-
Notifications
You must be signed in to change notification settings - Fork 2
15 document manual argocd deployment process #21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 3 commits
Commits
Show all changes
11 commits
Select commit
Hold shift + click to select a range
4f62868
Created docuemntation for manual argocd deployment
USHER-PB e91f635
Added readme to introduce argocd and providing links to appropriate a…
USHER-PB ef3064d
Feat: added manual argocd config file
USHER-PB 7439f74
Feat: Address file based on comment placed
USHER-PB 7b786e0
Docs: updated documentation to meetup deployment work
USHER-PB f5ed6bb
Docs: updated documentation to meetup deployment work
USHER-PB 3cc2b7a
Docs: update file
USHER-PB d70a90e
Docs: fix docs based on comment
USHER-PB 065aff5
Docs: Added image for doc
USHER-PB 956d608
Docs: refactor docs
USHER-PB ff071f5
Docs: arrange readme file making it more concise
USHER-PB File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,90 @@ | ||
| # Argo CD | ||
onelrian marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
onelrian marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It automates the deployment of applications by continuously monitoring Git repositories and synchronizing the desired application state with the live state in your Kubernetes cluster. | ||
|
|
||
| ## What is Argo CD? | ||
|
|
||
| Argo CD follows the **GitOps** pattern, using Git repositories as the source of truth for defining the desired application state. It provides: | ||
|
|
||
| - **Automated Deployment**: Automatically sync applications from Git to Kubernetes | ||
| - **Application Health Monitoring**: Continuously monitor application health and sync status | ||
| - **Rollback Capabilities**: Easy rollback to previous application versions | ||
| - **Multi-Cluster Management**: Manage deployments across multiple Kubernetes clusters | ||
| - **SSO Integration**: Support for OIDC, SAML, LDAP, and other authentication providers | ||
| - **RBAC**: Fine-grained role-based access control for multi-tenancy | ||
| - **Web UI & CLI**: Both graphical and command-line interfaces for management | ||
USHER-PB marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| ## Key Features | ||
|
|
||
| ### GitOps Workflow | ||
| - Declarative application definitions using Kubernetes manifests, Helm charts, or Kustomize | ||
| - Git as the single source of truth for application configuration | ||
| - Automated synchronization between Git repository and cluster state | ||
|
|
||
| ### High Availability | ||
| - Support for Redis HA for session storage | ||
| - Multiple replicas for API server and repository server | ||
| - Horizontal pod autoscaling for handling increased load | ||
|
|
||
| ### Security | ||
| - TLS/HTTPS support with automated certificate management | ||
| - Integration with cert-manager for certificate provisioning | ||
| - RBAC policies for fine-grained access control | ||
| - SSO/OIDC authentication support | ||
|
|
||
| ### Developer Experience | ||
| - Intuitive web UI for visualizing application topology | ||
| - CLI for automation and CI/CD integration | ||
| - Real-time sync status and health monitoring | ||
| - Automated or manual sync strategies | ||
|
|
||
| ## Architecture | ||
|
|
||
| Argo CD consists of several key components: | ||
|
|
||
| - **API Server**: Exposes the API consumed by the Web UI, CLI, and CI/CD systems | ||
| - **Repository Server**: Maintains a local cache of Git repositories holding application manifests | ||
| - **Application Controller**: Monitors running applications and compares live state against desired state | ||
| - **Redis**: Provides caching and session storage (with HA support for production) | ||
| - **ApplicationSet Controller**: Automates the generation of Argo CD applications | ||
|
|
||
| ## Deployment Options | ||
|
|
||
| We provide two ways to deploy Argo CD to your Kubernetes cluster: | ||
|
|
||
| ### 1. Manual Deployment | ||
|
|
||
| Deploy Argo CD manually using Helm with customizable values files. This approach gives you full control over the configuration and is ideal for: | ||
|
|
||
| - Learning how Argo CD works | ||
| - Custom configurations not covered by automation | ||
| - Environments where Terraform is not available | ||
|
|
||
| **📖 [Manual Deployment Guide](../docs/manual-argocd-deployment.md)** | ||
USHER-PB marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| The manual deployment uses the production-ready values file located at [`argocd/manual/argocd-prod-values.yaml`](manual/argocd-prod-values.yaml), which includes: | ||
|
|
||
| - High availability configuration with Redis HA | ||
| - Autoscaling for repo-server and API server | ||
| - HTTPS ingress with cert-manager integration | ||
| - OIDC authentication setup (Keycloak example) | ||
| - RBAC policies for multi-tenancy | ||
|
|
||
| ### 2. Automated Deployment (Terraform) | ||
|
|
||
| Deploy Argo CD automatically using Terraform for infrastructure-as-code management. This approach is ideal for: | ||
|
|
||
| - Production environments | ||
| - Repeatable deployments across multiple clusters | ||
| - Integration with existing Terraform infrastructure | ||
| - Team collaboration with version-controlled infrastructure | ||
|
|
||
| **📖 [Automated Deployment Guide](#)** *(Coming soon)* | ||
onelrian marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| The automated deployment is located in the [`argocd/terraform/`](terraform) directory and provides: | ||
|
|
||
| - Declarative infrastructure-as-code | ||
| - Automated dependency management (cert-manager, ingress controller) | ||
| - Environment-specific configurations (dev, prod) | ||
| - Integration with GCP/GKE infrastructure | ||
|
|
||
onelrian marked this conversation as resolved.
Show resolved
Hide resolved
|
||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,93 @@ | ||
| # 1. High Availability (Redis & Components) | ||
| # ----------------------------------------- | ||
| redis-ha: | ||
| enabled: true | ||
| exporter: | ||
| enabled: true | ||
|
|
||
| controller: | ||
| replicas: 1 | ||
| resources: | ||
| limits: | ||
| memory: "2Gi" | ||
| cpu: "1" | ||
| requests: | ||
| memory: "512Mi" | ||
| cpu: "250m" | ||
|
|
||
| repoServer: | ||
| replicas: 2 | ||
| autoscaling: | ||
| enabled: true | ||
| minReplicas: 2 | ||
| maxReplicas: 5 | ||
| resources: | ||
| limits: | ||
| memory: "1Gi" | ||
| cpu: "500m" | ||
|
|
||
| server: | ||
| replicas: 2 | ||
| autoscaling: | ||
| enabled: true | ||
| minReplicas: 2 | ||
| maxReplicas: 5 | ||
|
|
||
| # 2. Ingress & Cert-Manager Integration | ||
| # ------------------------------------- | ||
| ingress: | ||
| enabled: true | ||
| ingressClassName: argocd-nginx # Points to the controller we created in Phase 1 | ||
| hostname: "argocd.observe.camer.digital" # CHANGE THIS | ||
| annotations: | ||
| # Standard Nginx tuning | ||
| nginx.ingress.kubernetes.io/force-ssl-redirect: "true" | ||
| nginx.ingress.kubernetes.io/backend-protocol: "HTTP" | ||
|
|
||
| # Cert-Manager Configuration | ||
| cert-manager.io/cluster-issuer: "letsencrypt-prod" # CHANGE THIS to your Issuer name | ||
| # If you were using a ClusterIssuer, you would use: | ||
| # cert-manager.io/cluster-issuer: "letsencrypt-prod" | ||
|
|
||
| tls: | ||
| - secretName: argocd-tls-cert | ||
| hosts: | ||
| - "argocd.observe.camer.digital" # CHANGE THIS | ||
|
|
||
| # 3. Multi-Tenancy & RBAC | ||
| # ----------------------- | ||
| # This section sets up the foundation for multi-tenancy. | ||
| # We disable the admin user eventually and rely on SSO, | ||
| # but for now, we define policies. | ||
| configs: | ||
| params: | ||
| server.insecure: true # We terminate TLS at NGINX, so Argo itself runs insecurely internally | ||
|
|
||
| # Define RBAC roles for your tenants here or in a separate ConfigMap | ||
| rbac: | ||
| policy.csv: | | ||
| # Example: Grant 'dev-team' access only to 'dev-project' | ||
| # p, role:dev-team, applications, *, dev-project/*, allow | ||
| # g, dev-user@yourcompany.com, role:dev-team | ||
|
|
||
| # Default policy | ||
| g, admin, role:admin | ||
| g, ArgoCDAdmins, role:admin | ||
|
|
||
| cm: | ||
| url: https://argocd.observe.camer.digital | ||
| oidc.config: | | ||
| name: Keycloak | ||
| issuer: https://keycloak.18.198.59.109.sslip.io/realms/argocd | ||
| clientID: argocd | ||
| clientSecret: lGH4qCY4mtEVaweAAHzktyrXTwRLHdWC # Used by the Server for Web Login | ||
| requestedScopes: ["openid", "profile", "email", "groups"] | ||
| enablePKCEAuthentication: true | ||
| # PKCE is handled automatically by the ArgoCD CLI | ||
| # when it talks to this OIDC provider. | ||
|
|
||
| # 4. GitOps Engine Tuning | ||
| # ----------------------- | ||
| # Important for production to handle many applications | ||
| applicationSet: | ||
| replicas: 2 |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.