Installing and configuring
Installing and configuring OpenShift Pipelines
Abstract
Chapter 1. Installing OpenShift Pipelines
This guide walks cluster administrators through the process of installing the Red Hat OpenShift Pipelines Operator to an OpenShift Container Platform cluster.
Prerequisites
- 
					You have access to an OpenShift Container Platform cluster using an account with cluster-adminpermissions.
- 
					You have installed ocCLI.
- 
					You have installed OpenShift Pipelines (tkn) CLI on your local system.
- Your cluster has the Marketplace capability enabled or the Red Hat Operator catalog source configured manually.
In a cluster with both Windows and Linux nodes, Red Hat OpenShift Pipelines can run on only Linux nodes.
1.1. Installing the Red Hat OpenShift Pipelines Operator in web console
You can install Red Hat OpenShift Pipelines using the Operator listed in the OpenShift Container Platform OperatorHub. When you install the Red Hat OpenShift Pipelines Operator, the custom resources (CRs) required for the pipelines configuration are automatically installed along with the Operator.
				The default Operator custom resource definition (CRD) config.operator.tekton.dev is now replaced by tektonconfigs.operator.tekton.dev. In addition, the Operator provides the following additional CRDs to individually manage OpenShift Pipelines components: tektonpipelines.operator.tekton.dev, tektontriggers.operator.tekton.dev and tektonaddons.operator.tekton.dev.
			
				If you have OpenShift Pipelines already installed on your cluster, the existing installation is seamlessly upgraded. The Operator will replace the instance of config.operator.tekton.dev on your cluster with an instance of tektonconfigs.operator.tekton.dev and additional objects of the other CRDs as necessary.
			
					If you manually changed your existing installation, such as, changing the target namespace in the config.operator.tekton.dev CRD instance by making changes to the resource name - cluster field, then the upgrade path is not smooth. In such cases, the recommended workflow is to uninstall your installation and reinstall the Red Hat OpenShift Pipelines Operator.
				
				The Red Hat OpenShift Pipelines Operator now provides the option to choose the components that you want to install by specifying profiles as part of the TektonConfig custom resource (CR). The TektonConfig CR is automatically installed when the Operator is installed. The supported profiles are:
			
- Lite: This installs only Tekton Pipelines.
- Basic: This installs Tekton Pipelines, Tekton Triggers, and Tekton Chains.
- 
						All: This is the default profile used when the TektonConfigCR is installed. This profile installs all of the Tekton components, including Tekton Pipelines, Tekton Triggers, Tekton Chains, Pipelines as Code, and Tekton Addons. Tekton Addons includes theClusterTasks,ClusterTriggerBindings,ConsoleCLIDownload,ConsoleQuickStart, andConsoleYAMLSampleresources.
Procedure
- In the Administrator perspective of the web console, navigate to Operators → OperatorHub.
- 
						Use the Filter by keyword box to search for Red Hat OpenShift PipelinesOperator in the catalog. Click the Red Hat OpenShift Pipelines Operator tile.
- Read the brief description about the Operator on the Red Hat OpenShift Pipelines Operator page. Click Install.
- On the Install Operator page: - 
								Select All namespaces on the cluster (default) for the Installation Mode. This mode installs the Operator in the default openshift-operatorsnamespace, which enables the Operator to watch and be made available to all namespaces in the cluster.
- Select Automatic for the Approval Strategy. This ensures that the future upgrades to the Operator are handled automatically by the Operator Lifecycle Manager (OLM). If you select the Manual approval strategy, OLM creates an update request. As a cluster administrator, you must then manually approve the OLM update request to update the Operator to the new version.
- Select an Update Channel. - 
										The latestchannel enables installation of the most recent stable version of the Red Hat OpenShift Pipelines Operator. Currently, it is the default channel for installing the Red Hat OpenShift Pipelines Operator.
- To install a specific version of the Red Hat OpenShift Pipelines Operator, cluster administrators can use the corresponding - pipelines-<version>channel. For example, to install the Red Hat OpenShift Pipelines Operator version- 1.8.x, you can use the- pipelines-1.8channel.Note- Starting with OpenShift Container Platform 4.11, the - previewand- stablechannels for installing and upgrading the Red Hat OpenShift Pipelines Operator are not available. However, in OpenShift Container Platform 4.10 and earlier versions, you can use the- previewand- stablechannels for installing and upgrading the Operator.
 
