Installing Alauda DevOps
This guide provides detailed steps for installing Alauda DevOps.
TOC
Prerequisites
Ensure the Alauda DevOps v3 operator is uploaded before proceeding.
For more information on uploading the operator, please refer to
Namespace Security Policy Requirements
-
Katanomi only supports creating one instance. The instance can be deployed to any namespace, but the following conditions must be met:
- Sufficient namespace resources
- Namespace configured with privileged security policy
-
Katanomi Operator requires the namespace to use privileged security policy configuration to function correctly. This requirement is based on the component's dependency on privileged containers and hostPath volume mounts.
Root Cause: Katanomi Operator components require privileged container access and hostPath volume mounts (the audit log directory) for proper operation:
- Privileged Containers: Multiple Katanomi Operator deployments utilize
privileged: truesecurity context:apiserver deployment- The API server deployment requiresprivileged: truefor executingchownto the audit log directoryapi deployment- The API deployment usesprivileged: truefor executingchownto the audit log directorydevops-api deployment- The DevOps API deployment requiresprivileged: truefor executingchownto the audit log directorybuild-image-buildkit-v1tasks - Build tasks explicitly useprivileged: truefor container image building capabilities
- Privileged Containers: Multiple Katanomi Operator deployments utilize
Install Operator
Go to the platform's Administrator -> Marketplace -> OperatorHub page, search for the Alauda DevOps v3, and then click on the operator card to enter the operator details page.
Click Install to install the operator.
Deployment location
Deploy Katanomi instances in the Global cluster. The business cluster can deploy instances as needed for CI/CD.
Procedure
Create the Katanomi Instance
Only one Katanomi instance is supported.
- Global cluster: Deploy within the
cpaas-systemnamespace. SetExternalURLto thePlatform URLof theglobalcluster andService.TypetoIngress. - Business cluster: Can be deployed in any namespace other than
cpaas-system.
- Login to the
Alauda Container Platformplatform. - Navigate to the Clusters tab under
Platform Management. - Select the deployed cluster and click CLI Tools.
- Create the Katanomi Instance (adjust parameters as needed)
global cluster
business cluster
- Wait for the DevOps Instance to be ready
Preparation for CI/CD functionality
Before starting using build and release pipelines features of Alauda DevOps, platform administrators need to complete some preparation.
Refer to the documentation inside the platform after deploying Alauda DevOps v3: <Platform URL>/console-devops-docs/en/devops-initialization/cicd/init/
Katanomi Parameter Description
FAQ
Katanomi Pod Fails to Start Due to Read-Only Root Filesystem: /cpaas Directory Not Writable
Katanomi requires write access to the /cpaas directory on the host system to store audit logs. If the pod is unable to write to this directory, it will fail to start.
To resolve this issue, you can configure an alternative audit log storage path. For example:
This configuration directs Katanomi components to use /tmp/audit as the audit log storage path, ensuring compatibility with environments that enforce a read-only root filesystem. Adjust the path as needed to meet your security and operational requirements.
How to Configure a Custom ImagePullSecret When Deploying Katanomi
To specify a custom ImagePullSecret for your Katanomi instance, add the following configuration:
This configuration ensures that Katanomi uses the specified ImagePullSecret for pulling container images from private registries. Replace imagePullSecretName with the name of your pre-created Kubernetes secret containing the required registry credentials.