Installing Alauda DevOps
This guide provides detailed steps for installing Alauda DevOps.
TOC
Prerequisites
Ensure the Alauda DevOps v3 operator is uploaded before proceeding.
For more information on uploading the operator, please refer to
Install Operator
Go to the platform's Administrator -> Marketplace -> OperatorHub page, search for the Alauda DevOps v3, and then click on the operator card to enter the operator details page.
Click Install to install the operator.
Deployment location
Deploy Katanomi instances in the Global cluster. The business cluster can deploy instances as needed for CI/CD.
Procedure
Create the Katanomi Instance
Only one Katanomi instance is supported.
- Global cluster: Deploy within the
cpaas-systemnamespace. SetExternalURLto thePlatform URLof theglobalcluster andService.TypetoIngress. - Business cluster: Can be deployed in any namespace other than
cpaas-system.
- Login to the
Alauda Container Platformplatform. - Navigate to the Clusters tab under
Platform Management. - Select the deployed cluster and click CLI Tools.
- Create the Katanomi Instance (adjust parameters as needed)
global cluster
business cluster
- Wait for the DevOps Instance to be ready
Preparation for CI/CD functionality
Before starting using build and release pipelines features of Alauda DevOps, platform administrators need to complete some preparation.
Refer to the documentation inside the platform after deploying Alauda DevOps v3: <Platform URL>/console-devops-docs/en/devops-initialization/cicd/init/
Katanomi Parameter Description
FAQ
Katanomi Pod Fails to Start Due to Read-Only Root Filesystem: /cpaas Directory Not Writable
Katanomi requires write access to the /cpaas directory on the host system to store audit logs. If the pod is unable to write to this directory, it will fail to start.
To resolve this issue, you can configure an alternative audit log storage path. For example:
This configuration directs Katanomi components to use /tmp/audit as the audit log storage path, ensuring compatibility with environments that enforce a read-only root filesystem. Adjust the path as needed to meet your security and operational requirements.
How to Configure a Custom ImagePullSecret When Deploying Katanomi
To specify a custom ImagePullSecret for your Katanomi instance, add the following configuration:
This configuration ensures that Katanomi uses the specified ImagePullSecret for pulling container images from private registries. Replace imagePullSecretName with the name of your pre-created Kubernetes secret containing the required registry credentials.