent package (optional - required only for servers with no access to the Internet) and a KernelCare SimplePatch agent configuration file (/etc/sysconfig/kcare/kcare.conf);
    2. Set required environmental variables (optional);
    3. Install KernelCare SimplePatch agent from either locally available package or central KernelCare download location;
    4. Register KernelCare SimplePatch with either license key or IP-based license.

    Health Check

    Systems protected by KernelCare SimplePatch can be monitored using TuxCare Portal available at https://portal.tuxcare.com/. Registered KernelCare SimplePatch installations are grouped by license keys. Kernels that are marked with the exclamation sign in amber do not have the latest patches installed.

    In either case, you can check whether the latest available patch has been applied by running the following command on a system protected by KernelCare SimplePatch:

    kcarectl --check 
    +

    Backup and Recovery

    There is no reason to backup KernelCare SimplePatch. KernelCare SimplePatch doesn't store any data. You can always re-install and re-register KernelCare SimplePatch. To backup the configuration file of KernelCare SimplePatch if you have modified it, backup the /etc/sysconfig/kcare/ folder.

    Routine Maintenance

    KernelCare SimplePatch is packaged in RPM/DEB packages (depending on Linux distribution) and will update any time system packages are updated. No additional maintenance is needed.

    Emergency Maintenance

    If one of your instances degraded, once you start another instance based on EBS or snapshot - KernelCare SimplePatch will continue working as before, no additional work is needed. If you set up a new server instead, re-register KernelCare SimplePatch on the new server. If you decide to uninstall patches, run the command:

    kcarectl --unload
    +

    Or to completely remove the KernelCare SimplePatch package run one of the following commands:

    • on RPM-based systems:
    yum remove kernelcare
    +
    • or on DEB-based systems:
    apt-get remove kernelcare 
    +

    Patch Feed Advanced Options

    Delayed Feeds

    The KernelCare SimplePatch patch server provides the option to delay the installation of patches:

    • Delayed feeds - instructs KernelCare to skip loading patches that were released within the last 12/24/48 hours. The alternate feed option is enabled by setting the PREFIX variable in /etc/sysconfig/kcare/kcare.conf to one of test/12h/24h/48h.
    + diff --git a/local-mirror-els/index.html b/local-mirror-els/index.html index 035da43c..5ea1cc3a 100644 --- a/local-mirror-els/index.html +++ b/local-mirror-els/index.html @@ -39,7 +39,7 @@ })(); - +
    sidebar hamburger menu

    Installation instructions of a local mirror with ELS updates

    We provide the ability to create local mirrors of Extended Lifecycle Support updates.

    To obtain the access to the local mirroring, provide your External IP address to your Account Manager or send it to sales@tuxcare.com. To create a local mirror of the repository with security updates via rsync, you need to use one of the following.

    CentOS 6 ELS

    To create a local mirror with security updates of repo with centos6-els security updates, use the following:

    rsync://repo.cloudlinux.com/CENTOS6ELS/
    @@ -59,6 +59,6 @@
     

    CentOS 7 ELS

    To create a local mirror of the repository with security updates via rsync, use the following:

    rsync://repo.tuxcare.com/CENTOS7ELS/
     

    For example:

    rsync  -avSHP --delete rsync://repo.tuxcare.com/CENTOS7ELS/ .
     
    - + diff --git a/service-descriptions/index.html b/service-descriptions/index.html index 49869e79..5f3e9e4a 100644 --- a/service-descriptions/index.html +++ b/service-descriptions/index.html @@ -39,10 +39,10 @@ })(); Service Descriptions - +
    sidebar hamburger menu

    Service Descriptions

    Essential and Enhanced Support

    The description of Essential and Enhanced Support for AlmaLinux systems can be found here.

    Technical Account Manager

    Technical Account Manager (TAM)

    A Technical Account Manager (TAM) is an extension to TuxCare products to enhance product and support experience.

    • TuxCare provides a technical account manager who can perform the following tasks for up to 8 hours per week.
    • Provides best-in-practice configuration assistance.
    • Provides product presentation and training.
    • Participate in calls every other week identifying and addressing the customer's operational issues related to the TuxCare products.
    • Organise multi-vendor issue coordination through TuxCare's partners when applicable.
    • The TAM is available for customer requests during regular working hours for the TAM. Outside working hours support is provided through regular TuxCare support.

    Dedicated Technical Account Manager (dTAM)

    A dedicated Technical Account Manager (dTAM) is an extension to TuxCare products to enhance the product and support experience.

    • TuxCare provides a dedicated technical account manager who can perform the following tasks for up to 40 hours per week.
    • Acts as a primary point of contact for all TuxCare product-related requests from the customer.
    • Provides best-in-practice configuration assistance.
    • Provides product presentation and training.
    • Can assume maintenance and configuration tasks of TuxCare products on the agreement.
    • Participate in calls every other week identifying and addressing the customer's operational issues related to the TuxCare products.
    • Organise multi-vendor issue coordination through TuxCare's partners when applicable.
    • Facilitate integration of customer's ticketing system with TuxCare's when applicable.
    • Attend applicable TuxCare training and development activities.
    • The dTAM is available for customer requests during regular working hours for the dTAM and is subject to TuxCare leave policies. Outside working hours support is provided through regular TuxCare support.
    • The dTAM will visit the customer's site annually or twice per year according to the agreement.
    • If the dTAM is on annual leave for more than 5 consequent days, TuxCare will assign a temporary account manager.
    - + diff --git a/tuxcare-cln/index.html b/tuxcare-cln/index.html index 6a04d8b8..2cbc5519 100644 --- a/tuxcare-cln/index.html +++ b/tuxcare-cln/index.html @@ -39,10 +39,10 @@ })(); Subscription management portal - +
    sidebar hamburger menu

    Subscription management portal

    The TuxCare subscription management portal is designed to easily manage your licenses of TuxCare products and services by means of a user-friendly interface.

    Introduction

    The following are available in TuxCare portal:

    • Add, delete and edit licenses
    • Add, delete and edit servers
    • Choose payment methods and buy licenses
    • Track all the associated costs

    Create new account

    If you are a first time user, go to https://portal.tuxcare.com and fill in the simple registration form to create your account. You will find your login and password in your welcome email.

    Log in

    Go to https://portal.tuxcare.com and sign in with your credentials.

    Dashboard

    Dashboard helps quickly navigate to your Products. It has the following tabs:

    Products

    Click Dashboard. You will be redirected to the My Products page.

    The following actions are available:

    • Manage licenses and billing cycle. Click the link to contact our Sales team to change license quantity and product quota, and to manage the billing cycle.
    • Manage activation keys. Shortcut to the Extended Support Services | Activation Keys page.

    Servers

    Click Dashboard → Servers to go to All Servers page. A list of all servers with installed products belonged to this account is available.

    The table includes all servers that have been activated in all products within the account. The table contains the following columns:

    • Server name — server hostname
    • IP — server IP address
    • Registered — a date when a server was activated. A server sends this information to TuxCare portal
    • Group – server group (please refer to the TuxCare portal documentation to find more information about server group)
    • Installed products — shows a logo of a product activated on a server
    • Actions
      • To remove an item, click on

    Click the server name to show server details:

    • Installed products – the full name of the installed products
    • Last check-in — the last date when a server successfully responded to check-in

    The following filters are available:

    • Product — click Product button and select one or more products
    • Registered date — click Registered date to display a calendar where you can pick a date or a period to filter by
    • Search — type a query. A search is performed in Server name and Activation key entities

    Live Patching Services

    Click Live Patching Services You will be redirected to the Server License Types page.

    Here you can see the number of server licenses and manage licenses and billing cycle by contacting TuxCare Sales team.

    Extended Support Services

    Click Extended Support Services You will be redirected to the Server License Types page.

    Server License Types

    Here you can see the the number of server licenses for each product.

    Activation Keys

    Click Extended Support Services → Activation Keys. You will be redirected to the Activation Keys page.

    Activation Key is a string of numbers and letters used to activate a product.

    The table includes all activation keys for all products within the account. The table contains the following columns:

    • Activation key – is a string of numbers and letters used to activate a product
    • License type — a type of server license that is used and determines a limit of server users
    • Note — any information you’ve added to this activation key
    • Servers (used/limits) – a number of servers that have already been activated with this key (used) and a total number of servers that can be registered with this particular key (limits)
    • Tick – tick an activation key or keys to perform a remove action (use )

    Note

    The default activation key cannot be deleted.

    The following filters are available:

    • Server limits — filter by server limit/unlimited
    • License type — filter by license type

    Click an activation key to go to this Activation Key Details page.

    Activation Keys by product

    Click Extended Support Services → Activation Keys → Product. You will be redirected to the Product Activation Keys page.

    • If there are no activation keys for the product, you can create one by clicking the Create activation key.
    • If there is the default activation key for the product, you can generate a new one by clicking the Generate new activation key. A new key will be created automatically and added to the table.
    • You can copy an activation key by clicking Copy.

    The table includes all activation keys for the product. The table contains the following columns:

    • Activation key – is a string of numbers and letters used to activate a product
    • Note — any information you’ve added to this activation key
    • Servers (used/limits) – a number of servers that have already been activated with this key (used) and a total number of servers that can be registered with this particular key (limits)

    To remove a key, select it and click .

    The following filters are available:

    • Server limits — filter by server limit/unlimited
    • Search

    Click a key to go to the Activation Key Details page for this key.

    Activation Key Details

    Here you can:

    • See the activation key complete information
    • Edit key. Click Edit key
    • Remove key. Click
    • Review Servers List

    The table includes all servers registered with the key. The table contains the following columns:

    • Server name — server hostname
    • IP — server IP address
    • Registered — a date when a server was activated. A server sends this information to TuxCare portal
    • Last check-in — the last date when a server successfully responded to check-in

    The following filters are available:

    • Server limits — filter by server limit/unlimited
    • Search field

    Servers

    Click Extended Support Services → Servers. You will be redirected to the Servers page.

    The table includes all servers activated for all products within Extended Lifecycle Support. The table contains the following columns:

    • Server name — server hostname
    • IP — server IP address
    • Registered — a date when a server was activated. A server sends this information to TuxCare portal
    • Installed products — shows a logo of a product activated on a server
    • Actions
      • To remove an item, click on

    Click the server name to show server details:

    • Installed products – the full name of the installed products
    • Last check-in — the last date when a server successfully responded to check-in

    The following filters are available:

    • Product — click Product button and select one or more products
    • Registered date — click Registered date to display a calendar where you can pick a date or a period to filter by
    • Search — type a query

    Servers by product

    Click Extended Support Services → Servers → Product. You will be redirected to the Product Servers page.

    The table includes all servers activated for the product within Extended Lifecycle Support. The table contains the following columns:

    • Server name — server hostname
    • IP — server IP address
    • Registered — a date when a server was activated. A server sends this information to TuxCare portal
    • Installed products — shows a logo of a product activated on a server
    • Actions
      • To remove an item, click on

    Click the server name to show server details:

    • Installed products – the full name of the installed products
    • Last check-in — the last date when a server successfully responded to check-in

    The following filters are available:

    • Registered date — click Registered date to display a calendar where you can pick a date or a period to filter by
    • Search — type a query

    You can download the servers list by clicking the Get servers list.

    Billing

    Balance and Top up

    Click Billing, you will be redirected to the Balance and Top up page.

    Here you find the following:

    • your current plan and prices
    • your balance

    You can top up your account by entering the amount and clicking Top up.

    Payment methods

    Click Billing → Payment methods, you will be redirected to the Payment methods page.

    The following tabs are available:

    • Billing information
    • Payment methods
    • Autopayment

    Billing information

    Here, you can change your email for billing. Click Save to apply changes.

    Payment methods

    Here, you can manage your payment method. Click Save to apply changes.

    Autopayment

    Here, you can change your autopayment type:

    • Auto add funds
    • Auto repay
    • Do not add funds automatically

    Click Save to apply changes.