- 
										The 
 
- 
								Select All namespaces on the cluster (default) for the Installation Mode. This mode installs the Operator in the default 
- Click Install. You will see the Operator listed on the Installed Operators page. Note- The Operator is installed automatically into the - openshift-operatorsnamespace.
- Verify that the Status is set to Succeeded Up to date to confirm successful installation of Red Hat OpenShift Pipelines Operator. Warning- The success status may show as Succeeded Up to date even if installation of other components is in-progress. Therefore, it is important to verify the installation manually in the terminal. 
- Verify that all components of the Red Hat OpenShift Pipelines Operator were installed successfully. Login to the cluster on the terminal, and run the following command: - oc get tektonconfig config - $ oc get tektonconfig config- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - NAME VERSION READY REASON config 1.14.0 True - NAME VERSION READY REASON config 1.14.0 True- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - If the READY condition is True, the Operator and its components have been installed successfully. - Additonally, check the components' versions by running the following command: - oc get tektonpipeline,tektontrigger,tektonchain,tektonaddon,pac - $ oc get tektonpipeline,tektontrigger,tektonchain,tektonaddon,pac- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
1.2. Installing the OpenShift Pipelines Operator by using the CLI
You can install Red Hat OpenShift Pipelines Operator from OperatorHub by using the command-line interface (CLI).
Procedure
- Create a - Subscriptionobject YAML file to subscribe a namespace to the Red Hat OpenShift Pipelines Operator, for example,- sub.yaml:- Example - SubscriptionYAML- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Name of the channel that you want to subscribe. Thepipelines-<version>channel is the default channel. For example, the default channel for Red Hat OpenShift Pipelines Operator version1.7ispipelines-1.7. Thelatestchannel enables installation of the most recent stable version of the Red Hat OpenShift Pipelines Operator.
- 2
- Name of the Operator to subscribe to.
- 3
- Name of theCatalogSourceobject that provides the Operator.
- 4
- Namespace of theCatalogSourceobject. Useopenshift-marketplacefor the default OperatorHub catalog sources.
 
- Create the - Subscriptionobject by running the following command:- oc apply -f sub.yaml - $ oc apply -f sub.yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - The subscription installs the Red Hat OpenShift Pipelines Operator into the - openshift-operatorsnamespace. The Operator automatically installs OpenShift Pipelines into the default- openshift-pipelinestarget namespace.
1.3. Red Hat OpenShift Pipelines Operator in a restricted environment
The Red Hat OpenShift Pipelines Operator enables support for installation of pipelines in a restricted network environment.
				The Operator installs a proxy webhook that sets the proxy environment variables in the containers of the pod created by tekton-controllers based on the cluster proxy object. It also sets the proxy environment variables in the TektonPipelines, TektonTriggers, Controllers, Webhooks, and Operator Proxy Webhook resources.
			
				By default, the proxy webhook is disabled for the openshift-pipelines namespace. To disable it for any other namespace, you can add the operator.tekton.dev/disable-proxy: true label to the namespace object.
			
Chapter 2. Uninstalling OpenShift Pipelines
Cluster administrators can uninstall the Red Hat OpenShift Pipelines Operator by performing the following steps:
- Delete the Custom Resources (CRs) for the optional components, - TektonHuband- TektonResult, if these CRs exist, and then delete the- TektonConfigCR.Important- If you uninstall the Operator without removing the CRs of optional components, you cannot remove the components later. 
- Uninstall the Red Hat OpenShift Pipelines Operator.
- 
					Delete the Custom Resource Definitions (CRDs) of the operator.tekton.devgroup.
Uninstalling only the Operator will not remove the Red Hat OpenShift Pipelines components created by default when the Operator is installed.
2.1. Deleting the OpenShift Pipelines Custom Resources
				If the Custom Resources (CRs) for the optional components, TektonHub and TektonResult, exist, delete these CRs. Then delete the TektonConfig CR.
			
