Gitting There on Argos
Once more they lifted sails, and once more they took the Argo into the open sea. - Jason and Medea
This is part two of a series detailing my homelab Kubernetes setup. The other parts can be found as follows:
- Part 1: Talosian Terraforming
- Part 2: Gitting There on Argos (this part)
- Part 3: Playing in Traefik
Introduction
ArgoCD defines itself as a “declarative, GitOps continuous delivery tool for Kubernetes.” Basically, it allows the state of a Kubernetes cluster to be declared within a git repository, and the actual state will be continuously be reconciled with the desired state (at some git ref).
I chose ArgoCD over FluxCD, a very similar project, because I used Flux at a previous internship.
Installation
Ansible Role
To install Argo on the cluster have an ArgoCD Ansible role. It is a simple two tasks, create the namespace, then apply the installation yaml.
# https://argo-cd.readthedocs.io/en/stable/getting_started/
---
- name: Create 'argocd' Namespace.
kubernetes.core.k8s:
name: argocd
kind: Namespace
state: present
- name: Apply Argo CD Install Yaml.
kubernetes.core.k8s:
namespace: argocd
src: https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml
apply: true
ArgoCD post install steps
To use the argocd
cli or web UI you need to login. Retrieve the default
password using either of the following commands.
kubectl get secrets -n argocd \
argocd-initial-admin-secret \
-o jsonpath='{.data.password}' | base64 --decode
123abc456def789g
argocd admin initial-password -n argocd
123abc456def789g
This password must be only used for first time login. We strongly recommend you
update the password using `argocd account update-password`.
Then login using argocd login localhost:8080
with the username ‘admin’.
Note: The argoCD server needs to be accessible outside of the cluster in order for the cli to login. Port forwarding is the easyest way to acchive this.
kubectl port-forward -n argocd services/argocd-server 8080:80
Make sure to change the password and remove the initial secret!
argocd account update-password
kubectl delete secret -n argocd argocd-initial-admin-secret
Apps-of-Apps
A common method to bootstrap a cluster is the “app of apps” pattern. Offical documentation for this pattern can be found here. Basically, there is one meta app that configures the definitions of all other apps.
Given the following file tree (on Github).
homelab/k8s-apps/
├── argo-sources/
│ ├── blog-kgb33-dev.yaml
│ ├── metalLB.yaml
│ ├── sealed-secrets.yaml
│ └── traefik.yaml
├── blog-kgb33-dev/
│ └── ...
├── metalLB/
│ └── ...
├── sealed-secrets/
│ └── ...
├── traefik/
│ └── ...
├── meta.yaml
└── README.md
I have a file called meta.yaml
that declares the argo-sources
directory as
an Argo app. Each file within that directory declares the neighboring directory
as an Argo app.
# meta.yaml
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: argocd-meta
namespace: argocd
spec:
destination:
namespace: argocd
server: 'https://kubernetes.default.svc'
source:
path: k8s-apps/argo-sources
repoURL: 'https://github.com/KGB33/homelab.git'
targetRevision: HEAD
project: default
syncPolicy:
automated:
prune: true
selfHeal: true
Apply the meta.yaml
file: kubectl apply -f meta.yaml
. Then
sync it using argocd app sync argocd-meta
.
Now that each app definition has been synced, the apps themselves can be
synced. All of my apps are in the ‘default’ project, so I can sync that instead
of each individual app: argocd app sync --project default
.