Skip to content

Latest commit

 

History

History
248 lines (181 loc) · 21.4 KB

README.md

File metadata and controls

248 lines (181 loc) · 21.4 KB

Steward Helm Chart

Install and configure Steward on Kubernetes.

Table of Content

Prerequisites

This Helm chart requires Helm 3 or higher.

The Steward Helm chart is currently not published in any public Helm repository. Therefore it must be installed from a source checkout.

Install

Use the helm install command to install the Steward Helm chart:

helm install RELEASE_NAME CHECKOUT_DIR/charts/steward/ ...

The helm install command has a parameter --namespace that defines the target namespace of the release. Normally this is the namespace where the application will be installed to. Helm also stores the release data in that namespace. However, the Steward chart does not use the release namespace but has a separate parameter targetNamespace.name defining the namespace where Steward will be installed to. This allows to include the Steward chart as dependency into another chart but still install into an own namespace. The Helm release target namespace and the Steward target namespace can be equal if required.

If the Steward target namespace deliberately exists already, parameter targetNamespace.create should be set to false to suppress a resource conflict error.

Do not use the --no-hooks option of the helm install command. Hooks are required for a consistent installation.

Upgrade

Use the helm upgrade command to upgrade Steward releases:

helm upgrade RELEASE_NAME CHECKOUT_DIR/charts/steward/ ...

To reuse values from the current release revision, do NOT use the --reuse-values option of the helm upgrade command. This option will not only reuse overridden values, but also the built-in values of the current release's chart version. The result might be unexpected. Instead:

  1. Retrieve only the overridden values from the current release:

    helm get values RELEASE_NAME --namespace RELEASE_NAMESPACE --output yaml \
        >prev-values.yaml
  2. Apply the overridden values to the upgrade, optionally adding more overrides:

    helm upgrade ... -f prev-values.yaml -f new-values.yaml --set ...

    Note the order of increasing precedence from left to right!

Uninstall

Use the helm uninstall command to delete a Steward release:

helm uninstall RELEASE_NAME ...

Note that Steward's custom resource definitions will not be deleted automatically (see Custom Resource Definitions below).

Chart Configuration

The tables in the following sections list the configurable parameters of the Steward chart.

Target Namespace

Parameter Description Default
targetNamespace.create (bool)
Whether to create the target namespace. Can be set to false if the namespace exists already, e.g. because the target namespace is also the target namespace of the Helm release and therefore must be created before installing the Chart.
true
targetNamespace.name (string)
The name of the namespace where Steward should be installed to. Note that we do not use the Helm release target namespace, so that this chart can be used as subchart of another chart and still installs into its dedicated namespace.
steward-system

Controllers

Pipeline Run Controller:

Parameter Description Default
runController.image.repository (string)
The container registry and repository of the Run Controller image.
stewardci/stewardci-run-controller
runController.image.tag (string)
The tag of the Run Controller image in the container registry.
A fixed image tag.
runController.image.pullPolicy (string)
The image pull policy for the Run Controller image. For possible values see field imagePullPolicy of the container spec in the Kubernetes API documentation.
IfNotPresent
runController.resources (object of RecourceRequirements)
The resource requirements of the Run Controller container. When overriding, override the complete value, not just subvalues, because the default value might change in future versions and a partial override might not make sense anymore.
Limits and requests set (see values.yaml)
runController.podSecurityContext (object of PodSecurityContext)
The pod security context of the Run Controller pod.
{}
runController.securityContext (object of SecurityContext)
The security context of the Run Controller container.
{}
runController.nodeSelector (object)
The nodeSelector field of the Run Controller pod spec.
{}
runController.affinity (object of Affinity)
The affinity field of the Run Controller pod spec.
{}
runController.tolerations (array of Toleration)
The tolerations field of the Run Controller pod spec.
[]
runController.args.qps (integer)
The maximum queries per second (QPS) from the controller to the cluster.
5
runController.args.burst (integer)
The burst limit for throttle connections (maximum number of concurrent requests).
10
runController.args.threadiness (integer)
The maximum number of reconciliations performed in parallel.
2
runController.args.logVerbosity (integer)
The log verbosity. Levels are adopted from Kubernetes logging conventions.
2
runController.podSecurityPolicyName (string)
The name of an existing pod security policy that should be used by the run controller. If empty, a default pod security policy will be created.
empty

Tenant Controller:

Parameter Description Default
tenantController.image.repository (string)
The container registry and repository of the Tenant Controller image.
stewardci/stewardci-tenant-controller
tenantController.image.tag (string)
The tag of the Tenant Controller image in the container registry.
A fixed image tag.
tenantController.image.pullPolicy (string)
The image pull policy for the Tenant Controller image. For possible values see field imagePullPolicy of the container spec in the Kubernetes API documentation.
IfNotPresent
tenantController.resources (object of RecourceRequirements)
The resource requirements of the Tenant Controller container. When overriding, override the complete value, not just subvalues, because the default value might change in future versions and a partial override might not make sense anymore.
Limits and requests set (see values.yaml)
tenantController.podSecurityContext (object of PodSecurityContext)
The pod security context of the Tenant Controller pod.
{}
tenantController.securityContext (object of SecurityContext)
The security context of the Tenant Controller container.
{}
tenantController.nodeSelector (object)
The nodeSelector field of the Tenant Controller pod spec.
{}
tenantController.affinity (object of Affinity)
The affinity field of the Tenant Controller pod spec.
{}
tenantController.tolerations (array of Toleration)
The tolerations field of the Tenant Controller pod spec.
[]
tenantController.args.qps (integer)
The maximum queries per second (QPS) from the controller to the cluster.
5
tenantController.args.burst (integer)
The burst limit for throttle connections (maximum number of concurrent requests).
10
tenantController.args.threadiness (integer)
The maximum number of reconciliations performed in parallel.
2
tenantController.possibleTenantRoles (array of string)
The names of all possible tenant roles. A tenant role is a Kubernetes ClusterRole that the controller binds within a tenant namespace to (a) the default service account of the client namespace the tenant belongs to and (b) to the default service account of the tenant namespace. The tenant role to be used can be configured per Steward client namespace via annotation steward.sap.com/tenant-role.
['steward-tenant']
tenantController.args.logVerbosity The log verbosity. Levels are adopted from Kubernetes logging conventions. 2
tenantController.podSecurityPolicyName (string)
The name of an existing pod security policy that should be used by the tenant controller. If empty, a default pod security policy will be created.
empty

Common parameters:

Parameter Description Default
imagePullSecrets (array of LocalObjectReference)
The image pull secrets to be used for pulling controller images.
[]

Monitoring

Parameter Description Default
metrics.serviceMonitors.enabled (bool)
Whether to generate ServiceMonitor resource for Prometheus Operator.
false
metrics.serviceMonitors.extraLabels (object of string)
Labels to be attached to the ServiceMonitor resources for Prometheus Operator.
{}

Pipeline Runs

Parameter Description Default
pipelineRuns.logging.elasticsearch.indexURL (string)
The URL of the Elasticsearch index to send logs to. If null or empty, logging to Elasticsearch is disabled. Example: http://elasticsearch-primary.elasticsearch.svc.cluster.local:9200/jenkins-logs/_doc
empty
pipelineRuns.jenkinsfileRunner.image.repository OUTDATED (string)
Use pipelineRuns.jenkinsfileRunner.image instead.
pipelineRuns.jenkinsfileRunner.image.tag OUTDATED (string)
Use pipelineRuns.jenkinsfileRunner.image instead.
pipelineRuns.jenkinsfileRunner.image.pullPolicy OUTDATED (string)
Use pipelineRuns.jenkinsfileRunner.imagePullPolicy instead.
pipelineRuns.jenkinsfileRunner.image (string)
The Jenkinsfile Runner image.
stewardci/stewardci-jenkinsfile-runner:<versionTag>
pipelineRuns.jenkinsfileRunner.imagePullPolicy (string)
The image pull policy for the Jenkinsfile Runner image. For possible values see field imagePullPolicy of the container spec in the Kubernetes API documentation.

Currently broken, IfNotPresent is used in any case. See tektoncd/pipeline #3423
IfNotPresent
pipelineRuns.jenkinsfileRunner.javaOpts (string)
The JAVA_OPTS for the Jenkinsfile Runner process.
(see values.yaml)
pipelineRuns.jenkinsfileRunner.resources (object of RecourceRequirements)
The resource requirements of Jenkinsfile Runner containers. When overriding, override the complete value, not just subvalues, because the default value might change in future versions and a partial override might not make sense anymore.
Limits and requests set (see values.yaml)
pipelineRuns.jenkinsfileRunner.podSecurityContext.runAsUser (integer)
The user ID (UID) of the container processes of the Jenkinsfile Runner pod. The value must be an integer in the range of [1,65535]. Corresponds to field runAsUser of a PodSecurityContext.
1000
pipelineRuns.jenkinsfileRunner.podSecurityContext.runAsGroup (integer)
The group ID (GID) of the container processes of the Jenkinsfile Runner pod. The value must be an integer in the range of [1,65535]. Corresponds to field runAsGroup of a PodSecurityContext.
1000
pipelineRuns.jenkinsfileRunner.podSecurityContext.fsGroup (integer)
A special supplemental group ID of the container processes of the Jenkinsfile Runner pod, that defines the ownership of some volume types. The value must be an integer in the range of [1,65535]. Corresponds to field fsGroup of a PodSecurityContext.
1000
pipelineRuns.jenkinsfileRunner.pipelineCloneRetryIntervalSec (string)
The retry interval for cloning the pipeline repository (in seconds).
The default value is defined in the Jenkinsfile Runner image.
pipelineRuns.jenkinsfileRunner.pipelineCloneRetryTimeoutSec (string)
The retry timeout for cloning the pipeline repository (in seconds).
The default value is defined in the Jenkinsfile Runner image.
pipelineRuns.podSecurityPolicyName (string)
The name of an existing pod security policy that should be used by pipeline run pods. If empty, a default pod security policy will be created.
empty
pipelineRuns.timeout (string)
The maximum execution time of pipelines. Must be specified as a string understood by Go's time.parseDuration():
A duration string is a possibly signed sequence of decimal numbers, each with optional fraction and a unit suffix, such as "300ms", "-1.5h" or "2h45m". Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h".
60m
pipelineRuns.networkPolicy (string)
DEPRECATED: Use pipelineRuns.networkPolicies instead.
pipelineRuns.defaultNetworkPolicyName The name of the network policy which is used when no network profile is selected by a pipeline run spec. default if pipelineRuns.networkPolicies is not set or empty.
pipelineRuns.networkPolicies (map[string]string)
The network policies selectable as network profiles in pipeline run specs. The key can be any valid YAML key not starting with underscore (_). The value must be a string containing a complete networkpolicy.networking.k8s.io resource manifest in YAML format. The .metadata section of the manifest can be omitted, as it will be replaced anyway. See the Kubernetes documentation of network policies for details about Kubernetes network policies.

