This chart is deprecated! You can find the new chart in:
- Sources: https://github.com/jfrog/charts
- Charts repository: https://charts.jfrog.io
helm repo add jfrog https://charts.jfrog.io
- Kubernetes 1.6+
- Artifactory Pro trial license get one from here
This chart will do the following:
- Deploy Artifactory-Pro/Artifactory-Edge (or OSS if set custom image)
- Deploy a PostgreSQL database using the stable/postgresql chart
- Deploy an optional Nginx server
- Optionally expose Artifactory with Ingress Ingress documentation
To install the chart with the release name artifactory
:
$ helm install --name artifactory stable/artifactory
By default it will run Artifactory-Pro to run Artifactory-Oss use following command:
$ helm install --name artifactory --set artifactory.image.repository=docker.bintray.io/jfrog/artifactory-oss stable/artifactory
## Artifactory replicator is disabled by default. To enable it use the following:
$ helm install --name artifactory --set artifactory.replicator.enabled=true stable/artifactory
NOTE: It might take a few minutes for Artifactory's public IP to become available. Follow the instructions outputted by the install command to get the Artifactory IP to access it.
Once you have a new chart version, you can update your deployment with
$ helm upgrade artifactory --namespace artifactory stable/artifactory
This will apply any configuration changes on your existing deployment.
The Artifactory Helm chart comes with support for configured resource requests and limits to Artifactory, Nginx and PostgreSQL. By default, these settings are commented out.
It is highly recommended to set these so you have full control of the allocated resources and limits.
Artifactory java memory parameters can (and should) also be set to match the allocated resources with artifactory.javaOpts.xms
and artifactory.javaOpts.xmx
.
# Example of setting resource requests and limits to all pods (including passing java memory settings to Artifactory)
$ helm install --name artifactory \
--set artifactory.resources.requests.cpu="500m" \
--set artifactory.resources.limits.cpu="2" \
--set artifactory.resources.requests.memory="1Gi" \
--set artifactory.resources.limits.memory="4Gi" \
--set artifactory.javaOpts.xms="1g" \
--set artifactory.javaOpts.xmx="4g" \
--set nginx.resources.requests.cpu="100m" \
--set nginx.resources.limits.cpu="250m" \
--set nginx.resources.requests.memory="250Mi" \
--set nginx.resources.limits.memory="500Mi" \
stable/artifactory
Get more details on configuring Artifactory in the official documentation.
You can override the specified database password (set in values.yaml), by passing it as a parameter in the install command line
$ helm install --name artifactory --namespace artifactory --set postgresql.postgresPassword=12_hX34qwerQ2 stable/artifactory
You can customise other parameters in the same way, by passing them on helm install
command line.
$ helm delete --purge artifactory
This will completely delete your Artifactory Pro deployment.
IMPORTANT: This will also delete your data volumes. You will lose all data!
# Create private.key and root.crt
$ openssl req -newkey rsa:2048 -nodes -keyout private.key -x509 -days 365 -out root.crt
Once Created, Use it to create ConfigMap
# Create ConfigMap distribution-certs
$ kubectl create configmap distribution-certs --from-file=private.key=private.key --from-file=root.crt=root.crt
Pass it to helm
$ helm install --name artifactory --set artifactory.distributionCerts=distribution-certs stable/artifactory
You can deploy the Artifactory license as a Kubernetes secret. Prepare a text file with the license written in it.
# Create the Kubernetes secret (assuming the local license file is 'art.lic')
$ kubectl create secret generic artifactory-license --from-file=./art.lic
# Pass the license to helm
$ helm install --name artifactory --set artifactory.license.secret=artifactory-license,artifactory.license.dataKey=art.lic stable/artifactory
NOTE: You have to keep passing the license secret parameters as --set artifactory.license.secret=artifactory-license,artifactory.license.dataKey=art.lic
on all future calls to helm install
and helm upgrade
!
IMPORTANT: Bootstrapping Artifactory needs license. Pass license as shown in above section.
- User guide to bootstrap Artifactory Global Configuration
- User guide to bootstrap Artifactory Security Configuration
- Create
bootstrap-config.yaml
with artifactory.config.import.xml and security.import.xml as shown below:
apiVersion: v1
kind: ConfigMap
metadata:
name: my-release-bootstrap-config
data:
artifactory.config.import.xml: |
<config contents>
security.import.xml: |
<config contents>
- Create configMap in Kubernetes:
$ kubectl apply -f bootstrap-config.yaml
- Pass the configMap to helm
$ helm install --name artifactory --set artifactory.license.secret=artifactory-license,artifactory.license.dataKey=art.lic,artifactory.configMapName=my-release-bootstrap-config stable/artifactory
Steps to create configMap with nginx.conf
- Create
nginx.conf
file.
kubectl create configmap nginx-config --from-file=nginx.conf
- Pass configMap to helm install
helm install --name artifactory-ha --set nginx.customConfigMap=nginx-config stable/artifactory-ha
There are cases where you will want to use a different database and not the enclosed PostgreSQL. See more details on configuring the database
The official Artifactory Docker images include the PostgreSQL database driver. For other database types, you will have to add the relevant database driver to Artifactory's tomcat/lib
This can be done with the following parameters
# Make sure your Artifactory Docker image has the MySQL database driver in it
...
--set postgresql.enabled=false \
--set artifactory.postStartCommand="curl -L -o /opt/jfrog/artifactory/tomcat/lib/mysql-connector-java-5.1.41.jar https://jcenter.bintray.com/mysql/mysql-connector-java/5.1.41/mysql-connector-java-5.1.41.jar && chown 1030:1030 /opt/jfrog/artifactory/tomcat/lib/mysql-connector-java-5.1.41.jar" \
--set database.type=mysql \
--set database.host=${DB_HOST} \
--set database.port=${DB_PORT} \
--set database.user=${DB_USER} \
--set database.password=${DB_PASSWORD} \
...
NOTE: You must set postgresql.enabled=false
in order for the chart to use the database.*
parameters. Without it, they will be ignored!
To delete the Artifactory.
$ helm delete --purge artifactory
This will completely delete your Artifactory HA cluster.
If you need to pull your Docker images from a private registry, you need to create a Kubernetes Docker registry secret and pass it to helm
# Create a Docker registry secret called 'regsecret'
$ kubectl create secret docker-registry regsecret --docker-server=<your-registry-server> --docker-username=<your-name> --docker-password=<your-pword> --docker-email=<your-email>
Once created, you pass it to helm
$ helm install --name artifactory --set imagePullSecrets=regsecret stable/artifactory
The following table lists the configurable parameters of the artifactory chart and their default values.
Parameter | Description | Default |
---|---|---|
imagePullSecrets |
Docker registry pull secret | |
serviceAccount.create |
Specifies whether a ServiceAccount should be created | true |
serviceAccount.name |
The name of the ServiceAccount to create | Generated using the fullname template |
rbac.create |
Specifies whether RBAC resources should be created | true |
rbac.role.rules |
Rules to create | [] |
artifactory.name |
Artifactory name | artifactory |
artifactory.replicaCount |
Replica count for Artifactory deployment | 1 |
artifactory.image.pullPolicy |
Container pull policy | IfNotPresent |
artifactory.image.repository |
Container image | docker.bintray.io/jfrog/artifactory-pro |
artifactory.image.version |
Container tag | 6.1.0 |
artifactory.service.name |
Artifactory service name to be set in Nginx configuration | artifactory |
artifactory.service.type |
Artifactory service type | ClusterIP |
artifactory.externalPort |
Artifactory service external port | 8081 |
artifactory.internalPort |
Artifactory service internal port | 8081 |
artifactory.internalPortReplicator |
Replicator service internal port | 6061 |
artifactory.externalPortReplicator |
Replicator service external port | 6061 |
artifactory.livenessProbe.enabled |
Enable liveness probe | true |
artifactory.livenessProbe.initialDelaySeconds |
Delay before liveness probe is initiated | 180 |
artifactory.livenessProbe.periodSeconds |
How often to perform the probe | 10 |
artifactory.livenessProbe.timeoutSeconds |
When the probe times out | 10 |
artifactory.livenessProbe.successThreshold |
Minimum consecutive successes for the probe to be considered successful after having failed. | 1 |
artifactory.livenessProbe.failureThreshold |
Minimum consecutive failures for the probe to be considered failed after having succeeded. | 10 |
artifactory.readinessProbe.enabled |
would you like a readinessProbe to be enabled | true |
artifactory.readinessProbe.initialDelaySeconds |
Delay before readiness probe is initiated | 60 |
artifactory.readinessProbe.periodSeconds |
How often to perform the probe | 10 |
artifactory.readinessProbe.timeoutSeconds |
When the probe times out | 10 |
artifactory.readinessProbe.successThreshold |
Minimum consecutive successes for the probe to be considered successful after having failed. | 1 |
artifactory.readinessProbe.failureThreshold |
Minimum consecutive failures for the probe to be considered failed after having succeeded. | 10 |
artifactory.persistence.mountPath |
Artifactory persistence volume mount path | "/var/opt/jfrog/artifactory" |
artifactory.persistence.enabled |
Artifactory persistence volume enabled | true |
artifactory.persistence.accessMode |
Artifactory persistence volume access mode | ReadWriteOnce |
artifactory.persistence.size |
Artifactory persistence volume size | 20Gi |
artifactory.resources.requests.memory |
Artifactory initial memory request | |
artifactory.resources.requests.cpu |
Artifactory initial cpu request | |
artifactory.resources.limits.memory |
Artifactory memory limit | |
artifactory.resources.limits.cpu |
Artifactory cpu limit | |
artifactory.javaOpts.xms |
Artifactory java Xms size | |
artifactory.javaOpts.xmx |
Artifactory java Xms size | |
artifactory.javaOpts.other |
Artifactory additional java options | |
artifactory.replicator.enabled |
Enable Artifactory Replicator | false |
artifactory.distributionCerts |
Name of ConfigMap for Artifactory Distribution Certificate | `` |
artifactory.replicator.publicUrl |
Artifactory Replicator Public URL | |
ingress.enabled |
If true, Artifactory Ingress will be created | false |
ingress.annotations |
Artifactory Ingress annotations | {} |
ingress.hosts |
Artifactory Ingress hostnames | [] |
ingress.tls |
Artifactory Ingress TLS configuration (YAML) | [] |
nginx.name |
Nginx name | nginx |
nginx.enabled |
Deploy nginx server | true |
nginx.replicaCount |
Nginx replica count | 1 |
nginx.image.repository |
Container image | docker.bintray.io/jfrog/nginx-artifactory-pro |
nginx.image.version |
Container tag | 6.1.0 |
nginx.image.pullPolicy |
Container pull policy | IfNotPresent |
nginx.service.type |
Nginx service type | LoadBalancer |
nginx.service.loadBalancerSourceRanges |
Nginx service array of IP CIDR ranges to whitelist (only when service type is LoadBalancer) | |
nginx.loadBalancerIP |
Provide Static IP to configure with Nginx | |
nginx.externalPortHttp |
Nginx service external port | 80 |
nginx.internalPortHttp |
Nginx service internal port | 80 |
nginx.externalPortHttps |
Nginx service external port | 443 |
nginx.internalPortHttps |
Nginx service internal port | 443 |
nginx.internalPortReplicator |
Replicator service internal port | 6061 |
nginx.externalPortReplicator |
Replicator service external port | 6061 |
nginx.livenessProbe.enabled |
Enable liveness probe | true |
nginx.livenessProbe.initialDelaySeconds |
Delay before liveness probe is initiated | 60 |
nginx.livenessProbe.periodSeconds |
How often to perform the probe | 10 |
nginx.livenessProbe.timeoutSeconds |
When the probe times out | 10 |
nginx.livenessProbe.successThreshold |
Minimum consecutive successes for the probe to be considered successful after having failed. | 10 |
nginx.livenessProbe.failureThreshold |
Minimum consecutive failures for the probe to be considered failed after having succeeded. | 1 |
nginx.readinessProbe.enabled |
would you like a readinessProbe to be enabled | true |
nginx.readinessProbe.initialDelaySeconds |
Delay before readiness probe is initiated | 60 |
nginx.readinessProbe.periodSeconds |
How often to perform the probe | 10 |
nginx.readinessProbe.timeoutSeconds |
When the probe times out | 10 |
nginx.readinessProbe.successThreshold |
Minimum consecutive successes for the probe to be considered successful after having failed. | 10 |
nginx.readinessProbe.failureThreshold |
Minimum consecutive failures for the probe to be considered failed after having succeeded. | 1 |
nginx.tlsSecretName |
SSL secret that will be used by the Nginx pod | |
nginx.env.artUrl |
Nginx Environment variable Artifactory URL | "http://artifactory:8081/artifactory" |
nginx.env.ssl |
Nginx Environment enable ssl | true |
nginx.env.skipAutoConfigUpdate |
Nginx Environment to disable auto configuration update | false |
nginx.customConfigMap |
Nginx CustomeConfigMap name for nginx.conf |
|
nginx.persistence.mountPath |
Nginx persistence volume mount path | "/var/opt/jfrog/nginx" |
nginx.persistence.enabled |
Nginx persistence volume enabled | true |
nginx.persistence.accessMode |
Nginx persistence volume access mode | ReadWriteOnce |
nginx.persistence.size |
Nginx persistence volume size | 5Gi |
nginx.resources.requests.memory |
Nginx initial memory request | |
nginx.resources.requests.cpu |
Nginx initial cpu request | |
nginx.resources.limits.memory |
Nginx memory limit | |
nginx.resources.limits.cpu |
Nginx cpu limit |
Specify each parameter using the --set key=value[,key=value]
argument to helm install
.
To get Helm to create an ingress object with a hostname, add these two lines to your Helm command:
helm install --name artifactory \
--set ingress.enabled=true \
--set ingress.hosts[0]="artifactory.company.com" \
--set artifactory.service.type=NodePort \
--set nginx.enabled=false \
stable/artifactory
If your cluster allows automatic creation/retrieval of TLS certificates (e.g. cert-manager), please refer to the documentation for that mechanism.
To manually configure TLS, first create/retrieve a key & certificate pair for the address(es) you wish to protect. Then create a TLS secret in the namespace:
kubectl create secret tls artifactory-tls --cert=path/to/tls.cert --key=path/to/tls.key
Include the secret's name, along with the desired hostnames, in the Artifactory Ingress TLS section of your custom values.yaml
file:
ingress:
## If true, Artifactory Ingress will be created
##
enabled: true
## Artifactory Ingress hostnames
## Must be provided if Ingress is enabled
##
hosts:
- artifactory.domain.com
annotations:
kubernetes.io/tls-acme: "true"
## Artifactory Ingress TLS configuration
## Secrets must be manually created in the namespace
##
tls:
- secretName: artifactory-tls
hosts:
- artifactory.domain.com