@@ -64,15 +64,15 @@ spec:
6464 argoCDAgent:
6565 principal:
6666 enabled: true
67- allowedNamespaces:
67+ allowedNamespaces:
6868 - "*"
6969 jwtAllowGenerate: true
7070 auth: "mtls:CN=([^,]+)"
7171 logLevel: "trace"
7272 image: "ghcr.io/argoproj-labs/argocd-agent/argocd-agent:latest"
7373 sourceNamespaces:
7474 - "agent-managed"
75- - "agent-autonomous"
75+ - "agent-autonomous"
7676```
7777
7878The above CR should create all the necessary resource for Argo CD as well as argocd-agent principal in argocd namespace.
@@ -83,10 +83,10 @@ Create argocd-redis secret, because principal looks for it to fetch redis authen
8383oc create secret generic argocd-redis -n argocd --from-literal=auth="$(oc get secret argocd-redis-initial-password -n argocd -o jsonpath='{.data.admin\.password}' | base64 -d)"
8484```
8585
86- ## Setting up agent workload cluster
86+ ## Setting up agent workload cluster
87+
88+ ### Configure Argo CD for Agent
8789
88- ### Configure Argo CD for Agent
89-
9090Argo CD instance on Agent cluster
9191
9292Creating Argo CD instance for Workload/spoke cluster.
@@ -100,14 +100,14 @@ Creating Argo CD instance for Workload/spoke cluster.
100100 enabled: false
101101```
102102
103- Create redis secret using below command for agent deployment
103+ Create redis secret using below command for agent deployment
104104```
105105kubectl create secret generic argocd-redis -n <workload namespace> --from-literal=auth="$(kubectl get secret argocd-redis-initial-password -n <argocd-namespace> -o jsonpath='{.data.admin\.password}' | base64 -d)"
106106```
107107
108108### Configure Agent in managed mode
109109
110- Before installing agent resources create
110+ Before installing agent resources create
111111- a TLS secret containing the issued certificate for agent
112112
113113Create the PKI on the agent:
@@ -116,9 +116,9 @@ Run this command while connected to principal
116116argocd-agentctl pki issue agent <agent-name> --principal-context <principal context> --agent-context <workload context> --agent-namespace <workload namespace> --upsert
117117```
118118
119- Apply the installation manifests for Argo CD-agent agent
119+ Apply the installation manifests for Argo CD-agent agent, change < release-branch > to the release you want to deploy:
120120```
121- oc apply -n $(workload-namespace) -k 'https://github.com/argoproj-labs/argocd-agent/install/kubernetes/agent?ref=main '
121+ oc apply -n $(workload-namespace) -k 'https://github.com/argoproj-labs/argocd-agent/install/kubernetes/agent?ref=<release-branch> '
122122```
123123This should create all the required agent related resources.
124124
@@ -129,7 +129,7 @@ kubectl patch clusterrolebinding argocd-agent-agent --type='json' -p='[{"op": "r
129129```
130130
131131
132- Update the configMap with name ` argocd-agent-params ` with parameters related to agent.mode,agent.creds, agent.namespace, agent.server.address.
132+ Update the configMap with name ` argocd-agent-params ` with parameters related to agent.mode,agent.creds, agent.namespace, agent.server.address.
133133```
134134 agent.keep-alive-ping-interval: 50s
135135 agent.mode: managed
@@ -147,13 +147,13 @@ Update the configMap with name `argocd-agent-params` with parameters related to
147147 agent.tls.root-ca-secret-name: argocd-agent-ca
148148 agent.tls.secret-name: argocd-agent-client-tls
149149```
150- Also Update RBAC, rolebinding/clusterrolebinding with ` workload-namespace ` , if pod is facing rbac issues.
150+ Also Update RBAC, rolebinding/clusterrolebinding with ` workload-namespace ` , if pod is facing rbac issues.
151151
152152
153153
154154### Configure Agent in Autonomous mode
155155
156- Before installing agent resources create
156+ Before installing agent resources create
157157Create a TLS secret containing the issued certificate for agent
158158
159159Create the PKI on the agent:
@@ -162,9 +162,9 @@ Run this command while connected to principal
162162argocd-agentctl pki issue agent <agent-name> --principal-context <principal context> --agent-context <workload context> --agent-namespace argocd --upsert
163163```
164164
165- Apply the installation manifests for argocd agent
165+ Apply the installation manifests for argocd agent replacing < release-branch > with the release that you wish to use:
166166```
167- oc apply -n argocd -k 'https://github.com/argoproj-labs/argocd-agent/install/kubernetes/agent?ref=main '
167+ oc apply -n argocd -k 'https://github.com/argoproj-labs/argocd-agent/install/kubernetes/agent?ref=<release-branch> '
168168```
169169This should create all the required agent related resources.
170170
@@ -179,7 +179,7 @@ Update the configMap with name `argocd-agent-params` with parameters related to
179179```
180180data:
181181 agent.keep-alive-ping-interval: 50s
182- agent.tls.client.insecure: 'false'
182+ agent.tls.client.insecure: 'false'
183183 agent.server.port: '443'
184184 agent.tls.root-ca-path: ''
185185 agent.tls.client.cert-path: ''
@@ -196,7 +196,7 @@ data:
196196```
197197
198198
199- #### Troubleshooting
199+ #### Troubleshooting
200200___
201201
2022021 . If pod fails to come up with error
@@ -217,4 +217,4 @@ kubectl patch clusterrolebinding argocd-agent-agent --type='json' -p='[{"op": "r
217217```
218218Unable to create application: app is not allowed in project "default", or the project does not exist
219219```
220- refer to doc for [ AppProject Synchronization] ( https://argocd-agent.readthedocs.io/latest/user-guide/appprojects/#managed-agent-mode ) .
220+ refer to doc for [ AppProject Synchronization] ( https://argocd-agent.readthedocs.io/latest/user-guide/appprojects/#managed-agent-mode ) .
0 commit comments