Procedure
- In the Administrator perspective of the web console, navigate to Administration → CustomResourceDefinitions.
- 
						Type TektonHubin the Filter by name field to search for theTektonHubCustom Resource Definition (CRD).
- 
						Click the name of the TektonHubCRD to display the details page for the CRD.
- 
						Click the Instancestab.
- 
						If an instance is displayed, click the Options menu 
						 for the displayed instance. for the displayed instance.
- Select Delete TektonHub.
- Click Delete to confirm the deletion of the CR.
- 
						Repeat these steps, searching for TektonResultand thenTektonConfigin the Filter by name box. If any instances are found for these CRDs, delete these instances.
Deleting the CRs also deletes the Red Hat OpenShift Pipelines components and all the tasks and pipelines on the cluster.
					If you uninstall the Operator without removing the TektonHub and TektonResult CRs, you cannot remove the Tekton Hub and Tekton Results components later.
				
2.2. Uninstalling the Red Hat OpenShift Pipelines Operator
You can uninstall the Red Hat OpenShift Pipelines Operator by using the Administrator perspective in the web console.
Procedure
- From the Operators → OperatorHub page, use the Filter by keyword box to search for the Red Hat OpenShift Pipelines Operator.
- Click the Red Hat OpenShift Pipelines Operator tile. The Operator tile indicates that the Operator is installed.
- In the Red Hat OpenShift Pipelines Operator description page, click Uninstall.
- In the Uninstall Operator? window, select Delete all operand instances for this operator, and then click Uninstall.
					When you uninstall the OpenShift Pipelines Operator, all resources within the openshift-pipelines target namespace where OpenShift Pipelines is installed are lost, including the secrets you configured.
				
2.3. Deleting the Custom Resource Definitions of the operator.tekton.dev group
				Delete the Custom Resource Definitions (CRDs) of the operator.tekton.dev group. These CRDs are created by default during the installation of the Red Hat OpenShift Pipelines Operator.
			
Procedure
- In the Administrator perspective of the web console, navigate to Administration → CustomResourceDefinitions.
- 
						Type operator.tekton.devin the Filter by name box to search for the CRDs in theoperator.tekton.devgroup.
- To delete each of the displayed CRDs, complete the following steps: - 
								Click the Options menu 
								 . .
- Select Delete CustomResourceDefinition.
- Click Delete to confirm the deletion of the CRD.
 
- 
								Click the Options menu 
								
Chapter 3. Customizing configurations in the TektonConfig custom resource
			In Red Hat OpenShift Pipelines, you can customize the following configurations by using the TektonConfig custom resource (CR):
		
- Optimizing OpenShift Pipelines performance, including high-availability mode for the OpenShift Pipelines controller
- Configuring the Red Hat OpenShift Pipelines control plane
- Changing the default service account
- Disabling the service monitor
- Configuring pipeline resolvers
- Disabling cluster tasks and pipeline templates
- Disabling the integration of Tekton Hub
- Disabling the automatic creation of RBAC resources
- Pruning of task runs and pipeline runs
3.1. Prerequisites
- You have installed the Red Hat OpenShift Pipelines Operator.
3.2. Performance tuning using TektonConfig CR
				You can modify the fields under the .spec.pipeline.performance parameter in the TektonConfig custom resource (CR) to change high availability (HA) support and performance configuration for the OpenShift Pipelines controller.
			
Example TektonConfig performance fields
				All fields are optional. If you set them, the Red Hat OpenShift Pipelines Operator includes most of the fields as arguments in the openshift-pipelines-controller deployment under the openshift-pipelines-controller container. The OpenShift Pipelines Operator also updates the buckets field in the config-leader-election configuration map under the openshift-pipelines namespace.
			
