- Overview
- Requirements
- Installation
- Post-installation
- Cluster administration
- Monitoring and alerting
- Migration and upgrade
- Product-specific configuration
- Best practices and maintenance
- Troubleshooting
- How to Troubleshoot Services During Installation
- How to Uninstall the Cluster
- How to clean up offline artifacts to improve disk space
- How to disable TLS 1.0 and 1.1
- How to enable Istio logging
- How to manually clean up logs
- How to clean up old logs stored in the sf-logs bucket
- How to debug failed Automation Suite installations
- How to disable TX checksum offloading
- Unable to run an offline installation on RHEL 8.4 OS
- Error in Downloading the Bundle
- Offline installation fails because of missing binary
- Certificate issue in offline installation
- SQL connection string validation error
- Failure After Certificate Update
- Automation Suite Requires Backlog_wait_time to Be Set 1
- Cannot Log in After Migration
- Setting a timeout interval for the management portals
- Update the underlying directory connections
- Kinit: Cannot Find KDC for Realm <AD Domain> While Getting Initial Credentials
- Kinit: Keytab Contains No Suitable Keys for *** While Getting Initial Credentials
- GSSAPI Operation Failed With Error: An Invalid Status Code Was Supplied (Client's Credentials Have Been Revoked).
- Login Failed for User <ADDOMAIN><aduser>. Reason: The Account Is Disabled.
- Alarm Received for Failed Kerberos-tgt-update Job
- SSPI Provider: Server Not Found in Kerberos Database
- Failure to get the sandbox image
- Pods not showing in ArgoCD UI
- Redis Probe Failure
- RKE2 Server Fails to Start
- Secret Not Found in UiPath Namespace
- ArgoCD goes into progressing state after first installation
- Unexpected Inconsistency; Run Fsck Manually
- Missing Self-heal-operator and Sf-k8-utils Repo
- Degraded MongoDB or Business Applications After Cluster Restore
- Unhealthy Services After Cluster Restore or Rollback
- Using the Automation Suite Diagnostics Tool
- Using the Automation Suite support bundle
- Exploring Logs

Automation Suite installation guide
Step 3: Post-deployment Steps
This page walks you through the steps you need to take once the deployment is complete.
\
) may not work as expected. To ensure new lines are interpreted correctly, use the console's clipboard widget.
successFullInstall
in the container.
The installation process generates self-signed certificates on your behalf. However, the Azure deployment template also gives you the option to provide a CA-issued server certificate at installation time instead of using an auto-generated self-signed certificate.
Self-signed certificates will expire in 90 days, and you must replace them with certificates signed by a trusted CA as soon as installation completes. If you do not update the certificates, the installation will stop working after 90 days.
For instructions, see Managing certificates.
Once the installation is complete, you need to access the Deployment Outputs in the Outputs tab.
DateTime
) → Outputs.
Output |
Description |
---|---|
Documentation |
A link to the documentation. |
URL |
The Load Balancer URL. Can be used for direct access. If custom domains were enabled this is the domain that you would use for the CNAME binding. |
KeyVaultURL |
The Azure Portal URL for the Key Vault created by the deployment. It contains all the secrets (credentials) used in the deployment. |
ArgoCDURL |
The URL for accessing ArgoCD. This is available within the VNet. External access to this URL must be set up as described in: Step 4: Configuring the DNS. |
ArgoCDPassword |
The password used to log in to the ArgoCD portal. |
HostAdminUsername and HostAdminPassword |
The credentials used for Host Administration. |
All credentials used in the deployment are stored as secrets inside a Key Vault provisioned during the deployment. To access the secrets, filter the resources inside the Resource Group, search for Vault, and then click Secrets.
The operation “List” is not enabled in the key vault’s access policy
warning under the Secrets tab, take the following steps:
- Go to Access policies → Add access policy → Configure the template → Secret Management → Select Principal.
- Select your user, then click Save.
- Navigate back to Secrets. The warning should be gone, and the secrets should be visible.
The VMs are provisioned inside a private VNet. You can access them through Azure Bastion by following these steps:
As mentioned in Step 1: Preparing your Azure Deployment, the Automation Suite Azure deployment creates a Load Balancer with a public IP and a DNS label associated. This DNS label is Microsoft-owned.
The deployment also provisions a Private DNS zone inside the cluster VNet and adds several records that are used during the installation and configuration process.
If you choose to connect from an external machine, you will not be able to use the private DNS zone to resolve the DNS for various services, so you need to add these records to your host file.
See Step 4: Configuring the DNS for more details.
You should now be able to connect to various services running on your cluster.
The general-use Automation Suite user interface serves as a portal for both organization administrators and organization users. It is a common organization-level resource from where everyone can access all Automation Suite areas: administration pages, platform-level pages, service-specific pages, and user-specific pages.
See Interface tour for more details.
To access Automation Suite, take the following steps:
- Go to the following URL:
https://${Loadbalancer_dns}
, where<loadbalancer_dns>
is the DNS label for the load balancer and is found under outputs. - Switch to the Default organization.
- The username is orgadmin.
- Retrieve the password by going to Keyvault, then Secrets, and then Host Admin Password.
The host portal is where system administrators configure the Automation Suite instance. The settings configured from this portal are inherited by all your organizations, and some can be overwritten at the organization level.
To access host administration, take the following steps:
- Go to the following URL:
https://${Loadbalancer_dns}
, where<loadbalancer_dns>
is the DNS label for the load balancer and is found under Outputs. - Switch to the Host organization.
- Enter the username you previously specified as a value for the UiPath Admin Username parameter.
- Enter the password you previously specified as a value for the UiPath Admin Password parameter. Retrieve the password by going to Keyvault,Secrets, and then Host Admin Password.
You can use the ArgoCD console to manage installed products.
To access ArgoCD, take the following steps:
- Go to the following URL:
https://alm.${Loadbalancer_dns}
, where<loadbalancer_dns>
is the DNS label for the load balancer and is found under Outputs. Note that you must configure external access to this URL as described in Step 4: Configuring the DNS. - The username is admin.
- To access the password, go to the Outputs tab or the credential Keyvault.
Automation Suite uses Rancher to provide cluster management tools out of the box. This helps you manage the cluster and access monitoring and troubleshooting.
See Rancher documentation for more details.
See Using the monitoring stack for more on how to use Rancher monitoring in Automation Suite.
To access the Rancher console, take the following steps:
Compute resources provisioned from the deployment consist of Azure Scale Sets, which allow for easy scaling.
You can manually add additional resources to a specific Scale Set, including adding server nodes, agent nodes, or specialized agent nodes (such as GPU nodes).
You can perform a manual scale by identifying the specific Scale Set and add resources directly.
To do so, take the following steps: