eksctl create fargateprofile \
--cluster fordong-cluster-dev \
--region your-region-code \
--name argocd \
--namespace argocd
kubectl create namespace argocd
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/core-install.yaml
kubectl get all -n argocd
brew install argocd
kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; echo
kubectl patch svc argocd-server -n prd-cicd -p '{"spec": {"type": "NodePort"}}'
kubectl apply -f argocd-ingress.yaml
argocd-ingress.yaml
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
namespace: argocd
name: ingress-argocd
annotations:
kubernetes.io/ingress.class: alb
alb.ingress.kubernetes.io/scheme: internet-facing
alb.ingress.kubernetes.io/target-type: ip
alb.ingress.kubernetes.io/backend-protocol: HTTPS
alb.ingress.kubernetes.io/healthcheck-path: /login
# SSL Settings
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS":443}]'
alb.ingress.kubernetes.io/certificate-arn: 'arn:aws:acm:ap-northeast-2:300081888502:certificate/66031d62-4c54-4d96-b325-99cc9a4b6670'
alb.ingress.kubernetes.io/ssl-redirect: '443'
spec:
rules:
- http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: argocd-server
port:
number: 443
kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d; ech
argocd account update-password
ref.