이 콘텐츠는 선택한 언어로 제공되지 않습니다.

Chapter 3. Integrating pre-existing deployments and outside products


RHTAP installs a network of products that work together to form a secure, automated CI/CD platform. However, two of these products you may have already installed in your cluster: Advanced Cluster Security (ACS) and Quay. If you already have instances of either of these products, you can integrate them into your installation of RHTAP. Integration saves time and prevents data loss. If you have instances of these products in your cluster and do not integrate them, then the installer just creates new instances in new namespaces.

There are three other products that RHTAP uses by default, which you can replace in your instance. The table below names these products, their purpose, and what other products you can use instead.

Expand
ProductPurposePossible substitutes

GitHub

Source code repository

  • GitLab
  • Bitbucket

Tekton

CI pipeline

  • Jenkins
  • GitHub Actions
  • GitLab CI

CI pipeline substitutes conform to SLSA Build L2. Only Tekton conforms to Build L3.

Quay

Registry for artifacts

Artifactory

Please note that when you use alternative providers for your Git, CI and registry integrations, RHTAP also installs plugins for those products in Red Hat Developer Hub. Most of them are Technology Preview or community plugins. This means that replacing default products can introduce security risks and is not recommended for a production environment. For more information, please see the plugins table in our release notes and the RHDH documentation about plugins.

The following procedures explain how to integrate these products into RHTAP.

Note

Examples of all rhtap-cli integration commands listed in this guide include the --config parameter. Replace $CONFIG with the path of the config.yaml file.

You don’t need to add --config if you run the rhtap-cli integration command from a local clone of the rhtap-cli repo and you’re in the corresponding branch.

3.1. (Optional) Integrating ACS

Prerequisites

  • Administrator access to an instance of ACS.

Procedure

  1. Before you can integrate your instance of ACS, you need an API token and the central endpoint URL.

    1. