You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One of the benefits the Operator provides is a schema based approach to configuation that is supported
51
+
One of the benefits the Operator provides is a schema based approach to configuration that is supported
52
52
the Kubernetes `explain` command. Here are a couple of examples for you to try:
53
53
54
54
[.console-input]
@@ -209,7 +209,7 @@ STATUS: Progressing
209
209
MESSAGE
210
210
----
211
211
212
-
Note the command confirms that Argo CD considers the PVC to be `Progressing`, let's change that with the following
212
+
Note the command confirms that Argo CD considers the PVC to be `Progressing`, let's change that with the following
213
213
custom health check writtin in LUA to override the default one:
214
214
215
215
[source,yaml,subs="+macros,attributes+"]
@@ -289,8 +289,8 @@ STATUS: Healthy
289
289
MESSAGE: Pending
290
290
----
291
291
292
-
Great, our updated health check is working! The status is returned as `Healthy` to Argo CD but we set the message field to the
293
-
Kubernetes status of the PVC to provide additional context.
292
+
Great, our updated health check is working! The status is returned as `Healthy` to Argo CD but we set the message field to the
293
+
Kubernetes status of the PVC to provide additional context.
294
294
295
295
Let's go ahead and patch it into our ArgoCD Custom Resource on the cluster to take advantage of it:
296
296
@@ -385,8 +385,8 @@ The Argo CD user interface, when viewing a pod, can optionally show a link:https
385
385
tab similar to what you see in the OpenShift console. This can be useful for organizations which use the Argo CD UI
386
386
as the primary means for managing Kubernetes resources.
387
387
388
-
While we previously gave permissions for the terminal in the previous module, by default this is not enabled. To verify this,
389
-
in the health application that was deployed previously click on the pod.
388
+
While we previously gave permissions for the terminal in the previous module, by default this is not enabled. To verify this,
389
+
in the health application that was deployed previously click on the pod.
390
390
391
391
image::argocd-select-pod.png[]
392
392
@@ -395,9 +395,9 @@ Note that the only tabs available are `SUMMARY`, `EVENTS` and `LOGS` with no `TE
395
395
image::argocd-pod-tabs.png[]
396
396
397
397
As mentioned previously, not all Argo CD settings are defined in the ArgoCD Custom Resource and enabling
398
-
the terminal is one of those cases.
398
+
the terminal is one of those cases.
399
399
400
-
For cases like this where a setting is not defined, we can use the `extraConfig` to have the operator add these items
400
+
For cases like this where a setting is not defined, we can use the `extraConfig` to have the operator add these items
401
401
directly to the `argocd-cm` ConfigMap. Whatever is defined, correctly or incorrectly, will be copied
402
402
to this ConfigMap so some care should be taken when using this feature.
403
403
@@ -427,7 +427,7 @@ image::argocd-terminal.png[]
427
427
428
428
[IMPORTANT]
429
429
As per the link:https://argo-cd.readthedocs.io/en/latest/operator-manual/web_based_terminal/[Argo CD Documentation, window="_blank"], the `argocd-server` ServiceAccount must be granted additional permissions with Kubernetes RBAC
430
-
to enable the terminal. These permissions have already been applied by specifying a custom ClusterRole for the GitOps Operator.
430
+
to enable the terminal. These permissions have already been applied by specifying a custom ClusterRole for the GitOps Operator.
Copy file name to clipboardExpand all lines: content/modules/ROOT/pages/04-applicationsets.adoc
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,13 @@ and the newer ApplicationSets in Argo CD.
7
7
[#app-of-apps]
8
8
== App-of-Apps
9
9
10
-
Before we delve into ApplicatioSets, let's dive into the useful link:https://argo-cd.readthedocs.io/en/latest/operator-manual/cluster-bootstrapping/#app-of-apps-pattern[App-of-Apps, window="_blank"]
11
-
pattern which predates ApplicationSets.
10
+
Before we delve into ApplicationSets, let's dive into the useful link:https://argo-cd.readthedocs.io/en/latest/operator-manual/cluster-bootstrapping/#app-of-apps-pattern[App-of-Apps, window="_blank"]
11
+
pattern which predates ApplicationSets.
12
12
13
-
The concept of App-of-Apps is that you have an Application in Argo CD that points to a location that consists only of Applications. This enables bootstrapping a set of
13
+
The concept of App-of-Apps is that you have an Application in Argo CD that points to a location that consists only of Applications. This enables bootstrapping a set of
14
14
Applications from a single Application and is useful in use cases such as cluster configuration and same app with multiple environments scenarios.
15
15
16
-
Before we can deploy the App-of-Apps, we first need to deploy a health check for the Application resource which is not included as a health check in Argo CD at this time.
16
+
Before we can deploy the App-of-Apps, we first need to deploy a health check for the Application resource which is not included as a health check in Argo CD at this time.
17
17
18
18
[NOTE]
19
19
This is because in Argo CD 1.x the default Application health check was removed, the author of this workshop link:https://github.com/argoproj/argo-cd/issues/16870[disagrees, window="_blank"] with
@@ -99,7 +99,7 @@ using the App-of-Apps pattern as per the link:https://argo-cd.readthedocs.io/en/
99
99
The kustomize section is used to transform the destination for the Application for your specific user. This is only needed
100
100
here as all users are using the same repository, typically this would not be required.
101
101
102
-
In this section we have seen how we can use App-of-Apps to deploy multiple Applications stored in git. However this list of
102
+
In this section we have seen how we can use App-of-Apps to deploy multiple Applications stored in git. However this list of
103
103
Applications is static, what if we want to create Applications dynamically based on external sources? This is where
104
104
ApplicationSets come into play.
105
105
@@ -144,7 +144,7 @@ Deploy the ApplicationSet using the following command:
144
144
[.console-input]
145
145
[source,sh,subs="attributes",role=execute]
146
146
----
147
-
sed 's/$USER/{user}/' ~/workshop/content/modules/ROOT/examples/applicationsets/coolstore-list-appset.yaml | oc apply -n {user}-argocd -f -
147
+
sed 's/$USER/{user}/' ~/workshop/content/modules/ROOT/examples/applicationsets/coolstore-list-appset.yaml | oc apply -n {user}-argocd -f -
148
148
----
149
149
150
150
Next have a look at the ApplicationSet that was deployed with this command:
@@ -236,7 +236,7 @@ In this example we will deploy the front-end of the coolstore using an Applicati
236
236
git generator supports two modes, file and directory. In our case we will leverage the directory mode to
237
237
point the generator at a set of kustomize overlays in the repository.
238
238
239
-
For those not familiar with kustomize, a common pattern when deploying an application with kustomize for multiple
239
+
For those not familiar with kustomize, a common pattern when deploying an application with kustomize for multiple
240
240
environments is to have a repository that contains a `base` and `overlays` folders. The base folder contains
241
241
all of the manifests to be deployed. The `overlays` are used to patch the base to handle any
0 commit comments