Configuring access for Kubectl to private GKE cluster
A guide to how to configure access for Kubectl to private Google Kubernetes Engine cluster with different level of restricted access
Enable the Artifacts feature in
features: artifacts: enabled: true
config/clouddriver-local.yml. You’ll need a Github Personal Access Token so that Clouddriver can fetch artifacts stored in your repositories. Most users have a bot account that they can use for automation like this. If you already have one, feel free to use it instead of creating a new one.
my-github-accountcan be changed as you see fit. If you have multiple Github artifact accounts, it’s best to use an identifiable name.
artifacts: github: enabled: true accounts: - name: my-github-account # this will be the name of the artifact account within Spinnaker username: <YOUR_ACCOUNT_USERNAME> token: <YOUR_PERSONAL_ACCESS_TOKEN>
Redeploy Armory Spinnaker
Configure a Github webhook using this documentation. If you have a lot of repositories, you can setup an Organization level webhook.