Advanced Search
Search Results
367 total results found
Troubleshooting
Introduction to Troubleshooting Troubleshooting the Element Installer comes down to knowing a little bit about kubernetes and how to check the status of the various resources. This guide will walk you through some of the initial steps that you'll want to take ...
Auditbot crashloops due OneTimeKey conflicts
Issue Auditbot crashloops due OneTimeKey conflicts. You see logs such as One time key signed_curve25519:AAAAAAAAAAA already exists Environment ESS 24.04 and more Resolution #!/bin/bash SERVER_NAME=<server name> URL='https://<synapse fqdn>/_matrix/client/v3/ke...
Authentication Configuration Examples
Authentication configuration examples for LDAP, OpenID on Azure and SAML. Provided below are some configuration examples covering how you can set up various types of Delegated Authentication. For a more d...
Setting up Hookshot without E2EE support in encrypted rooms
If your Hookshot instance does not have E2EE support enabled but you still want to add it to an encrypted room, you can do this with a couple of caveats: You cannot send commands to Hookshot in the room as Hookshot cannot read any messages in the room Any m...
Calculate monthly active users
Take great care when modifying and running queries in your database. Ensure you understand what the queries do and double check that your query is correct. Incorrect queries can cause irrecoverable data loss. We recommend you familiarize yourself ...
Adding a Trust & Safety Contact
Click Your Account and Manage Servers or click this link https://ems.element.io/user/hosting. Click the Hosts tab. Add an email address to the Trust and Safety contact field and click Save at the bottom. This contact should be a user with access to respond t...
Attachments
Getting Browser Network and Console Logs
To troubleshoot some issues, logs from your browsers' Network and Console tabs will be requested, please see the steps below to pull those logs. 🔧 Accessing Developer Tools Press F12 or Ctrl+Shift+I (Windows/Linux) Or Cmd+Option+I (Mac) Alternatively: Right-c...
Updating a Jitsi-only Deployment
Preparing to upgrade Download the .bin file and copy it onto the Jitsi ESS deployment element users' home directory (with the others) Use chmod +x ./element-installer-enterprise-edition-jitsi-cors-fix.bin to make the binary executable Make a backup of yo...
Setting up ESS Pro Helm Chart
Getting started This readme is primarily aimed as a simple walkthrough to setup ESS Pro. Users experienced with Helm and Kubernetes can refer directly to the chart README in element's charts. Resource requirements The quick setup relies on K3s. It requires at ...
Advanced
Advanced setup Contents Values documentation Using a dedicated PostgreSQL database Configuring the storage path when using k3s Monitoring Components Configuration Configuring Element Web Configuring Synapse Configuring Matrix Authentication Ser...
Maintenance
Maintenance Contents Upgrading Backup & restore Backup Restore Upgrading In order to upgrade your deployment, you should: Read the release notes of the new version and check if there are any breaking changes. The changelog is available on element ...
Bridging
Bridging directories Bridges' job is to turn the contents of an external data directory into a data structure that can then be then constructed on the Matrix server by the Provisioner. See State representation for the details description of the data structure ...
Overview
Advanced Identity Management allows you to represent your organization's structure within Matrix and Element: creating a space for all its members, maintaining their membership in rooms and subspaces, managing power levels and more. It is composed of two main ...
Provisioning
Provisioning The role of the provisioner is to take the expected state representation produced by Bridges and ensure that the server state matches these expectations. The provisioner will try to do as little as possible to go from the existing to the desired s...
Usage Scenarios
Usage Scenarios With LDAP bridge as an example data source. Onboarding User logs in to Element, either using OpenID or with a user+password with LDAP integration User automatically gets invited to spaces matching their LDAP Organizational Unit memberships, wh...
Room Cleanup
Room cleanup After each provisioning cycle, Advanced Identity Management will clean up the rooms and spaces that it no longer needs to manage. Spaces in Matrix are still rooms, but we treat them a little differently during the cleanup, matching their distinct ...
Space Mapping
This mechanism allows us to configure spaces that Advanced Identity Management will maintain. Configuration We define each space giving it a name (which will be displayed in Element), a unique ID (which allows Advanced Identity Management to track the Space ev...
User Deletion
When user are no longer desired on the AIM-managed server, they fall under the user deletion flow described here. Deletion criteria They are considered no longer desired if they are present in the root space of the organization, but they're not on the list of ...
Setting up Advanced Identity Management
See how to download example files from the helm chart here. Configuration For a quick setup using the default settings, see the minimal fragment from charts/matrix-stack/ci/fragments/advanced-identity-management-minimal.yaml. Configuring a postgresql database ...