|
|
|
# Installation
|
|
|
|
|
|
|
|
This guide walks you through setting up the GitOps Toolkit
|
|
|
|
to manage one or more Kubernetes clusters.
|
|
|
|
|
|
|
|
## Prerequisites
|
|
|
|
|
|
|
|
You will need a Kubernetes cluster version **1.16** or newer
|
|
|
|
and kubectl version **1.18** or newer.
|
|
|
|
|
|
|
|
## Install the toolkit CLI
|
|
|
|
|
|
|
|
With Homebrew:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
brew tap fluxcd/tap
|
|
|
|
brew install flux
|
|
|
|
```
|
|
|
|
|
|
|
|
With Bash:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
curl -s https://toolkit.fluxcd.io/install.sh | sudo bash
|
|
|
|
|
|
|
|
# enable completions in ~/.bash_profile
|
|
|
|
. <(flux completion bash)
|
|
|
|
```
|
|
|
|
|
|
|
|
Command-line completion for `zsh`, `fish`, and `powershell`
|
|
|
|
are also supported with their own sub-commands.
|
|
|
|
|
|
|
|
Binaries for macOS, Windows and Linux AMD64/ARM are available for download on the
|
|
|
|
[release page](https://github.com/fluxcd/toolkit/releases).
|
|
|
|
|
|
|
|
Verify that your cluster satisfies the prerequisites with:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux check --pre
|
|
|
|
```
|
|
|
|
|
|
|
|
## Bootstrap
|
|
|
|
|
|
|
|
Using the `flux bootstrap` command you can install the toolkit on a Kubernetes cluster
|
|
|
|
and configure it to manage itself from a Git repository.
|
|
|
|
|
|
|
|
The bootstrap creates a Git repository if one doesn't exist and
|
|
|
|
commits the toolkit components manifests to the main branch.
|
|
|
|
Then it configures the target cluster to synchronize with that
|
|
|
|
repository by setting up SSH deploy keys.
|
|
|
|
|
|
|
|
If the toolkit components are present on the cluster,
|
|
|
|
the bootstrap command will perform an upgrade if needed.
|
|
|
|
The bootstrap is idempotent, it's safe to run the command as many times as you want.
|
|
|
|
|
|
|
|
You can choose what components to install and for which cluster with:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux bootstrap <GIT-PROVIDER> \
|
|
|
|
--components=source-controller,kustomize-controller,helm-controller,notification-controller \
|
|
|
|
--path=my-cluster \
|
|
|
|
--version=latest
|
|
|
|
```
|
|
|
|
|
|
|
|
!!! hint "ARM"
|
|
|
|
When deploying to a Kubernetes cluster with ARM architecture,
|
|
|
|
you can use `--arch=arm` for ARMv7 32-bit container images
|
|
|
|
and `--arch=arm64` for ARMv8 64-bit container images.
|
|
|
|
|
|
|
|
If you wish to install a specific version, use the toolkit
|
|
|
|
[release tag](https://github.com/fluxcd/toolkit/releases) e.g. `--version=v0.0.14`.
|
|
|
|
|
|
|
|
With `--path` you can configure the directory which will be used to reconcile the target cluster.
|
|
|
|
To control multiple clusters from the same Git repository, you have to set a unique path per
|
|
|
|
cluster e.g. `staging-cluster` and `production-cluster`:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
├── staging-cluster # <- path=staging-cluster
|
|
|
|
│ └── flux-system # <- namespace dir generated by bootstrap
|
|
|
|
│ ├── toolkit-components.yaml
|
|
|
|
│ ├── toolkit-kustomization.yaml
|
|
|
|
│ └── toolkit-source.yaml
|
|
|
|
└── production-cluster # <- path=production-cluster
|
|
|
|
└── flux-system
|
|
|
|
```
|
|
|
|
|
|
|
|
!!! hint "Change the default branch"
|
|
|
|
If you wish to change the branch to something else than main, create the repository manually,
|
|
|
|
push a branch to origin and then use `flux bootstrap <GIT-PROVIDER> --branch=your-branch`.
