20d8146e8c
- Created new documentation files including TROUBLESHOOTING.md, CONFIGURATION.md, and CONTRIBUTING.md. - Added deployment guide with automated and manual instructions. - Introduced new YAML configurations for Kubernetes resources and Helm charts. - Implemented a deployment script for setting up the GitOps infrastructure.
695 lines
21 KiB
Markdown
695 lines
21 KiB
Markdown
# GitOps for the KnockOut-Whist Project
|
|
|
|
This repository contains the GitOps configuration for deploying and managing the KnockOut-Whist project using modern DevOps tools and practices. It leverages GitOps principles to ensure that infrastructure and application deployments are version-controlled, auditable, and automated.
|
|
|
|
## Table of Contents
|
|
|
|
- [Overview](#overview)
|
|
- [Architecture](#architecture)
|
|
- [Prerequisites](#prerequisites)
|
|
- [Quick Start](#quick-start)
|
|
- [Directory Structure](#directory-structure)
|
|
- [Components](#components)
|
|
- [Installation Guide](#installation-guide)
|
|
- [Configuration](#configuration)
|
|
- [Secrets Management](#secrets-management)
|
|
- [Troubleshooting](#troubleshooting)
|
|
- [Contributing](#contributing)
|
|
|
|
## Overview
|
|
|
|
This GitOps repository implements a complete infrastructure-as-code solution for Kubernetes deployments in the EU Central 1 region. It provides:
|
|
|
|
- **Declarative Infrastructure**: All configurations are defined in Git
|
|
- **Automated Deployments**: Argo CD automatically syncs cluster state with Git
|
|
- **Progressive Delivery**: Kargo manages safe, progressive deployments across environments
|
|
- **Certificate Management**: Automated certificate provisioning via cert-manager
|
|
- **Secrets Management**: Encrypted secret storage with sealed-secrets pattern
|
|
- **Monitoring & Logging**: Integration points for observability tools
|
|
|
|
## Architecture
|
|
|
|
```
|
|
┌─────────────────────────────────────────────────────────────┐
|
|
│ Kubernetes Cluster │
|
|
│ │
|
|
│ ┌──────────────────────────────────────────────────────┐ │
|
|
│ │ ArgoCD (Namespace) │ │
|
|
│ │ - Application Controller │ │
|
|
│ │ - Server (UI & API) │ │
|
|
│ │ - Repo Server │ │
|
|
│ │ - Redis (Session Store) │ │
|
|
│ └──────────────────────────────────────────────────────┘ │
|
|
│ ▼ │
|
|
│ ┌──────────────────────────────────────────────────────┐ │
|
|
│ │ Cert-Manager (Namespace) │ │
|
|
│ │ - Webhook │ │
|
|
│ │ - Controller │ │
|
|
│ │ - CA Issuer │ │
|
|
│ └──────────────────────────────────────────────────────┘ │
|
|
│ ▼ │
|
|
│ ┌──────────────────────────────────────────────────────┐ │
|
|
│ │ Kargo (Namespace) │ │
|
|
│ │ - API Server │ │
|
|
│ │ - Controller │ │
|
|
│ │ - Webhooks Server │ │
|
|
│ │ - Management Controller │ │
|
|
│ │ - External Webhooks Server │ │
|
|
│ └──────────────────────────────────────────────────────┘ │
|
|
│ │
|
|
│ ┌──────────────────────────────────────────────────────┐ │
|
|
│ │ Kargo Projects (Orchestration) │ │
|
|
│ │ - Promotion Pipelines │ │
|
|
│ │ - Warehouse │ │
|
|
│ │ - Stages │ │
|
|
│ └──────────────────────────────────────────────────────┘ │
|
|
│ │
|
|
│ ┌──────────────────────────────────────────────────────┐ │
|
|
│ │ Argo Rollouts (Optional) │ │
|
|
│ │ - Canary Deployments │ │
|
|
│ │ - Progressive Rollout Controller │ │
|
|
│ └──────────────────────────────────────────────────────┘ │
|
|
│ │
|
|
└─────────────────────────────────────────────────────────────┘
|
|
│
|
|
▼
|
|
┌─────────────────┐
|
|
│ Git Repo │
|
|
│ (This Repo) │
|
|
└─────────────────┘
|
|
```
|
|
|
|
## Prerequisites
|
|
|
|
### System Requirements
|
|
|
|
- **Kubernetes**: Version 1.24+ (tested with 1.26+)
|
|
- **kubectl**: Latest stable version
|
|
- **Helm**: 3.10+
|
|
- **Kustomize**: 5.0+ (with Helm plugin enabled)
|
|
- **Git**: 2.40+
|
|
|
|
### Cluster Requirements
|
|
|
|
- Minimum 2 CPU cores, 4GB RAM (for development)
|
|
- Production: 4+ CPU cores, 8GB+ RAM recommended
|
|
- Storage class configured for persistent volumes
|
|
- Ingress controller (optional, for external access)
|
|
- cert-manager CRDs installed before cert-manager deployment
|
|
|
|
### Network Requirements
|
|
|
|
- Outbound access to container registries (quay.io, ghcr.io, ecr-public.aws.com)
|
|
- Git repository access (SSH key configured)
|
|
- DNS resolution for configured domains
|
|
- Port 443 (HTTPS) for API access
|
|
- Port 6379 (Redis) for internal Argo CD communication
|
|
|
|
## Quick Start
|
|
|
|
### 1. Clone the Repository
|
|
|
|
```bash
|
|
git clone git@git.janis-eccarius.de:NowChess/GitOps.git
|
|
cd GitOps
|
|
```
|
|
|
|
### 2. Prepare Your Kubernetes Cluster
|
|
|
|
Ensure your kubectl context points to the target cluster:
|
|
|
|
```bash
|
|
kubectl cluster-info
|
|
kubectl get nodes
|
|
```
|
|
|
|
### 3. Automatic Installation
|
|
|
|
For a complete automated setup (recommended for initial deployment):
|
|
|
|
```bash
|
|
cd scripts
|
|
chmod +x deploy-to-cluster.sh
|
|
./deploy-to-cluster.sh
|
|
```
|
|
|
|
This script will:
|
|
- Install Cert-Manager and required CRDs
|
|
- Install and configure Argo CD
|
|
- Configure sealed secrets for GitOps
|
|
- Deploy the root Argo CD application
|
|
- Display access credentials
|
|
|
|
### 4. Manual Installation (Step-by-Step)
|
|
|
|
If you prefer manual control or need to customize the installation:
|
|
|
|
#### Step 1: Install Cert-Manager
|
|
|
|
```bash
|
|
kustomize build --enable-helm cert-manager/eu-central-1 | kubectl apply -f -
|
|
|
|
# Wait for cert-manager to be ready
|
|
kubectl wait --for=condition=ready pod -l app.kubernetes.io/name=cert-manager \
|
|
-n cert-manager --timeout=300s
|
|
```
|
|
|
|
#### Step 2: Install Argo CD
|
|
|
|
```bash
|
|
kustomize build --enable-helm argocd/eu-central-1 | kubectl apply -f -
|
|
|
|
# Wait for Argo CD to be ready
|
|
kubectl wait --for=condition=ready pod -l app.kubernetes.io/name=argocd-server \
|
|
-n argocd --timeout=300s
|
|
```
|
|
|
|
#### Step 3: Get Initial Admin Password
|
|
|
|
```bash
|
|
kubectl -n argocd get secret argocd-initial-admin-secret \
|
|
-o jsonpath="{.data.password}" | base64 --decode
|
|
```
|
|
|
|
#### Step 4: Access Argo CD
|
|
|
|
**Port Forward (Development)**:
|
|
```bash
|
|
kubectl port-forward -n argocd svc/argocd-server 8080:443
|
|
# Access at https://localhost:8080
|
|
```
|
|
|
|
**Ingress (Production)**:
|
|
- If using an ingress controller, access via configured domain (e.g., `argo.knockout.janis-eccarius.de`)
|
|
|
|
#### Step 5: Deploy Root Application
|
|
|
|
```bash
|
|
kubectl apply -f eu-central-1/root-apps-app.yaml
|
|
|
|
# Monitor deployment
|
|
kubectl -n argocd get applications
|
|
argocd app list
|
|
```
|
|
|
|
## Directory Structure
|
|
|
|
```
|
|
GitOps/
|
|