    Invoices

    The table contains the followings columns:

    • Invoice id – unique invoice number
    • Created — invoice issue date.
    • Type – type of payment: invoice or payment received
    • Pay period – the start date of the period for which the invoice was issued
    • Total — a total amount received/need to pay
    • Balance – the current balance
    • Actions — the following actions are available:
      • View invoice — click to view invoice in-details. It opens in a new popup.
      • Download invoice — click to download an invoice.

    Click to view the invoice details.

    Settings

    To go to account details, click User icon → Settings in the top right corner. You will be redirected to the Account details page.

    Account details

    The following tabs are available:

    • Personal information
    • Company information
    • Billing contact information

    Personal information

    All fields marked * are required.

    • API secret key – use this key with TuxCare portal API
    • IM Upgrade URL – URL for upgrade Imunify products if it is not the default one

    To change the password, click Change password.

    To enable two-factor authentication, move the slider to On.

    Click Save to apply changes.

    Company information

    Click Save to apply changes.

    Billing contact information

    Click Save to apply changes.

    Account sublogins

    You can create additional logins for your account in the form of the email address. The sub login can have any role with different permissions listed below. A master Server Administrator account has the full scope of permissions; this role can create account sub logins.

    Click Save to apply changes.

    Roles

    Full Access/Admin

    • View products
    • View servers/licenses information
    • Reporting
    • Add/delete servers
    • Create activation keys
    • Order/delete licenses
    • View invoices
    • View billing information
    • Edit credit cards information
    • Edit account information
    • Edit billing information/top up for reseller
    • View prices
    • View account information
    • Change password

    Billing

    • View products
    • View server's/licenses information
    • View invoices
    • View billing information
    • Edit credit cards information
    • Edit account information
    • Edit billing information/top up for reseller
    • View prices
    • View account information

    Server and License Management

    • View products
    • View server's/licenses information
    • Reporting
    • Add/delete servers
    • Create activation keys
    • Order/delete licenses

    Server Management Only

    • View products
    • View server's/licenses information
    • Reporting
    • Add/delete servers
    • Create activation keys

    Read Only — Billing

    • View products
    • View server's/licenses information
    • Reporting
    • View invoices
    • View billing information

    Read Only — Server Management

    • View products
    • View server's/licenses information
    • Reporting

    Reports

    It is possible to set reports receiving for an account to the desired email address.

    To add a new report configuration, click Add config.

    - + diff --git a/tuxcare/index.html b/tuxcare/index.html index 890bb517..234db661 100644 --- a/tuxcare/index.html +++ b/tuxcare/index.html @@ -39,10 +39,10 @@ })(); TuxCare - +
    sidebar hamburger menu

    TuxCare

    The TuxCare services automate, simplify, and enhance Linux operations, giving organizations more flexibility in managing Linux distro choices and versions, significant maintenance cost reductions, and greatly enhanced security and compliance postures.

    TuxCare, which is an expansion of the CloudLinux’s KernelCare and Extended Lifecycle Support brands, helps organizations take care of support, maintenance, and security for Enterprise Linux systems.

    With TuxCare Live Patching Services, Linux kernels, libraries, databases, virtualizations and IoT devices receive automated security patches applied with zero downtime.

    Using the TuxCare Extended Lifecycle Support services, you can migrate to the newest version of Linux at your own pace while maintaining protection from the common risks of running an end-of-life distro.

    Enterprise Support for AlmaLinux provides a TuxCare-vetted repository of AlmaLinux updates with 16 years of support coverage, delivers an extension of an additional 4.5 years of security fixes for Critical and High-risk vulnerabilities and FIPS-compliant security patches for select AlmaLinux minor versions, minimizes vulnerability windows with rebootless security patches and helps to avoid costly upfront support package fees with pay-as-you-go hourly support bundles.

    TuxCare provides the AlmaLinux community with FIPS 140-3 certification for AlmaLinux 9.2. Organizations requiring FIPS-certified AlmaLinux deployments or those operating under compliance regimes with similar requirements (e.g., PCI DSS, HIPAA) can download and install FIPS-validated cryptographic packages for AlmaLinux 9.2 (including the kernel and OpenSSL) for free.

    - +