Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitee4d91b

Browse files
committed
Remove validation step
Merged validation information to install step and removed dedicated validation step
1 parent52bc1f8 commitee4d91b

File tree

1 file changed

+41
-98
lines changed

1 file changed

+41
-98
lines changed

‎_docs/installation/gitops/hybrid-gitops-helm-installation.md‎

Lines changed: 41 additions & 98 deletions
Original file line numberDiff line numberDiff line change
@@ -92,79 +92,20 @@ The Codefresh `values.yaml` located [here](https://github.com/codefresh-io/gitop
9292
*[Traefik ingress configuration](#traefik-ingress-configuration)
9393
<br><br>
9494

95-
###Step 1: (Optional) Validate Helm values file
96-
Codefresh automatically validates the`values.yaml` file before initiating the installation to verify that the supplied values are correct.
97-
You also have the option to manually run the validation if desired.
9895

96+
###Step 1: Select Hybrid Runtime install option
9997

100-
**Validation failure**
101-
102-
If there is a validation failure, Codefresh will terminate the Helm installation and display the error message:`Job has reached the specified backoff limit`.
103-
104-
To get more detailed and meaningful information on the reason for the validation failure, run:
105-
`kubectl logs jobs/validate-values -n ${NAMESPACE}`
106-
where:
107-
*`{NAMESPACE}` must be replaced with the namespace of the Hybrid GitOps Runtime.
108-
109-
**Disable automated validation**
110-
You may want to disable automated validation for specific scenarios, such as to address false-negatives.
111-
You can do so by either adding the flag to the Helm install command or adding the relevant section to the`values` file.
112-
113-
* In install command:
114-
`--set installer.skipValidation=true`
115-
116-
* In`values` file:
117-
118-
{% highlight yaml %}
119-
{% raw %}
120-
...
121-
122-
installer:
123-
skipValidation: true
124-
125-
...
126-
{% endraw %}
127-
{% endhighlight %}
128-
129-
130-
**Validated settings**
131-
132-
The table below lists the settings validated in the`values` file.
133-
134-
{: .table .table-bordered .table-hover}
135-
| Setting| Validation|
136-
| --------------| --------------|
137-
|**`userToken`**| If explicitly defined, or defined as a`secretKeyRef` which exists in the current k8s context and the defined namespace.|
138-
|**Account permissions**| If the user has admin permissions for the account in which they are installing the runtime.|
139-
|**Runtime name**| If defined, and is unique to the account.|
140-
|**Access mode**| {::nomarkdown}<ul><li>For tunnel-based, the default, if <codeclass="highlighter-rouge">accountId</code> is defined, and matches the account of the <codeclass="highlighter-rouge">userToken</code> defined in the file.</li><li>For ingress-based, if the <codeclass="highlighter-rouge">hosts</code> array contains at least one entry that is a valid URL (successful HTTP GET).</li><li>If both tunnel-based and ingress-based access modes are disabled, if <codeclass="highlighter-rouge">runtime.ingressUrl</code> is defined.</li></ul>{:/}|
141-
|**`gitCredentials`**| {::nomarkdown}<ul><li>When defined, includes a Git password either explicitly, or as a <codeclass="highlighter-rouge">secretKeyRef</code>, similar to <codeclass="highlighter-rouge">userToken</code>.</li><li>The password or token has the required permissions in the Git provider.</li></ul>{:/}|
142-
143-
144-
145-
**How to: Manually validate values file**
146-
147-
1. To manually validate the`values` file, run:
148-
`cf helm validate --values <values_file> --namespace <namespace> --version <version>`
149-
where:
150-
*`<values_file>` is the name of the values.yaml used by the Helm installation.
151-
*`<namespace>` is the namespace in which to install the Hybrid GitOps runtime, either the default`codefresh`, or the custom name you intend to use for the installation. The Namespace must conform to the naming conventions for Kubernetes objects.
152-
*`<version>` is the version of the runtime to install.
153-
1. Continue with[Step 2: Select Hybrid Runtime install option](#step-2-select-hybrid-runtime-install-option).
98+
1. In the Welcome page, select**+ Install Runtime**.
99+
1. Continue with[Step 2: Set up GitOps Git provider](#step-2-set-up-gitops-git-provider).
154100

155-
###Step 2: Select Hybrid Runtime install option
101+
###Step 2: Set up GitOps Git provider
102+
As a one-time action, select the Git provider and the Shared Configuration Repository to associate with your account.
156103

157-
1. In the Welcome page, select**+ Install Runtime**.
158-
1. Continue with[Step 3: Set up GitOps Git provider](#step-3-set-up-gitops-git-provider).
104+
The Git provider you select for the first GitOps Runtime in your account is used for all the other Runtimes installed in the same account.
159105

160-
###Step 3: Set up GitOps Git provider
161-
Select the Git provider and the Shared Configuration Repository to associate with your account.
106+
The[Shared Configuration Repository]({{site.baseurl}}/docs/installation/gitops/shared-configuration/) is a Git repository with configuration manifests shared between all the Hybrid GitOps Runtimes within the same account.To change the Shared Configuration Repo after installation, see Reset Shared Configuration Repository.
162107

163-
The same Git provider is used for other GitOps Runtimes in the same account.
164-
The[Shared Configuration Repository]({{site.baseurl}}/docs/installation/gitops/shared-configuration/) is a Git repository with configuration manifests shared between all the Hybrid GitOps Runtimes within the same account.
165108

166-
>**NOTE**:
167-
This is a one-time action, required once per account.
168109

169110
1. Select the**Git provider** from the list.
170111
1. Define the**API URL** for the Git provider you selected, as one of the following:
@@ -174,17 +115,18 @@ The [Shared Configuration Repository]({{site.baseurl}}/docs/installation/gitops/
174115
* GitLab Server:`<server-url>/api/v4`
175116
* Bitbucket Cloud:`https://api.bitbucket.org/2.0`
176117
* Bitbucket Server:`<server-url>/rest/api/1.0`
177-
1. Define the URL of the**Shared Configuration Repository**.
178-
>**NOTE**:
179-
>Because the Git provider and the Shared Configuration Repo are defined at the account-level, the Git provider you select for the first GitOps Runtime in your account is used for all the other Runtimes in the same account.
180-
>To change the Shared Configuration Repo or Git credentials after installation, see[Reset Shared Configuration Repository]({{site.baseurl}}/docs/installation/gitops/monitor-manage-runtimes/#reset-shared-configuration-repository-for-gitops-runtimes) and[Update Git credentials]({{site.baseurl}}/docs/installation/gitops/monitor-manage-runtimes/#update-git-credentials-for-gitops-runtimes) for GitOps Runtimes.
118+
1. Define the URL of the**Shared Configuration Repository**.
181119
1. Click**Next**.
182-
1. Continue with[Step4: Install Hybrid Runtime](#step-4-install-hybrid-gitops-runtime).
120+
1. Continue with[Step3: Install Hybrid Runtime](#step-3-install-hybrid-gitops-runtime).
183121

184-
###Step4: Install Hybrid GitOps Runtime
122+
###Step3: Install Hybrid GitOps Runtime
185123

186124
Install the Hybrid GitOps Runtime through the Helm chart. The Codefresh`values.yaml` is located[here](https://github.com/codefresh-io/gitops-runtime-helm/tree/main/charts/gitops-runtime){:target="\_blank"}.
187125

126+
>**TIP**:
127+
Before initiating the installation, Codefresh automatically validates the `values.yaml` file to verify that the supplied values are correct.<br>
128+
If the Helm installation is terminated with the error message:`Job has reached the specified backoff limit`, you can get more detailed and meaningful information on the reason for the validation failure, with:
129+
`kubectl logs jobs/validate-values -n ${NAMESPACE}`, replacing`{NAMESPACE}` with the namespace of the Hybrid GitOps Runtime.
188130