|
|
|
|
|
|
|
|
### GitHub and GitHub Enterprise
|
|
|
|
|
|
|
|
Generate a [personal access token](https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line)
|
|
|
|
that can create repositories by checking all permissions under `repo`.
|
|
|
|
|
|
|
|
Export your GitHub personal access token as an environment variable:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
export GITHUB_TOKEN=<your-token>
|
|
|
|
```
|
|
|
|
|
|
|
|
Run the bootstrap for a repository on your personal GitHub account:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux bootstrap github \
|
|
|
|
--owner=my-github-username \
|
|
|
|
--repository=my-repository \
|
|
|
|
--path=my-cluster \
|
|
|
|
--personal
|
|
|
|
```
|
|
|
|
|
|
|
|
Run the bootstrap for a repository owned by a GitHub organization:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux bootstrap github \
|
|
|
|
--owner=my-github-organization \
|
|
|
|
--repository=my-repository \
|
|
|
|
--team=team1-slug \
|
|
|
|
--team=team2-slug \
|
|
|
|
--path=my-cluster
|
|
|
|
```
|
|
|
|
|
|
|
|
When you specify a list of teams, those teams will be granted maintainer access to the repository.
|
|
|
|
|
|
|
|
To run the bootstrap for a repository hosted on GitHub Enterprise, you have to specify your GitHub hostname:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux bootstrap github \
|
|
|
|
--hostname=my-github-enterprise.com \
|
|
|
|
--owner=my-github-organization \
|
|
|
|
--repository=my-repository \
|
|
|
|
--branch=main \
|
|
|
|
--path=my-cluster
|
|
|
|
```
|
|
|
|
|
|
|
|
### GitLab and GitLab Enterprise
|
|
|
|
|
|
|
|
Generate a [personal access token](https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html)
|
|
|
|
that grants complete read/write access to the GitLab API.
|
|
|
|
|
|
|
|
Export your GitLab personal access token as an environment variable:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
export GITLAB_TOKEN=<your-token>
|
|
|
|
```
|
|
|
|
|
|
|
|
Run the bootstrap for a repository on your personal GitLab account:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux bootstrap gitlab \
|
|
|
|
--owner=my-gitlab-username \
|
|
|
|
--repository=my-repository \
|
|
|
|
--branch=master \
|
|
|
|
--path=my-cluster \
|
|
|
|
--personal
|
|
|
|
```
|
|
|
|
|
|
|
|
To run the bootstrap for a repository using deploy keys for authentication, you have to specify the SSH hostname:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux bootstrap gitlab \
|
|
|
|
--ssh-hostname=gitlab.com \
|
|
|
|
--owner=my-gitlab-username \
|
|
|
|
--repository=my-repository \
|
|
|
|
--branch=master \
|
|
|
|
--path=my-cluster
|
|
|
|
```
|
|
|
|
|
|
|
|
!!! hint "Authentication"
|
|
|
|
When providing the `--ssh-hostname`, a read-only (SSH) deploy key will be added
|
|
|
|
to your repository, otherwise your GitLab personal token will be used to
|
|
|
|
authenticate against the HTTPS endpoint instead.
|
|
|
|
|
|
|
|
Run the bootstrap for a repository owned by a GitLab group:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux bootstrap gitlab \
|
|
|
|
--owner=my-gitlab-group \
|
|
|
|
--repository=my-repository \
|
|
|
|
--branch=master \
|
|
|
|
--path=my-cluster
|
|
|
|
```
|
|
|
|
|
|
|
|
To run the bootstrap for a repository hosted on GitLab on-prem or enterprise, you have to specify your GitLab hostname:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux bootstrap gitlab \
|
|
|
|
--hostname=my-gitlab.com \
|
|
|
|
--owner=my-gitlab-group \
|
|
|
|
--repository=my-repository \
|
|
|
|
--branch=master \
|
|
|
|
--path=my-cluster
|
|
|
|
```
|
|
|
|
|
|
|
|
### Generic Git Server
|
|
|
|
|
|
|
|
For other Git providers such as Bitbucket, Gogs, Gitea, etc you can manually setup the repository and the deploy key.
