You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: user/enterprise/tcie-3.x-setting-up-travis-ci-enterprise.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Travis CI Enterprise Worker Images are publicly available and must be installed
23
23
24
24
## Travis CI Enterprise Core Services components
25
25
26
-
Travis CI Enterprise Core Services consist of components enlisted below. Each service has its own pod. Please pay attention to the *Comments* section, where you can find a list of services that may require replicating pods for handling higher workloads.
26
+
Travis CI Enterprise Core Services consist of components enlisted below. Each service has its own pod. Please pay attention to the *Comments* section, where you can find a list of services that may require replicating pods to handle higher workloads.
@@ -55,7 +55,7 @@ Please note: certain services will need to run scheduled background jobs, usuall
55
55
56
56
## Prerequisites
57
57
58
-
You can either install Travis CI Enterprise (TCIE) via [Replicated KOTS](https://kots.io/)to install it into a Kubernetes cluster on GCE, AWS, or OpenStack.
58
+
You can install Travis CI Enterprise (TCIE) via [Replicated KOTS](https://kots.io/)and install it into a Kubernetes cluster on GCE, AWS, or OpenStack.
59
59
Alternatively, you can install it on a single machine using the [Replicated kURL](https://kurl.sh/) installer and a configuration prepared by TravisCI (`tci-enterprise-kots`).
60
60
61
61
To set up your Travis CI Enterprise 3.x, you need:
@@ -66,7 +66,7 @@ To set up your Travis CI Enterprise 3.x, you need:
| not using default k8s service at cloud provider |**Two virtual machines** on your private cloud that meet the [system requirements](#system-requirements)| One vm for Core Services, one for Worker |
69
-
| using k8s service at cloud provider (e.g. Google KE, Amazon EKS ) | One Kubernetes (k8s) Cluster, one virtual machine that meet the [system requirements](#system-requirements)| Tke k8s cluster is meant for Core Services, the vm is meant for Worker Image |
69
+
| using k8s service at cloud provider (e.g., Google KE, Amazon EKS ) | One Kubernetes (k8s) Cluster, one virtual machine that meets the [system requirements](#system-requirements)| Tke k8s cluster is meant for Core Services, the VM is meant for Worker Image |
70
70
71
71
* If using a GitHub Cloud or GitHub Enterprise Server: Configure the `secret` and `clientid` of a GitHub.com or GitHub Enterprise [OAuth application](https://developer.github.com/apps/building-integrations/setting-up-and-registering-oauth-apps/registering-oauth-apps/) with:
72
72
@@ -83,7 +83,7 @@ Platform* which hosts Kubernetes cluster with each service in separate pods, and
83
83
*Worker hosts* which run the tests/jobs in isolated containers using LXC
84
84
and Docker.
85
85
86
-
Each dedicated host or hypervisor (VMWare, OpenStack, or EC2) should run **Ubuntu 18.04** and have at least **16 gigs of RAM and 8 CPUs**. If the same host is to run as Worker host, the minimum requirement would be **16 gigs of RAM and 8 CPUs**.
86
+
Each dedicated host or hypervisor (VMWare, OpenStack, or EC2) should run **Ubuntu 18.04** and have at least **16 gigs of RAM and 8 CPUs**. If the same host is to run as a Worker host, the minimum requirement would be **16 gigs of RAM and 8 CPUs**.
87
87
88
88
If you're running on EC2, we recommend the **c4.2xlarge** instance type for both **Core Service (aka Platform)** and **Worker**. We also recommend using an image that uses EBS for the root volume and allocating 80 gigs of space.
89
89
@@ -112,42 +112,42 @@ Ubuntu 18.04 LTS or later as the underlying operating system.
| 22 | SSH | Allow inbound SSH traffic to access from your local machine. |
121
121
122
-
2. Please configure your hostname now. Skip this step if you will access TCIE through an IP address. Accessing TCIE through IP address is also viable option for your setup.
122
+
2. Please configure your hostname now. Skip this step if you will access TCIE through an IP address. Accessing TCIE through an IP address is also a viable option for your setup.