189131
**Runtime Name**
190132
If you define a custom name for the Hybrid GitOps Runtime, it must start with a lower-case character, and can include up to 62 lower-case characters and numbers.
@@ -200,7 +142,8 @@ You can define one of three different access modes:
200142

201143
See[Ingress controller configuration](/#ingress-controller-configuration) in this article.
202144

203-
<br>
145+
146+
<br><br>
204147

205148
**How to**
206149
1. To generate your Codefresh API key, click**Generate**.
@@ -288,23 +231,22 @@ helm upgrade --install <helm-release-name> \
288231
* The Hybrid GitOps Runtime you added is prefixed with a green dot indicating that it is online
289232
* The Type column for the Runtime displays**Helm**
290233
* The Sync Status column displays**Complete Installation**, indicating that there are pending tasks to complete the installation.
291-
1. Continue with[Step5: Configure Git credentials for runtime](#step-5-configure-git-credentials-for-hybrid-gitops-runtime).
234+
1. Continue with[Step4: Configure Git credentials for runtime](#step-4-configure-git-credentials-for-hybrid-gitops-runtime).
292235

293236

294237

295-
###Step5: Configure Git credentials for Hybrid GitOps Runtime
238+
###Step4: Configure Git credentials for Hybrid GitOps Runtime
296239
Configure Git credentials to authorize access to and ensure proper functioning of the GitOps Runtime. This is one of the two steps to complete installing Hybrid GitOps Runtimes, the other being to configure the Runtime as an Argo Application, described in the next step.
297240

298-
Git credentials include authorizing access to Git through OAuth2 or auser (personal) accesstoken, and optionally configuring SSH access to Git.
241+
Git credentials include authorizing access to Git through OAuth2 or aGit Runtimetoken, and optionally configuring SSH access totheGit installation repo for the Runtime.
299242

300243
**Git authorization**
301244
* OAuth2 authorization is possible if your admin has registered an OAuth Application for Codefresh. See[OAuth2 setup for Codefresh]({{site.baseurl}}/docs/administration/account-user-management/oauth-setup/).
302-
* Git access token authentication requires you to generatea personal access token in your Git provider account for the GitOps Runtime, with the correct scopes. See[GitOps Runtime token scopes]({{site.baseurl}}/docs/reference/git-tokens/#git-runtime-token-scopes).
245+
* Git access token authentication requires you to generatean access token in your Git provider account for the GitOps Runtime, with the correct scopes. See[GitOps Runtime token scopes]({{site.baseurl}}/docs/reference/git-tokens/#git-runtime-token-scopes).
303246

304247
**SSH access to Git**
305-
By default, Git repositories use the HTTPS protocol. You can also use SSH to connect Git repositories by entering the SSH private key.
306-
307-
>When SSH is configured for a GitOps runtime, on creating/editing Git-Source applications, you can select HTTPS OR SSH as the protocol to connect to the Git repository. See[Repository URL in Application Source definitions]({{site.baseurl}}/docs/deployments/gitops/create-application/#source).
248+
By default, Git repositories use the HTTPS protocol. You can also use SSH to connect Git repositories by entering the SSH private key.
249+
When SSH is configured for a GitOps Runtime, on creating/editing Git-Source applications, you can select HTTPS OR SSH as the protocol to connect to the Git repository. See[Repository URL in Application Source definitions]({{site.baseurl}}/docs/deployments/gitops/create-application/#source).
308250

309251
For more information on generating SSH private keys, see the official documentation:
310252
*[GitHub](https://help.github.com/en/github/authenticating-to-github/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent){:target="\_blank"}
@@ -315,16 +257,17 @@ For more information on generating SSH private keys, see the official documentat
315257

316258

317259
**Before you begin**
318-
* To authenticate through a Gituser access token, make sure your token is valid and has the required scopes for GitOps Runtimes
260+
* To authenticate through a GitRuntime access token, make sure your token is valid and has the required scopes for GitOps Runtimes
319261
* To use SSH, copy the SSH private key for your Git provider
320262