├── README.md # This file
|
|
├── scripts/
|
|
│ └── deploy-to-cluster.sh # Automated deployment script
|
|
├── argocd/ # Argo CD configuration
|
|
│ ├── base/ # Base kustomization
|
|
│ │ ├── cert-manager-namespace.yaml
|
|
│ │ ├── kustomization.yaml
|
|
│ │ └── values.yaml
|
|
│ └── eu-central-1/ # Regional overrides
|
|
│ ├── kube-devops.yaml
|
|
│ ├── kustomization.yaml
|
|
│ └── values.yaml
|
|
├── cert-manager/ # Cert-Manager configuration
|
|
│ ├── base/
|
|
│ │ ├── cert-manager-namespace.yaml
|
|
│ │ ├── kustomization.yaml
|
|
│ │ └── values.yaml
|
|
│ └── eu-central-1/
|
|
│ ├── cert-issuer.yaml
|
|
│ ├── kustomization.yaml
|
|
├── kargo/ # Kargo progressive delivery
|
|
│ ├── base/
|
|
│ │ ├── kustomization.yaml
|
|
│ │ └── values.yaml
|
|
│ └── eu-central-1/
|
|
│ ├── kustomization.yaml
|
|
│ └── values.yaml
|
|
├── kargo-projects/ # Kargo project definitions
|
|
│ └── orchestration-stack/
|
|
│ ├── kustomization.yaml
|
|
│ ├── orch-project.yaml
|
|
│ ├── orch-projectconfig.yaml
|
|
│ ├── orch-promotion-template.yaml
|
|
│ ├── orch-stage.yaml
|
|
│ └── orch-warehouse.yaml
|
|
├── argo-rollouts/ # Argo Rollouts configuration
|
|
│ └── eu-central-1/
|
|
│ ├── kube-devops.yaml
|
|
│ └── kustomization.yaml
|
|
├── eu-central-1/ # Regional deployment root
|
|
│ ├── root-apps-app.yaml # Root Argo CD application
|
|
│ └── argo-apps/ # All deployed applications
|
|
│ ├── argo-rollouts/
|
|
│ ├── cert-manager/
|
|
│ ├── kargo/
|
|
│ └── kargo-projects/
|
|
├── secrets/ # Encrypted secrets
|
|
│ ├── kustomization.yaml
|
|
│ ├── gitea/
|
|
│ ├── github/
|
|
│ └── kargo/
|
|
└── Passwords.kdbx # Password manager file (DO NOT COMMIT)
|
|
```
|
|
|
|
## Components
|
|
|
|
### Argo CD
|
|
|
|
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes.
|
|
|
|
**Configuration Files**:
|
|
- `argocd/eu-central-1/values.yaml` - Main Helm values
|
|
|
|
**Key Features Enabled**:
|
|
- Helm support with `kustomize.buildOptions: --enable-helm`
|
|
- Automated pruning and self-healing
|
|
- Kustomize integration
|
|
- Redis caching
|
|
- Status badge support
|
|
|
|
**Access**:
|
|
```bash
|
|
# Via port-forward
|
|
kubectl port-forward -n argocd svc/argocd-server 8080:443
|
|
|
|
# Get initial password
|
|
kubectl -n argocd get secret argocd-initial-admin-secret \
|
|
-o jsonpath="{.data.password}" | base64 --decode
|
|
```
|
|
|
|
**Next Steps**:
|
|
1. Change default admin password in Argo CD UI
|
|
2. Configure Git repository credentials
|
|
3. Set up OIDC/SSO for authentication
|
|
4. Create additional Argo CD projects for RBAC
|
|
|
|
### Cert-Manager
|
|
|
|
Cert-Manager automates certificate management in Kubernetes using cert-manager and Let's Encrypt.
|
|
|
|
**Configuration Files**:
|
|
- `cert-manager/base/values.yaml` - Base Helm configuration
|
|
- `cert-manager/eu-central-1/cert-issuer.yaml` - Certificate issuer configuration
|
|
|
|
**Certificate Issuers**:
|
|
- Self-signed CA issuer for internal certificates
|
|
- Integration with Let's Encrypt for public certificates (can be configured)
|
|
|
|
**Usage**:
|
|
```bash
|
|
# View certificate issuers
|
|
kubectl get issuers -n cert-manager
|
|
|
|
# Monitor certificate requests
|
|
kubectl get certificaterequest -A
|
|
```
|
|
|
|
### Kargo
|
|
|
|
Kargo is a progressive delivery platform that automates and secures multi-stage promotion of Freight across a series of Stages.