Note that Steward ensures that all pods in pipeline run namespaces are isolated in terms of network policies. The policy defined here adds egress and/or ingress rules.
A single entry named default whose value is a network policy defining rules that allow ingress traffic from all pods in the same namespace and egress traffic to the internet, the cluster DNS resolver and the Kubernetes API server.
pipelineRuns.limitRange (string)
The limit range to be created in every pipeline run namespace. The value must be a string containing a complete limitrange resource manifest in YAML format. The .metadata section of the manifest can be omitted, as it will be replaced anyway. See the Kubernetes documentation of limit ranges for details about Kubernetes limit ranges.
A limit range defining a default CPU request of 0.5 CPUs, a default CPU limit of 3 CPUs, a default memory request of 0.5 GiB and a default memory limit of 3 GiB.

This default limit range might change with newer releases of Steward. It is recommended to set an own limit range to avoid unexpected changes with Steward upgrades.
pipelineRuns.resourceQuota (string)
The resource quota to be created in every pipeline run namespace. The value must be a string containing a complete resourcequotas resource manifest in YAML format. The .metadata section of the manifest can be omitted, as it will be replaced anyway. See the Kubernetes documentation of resource quotas for details about Kubernetes resource quotas.
none

Feature Flags

Parameter Description Default
featureFlags (string)
Feature flag definition.
empty

The feature flags definition is a string containing any number of feature flag names separated by any non-empty sequence of comma (,) and/or whitespace (space, horizontal tab, vertical tab, carriage return, newline, form feed). Separators at the beginning and the end of the string are allowed.

A feature flag gets enabled if the name is either prefixed with a plus sign (+) or not prefixed with a minus sign (-). A feature flag gets disabled if the name is prefixed with a minus sign (-).

Example 1: Typical format

Flag1 +Flag2 -Flag3

or alternatively using comma and space as separator:

Flag1, +Flag2, -Flag3

or alternatively using newline as separator:

Flag1
+Flag2
-Flag3

Flag1 and Flag2 get enabled, while Flag3 gets disabled.

Example 2: Untypical but correct format

, Flag1 +Flag2, ,,,,
Flag3,

It has the same effect as in example 1. The definition string has leading and trailing separators and uses different separator sequences.

List of Defined Feature Flags

Feature Flag Description Default
RetryOnInvalidPipelineRunsConfig If enabled, the pipeline run controller retries reconciling PipelineRun objects in case the controller configuration (in ConfigMaps) is invalid or cannot be loaded. It is assumed that the condition can be detected by a monitoring tool, triggers an alert and operators fix the issue in a timely manner. By that operator errors do not immediately break user pipeline runs. However, processing of PipelineRun objects may be delayed significantly in case of invalid configuration.

If disabled, the current behavior is used: immediately set all unfinished PipelineRun objects to finished with result code error_infra.

The new behavior is supposed to become the default in a future release of Steward.
disabled

Custom Resource Definitions

Steward extends Kubernetes by a set of custom resources types like Tenant and PipelineRun. The respective custom resource definitions (CRDs) are handled in a special way:

  • Upon install, upgrade and rollback the CRDs will be created or updated to the version from this chart.

    CRDs that are not part of the Steward version to be installed, upgraded to or rolled back to will NOT be deleted to prevent unexpected deletion of objects of those custom resource types.

  • An uninstall will keep the CRDs to prevent unexpected deletion of objects of those custom resource types.

  • The --force option of the helm upgrade or helm rollback command, which enables replacement by delete and recreate, does NOT apply to CRDs.

Operators may delete Steward CRDs manually after Steward has been uninstalled. By doing so, all resource objects of those types will be removed by Kubernetes, too.