123
123
3. Set up your cluster/machine instances configuration
124
124
125
125
| Infrastructure scenario | How to set up TCIE Core Services | How to Set Up TCIE Worker |
| not using default k8s service at cloud provider | Set up one vm as k8s host using Replicated kURL (see point 5 below) |[Set up vm to run Worker Image (docker or lxd)](/user/enterprise/setting-up-worker/)|
128
-
| using k8s service at cloud provider (e.g. Google KE, Amazon EKS ) | See point 6 below |[Set up Worker Image](/user/enterprise/setting-up-worker/) at your convernience, depending on infrastructure setup you use |
128
+
| using k8s service at a cloud provider (e.g., Google KE, Amazon EKS ) | See point 6 below |[Set up Worker Image](/user/enterprise/setting-up-worker/) at your convenience, depending on infrastructure setup you use |
129
129
130
-
In each case the TCIE Core Services will be deployed as k8s cluster. Cluster must be prepared and started.
130
+
In each case, the TCIE Core Services will be deployed as a k8s cluster. Cluster must be prepared and started.
131
131
132
132
4. Install Replicated KOTS on *your local machine*. Make sure that you can connect to the Kubernetes cluster containing Travis CI Enterprise Core Services.
133
133
1. Replicated KOTS [outputs after installation an url including port number](https://docs.replicated.com/vendor/tutorial-installing-without-existing-cluster#create-a-test-server-and-install-the-app-manager) under which Kotsadmin runs. You can also use `kots admin-console -n [your namespace]` to connect
134
-
2. Altenratively you can just use `kubectl` to verify access to cluster (sometimes bash shell reload `bash -l` may be required). See example in [Kubernetes documentation](https://kubernetes.io/docs/tasks/tools/install-kubectl-linux/#verify-kubectl-configuration).
134
+
2.Alternatively, you can just use `kubectl` to verify access to the cluster (sometimes bash shell reload `bash -l` may be required). See the example in [Kubernetes documentation](https://kubernetes.io/docs/tasks/tools/install-kubectl-linux/#verify-kubectl-configuration).
135
135
6. TCIE 3.x installed on **single** virtual machine instance
136
136
1. On *your new VM instance* run `kurl.sh` via `curl -sSL https://k8s.kurl.sh/tci-enterprise-kots | sudo bash`
137
-
2. Get credentials from the new cluster running on *your new VM instance*. Please view, e.g. [kurl documentation](https://kurl.sh/docs/install-with-kurl/connecting-remotely) where kubectl config with credentials is created and can be used afterward.
137
+
2. Get credentials from the new cluster running on *your new VM instance*. Please view, e.g.,[kurl documentation](https://kurl.sh/docs/install-with-kurl/connecting-remotely) where kubectl config with credentials is created and can be used afterward.
138
138
3. Refer to various cluster and installation options in [kURL documentation](https://kurl.sh/docs/install-with-kurl/). Make sure to adjust your setup and configuration according to your needs before progressing with TCIE 3.X installation.
139
139
7. TCIE 3.x installed as Kubernetes cluster in the cloud
140
-
1. Connect to your cluster and generate the kubectl config file. Then, download the kubectl config file to your *local machine*. The exact way to obtain generated credentials depends on your Kubernetes cluster provider (see GCloud example below).
140
+
1. Connect to your cluster and generate the kubectl config file. Then, download the kubectl config file to your *local machine*. The exact way to obtain generated credentials depends on your Kubernetes cluster provider (see the GCloud example below).
141
141
8. Run `kubectl kots install tci-enterprise-kots` to install TCIE 3.x. Please note down the administrative password and namespace used during this step.
142
-
9.*In your browser*, navigate to `http://localhost:8800` to complete the setup. The TCIE 3.x admin console will automatically enable the during first installation:
142
+
9.*In your browser*, navigate to `http://localhost:8800` to complete the setup. The TCIE 3.x admin console will automatically enable the during the first installation:
143
143
144
144
1. Authorize with a password set during the installation process.
145
145
2. Upload your Travis CI Enterprise license.
146
146
3. Connect your Source Control System (GitHub Enterprise Server, GitHub.com, or Bitbucket).
147
147
4. Optionally, configure Email, Metrics, and Caches.
148
148
5. Copy the *RabbitMQ password* for the Worker setup.
149
149
150
-
> If you have decided to use a self-signed certificate or wish to use Let's Encrypt certificate, there may be additional configuration steps required. Please see our page on [SSL Certificate Management](/user/enterprise/ssl-certificate-management/) for more information.
