Install and configure Steward on Kubernetes.
This Helm chart requires Helm 3 or higher.
The Steward Helm chart is currently not published in any public Helm repository. Therefore it must be installed from a source checkout.
Use the helm install
command to install the Steward Helm chart:
helm install RELEASE_NAME CHECKOUT_DIR/charts/steward/ ...
The helm install
command has a parameter --namespace
that defines the target namespace of the release.
Normally this is the namespace where the application will be installed to.
Helm also stores the release data in that namespace.
However, the Steward chart does not use the release namespace but has a separate parameter targetNamespace.name
defining the namespace where Steward will be installed to.
This allows to include the Steward chart as dependency into another chart but still install into an own namespace.
The Helm release target namespace and the Steward target namespace can be equal if required.
If the Steward target namespace deliberately exists already, parameter targetNamespace.create
should be set to false
to suppress a resource conflict error.
Do not use the --no-hooks
option of the helm install
command.
Hooks are required for a consistent installation.
Use the helm upgrade
command to upgrade Steward releases:
helm upgrade RELEASE_NAME CHECKOUT_DIR/charts/steward/ ...
To reuse values from the current release revision, do NOT use the --reuse-values
option of the helm upgrade
command.
This option will not only reuse overridden values, but also the built-in values of the current release's chart version.
The result might be unexpected. Instead:
-
Retrieve only the overridden values from the current release:
helm get values RELEASE_NAME --namespace RELEASE_NAMESPACE --output yaml \ >prev-values.yaml
-
Apply the overridden values to the upgrade, optionally adding more overrides:
helm upgrade ... -f prev-values.yaml -f new-values.yaml --set ...
Note the order of increasing precedence from left to right!
Use the helm uninstall
command to delete a Steward release:
helm uninstall RELEASE_NAME ...
Note that Steward's custom resource definitions will not be deleted automatically (see Custom Resource Definitions below).
The tables in the following sections list the configurable parameters of the Steward chart.
Parameter | Description | Default |
---|---|---|
targetNamespace.create |
(bool) Whether to create the target namespace. Can be set to false if the namespace exists already, e.g. because the target namespace is also the target namespace of the Helm release and therefore must be created before installing the Chart. |
true |
targetNamespace.name |
(string) The name of the namespace where Steward should be installed to. Note that we do not use the Helm release target namespace, so that this chart can be used as subchart of another chart and still installs into its dedicated namespace. |
steward-system |
Pipeline Run Controller:
Parameter | Description | Default |
---|---|---|
runController.image.repository |
(string) The container registry and repository of the Run Controller image. |
stewardci/stewardci-run-controller |
runController.image.tag |
(string) The tag of the Run Controller image in the container registry. |
A fixed image tag. |
runController.image.pullPolicy |
(string) The image pull policy for the Run Controller image. For possible values see field imagePullPolicy of the container spec in the Kubernetes API documentation. |
IfNotPresent |
runController.resources |
(object of RecourceRequirements )The resource requirements of the Run Controller container. When overriding, override the complete value, not just subvalues, because the default value might change in future versions and a partial override might not make sense anymore. |
Limits and requests set (see values.yaml ) |
runController.podSecurityContext |
(object of PodSecurityContext )The pod security context of the Run Controller pod. |
{} |
runController.securityContext |
(object of SecurityContext )The security context of the Run Controller container. |
{} |
runController.nodeSelector |
(object) The nodeSelector field of the Run Controller pod spec. |
{} |
runController.affinity |
(object of Affinity )The affinity field of the Run Controller pod spec. |
{} |
runController.tolerations |
(array of Toleration )The tolerations field of the Run Controller pod spec. |
[] |
runController.args.qps |
(integer) The maximum queries per second (QPS) from the controller to the cluster. |
5 |
runController.args.burst |
(integer) The burst limit for throttle connections (maximum number of concurrent requests). |
10 |
runController.args.threadiness |
(integer) The maximum number of reconciliations performed in parallel. |
2 |
runController.args.logVerbosity |
(integer) The log verbosity. Levels are adopted from Kubernetes logging conventions. |
2 |
runController.podSecurityPolicyName |
(string) The name of an existing pod security policy that should be used by the run controller. If empty, a default pod security policy will be created. |
empty |
Tenant Controller:
Parameter | Description | Default |
---|---|---|
tenantController.image.repository |
(string) The container registry and repository of the Tenant Controller image. |
stewardci/stewardci-tenant-controller |
tenantController.image.tag |
(string) The tag of the Tenant Controller image in the container registry. |
A fixed image tag. |
tenantController.image.pullPolicy |
(string) The image pull policy for the Tenant Controller image. For possible values see field imagePullPolicy of the container spec in the Kubernetes API documentation. |
