728x90
반응형
1. Namespace 생성 및 Argo CI/CD 설치
kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml
2. 만약 UI/SSO/Multi Cluster 기능을 원하지 않을 경우 아래 명령어처럼 Core 만 설치하도록 한다.
하지만 나는 이쁜 UI를 좋아하기 때문에 1번 명령어로 설치하려한다.
kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/core-install.yaml
3. 명령어를 실행하면 아래와 같이 쭉쭉 장문의 설치 내용이 출력된다.
[root@m-k8s argo]# kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml
customresourcedefinition.apiextensions.k8s.io/applications.argoproj.io created
customresourcedefinition.apiextensions.k8s.io/applicationsets.argoproj.io created
customresourcedefinition.apiextensions.k8s.io/appprojects.argoproj.io created
serviceaccount/argocd-application-controller created
serviceaccount/argocd-applicationset-controller created
serviceaccount/argocd-dex-server created
serviceaccount/argocd-notifications-controller created
serviceaccount/argocd-redis created
serviceaccount/argocd-repo-server created
serviceaccount/argocd-server created
role.rbac.authorization.k8s.io/argocd-application-controller created
role.rbac.authorization.k8s.io/argocd-applicationset-controller created
role.rbac.authorization.k8s.io/argocd-dex-server created
role.rbac.authorization.k8s.io/argocd-notifications-controller created
role.rbac.authorization.k8s.io/argocd-server created
clusterrole.rbac.authorization.k8s.io/argocd-application-controller created
clusterrole.rbac.authorization.k8s.io/argocd-server created
rolebinding.rbac.authorization.k8s.io/argocd-application-controller created
rolebinding.rbac.authorization.k8s.io/argocd-applicationset-controller created
rolebinding.rbac.authorization.k8s.io/argocd-dex-server created
rolebinding.rbac.authorization.k8s.io/argocd-notifications-controller created
rolebinding.rbac.authorization.k8s.io/argocd-redis created
rolebinding.rbac.authorization.k8s.io/argocd-server created
clusterrolebinding.rbac.authorization.k8s.io/argocd-application-controller created
clusterrolebinding.rbac.authorization.k8s.io/argocd-server created
configmap/argocd-cm created
configmap/argocd-cmd-params-cm created
configmap/argocd-gpg-keys-cm created
configmap/argocd-notifications-cm created
configmap/argocd-rbac-cm created
configmap/argocd-ssh-known-hosts-cm created
configmap/argocd-tls-certs-cm created
secret/argocd-notifications-secret created
secret/argocd-secret created
service/argocd-applicationset-controller created
service/argocd-dex-server created
service/argocd-metrics created
service/argocd-notifications-controller-metrics created
service/argocd-redis created
service/argocd-repo-server created
service/argocd-server created
service/argocd-server-metrics created
deployment.apps/argocd-applicationset-controller created
deployment.apps/argocd-dex-server created
deployment.apps/argocd-notifications-controller created
deployment.apps/argocd-redis created
deployment.apps/argocd-repo-server created
deployment.apps/argocd-server created
statefulset.apps/argocd-application-controller created
networkpolicy.networking.k8s.io/argocd-application-controller-network-policy created
networkpolicy.networking.k8s.io/argocd-applicationset-controller-network-policy created
networkpolicy.networking.k8s.io/argocd-dex-server-network-policy created
networkpolicy.networking.k8s.io/argocd-notifications-controller-network-policy created
networkpolicy.networking.k8s.io/argocd-redis-network-policy created
networkpolicy.networking.k8s.io/argocd-repo-server-network-policy created
networkpolicy.networking.k8s.io/argocd-server-network-policy created
4. 설치가 완료되고, 서비스를 조회하게 되면 아래와 같이 출력된다.
그 중 argocd-server 가 Web 서비스 항목인데, 초기에는 ClusterIP 타입이지만, LoadBalancer 로 변경하여, 외부에서도 접속할 수 있도록 수정하였다.
kubectl patch svc argocd-server -n argocd -p '{"spec": {"type": "LoadBalancer"}}'
5. External-IP 로 접속하게 되면 아래와 같이 Web 페이지가 출력된다.
포트포워딩[Port Forwarding] 하여, 80포트가 아닌 다른 포트로 사용해도 상관 없다.
https://[External-IP]
kubectl port-forward svc/argocd-server -n argocd 8080:443
6. 초기 암호 찾기 (초기 ID : admin)
kubectl -n argo get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d && echo
uIDdeNXLASlDNxxG
7. 초기 로그인 성공 시 아래와 같이 출력된다.
8. 초기 패스워드 변경
출처 : https://argo-cd.readthedocs.io/en/stable/getting_started/
728x90
반응형
LIST
'Kubernetes' 카테고리의 다른 글
[Kubernetes] k3s kubernetes dashboard 설정 (1) | 2023.05.02 |
---|---|
[Kubernetes] k3s 에서 명령어를 간소화하기 위한 스크립트 (1) | 2023.05.01 |
[Kubernetes] Raspberry PI4 에 k3s 구축하기 (1) | 2023.04.30 |
[Kubernetes] 쿠버네티스 대시보드 Lens 설치 (4) | 2023.01.05 |
[Kubernetes] 쿠버네티스 vagrant 로 설치 시 Encoding::CompatibilityError 오류 해결 (3) | 2022.12.26 |