Skip to content


Switch branches/tags

Latest commit


Git stats


Failed to load latest commit information.
Latest commit message
Commit time

Jenkins Infrastructure Kubernetes Management

This repository contains the helmfile manifests values used by jenkins infrastructure project to manage the applications of its kubernetes clusters.

The charts used come from the helm charts repository and from external providers.


The Jenkins Infrastructure Kubernetes Management project accepts contributions via GitHub pull requests, more information in


Any issues can be reported on our JIRA issue tracker

Repository Structure

This project contains the following main directories:

  • clusters: This folder contains the per-cluster helmfiles with the releases to apply per cluster
  • config: This folder contains the specific configuration for our environments
  • updatecli: This folder contains the updatecli manifests to keep all Helm charts and Docker images versions up to date


This project requires the following tools (more details within the DockerFile):

  • az
  • awscli
  • doctl
  • kubectl
  • helm
  • helmfile
  • sops
  • the 3 followings helm plugins:
    • helm-diff
    • helm-secrets
    • helm-git


Secrets are encrypted with sops, a default configuration is defined in .sops.yaml. Currently there are two kinds of encryption keys: a GPG key and an Azure Key Vault (accessible from Kubernetes clusters).

All secrets are expected to be found in the ./secrets folder which is absent by default and (git)ignored.

If you have the right to access the secrets, you can set up the local ./secrets folder from the (private) repository jenkins-infra/charts-secrets with the following command:

git clone ./secrets

Then, you can edit an app secret by using the sops ./secrets/config/<app-name>/secrets.yaml command that will create a blank secrets.yaml file ready to get encrypted as soon as it's saved and closed (you may need to add your ip on the azure key vault to get access) sops examples.


  • We need one Jenkins instance per cluster to be able to split cluster orchestration tasks outside

  • If RBAC is enabled on the cluster, before being able to use Helm we need to create a Service Account for Helm with the right Cluster Role Binding with this command: kubectl apply -f helm/rbac.yaml


minikube start --kubernetes-version v1.20.13
minikube addons enable ingress
helm install stable/nginx-ingress nginx-ingress # we can't install the ingress defined in this repository for local testing
kubectl -n release port-forward default-release-jenkins-77fd54976f-ns2c6 8081:8080

kubectl get secrets -n release  default-release-jenkins -o json