You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/user-guide/auto_sync.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ spec:
18
18
syncPolicy:
19
19
automated: {}
20
20
```
21
-
Application CRD now also support explicitly setting automated sync to be turn on or off by using `spec.syncPolicy.automated.enabled` flag to true or false. When `enable` field is set to true, Automated Sync is active and when set to false controller will skip automated sync even if `prune`, `self-heal` and `allowEmpty` are set.
21
+
Application CRD now also support explicitly setting automated sync to be turned on or off by using `spec.syncPolicy.automated.enabled` flag to true or false. When `enable` field is set to true, Automated Sync is active and when set to false controller will skip automated sync even if `prune`, `self-heal` and `allowEmpty` are set.
22
22
```yaml
23
23
spec:
24
24
syncPolicy:
@@ -27,7 +27,7 @@ spec:
27
27
```
28
28
29
29
!!!note
30
-
Setting `spec.syncPolicy.automated.enabled` flag to null will be treated as automated sync as enabled. When using `enabled` field set to false, fields like `prune`, `self-heal` and `allowEmpty` can be set without enabling them.
30
+
Setting the `spec.syncPolicy.automated.enabled` flag to null will be treated as if automated sync is enabled. When the `enabled` field is set to false, fields like `prune`, `selfHeal` and `allowEmpty` can be set without enabling them.
31
31
32
32
## Temporarily toggling auto-sync for applications managed by ApplicationSets
33
33
@@ -82,7 +82,7 @@ when the live cluster's state deviates from the state defined in Git, run:
82
82
argocd app set <APPNAME> --self-heal
83
83
```
84
84
85
-
Or by setting the selfheal option to true in the automated sync policy:
85
+
Or by setting the self-heal option to true in the automated sync policy:
86
86
87
87
```yaml
88
88
spec:
@@ -100,7 +100,7 @@ Disabling self-heal does not guarantee that live cluster changes won't be revert
100
100
* Automated sync will only attempt one synchronization per unique combination of commit SHA1 and
101
101
application parameters. If the most recent successful sync in the history was already performed
102
102
against the same commit-SHA and parameters, a second sync will not be attempted, unless `selfHeal` flag is set to true.
103
-
* If `selfHeal` flag is set to true then sync will be attempted again after selfheal timeout (5 seconds by default)
103
+
* If the `selfHeal` flag is set to true, then the sync will be attempted again after self-heal timeout (5 seconds by default)
104
104
which is controlled by `--self-heal-timeout-seconds` flag of `argocd-application-controller` deployment.
105
105
* Automatic sync will not reattempt a sync if the previous sync attempt against the same commit-SHA
Copy file name to clipboardExpand all lines: docs/user-guide/diffing.md
+5-4
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ It is possible for an application to be `OutOfSync` even immediately after a suc
6
6
resulting in an `OutOfSync` status indicating a missing field was detected.
7
7
- The sync was performed (with pruning disabled), and there are resources which need to be deleted.
8
8
- A controller or [mutating webhook](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#mutatingadmissionwebhook) is altering the object after it was
9
-
submitted to Kubernetes in a manner which contradicts Git.
9
+
submitted to Kubernetes so it differs from the one in Git.
10
10
- A Helm chart is using a template function such as [`randAlphaNum`](https://github.com/helm/charts/blob/master/stable/redis/templates/secret.yaml#L16),
11
11
which generates different data every time `helm template` is invoked.
12
12
- For Horizontal Pod Autoscaling (HPA) objects, the HPA controller is known to reorder `spec.metrics`
@@ -94,7 +94,7 @@ data:
94
94
- '.webhooks[]?.clientConfig.caBundle'
95
95
```
96
96
97
-
Resource customization can also be configured to ignore all differences made by a managedField.manager at the system level. The example below shows how to configure Argo CD to ignore changes made by `kube-controller-manager` in `Deployment` resources.
97
+
Resource customization can also be configured to ignore all differences made by a `managedField.manager` at the system level. The example below shows how to configure Argo CD to ignore changes made by `kube-controller-manager` in `Deployment` resources.
98
98
99
99
```yaml
100
100
data:
@@ -103,7 +103,7 @@ data:
103
103
- kube-controller-manager
104
104
```
105
105
106
-
It is possible to configure ignoreDifferences to be applied to all resources in every Application managed by an Argo CD instance. In order to do so, resource customizations can be configured like in the example below:
106
+
It is possible to configure `ignoreDifferences` to be applied to all resources in every Application managed by an Argo CD instance. In order to do so, resource customizations can be configured like in the example below:
107
107
108
108
```yaml
109
109
data:
@@ -129,7 +129,8 @@ data:
129
129
130
130
If you rely on the status field being part of your desired state, although this is not recommended, the `ignoreResourceStatusField` setting can be used to configure this behavior.