|
|
|
|
|
|
|
|
Create a Git repository and clone it locally:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
git clone ssh://<host>/<org>/my-repository
|
|
|
|
cd my-repository
|
|
|
|
```
|
|
|
|
|
|
|
|
Create a directory inside the repository:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
mkdir -p ./my-cluster/flux-system
|
|
|
|
```
|
|
|
|
|
|
|
|
Generate the toolkit manifests with:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux install --version=latest \
|
|
|
|
--arch=amd64 \ # on ARM64/AARCH64 clusters use --arch=arm64
|
|
|
|
--export > ./my-cluster/flux-system/toolkit-components.yaml
|
|
|
|
```
|
|
|
|
|
|
|
|
If your cluster must pull images from a private container registry, first you should pull
|
|
|
|
the toolkit images from GitHub Container Registry and push them to your registry, for example:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
docker pull ghcr.io/fluxcd/source-controller:v0.0.14
|
|
|
|
docker tag ghcr.io/fluxcd/source-controller:v0.0.14 registry.internal/fluxcd/source-controller:v0.0.14
|
|
|
|
docker push registry.internal/fluxcd/source-controller:v0.0.14
|
|
|
|
```
|
|
|
|
|
|
|
|
Create the pull secret in the `flux-system` namespace:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
kubectl create ns flux-system
|
|
|
|
|
|
|
|
kubectl -n flux-system create secret generic regcred \
|
|
|
|
--from-file=.dockerconfigjson=/.docker/config.json \
|
|
|
|
--type=kubernetes.io/dockerconfigjson
|
|
|
|
```
|
|
|
|
|
|
|
|
Set your registry domain, and the pull secret when generating the manifests:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux install --version=latest \
|
|
|
|
--registry=registry.internal/fluxcd \
|
|
|
|
--image-pull-secret=regcred \
|
|
|
|
--export > ./my-cluster/flux-system/toolkit-components.yaml
|
|
|
|
```
|
|
|
|
|
|
|
|
Commit and push the manifest to the master branch:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
git add -A && git commit -m "add toolkit manifests" && git push
|
|
|
|
```
|
|
|
|
|
|
|
|
Apply the manifests on your cluster:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
kubectl apply -f ./my-cluster/flux-system/toolkit-components.yaml
|
|
|
|
```
|
|
|
|
|
|
|
|
Verify that the toolkit controllers have started:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux check
|
|
|
|
```
|
|
|
|
|
|
|
|
Create a `GitRepository` object on your cluster by specifying the SSH address of your repo:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux create source git flux-system \
|
|
|
|
--url= ssh://<host>/<org>/my-repository \
|
|
|
|
--ssh-key-algorithm=ecdsa \
|
|
|
|
--ssh-ecdsa-curve=p521 \
|
|
|
|
--branch=master \
|
|
|
|
--interval=1m
|
|
|
|
```
|
|
|
|
|
|
|
|
You will be prompted to add a deploy key to your repository.
|
|
|
|
If you don't specify the SSH algorithm, then flux will generate an RSA 2048 bits key.