If you do not specify the values, the OpenShift Pipelines Operator does not update those fields and applies the default values for the OpenShift Pipelines controller.
					If you modify or remove any of the performance fields, the OpenShift Pipelines Operator updates the openshift-pipelines-controller deployment and the config-leader-election configuration map (if the buckets field changed) and re-creates openshift-pipelines-controller pods.
				
High-availability (HA) mode applies to the OpenShift Pipelines controller, which creates and starts pods based on pipeline run and task run definitions. Without HA mode, a single pod executes these operations, potentially creating significant delays under a high load.
In HA mode, OpenShift Pipelines uses several pods (replicas) to execute these operations. Initially, OpenShift Pipelines assigns every controller operation into a bucket. Each replica picks operations from one or more buckets. If two replicas could pick the same operation at the same time, the controller internally determines a leader that executes this operation.
HA mode does not affect execution of task runs after the pods are created.
| Name | Description | Default value for the OpenShift Pipelines controller | 
|---|---|---|
| 
								 | Enable or disable the high availability (HA) mode. By default, the HA mode is enabled. | 
								 | 
| 
								 | 
								In HA mode, the number of buckets used to process controller operations. The maximum value is  | 
								 | 
| 
								 | 
								In HA mode, the number of pods created to process controller operations. Set this value to the same or lower number than the  | 
								 | 
| 
								 | The number of threads (workers) to use when the work queue of the OpenShift Pipelines controller is processed. | 
								 | 
| 
								 | The maximum queries per second (QPS) to the cluster master from the REST client. | 
								 | 
| 
								 | The maximum burst for a throttle. | 
								 | 
					The OpenShift Pipelines Operator does not control the number of replicas of the OpenShift Pipelines controller. The replicas setting of the deployment determines the number of replicas. For example, to change the number of replicas to 3, enter the following command:
				
oc --namespace openshift-pipelines scale deployment openshift-pipelines-controller --replicas=3
$ oc --namespace openshift-pipelines scale deployment openshift-pipelines-controller --replicas=3
					The kube-api-qps and kube-api-burst fields are multiplied by 2 in the OpenShift Pipelines controller. For example, if the kube-api-qps and kube-api-burst values are 10, the actual QPS and burst values become 20.
				
3.3. Configuring the Red Hat OpenShift Pipelines control plane
				You can customize the OpenShift Pipelines control plane by editing the configuration fields in the TektonConfig custom resource (CR). The Red Hat OpenShift Pipelines Operator automatically adds the configuration fields with their default values so that you can use the OpenShift Pipelines control plane.
			
Procedure
- In the Administrator perspective of the web console, navigate to Administration → CustomResourceDefinitions.
- 
						Use the Search by name box to search for the tektonconfigs.operator.tekton.devcustom resource definition (CRD). Click TektonConfig to see the CRD details page.
- Click the Instances tab.
- 
						Click the config instance to see the TektonConfigCR details.
- Click the YAML tab.
- Edit the - TektonConfigYAML file based on your requirements.- Example of - TektonConfigCR with default values- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
3.3.1. Modifiable fields with default values
					The following list includes all modifiable fields with their default values in the TektonConfig CR:
				
- running-in-environment-with-injected-sidecars(default:- true): Set this field to- falseif pipelines run in a cluster that does not use injected sidecars, such as Istio. Setting it to- falsedecreases the time a pipeline takes for a task run to start.Note- For clusters that use injected sidecars, setting this field to - falsecan lead to an unexpected behavior.
- 
							await-sidecar-readiness(default:true): Set this field tofalseto stop OpenShift Pipelines from waiting forTaskRunsidecar containers to run before it begins to operate. This allows tasks to be run in environments that do not support thedownwardAPIvolume type.
- 
							default-service-account(default:pipeline): This field contains the default service account name to use for theTaskRunandPipelineRunresources, if none is specified.
- require-git-ssh-secret-known-hosts(default:- false): Setting this field to- truerequires that any Git SSH secret must include the- known_hostsfield.- For more information about configuring Git SSH secrets, see Configuring SSH authentication for Git in the Additional resources section.
 