IfNotPresent |
tenantController.resources |
(object of RecourceRequirements )The resource requirements of the Tenant Controller container. When overriding, override the complete value, not just subvalues, because the default value might change in future versions and a partial override might not make sense anymore. |
Limits and requests set (see values.yaml ) |
tenantController.podSecurityContext |
(object of PodSecurityContext )The pod security context of the Tenant Controller pod. |
{} |
tenantController.securityContext |
(object of SecurityContext )The security context of the Tenant Controller container. |
{} |
tenantController.nodeSelector |
(object) The nodeSelector field of the Tenant Controller pod spec. |
{} |
tenantController.affinity |
(object of Affinity )The affinity field of the Tenant Controller pod spec. |
{} |
tenantController.tolerations |
(array of Toleration )The tolerations field of the Tenant Controller pod spec. |
[] |
tenantController.args.qps |
(integer) The maximum queries per second (QPS) from the controller to the cluster. |
5 |
tenantController.args.burst |
(integer) The burst limit for throttle connections (maximum number of concurrent requests). |
10 |
tenantController.args.threadiness |
(integer) The maximum number of reconciliations performed in parallel. |
2 |
tenantController.possibleTenantRoles |
(array of string) The names of all possible tenant roles. A tenant role is a Kubernetes ClusterRole that the controller binds within a tenant namespace to (a) the default service account of the client namespace the tenant belongs to and (b) to the default service account of the tenant namespace. The tenant role to be used can be configured per Steward client namespace via annotation steward.sap.com/tenant-role . |
['steward-tenant'] |
tenantController.args.logVerbosity |
The log verbosity. Levels are adopted from Kubernetes logging conventions. | 2 |
tenantController.podSecurityPolicyName |
(string) The name of an existing pod security policy that should be used by the tenant controller. If empty, a default pod security policy will be created. |
empty |
Common parameters:
Parameter | Description | Default |
---|---|---|
imagePullSecrets |
(array of LocalObjectReference) The image pull secrets to be used for pulling controller images. |
[] |
Parameter | Description | Default |
---|---|---|
metrics.serviceMonitors.enabled |
(bool) Whether to generate ServiceMonitor resource for Prometheus Operator. |
false |
metrics.serviceMonitors.extraLabels |
(object of string) Labels to be attached to the ServiceMonitor resources for Prometheus Operator. |
{} |
Parameter | Description | Default |
---|---|---|
pipelineRuns.logging.elasticsearch.indexURL |
(string) The URL of the Elasticsearch index to send logs to. If null or empty, logging to Elasticsearch is disabled. Example: http://elasticsearch-primary.elasticsearch.svc.cluster.local:9200/jenkins-logs/_doc |
empty |
pipelineRuns.jenkinsfileRunner.image.repository |
OUTDATED (string) Use pipelineRuns.jenkinsfileRunner.image instead. |
|
pipelineRuns.jenkinsfileRunner.image.tag |
OUTDATED (string) Use pipelineRuns.jenkinsfileRunner.image instead. |
|
pipelineRuns.jenkinsfileRunner.image.pullPolicy |
OUTDATED (string) Use pipelineRuns.jenkinsfileRunner.imagePullPolicy instead. |
|
pipelineRuns.jenkinsfileRunner.image |
(string) The Jenkinsfile Runner image. |
stewardci/stewardci-jenkinsfile-runner:<versionTag> |
pipelineRuns.jenkinsfileRunner.imagePullPolicy |
(string) The image pull policy for the Jenkinsfile Runner image. For possible values see field imagePullPolicy of the container spec in the Kubernetes API documentation. Currently broken, IfNotPresent is used in any case. See tektoncd/pipeline #3423 |
IfNotPresent |
pipelineRuns.jenkinsfileRunner.javaOpts |
(string) The JAVA_OPTS for the Jenkinsfile Runner process. |
(see values.yaml ) |
pipelineRuns.jenkinsfileRunner.resources |
(object of RecourceRequirements )The resource requirements of Jenkinsfile Runner containers. When overriding, override the complete value, not just subvalues, because the default value might change in future versions and a partial override might not make sense anymore. |
Limits and requests set (see values.yaml ) |
pipelineRuns.jenkinsfileRunner.podSecurityContext.runAsUser |
(integer) The user ID (UID) of the container processes of the Jenkinsfile Runner pod. The value must be an integer in the range of [1,65535]. Corresponds to field runAsUser of a PodSecurityContext. |
1000 |
pipelineRuns.jenkinsfileRunner.podSecurityContext.runAsGroup |
(integer) The group ID (GID) of the container processes of the Jenkinsfile Runner pod. The value must be an integer in the range of [1,65535]. Corresponds to field runAsGroup of a PodSecurityContext. |
1000 |
pipelineRuns.jenkinsfileRunner.podSecurityContext.fsGroup |
(integer) A special supplemental group ID of the container processes of the Jenkinsfile Runner pod, that defines the ownership of some volume types. The value must be an integer in the range of [1,65535]. Corresponds to field fsGroup of a PodSecurityContext. |
1000 |
pipelineRuns.jenkinsfileRunner.pipelineCloneRetryIntervalSec |
(string) The retry interval for cloning the pipeline repository (in seconds). |
The default value is defined in the Jenkinsfile Runner image. |
pipelineRuns.jenkinsfileRunner.pipelineCloneRetryTimeoutSec |
(string) The retry timeout for cloning the pipeline repository (in seconds). |
The default value is defined in the Jenkinsfile Runner image. |