|
|
|
|
|
|
|
|
If your Git server supports basic auth, you can set the URL to HTTPS and specify the credentials with:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux create source git flux-system \
|
|
|
|
--url=https://<host>/<org>/my-repository \
|
|
|
|
--username=my-username \
|
|
|
|
--password=my-password \
|
|
|
|
--branch=master \
|
|
|
|
--interval=1m
|
|
|
|
```
|
|
|
|
|
|
|
|
Create a `Kustomization` object on your cluster:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux create kustomization flux-system \
|
|
|
|
--source=flux-system \
|
|
|
|
--path="./my-cluster" \
|
|
|
|
--prune=true \
|
|
|
|
--interval=10m
|
|
|
|
```
|
|
|
|
|
|
|
|
Export both objects, commit and push the manifests to Git:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux export source git flux-system \
|
|
|
|
> ./my-cluster/flux-system/toolkit-source.yaml
|
|
|
|
|
|
|
|
flux export kustomization flux-system \
|
|
|
|
> ./my-cluster/flux-system/toolkit-kustomization.yaml
|
|
|
|
|
|
|
|
git add -A && git commit -m "add toolkit reconciliation" && git push
|
|
|
|
```
|
|
|
|
|
|
|
|
To upgrade the toolkit to a newer version, run the install command and commit the changes:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux install --version=latest \
|
|
|
|
--export > ./my-cluster/flux-system/toolkit-components.yaml
|
|
|
|
|
|
|
|
git add -A && git commit -m "update toolkit" && git push
|
|
|
|
```
|
|
|
|
|
|
|
|
The source-controller will pull the changes on the cluster, then the kustomize-controller
|
|
|
|
will perform a rolling update of all toolkit components including itself.
|
|
|
|
|
|
|
|
## Dev install
|
|
|
|
|
|
|
|
For testing purposes you can install the toolkit without storing its manifests in a Git repository.
|
|
|
|
|
|
|
|
Here is the equivalent to `fluxctl install`:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux install \
|
|
|
|
--components=source-controller,kustomize-controller
|
|
|
|
```
|
|
|
|
|
|
|
|
Then you can register Git repositories and reconcile them on your cluster:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux create source git podinfo \
|
|
|
|
--url=https://github.com/stefanprodan/podinfo \
|
|
|
|
--tag-semver=">=4.0.0" \
|
|
|
|
--interval=1m
|
|
|
|
|
|
|
|
flux create kustomization podinfo-default \
|
|
|
|
--source=podinfo \
|
|
|
|
--path="./kustomize" \
|
|
|
|
--prune=true \
|
|
|
|
--validation=client \
|
|
|
|
--interval=10m \
|
|
|
|
--health-check="Deployment/podinfo.default" \
|
|
|
|
--health-check-timeout=2m
|
|
|
|
```
|
|
|
|
|
|
|
|
Here is the equivalent to `helm install helm-operator`:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux install \
|
|
|
|
--components=source-controller,kustomize-controller,helm-controller
|
|
|
|
```
|
|
|
|
|
|
|
|
Then you can register Helm repositories and create Helm releases:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux create source helm stable \
|
|
|
|
--interval=1h \
|
|
|
|
--url=https://charts.helm.sh/stable
|
|
|
|
|
|
|
|
flux create helmrelease sealed-secrets \
|
|
|
|
--interval=1h \
|
|
|
|
--release-name=sealed-secrets \
|
|
|
|
--target-namespace=flux-system \
|
|
|
|
--source=HelmRepository/stable \
|
|
|
|
--chart=sealed-secrets \
|
|
|
|
--chart-version="1.10.x"
|
|
|
|
```
|
|
|
|
|
|
|
|
## Monitoring with Prometheus and Grafana
|
|
|
|
|
|
|
|
The GitOps Toolkit comes with a monitoring stack composed of Prometheus and Grafana. The controllers expose
|
|
|
|
metrics that can be used to track the readiness of the cluster reconciliation process.
|
|
|
|
|
|
|
|
To install the monitoring stack please follow this [guide](monitoring.md).
|
|
|
|
|
|
|
|
## Uninstall
|
|
|
|
|
|
|
|
You can uninstall the toolkit components with:
|
|
|
|
|
|
|
|
```sh
|
|
|
|
flux uninstall --crds
|
|
|
|
```
|
|
|
|
|
|
|
|
The above command will delete the toolkit custom resources definitions, the controllers
|
|
|
|
and the namespace where they were installed.
|