150
+
> If you have decided to use a self-signed certificate or wish to use the Let's Encrypt certificate, additional configuration steps may be required. For more information, please see our page on [SSL Certificate Management](/user/enterprise/ssl-certificate-management/).
151
151
152
152
153
153
### Example: TCIE 3.x installation for GCE on macOSX
@@ -160,7 +160,7 @@ You'll want to make sure you have the latest version of Python 3. If you're on m
Once brew is up and running, you'll install Python via:
163
+
Once the brew is up and running, you'll install Python via:
164
164
165
165
```bash
166
166
brew install python
@@ -186,7 +186,7 @@ Restart your shell session before running `gcloud init`:
186
186
exec -l $SHELL
187
187
```
188
188
189
-
Make sure gcloud installed via using the ```version``` arugument:
189
+
Make sure gcloud is installed via using the ```version``` argument:
190
190
191
191
```bash
192
192
gcloud --version
@@ -253,7 +253,7 @@ Once employed with the choice, you can type the following:
253
253
travis
254
254
```
255
255
256
-
From there, if you have the correct permissions, you can now start Enterprise on local via going to your browser and typing:
256
+
From there, if you have the correct permissions, you can now start Enterprise locally by going to your browser and typing:
257
257
258
258
```bash
259
259
http://localhost:8800
@@ -263,13 +263,13 @@ If you get a "permissions" error, please
263
263
* Make sure you have [obtained correct license](/user/enterprise/tcie-3.x-obtain-license/).
264
264
* Contact one of your sysadmins to solve the access rights error.
265
265
266
-
Once you get the proper permissions, you should have a license file. You'll see where you can drag and drop this on the localhost UI, it will look like this:
266
+
Once you get the proper permissions, you should have a license file. You'll see where you can drag and drop this on the localhost UI; it will look like this:
Next, map your platform host, in example case the platform host is:
272
+
Next, map your platform host in example case the platform host is:
273
273
274
274
```bash
275
275
montana.travis-ci-enterprise.com
@@ -283,7 +283,7 @@ Next, you'll want to register a new OAuth application with GitHub. In this case,
283
283
284
284

285
285
286
-
Retrieve your ```Client_ID``` and your ```Secret``` from GitHub and enter them. This is how it would look like in the UI with application name set as ```kubernetes```:
286
+
Retrieve your ```Client_ID``` and your ```Secret``` from GitHub and enter them. This is how it would look in the UI with the application name set as ```kubernetes```:
287
287
288
288

289
289
@@ -293,7 +293,7 @@ Once your ```Client_ID``` and ```Secrets``` are obtained, obtain proper values v
293
293
https://gh-app-setup.travis-ci-enterprise.com
294
294
```
295
295
296
-
Be sure that in GitHub app section to use SSL (Secure Socket Layer) via
296
+
Be sure that inthe GitHub app section to use SSL (Secure Socket Layer) via
297
297
```bash
298
298
https://
299
299
```
@@ -313,7 +313,7 @@ Now that you have your RSA key, you'll see a variable of settings, including ```
313
313
```bash
314
314
kubectl get pods -n [NAMESPACE]
315
315
```
316
-
Remember to replace the ```[NAMESPACE]``` with your value from the config form. Now regarding the Load Balancer, below is the default behavior of the Load Balancer:
316
+
Remember to replace the ```[NAMESPACE]``` with your value from the config form. Now, regarding the Load Balancer, below is the default behavior of the Load Balancer:
@@ -324,7 +324,7 @@ To access the config page, try running:
324
324
kubectl kots admin-console --namespace travis
325
325
```
326
326
327
-
The above command assumes your namespace is ```travis```, please replace it with yours. Remember registering the Load Balancer is generic. So you run ```kubectl get service nginx``` for example, just make a DNS record to point to the service's external IP. This is true with GCE and AWS.
327
+
The above command assumes your namespace is ```travis```, please replace it with yours. Remember, registering the Load Balancer is generic. So you run ```kubectl get service nginx``` for example, just make a DNS record to point to the service's external IP. This is true with GCE and AWS.
0 commit comments