The official Matrix stack from Element for non-commercial use
Element Server Suite Community Edition (ESS Community) allows you to deploy a Matrix stack using the provided Helm charts and a Kubernetes distribution of your choice, even if you don't have Kubernetes knowledge. It is provided for non-commercial community use cases with quality in mind and aims to be as easy to use as possible. ESS Community allows you to very quickly deploy a solid Matrix stack fully supporting Matrix 2.0 and gives you the flexibility to make it your own. Below you will find a quick setup guide that gives you everything needed to set up a basic system with as few steps as possible.
There are three editions of Element Server Suite:
ESS Community is a cutting-edge Matrix distribution including all the latest features of the Matrix server Synapse and other components. It is freely available under the AGPLv3 license and tailored to small-/mid-scale, non-commercial community use cases. It's designed to easily and quickly set up a Matrix deployment. It comprises the basic components needed to get you running and is a great way to get started.
ESS Pro is the commercial backend distribution from Element. It includes everything in ESS Community plus additional features and services that are tailored to professional environments with more than 100 users up to massive scale in the millions. It is designed to support enterprise requirements in terms of advanced IAM, compliance, scalability, high availability, high density and multi-tenancy. ESS Pro makes use of Synapse Pro to provide infrastructure cost savings and improved user experience under high load. It uses Element’s Secure Border Gateway (SBG) as an application layer firewall to manage federation and to ensure that deployments stay compliant at any time. ESS Pro includes L3 support, Long-term Support (LTS), Advanced Security Advisory and prepares you for the Cyber Resilience Act (CRA).
ESS TI-M is a special version of ESS Pro focused on the requirements of TI-Messenger Pro and ePA as specified by the German National Digital Health Agency Gematik. It complies with a specific Matrix version and does not make use of experimental features.
- Architecture and components
- Feedback and questions
- Getting started
- Quick setup
- Advanced setup
- Uninstalling
ESS Community comes with the following components out-of-the box:
- Synapse: The Matrix server
- Matrix Authentication Service: Manages users and handles user authentication.
- Element Web: The Matrix Web Client provided by Element.
- PostgreSQL: An optional packaged PostgreSQL server that allows you to quickly set up the stack out-of-the-box. For a better long-term experience, please consider using a dedicated PostgreSQL server. See the advanced setup docs for more information.
- HAProxy: Provides the routing to Synapse processes.
- .well-known delegation: Required for federation and Matrix clients.
It is possible to enable/disable each on a per-component basis. They can also be customized using dedicated values.
For more details about the architecture, please refer to the Architecture Documentation.
Element does not provide support for ESS Community but we want to know about your experience and get any suggestions for improvements that you might have. Any contribution helps to further improve the stack and its documentation.
If you have feedback or questions about it, you can
- Create a ticket in the issue tracker
- Join our ESS Community Matrix room
If you want to suggest changes to the distribution or contribute them yourself, please come and chat to us first in #ess-community:element.io to coordinate.
This readme is primarily aimed as a simple walkthrough to setup ESS Community. Users experienced with Helm and Kubernetes can refer directly to the chart README at charts/matrix-stack/README.md.
The quick setup relies on K3s. It requires at least 2 CPU cores and 2 GB of memory available.
You first need to choose what your server name is going to be. The server name makes up the latter part of a user's Matrix ID. In the following example Matrix ID, server-name.tld
is the server name, and should point to your ESS Community installation:
@alice:server-name.tld
It is currently not possible to change your server name without resetting your database and having to recreate the server.
Setting up a basic environment involves only 6 steps:
- Setting up DNS entries
- Setting up K3s (or use another Kubernetes distribution)
- Setting up TLS/certificates
- Installing the stack
- Creating an initial user
- Verifying the setup
The below instructions will guide you through each of the steps.
You need to create DNS entries to set up ESS Community. All of these DNS entries must point to your server's IP.
- Server name: This DNS entry should point to the installation ingress. It should be the
server-name.tld
you chose above. - Synapse: For example, you could use
matrix.<server-name.tld>
. - Matrix Authentication Service: For example, you could use
account.<server-name.tld>
. - Element Web: This will be the address of the chat client of your server. For example, you could use
chat.<server-name.tld>
.
This guide suggests using K3s as the Kubernetes node hosting ESS Community. Other options are possible. You can use an existing Kubernetes cluster, or use other clusters like microk8s. Any Kubernetes distribution is compatible with Element Community, so choose one according to your needs.
