This repository contains the source code for the RT Bootstrapper Kyma component used to configure Kyma runtime components running in markets with individual infrastructure setups.
RT Bootstrapper contains two functional parts:
-
Kubernetes admission webhook that intercepts the creation of Pods. It modifies the Pod specifications to include necessary configurations, modifies image paths to use the configured remote registry, and provides pull secrets with credentials.
-
Kubernetes Controller that watches for namespaces and ensures that the secrets with required credentials are present and synchronized in those namespaces.
Note
This component is implemented as part of the Kyma runtime delivery.
Installing RT Bootstrapper in SAP BTP, Kyma runtime, or in a self-managed Kyma runtime cluster may negatively impact your workloads.
- SAP BTP, Kyma runtime instance
- Access to the Kyma runtime cluster with kubeconfig
In environments with individual infrastructure setups, RT Bootstrapper is installed and configured automatically by Kyma Control Plane in all provisioned Kyma runtimes.
To enable RT Bootstrapper in your Kyma cluster, apply the release manifest using kubectl:
kubectl apply -f https://github.com/kyma-project/rt-bootstrapper/releases/latest/download/rt-bootstrapper.yamlSee the Architectural Decisions file.
-
Clone the project.
git clone https://github.com/kyma-project/rt-boostrapper.git && cd rt-boostrapper/
-
Create a new k3d cluster and run RT Bootstrapper from the main branch:
k3d cluster create test-cluster make deploy
To use RT Bootstrapper, label your Kubernetes namespaces and Pods accordingly.
The admission webhook intercepts the creation of these resources and applies the necessary configurations.
See the Contributing Rules.
See the Code of Conduct document.
See the license file.