Skip to content

Commit 659438b

Browse files
authored
Update tcie-3.x-setting-up-travis-ci-enterprise.md
1 parent 35b392c commit 659438b

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

user/enterprise/tcie-3.x-setting-up-travis-ci-enterprise.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Travis CI Enterprise Worker Images are publicly available and must be installed
2323

2424
## Travis CI Enterprise Core Services components
2525

26-
Travis CI Enterprise Core Services consist of components enlisted below. Each service has its own pod. Please pay attention to the *Comments* section, where you can find a list of services that may require replicating pods for handling higher workloads.
26+
Travis CI Enterprise Core Services consist of components enlisted below. Each service has its own pod. Please pay attention to the *Comments* section, where you can find a list of services that may require replicating pods to handle higher workloads.
2727

2828
| Pod name | Function | Comments |
2929
| ----------------------- | ----------------------------------------------------------------- | ---------------------------------------------- |
@@ -55,7 +55,7 @@ Please note: certain services will need to run scheduled background jobs, usuall
5555

5656
## Prerequisites
5757

58-
You can either install Travis CI Enterprise (TCIE) via [Replicated KOTS](https://kots.io/) to install it into a Kubernetes cluster on GCE, AWS, or OpenStack.
58+
You can install Travis CI Enterprise (TCIE) via [Replicated KOTS](https://kots.io/) and install it into a Kubernetes cluster on GCE, AWS, or OpenStack.
5959
Alternatively, you can install it on a single machine using the [Replicated kURL](https://kurl.sh/) installer and a configuration prepared by TravisCI (`tci-enterprise-kots`).
6060

6161
To set up your Travis CI Enterprise 3.x, you need:
@@ -66,7 +66,7 @@ To set up your Travis CI Enterprise 3.x, you need:
6666
| Infrastructure scenario | Requirement | Comment |
6767
| ------------------- | ---------------------- | ------------------------------------------------------- |
6868
| not using default k8s service at cloud provider | **Two virtual machines** on your private cloud that meet the [system requirements](#system-requirements) | One vm for Core Services, one for Worker |
69-
| using k8s service at cloud provider (e.g. Google KE, Amazon EKS ) | One Kubernetes (k8s) Cluster, one virtual machine that meet the [system requirements](#system-requirements) | Tke k8s cluster is meant for Core Services, the vm is meant for Worker Image |
69+
| using k8s service at cloud provider (e.g., Google KE, Amazon EKS ) | One Kubernetes (k8s) Cluster, one virtual machine that meets the [system requirements](#system-requirements) | Tke k8s cluster is meant for Core Services, the VM is meant for Worker Image |
7070

7171
* If using a GitHub Cloud or GitHub Enterprise Server: Configure the `secret` and `clientid` of a GitHub.com or GitHub Enterprise [OAuth application](https://developer.github.com/apps/building-integrations/setting-up-and-registering-oauth-apps/registering-oauth-apps/) with:
7272

@@ -83,7 +83,7 @@ Platform* which hosts Kubernetes cluster with each service in separate pods, and
8383
*Worker hosts* which run the tests/jobs in isolated containers using LXC
8484
and Docker.
8585

86-
Each dedicated host or hypervisor (VMWare, OpenStack, or EC2) should run **Ubuntu 18.04** and have at least **16 gigs of RAM and 8 CPUs**. If the same host is to run as Worker host, the minimum requirement would be **16 gigs of RAM and 8 CPUs**.
86+
Each dedicated host or hypervisor (VMWare, OpenStack, or EC2) should run **Ubuntu 18.04** and have at least **16 gigs of RAM and 8 CPUs**. If the same host is to run as a Worker host, the minimum requirement would be **16 gigs of RAM and 8 CPUs**.
8787

8888
If you're running on EC2, we recommend the **c4.2xlarge** instance type for both **Core Service (aka Platform)** and **Worker**. We also recommend using an image that uses EBS for the root volume and allocating 80 gigs of space.
8989

@@ -112,42 +112,42 @@ Ubuntu 18.04 LTS or later as the underlying operating system.
112112
| Port | Service | Description |
113113
|:-----|:----------------|:-----------------------------------------------------------------------------|
114114
| 8800 | Custom TCP Rule | Allow inbound access to the admin dashboard for your Enterprise installation. |
115-
| 5672 | Custom TCP Rule | Allow inbound access for RabbitMQ Non-SSL connections, e.g. for client. |
116-
| 4567 | Custom TCP Rule | Allow inbound access for RabbitMQ SSL, e.g. for client. |
115+
| 5672 | Custom TCP Rule | Allow inbound access for RabbitMQ Non-SSL connections, e.g., for the client. |
116+
| 4567 | Custom TCP Rule | Allow inbound access for RabbitMQ SSL, e.g., for the client. |
117117
| 3333 | HTTPS | Allow inbound TCIE 3.x User administration Web application over HTTPS access. |
118118
| 443 | HTTPS | Allow inbound Web application over HTTPS access. |
119119
| 80 | HTTP | Allow inbound Web application access. |
120120
| 22 | SSH | Allow inbound SSH traffic to access from your local machine. |
121121