|
|
|
|
**Configuration Files**:
|
|
- `kargo/base/values.yaml` - Core Kargo configuration
|
|
- `kargo/eu-central-1/values.yaml` - Regional overrides
|
|
- `kargo-projects/orchestration-stack/` - Project definitions
|
|
|
|
**Key Features**:
|
|
- Multi-stage promotion pipelines
|
|
- Integration with Argo CD and Argo Rollouts
|
|
- OIDC authentication support
|
|
- External webhook integrations
|
|
- Garbage collection for old promotions and freight
|
|
|
|
**Access**:
|
|
```bash
|
|
# Port forward to Kargo API
|
|
kubectl port-forward -n kargo svc/kargo-api 8443:443
|
|
|
|
# Get admin credentials
|
|
kubectl -n kargo get secret kargo-admin-password -o jsonpath="{.data.password}"
|
|
```
|
|
|
|
### Argo Rollouts
|
|
|
|
Argo Rollouts provides advanced deployment strategies (Canary, Blue-Green, etc.).
|
|
|
|
**Configuration Files**:
|
|
- `argo-rollouts/eu-central-1/kube-devops.yaml` - Deployment spec
|
|
- `argo-rollouts/eu-central-1/kustomization.yaml` - Kustomization
|
|
|
|
**Features**:
|
|
- Canary deployments
|
|
- Blue-green deployments
|
|
- Progressive rollouts with automated analysis
|
|
- Integration with analysis tools
|
|
|
|
## Installation Guide
|
|
|
|
### Detailed Installation Steps
|
|
|
|
#### Prerequisites Verification
|
|
|
|
```bash
|
|
# Verify Kubernetes version
|
|
kubectl version --short
|
|
|
|
# Check node capacity
|
|
kubectl top nodes
|
|
|
|
# Verify storage class exists
|
|
kubectl get storageclass
|
|
|
|
# Check for existing cert-manager
|
|
kubectl get crd | grep cert-manager
|
|
```
|
|
|
|
#### Step 1: Namespace Setup
|
|
|
|
```bash
|
|
# Create namespaces
|
|
kubectl create namespace argocd
|
|
kubectl create namespace cert-manager
|
|
kubectl create namespace kargo
|
|
|
|
# Label namespaces for cert-manager
|
|
kubectl label namespace cert-manager cert-manager.io/inject-enabled=true
|
|
```
|
|
|
|
#### Step 2: Install Cert-Manager
|
|
|
|
```bash
|
|
# Add cert-manager CRDs first
|
|
kustomize build cert-manager/base | kubectl apply -f -
|
|
|
|
# Wait for CRDs
|
|
sleep 5
|
|
|
|
# Install cert-manager
|
|
kustomize build --enable-helm cert-manager/eu-central-1 | kubectl apply -f -
|
|
|
|
# Verify installation
|
|
kubectl -n cert-manager get pods
|
|
kubectl get crd | grep certmanager
|
|
```
|
|
|
|
#### Step 3: Install Argo CD
|
|
|
|
```bash
|
|
kustomize build --enable-helm argocd/eu-central-1 | kubectl apply -f -
|
|
|
|
# Wait for readiness
|
|
kubectl -n argocd wait --for=condition=ready pod \
|
|
-l app.kubernetes.io/name=argocd-server --timeout=300s
|
|
```
|
|
|
|
#### Step 4: Configure Secrets
|
|
|
|
```bash
|
|
# Create Git repository secret
|
|
kubectl -n argocd create secret generic repo-credentials \
|
|
--from-file=sshPrivateKey=$HOME/.ssh/id_rsa \
|
|
--dry-run=client -o yaml | kubectl apply -f -
|
|
```
|
|
|
|
#### Step 5: Deploy Applications
|
|
|
|
```bash
|
|
# Apply root application
|
|
kubectl apply -f eu-central-1/root-apps-app.yaml
|
|
|
|
# Monitor sync status
|
|
watch "kubectl -n argocd get applications"
|
|
```
|
|
|
|
### Post-Installation Configuration
|
|
|
|
#### 1. Update Admin Credentials
|
|
|
|
```bash
|
|
# Generate new password hash
|
|
PASSWORD=$(echo 'mypassword' | htpasswd -nbBC 10 admin | tr -d ':\n' | sed 's/$2y/$2a/')
|
|
|
|
# Update secret
|
|
kubectl -n argocd patch secret argocd-secret -p \
|
|
"{\"data\":{\"admin.password\":\"$(echo -n $PASSWORD | base64)\"}\
|
|
\"admin.passwordMtime\":\"$(date -u +'%Y-%m-%dT%H:%M:%SZ' | base64)\"}"
|
|
```
|
|
|
|
#### 2. Configure Git Repository
|
|
|
|
In Argo CD UI:
|
|
1. Settings → Repositories
|
|
2. Connect Repo → Via SSH
|
|
3. Enter repository URL: `git@git.janis-eccarius.de:NowChess/GitOps.git`
|
|
4. Upload SSH private key
|
|
5. Save and verify
|
|
|
|
#### 3. Enable OIDC Authentication (Optional)
|
|
|
|
Update `argocd/eu-central-1/values.yaml`:
|
|
|
|
```yaml
|
|
configs:
|
|
cm:
|
|
oidc.config: |
|
|
name: <Your Provider>
|
|
issuer: <https://provider/endpoint>
|
|
clientID: <client-id>
|
|
clientSecret: $oidc.clientSecret
|
|
```
|
|
|
|
## Configuration
|
|
|
|
### Regional Configuration
|
|
|
|
This repository is configured for **EU Central 1** region. To add new regions:
|
|
|
|
1. Create new directory: `eu-west-1/`
|
|
2. Copy and adapt configuration from `eu-central-1/`
|
|
3. Update domain names and region-specific values
|
|
4. Create new root application for the region
|
|
|
|
### Customizing Component Versions
|
|
|
|
Edit the Helm chart versions in respective `kustomization.yaml` files:
|
|
|
|
```yaml
|
|
# Example: argocd/eu-central-1/kustomization.yaml
|
|
helmCharts:
|
|
- name: argo-cd
|
|
repo: https://argoproj.github.io/argo-helm
|
|
version: 5.x.x # Update version here
|
|
releaseName: argocd
|
|
namespace: argocd
|
|
```
|
|
|
|
### Resource Limits
|
|
|
|
Default resource requests/limits can be modified in `values.yaml` files:
|
|
|
|
```yaml
|
|
# argocd/eu-central-1/values.yaml
|
|
controller:
|
|
resources:
|
|
requests:
|
|
cpu: 250m
|
|
memory: 256Mi
|
|
limits:
|
|
cpu: 500m
|
|
memory: 512Mi
|
|
```
|
|
|
|
## Secrets Management
|
|
|
|
### Secret Storage Strategy
|
|
|
|
This repository uses the **Sealed Secrets** pattern:
|
|
|
|
1. **Encrypted Storage**: Secrets are encrypted in Git using sealing keys
|
|
2. **Key Management**: Sealing keys are stored securely outside Git
|
|
3. **Decryption**: Sealed secrets are automatically decrypted by the cluster
|
|
|
|
### Creating New Secrets
|
|
|
|
```bash
|
|
# Install kubeseal (one-time)
|
|
wget https://github.com/bitnami-labs/sealed-secrets/releases/download/v0.18.0/kubeseal-0.18.0-linux-amd64.tar.gz
|
|
tar xfz kubeseal-0.18.0-linux-amd64.tar.gz -C /usr/local/bin
|
|
|
|
# Create a new secret
|
|
kubectl -n <namespace> create secret generic my-secret \
|
|
--from-literal=password=mysecret \
|
|
--dry-run=client -o yaml > my-secret.yaml
|
|
|
|
# Seal it
|
|
kubeseal -f my-secret.yaml -w my-sealed-secret.yaml
|
|
|
|
# Commit sealed secret to Git
|
|
git add my-sealed-secret.yaml
|
|
git commit -m "Add sealed secret"
|
|
git push
|
|
```
|
|
|
|
### Accessing Secret Credentials
|
|
|
|
Located in `secrets/` directory:
|
|
|
|
- **GitHub**: `secrets/github/` - GitHub access tokens
|
|
- **Gitea**: `secrets/gitea/` - Gitea repository access
|
|
- **Kargo**: `secrets/kargo/` - Kargo admin credentials
|
|
|
|
**Never commit unencrypted secrets to Git.**
|
|
|
|
## Troubleshooting
|
|
|
|
### Common Issues and Solutions
|
|
|
|
#### 1. Pods Not Starting
|
|
|
|
```bash
|
|
# Check pod status and events
|
|
kubectl -n <namespace> describe pod <pod-name>
|
|
|
|
# View logs
|
|
kubectl -n <namespace> logs <pod-name>
|
|
```
|
|
|
|
#### 2. Certificate Issues
|
|
|
|
```bash
|
|
# Check certificate status
|
|
kubectl get certificate -A
|
|
kubectl describe certificate -n <namespace> <cert-name>
|
|
|
|
# Check cert-manager logs
|
|
kubectl -n cert-manager logs -f deployment/cert-manager
|
|
```
|
|
|
|
#### 3. Argo CD Sync Failures
|
|
|
|
