Skip to content

Commit 05985c2

Browse files
committed
🎶kcd munich updates
1 parent 0fe7e61 commit 05985c2

File tree

7 files changed

+11
-20
lines changed

7 files changed

+11
-20
lines changed

docs/1-the-manual-menace/1-the-basics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
## 🐌 The Basics - CRW, OCP & Helm
22
## DevSpaces setup
33

4-
1. Login to your DevSpaces Editor here - [https://devspaces.<CLUSTER_DOMAIN>](https://devspaces.<CLUSTER_DOMAIN>). Use the `FREE IPA` login and use the user credentials provided by the instructor. Click `tl500` from the left menu. It will open a new browser tab to take you your IDE.
4+
1. Login to your DevSpaces Editor here - [https://red.ht/kcdmunich-devspaces](https://red.ht/kcdmunich-devspaces). Use the `FREE IPA` login and use the user credentials provided by the instructor. Click `tl500` from the left menu. It will open a new browser tab to take you your IDE.
55

66
![tl500](./images/tl500.png)
77

docs/1-the-manual-menace/3-ubiquitous-journey.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -51,16 +51,7 @@ All of these traits lead to one outcome - the ability to build and release quali
5151

5252
![values-tooling](./images/values-tooling.png)
5353

54-
3. This is GITOPS - so in order to affect change, let's get the configuration into git, before telling ArgoCD to sync the changes for us.
55-
56-
```bash#test
57-
cd /projects/tech-exercise/
58-
git add .
59-
git commit -m "🦆 ADD - bootstrap and nexus 🦆"
60-
git push
61-
```
62-
63-
4. In order for ArgoCD to sync the changes from our git repository, we need to provide access to it. We'll deploy a secret to cluster, for now *not done as code* but in the next lab we'll add the secret as code and store it encrypted in Git. In your terminal
54+
3. In order for ArgoCD to sync the changes from our git repository, we need to provide access to it. We'll deploy a secret to cluster, for now *not done as code* but in the next lab we'll add the secret as code and store it encrypted in Git. In your terminal
6455
6556
Add the Secret to the cluster:
6657
@@ -83,6 +74,7 @@ All of these traits lead to one outcome - the ability to build and release quali
8374
metadata:
8475
annotations:
8576
tekton.dev/git-0: https://${GIT_SERVER}
77+
sealedsecrets.bitnami.com/managed: "true"
8678
name: git-auth
8779
EOF
8880
```
@@ -103,4 +95,8 @@ EOF
10395
oc get projects | grep ${TEAM_NAME}
10496
```
10597
98+
```bash#test
99+
oc get pods -n ${TEAM_NAME}-ci-cd
100+
```
101+
106102
🪄🪄 Magic! You've now deployed an app of apps to scaffold our tooling and projects in a repeatable and auditable way (via git!). Next up, we'll make extend the Ubiquitous Journey with some tooling 🪄🪄
-87.6 KB
Loading

docs/2-attack-of-the-pipelines/1-sealed-secrets.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,22 +7,22 @@ Sealed Secrets allows us to _seal_ Kubernetes secrets by using a utility called
77

88
### Sealed Secrets in action
99

10-
1. The observant among you will have noticed that in the previous exercise we created a secret for git and added it to the cluster WITHOUT putting it in git...😳 Lets start by fixing this and sealing our Git credentials so they can be safely checked in to the code. First, we'll create the secret in a tmp directory. Make sure you have your gitlab user and PAT from the previous exercise set in your environment
10+
1. The observant among you will have noticed that in the previous exercise we created a secret for git and added it to the cluster WITHOUT putting it in git...😳 Lets start by fixing this and sealing our Git credentials so they can be safely checked in to the code. First, we'll create the secret in a tmp directory. Make sure you have your GitLab user and password from the previous exercise set in your environment.
1111

1212
```bash
1313
echo ${GITLAB_USER}
14-
echo ${GITLAB_PAT}
14+
echo ${GITLAB_PASSWORD}
1515
```
1616

17-
2. Run this command to generate a Kubernetes secret object in `/tmp` with the right labels needed for Tekton and Jenkins later.
17+
2. Run this command to generate a Kubernetes secret object in `/tmp` with the right labels needed for Tekton later.
1818

1919
```bash#test
2020
cat << EOF > /tmp/git-auth.yaml
2121
kind: Secret
2222
apiVersion: v1
2323
data:
2424
username: "$(echo -n ${GITLAB_USER} | base64 -w0)"
25-
password: "$(echo -n ${GITLAB_PAT} | base64 -w0)"
25+
password: "$(echo -n ${GITLAB_PASSWORD} | base64 -w0)"
2626
type: kubernetes.io/basic-auth
2727
metadata:
2828
annotations:

docs/2-attack-of-the-pipelines/3-the-pipelines.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -148,10 +148,5 @@ In this snippet of the pipeline used in this exercise, we define:
148148

149149
![images/tekton-pipeline-running.png](images/tekton-pipeline-running.png)
150150

151-
?> **TIP** You can use the **tkn** command line to observe `PipelineRun` logs as well:
152-
153-
```bash
154-
tkn -n ${TEAM_NAME}-ci-cd pr logs -Lf
155-
```
156151

157152
🪄 OBSERVE THE PIPELINE IS RUNNING 🪄
192 KB
Loading
240 KB
Loading

0 commit comments

Comments
 (0)