321263
**How to**
322-
264+
1. In the Sync Status column for the Runtime you just installed, click**Complete Installation**.
323265
1. Do one of the following:
324266
* If your admin has set up OAuth access, click**Authorize Access to Git Provider**. Go to_step 2_.
325267
* Alternatively, authenticate with an access token from your Git provider. Go to_step 3_.
326268
1. For OAuth2 authorization:
327-
>If the application is not registered, you get an error. Contact your admin for help.
269+
>**NOTE**:
270+
If the application is not registered and you get an error, contact your admin for help.
328271
* Enter your credentials, and select **Sign In**.
329272
* If required, as for example with two-factor authentication, complete the verification.
330273

@@ -339,17 +282,17 @@ For more information on generating SSH private keys, see the official documentat
339282
%}
340283

341284
{:start="3"}
342-
1. For Git token authentication, in the**Git Runtime Token** field, paste the Gitruntime token you generated.
285+
1. For Git token authentication, in the**Git Runtime Token** field, paste the GitRuntime token you generated.
343286
1. Optional. To configure SSH access to Git, expand**Connect Repo using SSH**, and then paste the raw SSH private key into the field.
344287

345288
<!---SCREENSHOT-->
346289

347290
{:start="5"}
348291
1. Click**Configure**.
349-
1. Continue with[Step6: (Optional) Configure Hybrid GitOps Runtime as Argo Application](#step-6-optional-configure-hybrid-gitops-runtime-as-argo-application).
292+
1. Continue with[Step5: (Optional) Configure Hybrid GitOps Runtime as Argo Application](#step-5-optional-configure-hybrid-gitops-runtime-as-argo-application).
350293

351294

352-
###Step6: (Optional) Configure Hybrid GitOps Runtime as Argo Application
295+
###Step5: (Optional) Configure Hybrid GitOps Runtime as Argo Application
353296

354297
Configure the Hybrid GitOps Runtime as an Argo Application as the final step in the installation process.
355298
By doing so, you can view the Runtime components, monitor health and sync statuses, and ensure that GitOps is the single source of truth for the Runtime.
@@ -359,17 +302,17 @@ You cannot configure the Runtime as an Argo Application if you have not configur
359302

360303

361304
1. Click**Configure as Argo Application**. Codefresh takes care of the configuration for you.
362-
1. Continue with[Step7: (Optional) Create a Git Source](#step-7-optional-create-a-git-source).
305+
1. Continue with[Step6: (Optional) Create a Git Source](#step-6-optional-create-a-git-source).
363306

364307

365308

366-
###Step7: (Optional) Create a Git Source
309+
###Step6: (Optional) Create a Git Source
367310
Create a[Git Source]({{site.baseurl}}/docs/installation/gitops/git-sources/#create-a-git-source) for the Runtime.
368311

369312
1. Optional. Create a Git Source.
370-
1. Continue with[Step8: (Optional) Configure ingress-controllers](#step-8-optional-configure-ingress-controllers).
313+
1. Continue with[Step7: (Optional) Configure ingress-controllers](#step-7-optional-configure-ingress-controllers).
371314

372-
###Step8: (Optional) Configure ingress-controllers
315+
###Step7: (Optional) Configure ingress-controllers
373316
Required only for ALB AWS, Istio, or NGINX Enterprise ingress-controllers.<br>
374317

375318
* Complete configuring these ingress controllers:
@@ -379,11 +322,11 @@ Required only for ALB AWS, Istio, or NGINX Enterprise ingress-controllers.<br>
379322

380323
That's it! You have successfully completed installing a Hybrid GitOps Runtime with Helm. View the Runtime in the[Runtimes]({{site.baseurl}}/docs/installation/gitops/monitor-manage-runtimes/#gitops-runtime-views) page.
381324

382-
**Post-installation configuration**
325+
**What to do next**
383326

384327
Depending on your configuration, if you have private registries, you need to override specific image values, and if your Git servers are on-premises, you need to add custom repository certificates. See[Optional GitOps Runtime configuration](#optional-gitops-runtime-configuration) in this article.
385328