- 
							enable-tekton-oci-bundles(default:false): Set this field totrueto enable the use of an experimental alpha feature named Tekton OCI bundle.
- enable-api-fields(default:- stable): Setting this field determines which features are enabled. Acceptable value is- stable,- beta, or- alpha.Note- Red Hat OpenShift Pipelines does not support the - alphavalue.
- 
							enable-provenance-in-status(default:false): Set this field totrueto enable populating theprovenancefield inTaskRunandPipelineRunstatuses. Theprovenancefield contains metadata about resources used in the task run and pipeline run, such as the source from where a remote task or pipeline definition was fetched.
- 
							enable-custom-tasks(default:true): Set this field tofalseto disable the use of custom tasks in pipelines.
- 
							disable-creds-init(default:false): Set this field totrueto prevent OpenShift Pipelines from scanning attached service accounts and injecting any credentials into your steps.
- 
							disable-affinity-assistant(default:true): Set this field tofalseto enable affinity assistant for eachTaskRunresource sharing a persistent volume claim workspace.
Metrics options
						You can modify the default values of the following metrics fields in the TektonConfig CR:
					
- 
							metrics.taskrun.duration-typeandmetrics.pipelinerun.duration-type(default:histogram): Setting these fields determines the duration type for a task or pipeline run. Acceptable value isgaugeorhistogram.
- 
							metrics.taskrun.level(default:task): This field determines the level of the task run metrics. Acceptable value istaskrun,task, ornamespace.
- 
							metrics.pipelinerun.level(default:pipeline): This field determines the level of the pipeline run metrics. Acceptable value ispipelinerun,pipeline, ornamespace.
3.3.2. Optional configuration fields
					The following fields do not have a default value, and are considered only if you configure them. By default, the Operator does not add and configure these fields in the TektonConfig custom resource (CR).
				
- 
							default-timeout-minutes: This field sets the default timeout for theTaskRunandPipelineRunresources, if none is specified when creating them. If a task run or pipeline run takes more time than the set number of minutes for its execution, then the task run or pipeline run is timed out and cancelled. For example,default-timeout-minutes: 60sets 60 minutes as default.
- 
							default-managed-by-label-value: This field contains the default value given to theapp.kubernetes.io/managed-bylabel that is applied to allTaskRunpods, if none is specified. For example,default-managed-by-label-value: tekton-pipelines.
- 
							default-pod-template: This field sets the defaultTaskRunandPipelineRunpod templates, if none is specified.
- 
							default-cloud-events-sink: This field sets the defaultCloudEventssink that is used for theTaskRunandPipelineRunresources, if none is specified.
- 
							default-task-run-workspace-binding: This field contains the default workspace configuration for the workspaces that aTaskresource declares, but aTaskRunresource does not explicitly declare.
- 
							default-affinity-assistant-pod-template: This field sets the defaultPipelineRunpod template that is used for affinity assistant pods, if none is specified.
- 
							default-max-matrix-combinations-count: This field contains the default maximum number of combinations generated from a matrix, if none is specified.
3.4. Changing the default service account for OpenShift Pipelines
				You can change the default service account for OpenShift Pipelines by editing the default-service-account field in the .spec.pipeline and .spec.trigger specifications. The default service account name is pipeline.
			
Example
3.5. Disabling the service monitor
				You can disable the service monitor, which is part of OpenShift Pipelines, to expose the telemetry data. To disable the service monitor, set the enableMetrics parameter to false in the .spec.pipeline specification of the TektonConfig custom resource (CR):
			
Example
3.6. Configuring pipeline resolvers
				You can configure pipeline resolvers in the TektonConfig custom resource (CR). You can enable or disable these pipeline resolvers:
			
- 
						enable-bundles-resolver
- 
						enable-cluster-resolver
- 
						enable-git-resolver
- 
						enable-hub-resolver
Example
				You can also provide resolver specific configurations in the TektonConfig CR. For example, define the following fields in the map[string]string format to set configurations for each pipeline resolver:
			
Example
3.7. Disabling cluster tasks and pipeline templates
				By default, the TektonAddon custom resource (CR) installs clusterTasks and pipelineTemplates resources along with OpenShift Pipelines on the cluster.
			