122-
2. Please configure your hostname now. Skip this step if you will access TCIE through an IP address. Accessing TCIE through IP address is also viable option for your setup.
122+
2. Please configure your hostname now. Skip this step if you will access TCIE through an IP address. Accessing TCIE through an IP address is also a viable option for your setup.
123123
3. Set up your cluster/machine instances configuration
124124

125125
| Infrastructure scenario | How to set up TCIE Core Services | How to Set Up TCIE Worker |
126126
| ----------------------------------------------------------------- | ------------------------------------------ | ----------------------------------- |
127127
| not using default k8s service at cloud provider | Set up one vm as k8s host using Replicated kURL (see point 5 below) | [Set up vm to run Worker Image (docker or lxd)](/user/enterprise/setting-up-worker/) |
128-
| using k8s service at cloud provider (e.g. Google KE, Amazon EKS ) | See point 6 below | [Set up Worker Image](/user/enterprise/setting-up-worker/) at your convernience, depending on infrastructure setup you use |
128+
| using k8s service at a cloud provider (e.g., Google KE, Amazon EKS ) | See point 6 below | [Set up Worker Image](/user/enterprise/setting-up-worker/) at your convenience, depending on infrastructure setup you use |
129129

130-
In each case the TCIE Core Services will be deployed as k8s cluster. Cluster must be prepared and started.
130+
In each case, the TCIE Core Services will be deployed as a k8s cluster. Cluster must be prepared and started.
131131

132132
4. Install Replicated KOTS on *your local machine*. Make sure that you can connect to the Kubernetes cluster containing Travis CI Enterprise Core Services.
133133
1. Replicated KOTS [outputs after installation an url including port number](https://docs.replicated.com/vendor/tutorial-installing-without-existing-cluster#create-a-test-server-and-install-the-app-manager) under which Kotsadmin runs. You can also use `kots admin-console -n [your namespace]` to connect
134-
2. Altenratively you can just use `kubectl` to verify access to cluster (sometimes bash shell reload `bash -l` may be required). See example in [Kubernetes documentation](https://kubernetes.io/docs/tasks/tools/install-kubectl-linux/#verify-kubectl-configuration).
134+
2. Alternatively, you can just use `kubectl` to verify access to the cluster (sometimes bash shell reload `bash -l` may be required). See the example in [Kubernetes documentation](https://kubernetes.io/docs/tasks/tools/install-kubectl-linux/#verify-kubectl-configuration).
135135
6. TCIE 3.x installed on **single** virtual machine instance
136136
1. On *your new VM instance* run `kurl.sh` via `curl -sSL https://k8s.kurl.sh/tci-enterprise-kots | sudo bash`
137-
2. Get credentials from the new cluster running on *your new VM instance*. Please view, e.g. [kurl documentation](https://kurl.sh/docs/install-with-kurl/connecting-remotely) where kubectl config with credentials is created and can be used afterward.
137+
2. Get credentials from the new cluster running on *your new VM instance*. Please view, e.g., [kurl documentation](https://kurl.sh/docs/install-with-kurl/connecting-remotely) where kubectl config with credentials is created and can be used afterward.
138138
3. Refer to various cluster and installation options in [kURL documentation](https://kurl.sh/docs/install-with-kurl/). Make sure to adjust your setup and configuration according to your needs before progressing with TCIE 3.X installation.
139139
7. TCIE 3.x installed as Kubernetes cluster in the cloud
140-
1. Connect to your cluster and generate the kubectl config file. Then, download the kubectl config file to your *local machine*. The exact way to obtain generated credentials depends on your Kubernetes cluster provider (see GCloud example below).
140+
1. Connect to your cluster and generate the kubectl config file. Then, download the kubectl config file to your *local machine*. The exact way to obtain generated credentials depends on your Kubernetes cluster provider (see the GCloud example below).
141141
8. Run `kubectl kots install tci-enterprise-kots` to install TCIE 3.x. Please note down the administrative password and namespace used during this step.
142-
9. *In your browser*, navigate to `http://localhost:8800` to complete the setup. The TCIE 3.x admin console will automatically enable the during first installation:
142+
9. *In your browser*, navigate to `http://localhost:8800` to complete the setup. The TCIE 3.x admin console will automatically enable the during the first installation:
143143

144144
1. Authorize with a password set during the installation process.
145145
2. Upload your Travis CI Enterprise license.
146146
3. Connect your Source Control System (GitHub Enterprise Server, GitHub.com, or Bitbucket).
147147
4. Optionally, configure Email, Metrics, and Caches.
148148
5. Copy the *RabbitMQ password* for the Worker setup.
149149

