Skip to content

Commit ced2097

Browse files
authored
Update requirements & Install (#218)
* Update requirements & Install Restructure requirements and install according to reqs * Update requirements and installation * Update requirements.md * Update installation.md * Update requirements.md * Update requirements.md Added configuration per ingress controller * Update requirements and installation * Update requirements.md * Updated installation and requirements Added x-refs to pre and post install config topics * Update requirements and installation Added xrefs * Update requirements and installation Minor content updates * Update requirements.md Minor update * Update installation.md Added git provider, git user and extended rep url flag descriptions currently commented out pending approval by product * Update requirements and installation Changed SSL to TLS and removed note on skip connectivity and server version checks * Update cross-refs for installation and requirements * Updates Fixed typos and replaced SSL with TLS * Update requirements and install * Update installation.md Updated ingress class flag as required * Update formattings Added line breaks for differentiation between headings * Update installation.md * Update installation.md
1 parent 0f11a4d commit ced2097

File tree

11 files changed

+1372
-296
lines changed

11 files changed

+1372
-296
lines changed

_data/home-content.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
localurl: /docs/runtime/installation
4040
- title: Manage provisioned runtimes
4141
localurl: /docs/runtime/monitor-manage-runtimes/
42-
- title: Monitor provisioned runtimes
42+
- title: Monitor provisioned hybrid runtimes
4343
localurl: /docs/runtime/monitoring-troubleshooting/
4444
- title: Add external clusters to runtimes
4545
localurl: /docs/runtime/managed-cluster/

_data/nav.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@
5555
url: "/installation"
5656
- title: Manage provisioned runtimes
5757
url: "/monitor-manage-runtimes"
58-
- title: Monitor provisioned runtimes
58+
- title: Monitor provisioned hybrid runtimes
5959
url: "/monitoring-troubleshooting"
6060
- title: Add external clusters to runtimes
6161
url: "/managed-cluster"
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: "Sync applications"
3+
description: ""
4+
group: deployment
5+
toc: true
6+
---
7+
8+
Sync applications directly from the Codefresh UI
9+
10+
The Synchonuze option si
11+
12+
13+
The set of options for application synchronization identical to that of Argo CD. In Codefresh, they are grouped into sets: Revision and Additional Options.
14+
15+
16+
### Synchronize application
17+
18+
19+
Codefresh groups Synchronization options By
20+
21+
### Revision settings for application sync
22+
revision - The branch to be checked out when a deployment happens
23+
24+
Prune: When selected, removes legacy resources that do not exist currently in Git. If pruning is not enforced and Argo CD identifies resources that require pruning, it displays them in the
25+
Read more in [No Prune Resources](https://argo-cd.readthedocs.io/en/stable/user-guide/sync-options/#no-prune-resources){:target="\_blank"}.
26+
27+
Apply only: When selected, applies Kubernetes sever-side apply with field-management controls for patches and updates. Modifications to fields foChanges to a field of which you are not the manager results by If a new field is created, the new ownCompared to the last-applied annotation managed by kubectl, Server Side Apply uses a more declarative approach, which tracks a user's field management, rather than a user's last applied state. This means that as a side effect of using Server Side Apply, information about which field manager manages each field in an object also becomes available.
28+
29+
For a user to manage a field, in the Server Side Apply sense, means that the user relies on and expects the value of the field not to change. The user who last made an assertion about the value of a field will be recorded as the current field manager. This can be done either by changing the value with POST, PUT, or non-apply PATCH, or by including the field in a config sent to the Server Side Apply endpoint. When using Server-Side Apply, trying to change a field which is managed by someone else will result in a rejected request (if not forced, see Conflicts).
30+
Read more in instead of the client-side apply. when syncinng the application. We have a use case I don't see discussed much. We leverage mutating webhooks to provide lots of valuable default configuration for our Kubernetes users. An issue with this is that when running kubectl apply, the mutation will not take place if there is no difference between the desired and live states (I believe kubectl doesn't try to apply the patch in this case). However, when running kubectl apply --server-side, the mutations are always applied.
31+
32+
SSA controls modification right by clarifying field ownership, which can effectively prevent wrong modification. Understanding SSA merge policy and under what circumstances users can modify fields is necessary.
33+
34+
Whether it is an update or a patch, there will be three circumstances.
35+
36+
The current manager is the manager of all fields. Then the operation can proceed normally.
37+
The current manager is not the manager of some fields. The current operation can continue if those fields are not modified, and the current manager will be added to the fieldManager of the field as co-manager(sharedmanager).
38+
Modify non-manager fields, and conflicts occur. You can override value by becoming a shared manager or force the modification using--force-conflict.
39+
40+
Our users primarily interact with Kubernetes through ArgoCD. Without Argo CD supporting server-side apply, there is no way apply these mutations unless the resource actually has some new desired state.
41+
42+
Dry run: When selected, skips dry run for resources that are not known to the cluster. This option is useful when CRDs for custom resources are not created as part of the sync mechanism, but creatd by other mechanisms. In such cases, Argo CD's default behavior is to automatically fail the sync with the server could not find requested resource error.
43+
Read more in [Skip Dry Run for new custom resource types](https://argo-cd.readthedocs.io/en/stable/user-guide/sync-options/#skip-dry-run-for-new-custom-resources-types){:target="\_blank"}.
44+
45+
Force
46+
When selected, orphans (deletes??) the dependents of a deleted resource during the sync operation. This option is useful to prevent
47+
48+
### Additional Options for application sync
49+
50+
Sync options are described in ????
51+
Respect ignore differences
52+
When selected, ignore differences between all resources in the applicaion that could not be synced or resolved.
53+
Read more in [Argo CD Diffing Customization](https://argo-cd.readthedocs.io/en/stable/user-guide/diffing/){:target="\_blank"}.
54+
55+
#### Prune propagation policy
56+
{::nomarkdown}Defines how resources are pruned, applying Kubernetes cascading deletion prune policies.
57+
Read more at <a href="https://kubernetes.io/docs/concepts/architecture/garbage-collection/#cascading-deletion" target="_blank">Kubernetes - Cascading deletion</a>.</br><ul><li><b>Foreground</b>: The default prune propagation policy used by Argo CD. With this policy, Kubernetes changes the state of the owner resource to `deletion in progress`, until the controller deletes the dependent resources and finally the owner resource itself. </li><li><b>Background</b>: When selected, Kubernetes deletes the owner resource immediately, and then deletes the dependent resources in the background.</li><li><b>Orphan</b>: When selected, Kubernetes deletes the dependent resources that remain orphaned after the owner resource is deleted.</li></ul> </br>{:/}
58+
All Prune propagation policies can be used with:
59+
60+
61+
**Replace**: When selected, Argo CD executes `kubectl replace` or `kubectl create`, instead of the default `kubectl apply` to enforce the changes in Git. This action will potentially recreate resources and should be used with care. See [Replace Resource Instead Of Applying Change](https://argo-cd.readthedocs.io/en/stable/user-guide/sync-options/#replace-resource-instead-of-applying-changes){:target="_blank"}.
62+
63+
64+
**Retry**: When selected, retries a failed sync operation, based on the retry settings configured:
65+
* Maximum number of sync retries (**Limit**)
66+
* Duration of each retry attempt in seconds, minutes, or hours (**Duration**)
67+
* Maximum duration permitted for each retry (**Max Duration**)
68+
* Factor by which to multiply the Duration in the event of a failed retry (**Factor**). A factor of 2 for example, attempts the second retry in 2 X 2 seconds, where 2 seconds is the Duration.

0 commit comments

Comments
 (0)