				You can disable installation of the clusterTasks and pipelineTemplates resources by setting the parameter value to false in the .spec.addon specification. In addition, you can disable the communityClusterTasks parameter.
			
Example
3.8. Disabling the integration of Tekton Hub
				You can disable the integration of Tekton Hub in the web console Developer perspective by setting the enable-devconsole-integration parameter to false in the TektonConfig custom resource (CR).
			
Example of disabling Tekton Hub
3.9. Disabling the automatic creation of RBAC resources
				The default installation of the Red Hat OpenShift Pipelines Operator creates multiple role-based access control (RBAC) resources for all namespaces in the cluster, except the namespaces matching the ^(openshift|kube)-* regular expression pattern. Among these RBAC resources, the pipelines-scc-rolebinding security context constraint (SCC) role binding resource is a potential security issue, because the associated pipelines-scc SCC has the RunAsAny privilege.
			
				To disable the automatic creation of cluster-wide RBAC resources after the Red Hat OpenShift Pipelines Operator is installed, cluster administrators can set the createRbacResource parameter to false in the cluster-level TektonConfig custom resource (CR).
			
Example TektonConfig CR
					As a cluster administrator or an user with appropriate privileges, when you disable the automatic creation of RBAC resources for all namespaces, the default ClusterTask resource does not work. For the ClusterTask resource to function, you must create the RBAC resources manually for each intended namespace.
				
3.10. Automatic pruning of task runs and pipeline runs
				Stale TaskRun and PipelineRun objects and their executed instances occupy physical resources that can be used for active runs. For optimal utilization of these resources, Red Hat OpenShift Pipelines provides a pruner component that automatically removes unused objects and their instances in various namespaces.
			
					You can configure the pruner for your entire installation by using the TektonConfig custom resource and modify configuration for a namespace by using namespace annotations. However, you cannot selectively auto-prune an individual task run or pipeline run in a namespace.
				
3.10.1. Configuring the pruner
					You can use the TektonConfig custom resource to configure periodic pruning of resources associated with pipeline runs and task runs.
				
The following example corresponds to the default configuration:
Example of the pruner configuration
| Parameter | Description | 
|---|---|
| 
									 | The Cron schedule for running the pruner process. The default schedule runs the process at 08:00 every day. For more information about the Cron schedule syntax, see Cron schedule syntax in the Kubernetes documentation. | 
| 
									 | 
									The resource types to which the pruner applies. The available resource types are  | 
| 
									 | The number of most recent resources of every type to keep. | 
| 
									 | 
									If set to  
									If set to  | 
| 
									 | 
									The maximum time for which to keep resources, in minutes. For example, to retain resources which were created not more than five days ago, set  | 
						The keep and keep-since parameters are mutually exclusive. Use only one of them in your configuration.
					
3.10.2. Annotations for automatically pruning task runs and pipeline runs
To modify the configuration for automatic pruning of task runs and pipeline runs in a namespace, you can set annotations in the namespace.
					The following namespace annotations have the same meanings as the corresponding keys in the TektonConfig custom resource:
				
- 
							operator.tekton.dev/prune.schedule
- 
							operator.tekton.dev/prune.resources
- 
							operator.tekton.dev/prune.keep
- 
							operator.tekton.dev/prune.prune-per-resource
- 
							operator.tekton.dev/prune.keep-since
						The operator.tekton.dev/prune.resources annotation accepts a comma-separated list. To prune both task runs and pipeline runs, set this annotation to "taskrun, pipelinerun".
					
The following additional namespace annotations are available:
- 
							operator.tekton.dev/prune.skip: When set totrue, the namespace for which the annotation is configured is not pruned.
- 
							operator.tekton.dev/prune.strategy: Set the value of this annotation to eitherkeeporkeep-since.
For example, the following annotations retain all task runs and pipeline runs created in the last five days and delete the older resources:
Example of auto-pruning annotations