131
131
132
-
**Note**: Since it is common for `CustomResourceDefinitions` to have their `status` commited to Git, consider using `crd` over `none`.
132
+
!!! note
133
+
Since it is common for `CustomResourceDefinitions` to have their `status` commited to Git, consider using `crd` over `none`.
You have to remember about `HELM_PLUGINS` environment property - this is required for plugins to work correctly.
393
+
The `HELM_PLUGINS` environment property required for ArgoCD to locale plugins correctly.
394
394
395
-
After that you have to use your custom image for ArgoCD installation.
395
+
Once built, use the custom image for ArgoCD installation.
396
396
397
397
### Using `initContainers`
398
398
Another option is to install Helm plugins via Kubernetes `initContainers`.
@@ -519,7 +519,6 @@ spec:
519
519
```
520
520
521
521
522
-
523
522
## Helm `--skip-tests`
524
523
525
524
By default, Helm includes test manifests when rendering templates. Argo CD currently skips manifests that include hooks not supported by Argo CD, including [Helm test hooks](https://helm.sh/docs/topics/chart_tests/). While this feature covers many testing use cases, it is not totally congruent with --skip-tests, so the --skip-tests option can be used.
Copy file name to clipboardExpand all lines: docs/user-guide/multiple_sources.md
+1-2
Original file line number
Diff line number
Diff line change
@@ -80,8 +80,7 @@ If the `path` field is set in the `$values` source, Argo CD will attempt to gene
80
80
at that URL. If the `path` field is not set, Argo CD will use the repository solely as a source of value files.
81
81
82
82
!!! note
83
-
Sources with the `ref` field set must not also specify the `chart` field. Argo CD does not currently support using
84
-
another Helm chart as a source for value files.
83
+
Sources with the `ref` field set cannot include the `chart` field. Currently, Argo CD does not support using another Helm chart as a source for value files.
85
84
86
85
!!! note
87
86
Even when the `ref` field is configured with the `path` field, `$value` still represents the root of sources with the `ref` field. Consequently, `valueFiles` must be specified as relative paths from the root of sources.
Copy file name to clipboardExpand all lines: docs/user-guide/parameters.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -26,8 +26,8 @@ argocd app set guestbook -p ingress.enabled=true
26
26
argocd app set guestbook -p ingress.hosts[0]=guestbook.myclusterurl
27
27
```
28
28
29
-
The `argocd app set`[command](./commands/argocd_app_set.md) supports more tool-specific flags such as `--kustomize-image`, `--jsonnet-ext-var-str` etc
30
-
flags. You can also specify overrides directly in the source field on application spec. Read more about supported options in corresponded tool [documentation](./application_sources.md).
29
+
The `argocd app set`[command](./commands/argocd_app_set.md) supports more tool-specific flags such as `--kustomize-image`, `--jsonnet-ext-var-str`, etc.
30
+
You can also specify overrides directly in the source field on the application spec. Read more about supported options in the corresponding tool [documentation](./application_sources.md).
31
31
32
32
## When To Use Overrides?
33
33
@@ -81,7 +81,7 @@ are sourcing multiple applications from a single path in your repository.
81
81
The application specific file must be named `.argocd-source-<appname>.yaml`,
82
82
where `<appname>` is the name of the application the overrides are valid for.
83
83
84
-
If there exists an non-application specific `.argocd-source.yaml`, parameters
84
+
If there exists a non-application specific `.argocd-source.yaml`, parameters
85
85
included in that file will be merged first, and then the application specific
86
86
parameters are merged, which can also contain overrides to the parameters
Copy file name to clipboardExpand all lines: docs/user-guide/private-repositories.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ Of course, you can also use this in combination with the `--username` and `--pas
63
63
Your TLS client certificate and corresponding key can also be configured using the UI, see instructions for adding Git repos using HTTPS.
64
64
65
65
!!! note
66
-
Your client certificate and key data must be in PEM format, other formats (such as PKCS12) are not understood. Also make sure that your certificate's key is not password protected, otherwise it cannot be used by Argo CD.
66
+
Your client certificate and key data must be in PEM format, other formats (such as PKCS12) are not supported. Also make sure that your certificate's key is not password protected, otherwise it cannot be used by Argo CD.
67
67
68
68
!!! note
69
69
When pasting TLS client certificate and key in the text areas in the web UI, make sure they contain no unintended line breaks or additional characters.
Copy file name to clipboardExpand all lines: docs/user-guide/projects.md
+7-7
Original file line number
Diff line number
Diff line change
@@ -195,7 +195,7 @@ argocd proj role create-token PROJECT ROLE-NAME
195
195
argocd proj role delete-token PROJECT ROLE-NAME ISSUED-AT
196
196
```
197
197
198
-
Since the JWT tokens aren't stored in Argo CD, they can only be retrieved when they are created. A user can leverage them in the cli by either passing them in using the `--auth-token` flag or setting the ARGOCD_AUTH_TOKEN environment variable. The JWT tokens can be used until they expire or are revoked. The JWT tokens can created with or without an expiration, but the default on the cli is creates them without an expirations date. Even if a token has not expired, it cannot be used if the token has been revoked.
198
+
Since the JWT tokens aren't stored in Argo CD, they can only be retrieved when they are created. A user can leverage them in the cli by either passing them in using the `--auth-token` flag or setting the ARGOCD_AUTH_TOKEN environment variable. The JWT tokens can be used until they expire or are revoked. The JWT tokens can be created with or without an expiration. By default, the cli creates them without an expirations date. Even if a token has not expired, it cannot be used if the token has been revoked.
199
199
200
200
Below is an example of leveraging a JWT token to access a guestbook application. It makes the assumption that the user already has a project named myproject and an application called guestbook-default.
201
201
@@ -297,7 +297,7 @@ It is possible to offer a self-service process for developers so that they can a
297
297
For this purpose Argo CD supports project-scoped repositories and clusters.
298
298
299
299
To begin the process, Argo CD admins must configure RBAC security to allow this self-service behavior.
300
-
For example, to allow users to add project scoped repositories and admin would have to add the following RBAC rules:
300
+
For example, to allow users to add project scoped repositories an admin would have to add the following RBAC rules:
Copy file name to clipboardExpand all lines: docs/user-guide/sync-options.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Sync Options
2
2
3
-
Argo CD allows users to customize some aspects of how it syncs the desired state in the target cluster. Some Sync Options can be defined as annotations in a specific resource. Most of the Sync Options are configured in the Application resource `spec.syncPolicy.syncOptions` attribute. Multiple Sync Options which are configured with the `argocd.argoproj.io/sync-options` annotation can be concatenated with a `,` in the annotation value; white spaces will be trimmed.
3
+
Argo CD allows users to customize some aspects of how it syncs the desired state in the target cluster. Some Sync Options can be defined as annotations in a specific resource. Most of the Sync Options are configured in the Application resource `spec.syncPolicy.syncOptions` attribute. Multiple Sync Options which are configured with the `argocd.argoproj.io/sync-options` annotation can be concatenated with a `,` in the annotation value; white-space will be trimmed.
4
4
5
5
Below you can find details about each available Sync Option:
6
6
@@ -43,7 +43,7 @@ annotation to the application.
43
43
44
44
## Disable Kubectl Validation
45
45
46
-
For a certain class of objects, it is necessary to `kubectl apply` them using the `--validate=false` flag. Examples of this are Kubernetes types which uses `RawExtension`, such as [ServiceCatalog](https://github.com/kubernetes-incubator/service-catalog/blob/master/pkg/apis/servicecatalog/v1beta1/types.go#L497). You can do using this annotations:
46
+
For a certain class of objects, it is necessary to `kubectl apply` them using the `--validate=false` flag. Examples of this are Kubernetes types which uses `RawExtension`, such as [ServiceCatalog](https://github.com/kubernetes-incubator/service-catalog/blob/master/pkg/apis/servicecatalog/v1beta1/types.go#L497). You can do using this annotation:
47
47
48
48
49
49
```yaml
@@ -58,8 +58,8 @@ If you want to exclude a whole class of objects globally, consider setting `reso
58
58
59
59
When syncing a custom resource which is not yet known to the cluster, there are generally two options:
60
60
61
-
1) The CRD manifest is part of the same sync. Then Argo CD will automatically skip the dry run, the CRD will be applied and the resource can be created.
62
-
2) In some cases the CRD is not part of the sync, but it could be created in another way, e.g. by a controller in the cluster. An example is [gatekeeper](https://github.com/open-policy-agent/gatekeeper),
61
+
1. The CRD manifest is part of the same sync. Then Argo CD will automatically skip the dry run, the CRD will be applied and the resource can be created.
62
+
2. In some cases the CRD is not part of the sync, but it could be created in another way, e.g. by a controller in the cluster. An example is [gatekeeper](https://github.com/open-policy-agent/gatekeeper),
63
63
which creates CRDs in response to user defined `ConstraintTemplates`. Argo CD cannot find the CRD in the sync and will fail with the error `the server could not find the requested resource`.
64
64
65
65
To skip the dry run for missing resource types, use the following annotation:
@@ -100,7 +100,7 @@ annotation to the application.
100
100
101
101
## Selective Sync
102
102
103
-
Currently when syncing using auto sync Argo CD applies every object in the application.
103
+
Currently, when syncing using auto sync Argo CD applies every object in the application.
104
104
For applications containing thousands of objects this takes quite a long time and puts undue pressure on the api server.
105
105
Turning on selective sync option which will sync only out-of-sync resources.
0 commit comments