The *jenkins-repohost* Secret contains an SSH private key Jenkins jobs can use to publish RPM packages to the Yum repo host on *files.pyrocufflink.blue*. The *rpm-gpg-key* and *rpm-gpg-key-passphrase* Secrets contain the GnuPG private key and its encryption passphrase, respectively, that can be used to sign RPM packages. This key is trusted by managed nodes on the Pyrocufflink network. |
||
---|---|---|
.. | ||
README.md | ||
argocd-sync-hook.yaml | ||
jenkins.yaml | ||
kustomization.yaml | ||
secrets.yaml | ||
ssh_known_hosts |
README.md
Jenkins in Kubernetes
Kubernetes Setup
Configure Jenkins resources:
ln imagepull-gitea jenkins/.dockerconfigjson
kubectl apply -k jenkins
Jenkins Setup
Install Kubernetes plugin.
Set TCP port for inbound agents setting (Manage Jenkins → Configure Global
Security) to Fixed and enter 40414
.
Configure Kubernetes (Manage Jenkins → Manage Nodes and Clouds → Configure Clouds:
- Add a new cloud → Kubernetes
- Enter a name
- Kubernetes Cloud details...
- Kubernetes URL: (leave blank; will use Kubernetes service discovery)
- Kubernetes Namespace:
jenkins-jobs
- Credentials:
- none -
(will use Service Account token) - Jenkins tunnel:
jenkins.jenkins.svc.cluster.local:
(trailing colon!)