386-
You can now add[external clusters to the Runtime]({{site.baseurl}}/docs/installation/gitops/managed-cluster/), and[create and deploy GitOps applications]({{site.baseurl}}/docs/deployments/gitops/create-application/).
329+
You can now add[Git Sources]({{site.baseurl}}/installation/gitops/git-sources/),[external clusters]({{site.baseurl}}/docs/installation/gitops/managed-cluster/), and[create and deploy GitOps applications]({{site.baseurl}}/docs/deployments/gitops/create-application/).
387330

388331

389332
##Install additional GitOps Runtimes in account
@@ -392,10 +335,10 @@ The Codefresh `values.yaml` located [here](https://github.com/codefresh-io/gitop
392335

393336

394337
**Git provider and Shared Configuration Repository**
395-
The Git provider and Shared Configuration Repository, configured once per account,is alreadyavailable this setup in your initial installation,additional installations do not require this.
338+
The Git provider and Shared Configuration Repository, configured once per account,has alreadybeen set up in your initial installation,and not required for additional installations.
396339

397340
**Access mode**
398-
You can define the tunnel/ingress/service-mesh-based access mode for the additional GitOps Runtimes. The command in the How To below is valid for the tunnel-based access mode. For ingress-based or service-mesh-based access modes, add the required arguments and values, as described in the step-by-step section,[Step4: Install Hybrid GitOps Runtime](/#step-4-install-hybrid-gitops-runtime).
341+
You can define the tunnel/ingress/service-mesh-based access mode for the additional GitOps Runtimes. The command in the How To below is valid for the tunnel-based access mode. For ingress-based or service-mesh-based access modes, add the required arguments and values, as described in the step-by-step section,[Step3: Install Hybrid GitOps Runtime](/#step-3-install-hybrid-gitops-runtime).
399342

400343
**Runtime name**
401344
The new Runtime must have a unique name in the same account.
@@ -429,7 +372,7 @@ where:
429372
*`--wait` waits until all the pods are up and running for the deployment.
430373

431374

432-
**Post-installation configuration**
375+
**What to do next**
433376

434377
Depending on your configuration, if you have private registries, you need to override specific image values, and if your Git servers are on-premises, you need to add custom repository certificates. See[Optional GitOps Runtime configuration](#optional-gitops-runtime-configuration) in this article.
435378

@@ -470,12 +413,12 @@ resource "helm_release" "my_gitops_runtime" {
470413

471414
Feel free to user a different chart version and a unique name for the Runtime. You can get the values for both the Codefresh API token and account ID from the Codefresh UI as explained in the previous section.
472415

473-
The example is valid for the tunnel-based access mode. For ingress-based or service-mesh-based access modes, add the required arguments and values, as described in the step-by-step section,[Step4: Install Hybrid GitOps Runtime](/#step-4-install-hybrid-gitops-runtime).
416+
The example is valid for the tunnel-based access mode. For ingress-based or service-mesh-based access modes, add the required arguments and values, as described in the step-by-step section,[Step3: Install Hybrid GitOps Runtime](/#step-3-install-hybrid-gitops-runtime).
474417

475418
Depending on your configuration, if you have private registries, you need to override specific image values, and if your Git servers are on-premises, you need to add custom repository certificates. See[Optional GitOps Runtime configuration](#optional-gitops-runtime-configuration) in this article.
476419

477-
By default, theCodefresh Runtime can deploy to the cluster it is installed on.
478-
You can also[use Terraform to connect additional]({{site.baseurl}}/docs/installation/gitops/managed-cluster/#add-a-managed-cluster-with-terraform) external clusters to yourruntime.
420+
By default, theGitOps Runtime can deploy to the cluster it is installed on.
421+
You can also[use Terraform to connect additional]({{site.baseurl}}/docs/installation/gitops/managed-cluster/#add-a-managed-cluster-with-terraform) external clusters to yourRuntime.
479422

480423

481424

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp