jon*_*ckt 5 continuous-deployment kubernetes amazon-eks github-actions argocd
我们使用 AWS EKS 进行了完整的设置,并安装了 Tekton,并希望使用 ArgoCD 进行应用程序部署。
正如文档所述,我们在 GitHub Actions 中的 EKS 上安装了 ArgoCD:
- name: Install ArgoCD
run: |
echo "--- Create argo namespace and install it"
kubectl create namespace argocd --dry-run=client -o yaml | kubectl apply -f -
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml
Run Code Online (Sandbox Code Playgroud)
正如文档告诉我们的那样,我们还公开了 ArgoCD 服务器(包括仪表板):
- name: Expose ArgoCD Dashboard
run: |
echo "--- Expose ArgoCD Dashboard via K8s Service"
kubectl patch svc argocd-server -n argocd -p '{"spec": {"type": "LoadBalancer"}}'
echo "--- Wait until Loadbalancer url is present (see /sf/answers/4907595031/)"
until kubectl get service/argocd-server -n argocd --output=jsonpath='{.status.loadBalancer}' | grep "ingress"; do : ; done
Run Code Online (Sandbox Code Playgroud)
最后我们argocd用brew安装了CLI:
echo "--- Install ArgoCD CLI"
brew install argocd
Run Code Online (Sandbox Code Playgroud)
现在我们如何argocd login使用 GitHub Actions 进行操作(无需人工交互)?该argocd login命令需要用户名和密码...
相同的文档告诉我们如何使用以下命令提取 argo 的密码:
kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; echo
Run Code Online (Sandbox Code Playgroud)
使用以下命令获取 ArgoCD 服务器hostname也没什么大不了的:
kubectl get service argocd-server -n argocd --output=jsonpath='{.status.loadBalancer.ingress[0].hostname}'
Run Code Online (Sandbox Code Playgroud)
由于该argocd login命令具有参数--username和--password,我们可以像这样制作登录命令:
argocd login $(kubectl get service argocd-server -n argocd --output=jsonpath='{.status.loadBalancer.ingress[0].hostname}') --username admin --password $(kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; echo) --insecure
Run Code Online (Sandbox Code Playgroud)
请注意--insecure以防止 argo CLI 询问诸如WARNING: server certificate had error: x509: certificate is valid for localhost, argocd-server, argocd-server.argocd, argocd-server.argocd.svc, argocd-server.argocd.svc.cluster.local, not a5f715808162c48c1af54069ba37db0e-1371850981.eu-central-1.elb.amazonaws.com. Proceed insecurely (y/n)?.
成功登录在 GitHub Actions UI 中应如下所示(请参阅此处的完整日志):
'admin:login' logged in successfully
Context 'a5f715808162c48c1af54069ba37db0e-1371850981.eu-central-1.elb.amazonaws.com' updated
Run Code Online (Sandbox Code Playgroud)
现在您的 GitHub Actions 工作流程应该能够与 ArgoCD 服务器进行交互。
FATA[0000] dial tcp: lookup a965bfb530e8449f5a355f221b2fd107-598531793.eu-central-1.elb.amazonaws.com on 8.8.8.8:53: no such host如果在运行命令argocd-server之前刚刚安装了 Kubernetes 服务,则会出现此错误。argocd login然后该argocd login命令会失败一段时间,直到最终可以正常工作。
假设存在一些 DNS 传播问题,我们可以通过将命令包装到此答案中已完成的argocd login命令中来防止此错误破坏我们的 CI 管道。完整的命令将如下所示:until
kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; echo
Run Code Online (Sandbox Code Playgroud)
在 GitHub Actions 中,这将看起来像这样:
--- Login argocd CLI - now wrapped in until to prevent FATA[0000] dial tcp: lookup 12345.eu-central-1.elb.amazonaws.com on 8.8.8.8:53: no such host
time="2022-02-21T12:57:32Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
time="2022-02-21T12:57:35Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
time="2022-02-21T12:57:37Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
[...]
time="2022-02-21T12:58:27Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
time="2022-02-21T12:58:30Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
time="2022-02-21T12:58:32Z" level=fatal msg="dial tcp: lookup a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com on 127.0.0.53:53: no such host"
'admin:login' logged in successfully
Context 'a071bed7e9ea14747951b04360133141-459093397.eu-central-1.elb.amazonaws.com' updated
Run Code Online (Sandbox Code Playgroud)
| 归档时间: |
|
| 查看次数: |
15451 次 |
| 最近记录: |