150-
> If you have decided to use a self-signed certificate or wish to use Let's Encrypt certificate, there may be additional configuration steps required. Please see our page on [SSL Certificate Management](/user/enterprise/ssl-certificate-management/) for more information.
150+
> If you have decided to use a self-signed certificate or wish to use the Let's Encrypt certificate, additional configuration steps may be required. For more information, please see our page on [SSL Certificate Management](/user/enterprise/ssl-certificate-management/).
151151
152152

153153
### Example: TCIE 3.x installation for GCE on macOSX
@@ -160,7 +160,7 @@ You'll want to make sure you have the latest version of Python 3. If you're on m
160160
ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)
161161
```
162162
163-
Once brew is up and running, you'll install Python via:
163+
Once the brew is up and running, you'll install Python via:
164164
165165
```bash
166166
brew install python
@@ -186,7 +186,7 @@ Restart your shell session before running `gcloud init`:
186186
exec -l $SHELL
187187
```
188188
189-
Make sure gcloud installed via using the ```version``` arugument:
189+
Make sure gcloud is installed via using the ```version``` argument:
190190
191191
```bash
192192
gcloud --version
@@ -253,7 +253,7 @@ Once employed with the choice, you can type the following:
253253
travis
254254
```
255255
256-
From there, if you have the correct permissions, you can now start Enterprise on local via going to your browser and typing:
256+
From there, if you have the correct permissions, you can now start Enterprise locally by going to your browser and typing:
257257
258258
```bash
259259
http://localhost:8800
@@ -263,13 +263,13 @@ If you get a "permissions" error, please
263263
* Make sure you have [obtained correct license](/user/enterprise/tcie-3.x-obtain-license/).
264264
* Contact one of your sysadmins to solve the access rights error.
265265
266-
Once you get the proper permissions, you should have a license file. You'll see where you can drag and drop this on the localhost UI, it will look like this:
266+
Once you get the proper permissions, you should have a license file. You'll see where you can drag and drop this on the localhost UI; it will look like this:
267267
268268
![License](/images/tcie-3.x-setting-up-License.png)
269269
270270
#### Configure Travis CI Enterprise
271271
272-
Next, map your platform host, in example case the platform host is:
272+
Next, map your platform host in example case the platform host is:
273273
274274
```bash
275275
montana.travis-ci-enterprise.com
@@ -283,7 +283,7 @@ Next, you'll want to register a new OAuth application with GitHub. In this case,
283283
284284
![OAuth](/images/tcie-3.x-setting-up-OAuth.png)
285285
286-
Retrieve your ```Client_ID``` and your ```Secret``` from GitHub and enter them. This is how it would look like in the UI with application name set as ```kubernetes```:
286+
Retrieve your ```Client_ID``` and your ```Secret``` from GitHub and enter them. This is how it would look in the UI with the application name set as ```kubernetes```:
287287
288288
![Secret](/images/tcie-3.x-setting-up-Secret.png)
289289
@@ -293,7 +293,7 @@ Once your ```Client_ID``` and ```Secrets``` are obtained, obtain proper values v
293293
https://gh-app-setup.travis-ci-enterprise.com
294294
```
295295
296-
Be sure that in GitHub app section to use SSL (Secure Socket Layer) via
296+
Be sure that in the GitHub app section to use SSL (Secure Socket Layer) via
297297
```bash
298298
https://
299299
```
@@ -313,7 +313,7 @@ Now that you have your RSA key, you'll see a variable of settings, including ```
313313
```bash
314314
kubectl get pods -n [NAMESPACE]
315315
```
316-
Remember to replace the ```[NAMESPACE]``` with your value from the config form. Now regarding the Load Balancer, below is the default behavior of the Load Balancer:
316+
Remember to replace the ```[NAMESPACE]``` with your value from the config form. Now, regarding the Load Balancer, below is the default behavior of the Load Balancer:
317317
318318
![LoadBalancer](/images/tcie-3.x-setting-up-loadbalancer.svg)
319319
@@ -324,7 +324,7 @@ To access the config page, try running:
324324
kubectl kots admin-console --namespace travis
325325
```
326326
327-
The above command assumes your namespace is ```travis```, please replace it with yours. Remember registering the Load Balancer is generic. So you run ```kubectl get service nginx``` for example, just make a DNS record to point to the service's external IP. This is true with GCE and AWS.
327+
The above command assumes your namespace is ```travis```, please replace it with yours. Remember, registering the Load Balancer is generic. So you run ```kubectl get service nginx``` for example, just make a DNS record to point to the service's external IP. This is true with GCE and AWS.
328328
329329
## Setup the Enterprise Worker virtual machine
330330

0 commit comments

Comments
 (0)