The following will install K3s on the node, and configure its Traefik proxy automatically. If you want to configure K3s behind an existing reverse proxy on the same node, please see the dedicated section.
If you have a firewall running on your server, please follow k3s official recommandations.
- Run the following command to install K3s:
curl -sfL https://get.k3s.io | sh -
- Once K3s is set up, copy its kubeconfig to your home directory to get access to it:
mkdir ~/.kube
export KUBECONFIG=~/.kube/config
sudo k3s kubectl config view --raw > "$KUBECONFIG"
chmod 600 "$KUBECONFIG"
-
Add
export KUBECONFIG=~/.kube/config
to~/.bashrc
to make it persistent -
Install Helm, the Kubernetes Package Manager. You can use your OS repository or call the following command:
curl -fsSL https://raw.githubusercontent.com/helm/helm/main/scripts/get-helm-3 | bash
- Create your Kubernetes namespace where you will deploy the Element Server Suite Community:
kubectl create namespace ess
- Create a directory containing your Element Server Suite configuration values:
mkdir ~/ess-config-values
We present here 3 options to set up certificates in Element Server Suite. To configure Element Server Suite behind an existing reverse proxy already serving TLS, you can jump to the end of this section.
To use Let’s Encrypt with ESS Community, you should use Cert Manager. This is a Kubernetes component which allows you to get certificates issued by an ACME provider. The installation follows the official manual:
- Add Helm Jetstack repository:
helm repo add jetstack https://charts.jetstack.io --force-update
- Install Cert-Manager:
helm install \
cert-manager jetstack/cert-manager \
--namespace cert-manager \
--create-namespace \
--version v1.17.0 \
--set crds.enabled=true
- Configure Cert-Manager to allow ESS Community to request Let’s Encrypt certificates automatically. Create a “ClusterIssuer” resource in your K3s node to do so:
export USER_EMAIL=<your email>
kubectl apply -f - <<EOF
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: letsencrypt-prod
spec:
acme:
server: https://acme-v02.api.letsencrypt.org/directory
email: $USER_EMAIL
privateKeySecretRef:
name: letsencrypt-prod-private-key
solvers:
- http01:
ingress:
class: traefik
EOF
- In your ESS configuration values directory, copy the file
charts/matrix-stack/ci/fragments/quick-setup-letsencrypt.yaml
totls.yaml
.
If your wildcard certificate covers both the server-name and the hosts of your services, you can use it directly.
- Import your certificate file in your namespace using kubectl:
kubectl create secret tls ess-certificate -n ess --cert=path/to/cert/file --key=path/to/key/file
- In your ess configuration values directory, copy the file
charts/matrix-stack/ci/fragments/quick-setup-wildcard-cert.yaml
totls.yaml
. Adjust the TLS Secret name accordingly if needed.
- If you have a distinct certificate for each of your DNS names, you will need to import each certificate in your namespace using kubectl:
kubectl create secret tls ess-chat-certificate -n ess --cert=path/to/cert/file --key=path/to/key/file
kubectl create secret tls ess-matrix-certificate -n ess --cert=path/to/cert/file --key=path/to/key/file
kubectl create secret tls ess-auth-certificate -n ess --cert=path/to/cert/file --key=path/to/key/file
kubectl create secret tls ess-well-known-certificate -n ess --cert=path/to/cert/file --key=path/to/key/file
- In your ess configuration values directory, copy the file
charts/matrix-stack/ci/fragments/quick-setup-certificates.yaml
totls.yaml
. Adjust the TLS Secret name accordingly if needed.
If your server already has a reverse proxy, ports 80 and 443 will likely be taken.
- Use the following command to get the external-ip provisioned by Kubernetes for Traefik :
kubectl get svc/traefik -n kube-system
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
traefik LoadBalancer 10.43.184.49 172.20.1.60 80:32100/TCP,443:30129/TCP 5d18h
- In such a case, you will need to set up K3S with custom ports. Create a file
/var/lib/rancher/k3s/server/manifests/traefik-config.yaml
with the following:
apiVersion: helm.cattle.io/v1
kind: HelmChartConfig
metadata:
name: traefik
namespace: kube-system
spec:
valuesContent: |-
ports:
web:
exposedPort: 8080
websecure:
exposedPort: 8443
service:
spec:
externalIPs:
- `<external IP returned by the command above>`
- K3s will apply the file content automatically. You can verify its ports using the command :
kubectl get svc -n kube-system | grep traefik
traefik LoadBalancer 10.43.184.49 172.20.1.60 8080:32100/TCP,8443:30129/TCP 5d18h
-
Configure your reverse proxy so that the DNS names you configured are routed to the external IP of traefik on port 8080 (HTTP) and 8443 (HTTPS).