pipelineRuns.podSecurityPolicyName |
(string) The name of an existing pod security policy that should be used by pipeline run pods. If empty, a default pod security policy will be created. |
empty |
pipelineRuns.timeout |
(string) The maximum execution time of pipelines. Must be specified as a string understood by Go's time.parseDuration() : A duration string is a possibly signed sequence of decimal numbers, each with optional fraction and a unit suffix, such as "300ms", "-1.5h" or "2h45m". Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". |
60m |
pipelineRuns.networkPolicy |
(string) DEPRECATED: Use pipelineRuns.networkPolicies instead. |
|
pipelineRuns.defaultNetworkPolicyName |
The name of the network policy which is used when no network profile is selected by a pipeline run spec. | default if pipelineRuns.networkPolicies is not set or empty. |
pipelineRuns.networkPolicies |
(map[string]string) The network policies selectable as network profiles in pipeline run specs. The key can be any valid YAML key not starting with underscore ( _ ). The value must be a string containing a complete networkpolicy.networking.k8s.io resource manifest in YAML format. The .metadata section of the manifest can be omitted, as it will be replaced anyway. See the Kubernetes documentation of network policies for details about Kubernetes network policies.Note that Steward ensures that all pods in pipeline run namespaces are isolated in terms of network policies. The policy defined here adds egress and/or ingress rules. |
A single entry named default whose value is a network policy defining rules that allow ingress traffic from all pods in the same namespace and egress traffic to the internet, the cluster DNS resolver and the Kubernetes API server. |
pipelineRuns.limitRange |
(string) The limit range to be created in every pipeline run namespace. The value must be a string containing a complete limitrange resource manifest in YAML format. The .metadata section of the manifest can be omitted, as it will be replaced anyway. See the Kubernetes documentation of limit ranges for details about Kubernetes limit ranges. |
A limit range defining a default CPU request of 0.5 CPUs, a default CPU limit of 3 CPUs, a default memory request of 0.5 GiB and a default memory limit of 3 GiB. This default limit range might change with newer releases of Steward. It is recommended to set an own limit range to avoid unexpected changes with Steward upgrades. |
pipelineRuns.resourceQuota |
(string) The resource quota to be created in every pipeline run namespace. The value must be a string containing a complete resourcequotas resource manifest in YAML format. The .metadata section of the manifest can be omitted, as it will be replaced anyway. See the Kubernetes documentation of resource quotas for details about Kubernetes resource quotas. |
none |
Parameter | Description | Default |
---|---|---|
featureFlags |
(string) Feature flag definition. |
empty |
The feature flags definition is a string containing any number of feature flag names separated by any non-empty sequence of comma (,
) and/or whitespace (space, horizontal tab, vertical tab, carriage return, newline, form feed). Separators at the beginning and the end of the string are allowed.
A feature flag gets enabled if the name is either prefixed with a plus sign (+
) or not prefixed with a minus sign (-
).
A feature flag gets disabled if the name is prefixed with a minus sign (-
).
Example 1: Typical format
Flag1 +Flag2 -Flag3
or alternatively using comma and space as separator:
Flag1, +Flag2, -Flag3
or alternatively using newline as separator:
Flag1
+Flag2
-Flag3
Flag1
and Flag2
get enabled, while Flag3
gets disabled.
Example 2: Untypical but correct format
, Flag1 +Flag2, ,,,,
Flag3,
It has the same effect as in example 1. The definition string has leading and trailing separators and uses different separator sequences.
Feature Flag | Description | Default |
---|---|---|
RetryOnInvalidPipelineRunsConfig |
If enabled, the pipeline run controller retries reconciling PipelineRun objects in case the controller configuration (in ConfigMaps) is invalid or cannot be loaded. It is assumed that the condition can be detected by a monitoring tool, triggers an alert and operators fix the issue in a timely manner. By that operator errors do not immediately break user pipeline runs. However, processing of PipelineRun objects may be delayed significantly in case of invalid configuration. If disabled, the current behavior is used: immediately set all unfinished PipelineRun objects to finished with result code error_infra .The new behavior is supposed to become the default in a future release of Steward. |
disabled |
Steward extends Kubernetes by a set of custom resources types like Tenant and PipelineRun. The respective custom resource definitions (CRDs) are handled in a special way:
-
Upon install, upgrade and rollback the CRDs will be created or updated to the version from this chart.
CRDs that are not part of the Steward version to be installed, upgraded to or rolled back to will NOT be deleted to prevent unexpected deletion of objects of those custom resource types.
-
An uninstall will keep the CRDs to prevent unexpected deletion of objects of those custom resource types.
-
The
--force
option of thehelm upgrade
orhelm rollback
command, which enables replacement by delete and recreate, does NOT apply to CRDs.
Operators may delete Steward CRDs manually after Steward has been uninstalled. By doing so, all resource objects of those types will be removed by Kubernetes, too.