Skip to content

jenkins-infra/kubernetes-management

main
Switch branches/tags
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Jenkins Infrastructure Kubernetes Management

This repository contains the helmfile manifests values used by jenkins infrastructure project to manage the applications of its kubernetes clusters.

The charts used come from the helm charts repository and from external providers.

Contributing

The Jenkins Infrastructure Kubernetes Management project accepts contributions via GitHub pull requests, more information in CONTRIBUTING.md

Issues

Any issues can be reported on our JIRA issue tracker

Repository Structure

This project contains the following main directories:

  • clusters: This folder contains the per-cluster helmfiles with the releases to apply per cluster
  • config: This folder contains the specific configuration for our environments
  • updatecli: This folder contains the updatecli manifests to keep all Helm charts and Docker images versions up to date

Requirements

This project requires the following tools (more details within the DockerFile):

  • az
  • awscli
  • doctl
  • kubectl
  • helm
  • helmfile
  • sops
  • the 3 followings helm plugins:
    • helm-diff
    • helm-secrets
    • helm-git

Secrets

Secrets are encrypted with sops, a default configuration is defined in .sops.yaml. Currently there are two kinds of encryption keys: a GPG key and an Azure Key Vault (accessible from Kubernetes clusters).

All secrets are expected to be found in the ./secrets folder which is absent by default and (git)ignored.

If you have the right to access the secrets, you can set up the local ./secrets folder from the (private) repository jenkins-infra/charts-secrets with the following command:

git clone https://github.com/jenkins-infra/charts-secrets.git ./secrets

Then, you can edit an app secret by using the sops ./secrets/config/<app-name>/secrets.yaml command that will create a blank secrets.yaml file ready to get encrypted as soon as it's saved and closed (you may need to add your ip on the azure key vault to get access) sops examples.

Remarks

  • We need one Jenkins instance per cluster to be able to split cluster orchestration tasks outside release.ci.jenkins.io

  • If RBAC is enabled on the cluster, before being able to use Helm we need to create a Service Account for Helm with the right Cluster Role Binding with this command: kubectl apply -f helm/rbac.yaml

Minikube

minikube start --kubernetes-version v1.20.13
minikube addons enable ingress
helm install stable/nginx-ingress nginx-ingress # we can't install the ingress defined in this repository for local testing
kubectl -n release port-forward default-release-jenkins-77fd54976f-ns2c6 8081:8080

kubectl get secrets -n release  default-release-jenkins -o json

Links