```bash
|
|
# Get application status
|
|
kubectl -n argocd get application
|
|
|
|
# Detailed status
|
|
kubectl -n argocd describe application <app-name>
|
|
|
|
# Resync
|
|
argocd app sync <app-name>
|
|
```
|
|
|
|
#### 4. Git Repository Connection Issues
|
|
|
|
```bash
|
|
# Check repository credentials
|
|
kubectl -n argocd get secret repo-credentials -o yaml
|
|
|
|
# Test repository access
|
|
kubectl -n argocd exec -it <argocd-repo-server-pod> -- bash
|
|
# Try: ssh -v git@git.janis-eccarius.de
|
|
```
|
|
|
|
### Debugging Commands
|
|
|
|
```bash
|
|
# View all resources in cluster
|
|
kubectl get all -A
|
|
|
|
# Get cluster events
|
|
kubectl get events -A --sort-by='.lastTimestamp'
|
|
|
|
# Check resource quotas
|
|
kubectl describe resourcequota -A
|
|
|
|
# Monitor node status
|
|
kubectl describe nodes
|
|
```
|
|
|
|
### Support Resources
|
|
|
|
- **Argo CD Docs**: https://argo-cd.readthedocs.io/
|
|
- **Cert-Manager Docs**: https://cert-manager.io/docs/
|
|
- **Kargo Docs**: https://kargo.akuity.io/
|
|
- **Argo Rollouts Docs**: https://argoproj.github.io/argo-rollouts/
|
|
|
|
## Contributing
|
|
|
|
### Making Changes
|
|
|
|
1. Create a feature branch:
|
|
```bash
|
|
git checkout -b feature/my-feature
|
|
```
|
|
|
|
2. Make your changes and test locally:
|
|
```bash
|
|
kustomize build <path> | kubectl apply --dry-run=client -f -
|
|
```
|
|
|
|
3. Commit with descriptive messages:
|
|
```bash
|
|
git commit -m "feat: add new certificate issuer"
|
|
```
|
|
|
|
4. Push to repository:
|
|
```bash
|
|
git push origin feature/my-feature
|
|
```
|
|
|
|
5. Create merge request for review
|
|
|
|
### Best Practices
|
|
|
|
- **Small, focused commits**: Each commit should represent one logical change
|
|
- **Test before committing**: Use `--dry-run` to validate
|
|
- **Document changes**: Update this README for significant changes
|
|
- **Use semantic versioning**: Tag releases appropriately
|
|
- **Follow naming conventions**: Use descriptive names for branches, commits, and resources
|
|
|
|
### Policy and Guidelines
|
|
|
|
- All changes must go through Git version control
|
|
- Never manually apply Kubernetes manifests to production
|
|
- Always validate with `kustomize build` before deployment
|
|
- Encrypt all secrets before committing
|
|
- Keep sealed-secrets keys secure (not in Git)
|
|
- Regular security audits of repository access
|
|
|
|
## Additional Resources
|
|
|
|
### Documentation Files
|
|
|
|
- `DEPLOYMENT_GUIDE.md` - Detailed deployment instructions
|
|
- `ARCHITECTURE.md` - System architecture overview
|
|
- `TROUBLESHOOTING.md` - Extended troubleshooting guide
|
|
- `UPGRADE_GUIDE.md` - Version upgrade procedures
|
|
|
|
### Useful Commands Reference
|
|
|
|
```bash
|
|
# Kustomize build and apply
|
|
kustomize build . | kubectl apply -f -
|
|
kustomize build . | kubectl apply --dry-run=client -f -
|
|
|
|
# Watch applications
|
|
kubectl -n argocd get applications -w
|
|
argocd app list
|
|
argocd app watch <app-name>
|
|
|
|
# Get application details
|
|
argocd app get <app-name>
|
|
kubectl -n argocd describe application <app-name>
|
|
|
|
# Manual sync
|
|
argocd app sync <app-name>
|
|
|
|
# Access logs
|
|
kubectl -n argocd logs -f deployment/argocd-controller
|
|
kubectl -n cert-manager logs -f deployment/cert-manager
|
|
```
|
|
|
|
---
|
|
|
|
**Last Updated**: 2026-04-16
|
|
**Maintained By**: NowChess DevOps Team
|
|
**Repository**: https://git.janis-eccarius.de/NowChess/GitOps
|