-
If the certificates are handled in your reverse proxy, you can point to port 8080 (HTTP) only and disable TLS in ESS. Copy the file
charts/matrix-stack/ci/fragments/quick-setup-external-cert.yaml
totls.yaml
.
To make running ESS Community behind a reverse proxy as easy as possible, you can find below some configuration examples for popular webservers.
Apache2
Find below a minimal example of an Apache2 vhost to work as a reverse proxy with TLS termination for ESS Community. You will need to enable the respective modules in your Apache2 configuration.
<VirtualHost *:*>
ServerName <your domain/subdomain>
SSLEngine on
SSLCertificateFile /path/to/your/certfile
SSLCertificateKeyFile /path/to/your/keyfile
SSLCipherSuite ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256
SSLHonorCipherOrder on
SSLProtocol all -SSLv3 -TLSv1 -TLSv1.1
Header unset Strict-Transport-Security
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
ProxyPreserveHost On
ProxyPass / http://127.0.0.1:8080/ nocanon
ProxyPassReverse / http://127.0.0.1:8080/
</VirtualHost>
You can either use the database provided with ESS Community or you use a dedicated PostgreSQL Server. We recommend using a PostgreSQL server installed with your own distribution packages. For a quick set up, feel free to use the internal PostgreSQL database. The chart will configure it automatically for you by default.
The ESS Community installation is performed using Helm package manager, which requires configuration of a values file as specified in this documentation.
For a quick setup using the default settings, copy the file from charts/matrix-stack/ci/fragments/quick-setup-hostnames.yaml
to hostnames.yaml
in your ESS configuration values directory and edit the hostnames accordingly.
Run the setup using the following helm command. This command supports combining multiple values files depending on your setup. Typically you would pass to the command line a combination of:
- If using Lets Encrypt or Certificate Files :
-f ~/ess-config-values/tls.yaml
- If using your own PostgreSQL server :
-f ~/ess-config-values/postgresql.yaml
Each optional additional values file used needs to be prefixed with -f
helm upgrade --install --namespace "ess" ess oci://ghcr.io/element-hq/ess-helm/matrix-stack -f ~/ess-config-values/hostnames.yaml <optional additional values files to pass> --wait
Wait for the helm command to finish up. ESS Community is now installed!
ESS Community does not allow user registration by default. To create your initial user, use the mas-cli manage register-user
command in the Matrix Authentication Service pod:
kubectl exec -n ess -it deploy/ess-matrix-authentication-service -- mas-cli manage register-user
This should give you the following output:
Defaulted container "matrix-authentication-service" out of: matrix-authentication-service, render-config (init), db-wait (init), config (init)
✔ Username · alice
User attributes
Username: alice
Matrix ID: @alice:thisservername.tld
No email address provided, user will be prompted to add one
No password or upstream provider mapping provided, user will not be able to log in
Non-interactive equivalent to create this user:
mas-cli manage register-user --yes alice
✔ What do you want to do next? (<Esc> to abort) · Set a password
✔ Password · ********
User attributes
Username: alice
Matrix ID: @alice:thisservername.tld
Password: ********
No email address provided, user will be prompted to add one
To allow users registration, you will need to configure MAS with SMTP. To do so, follow the steps in Configuring Matrix Authentication Service to inject additional email configuration.
To verify the setup, you can:
- Log into your Element Web client website and log in with the user you created above.
- Verify that federation works fine using Matrix Federation Tester.
- Login with an Element X mobile client with the user you created above.
- You can use a Kubernetes UI client such has k9s (TUI-Based) or lens (Electron Based) to see your cluster status.
For advanced setup instructions, please refer to the Advanced setup guide.
For maintenance topics like upgrading, backups and restoring from backups, please refer to the Maintenance guide.
If you wish to remove ESS Community from your cluster, you can simply run the following commands to clean up the installation. Please note deleting the ess
namespace will remove everything within it, including any resources you may have manually created within it:
helm uninstall ess -n ess
kubectl delete namespace ess
If you want to also uninstall other components installed in this guide, you can do so using the following commands:
# Remove cert-manager from cluster
helm uninstall cert-manager -n cert-manager
# Uninstall helm
rm -rf /usr/local/bin/helm $HOME/.cache/helm $HOME/.config/helm $HOME/.local/share/helm
# Uninstall k3s
/usr/local/bin/k3s-uninstall.sh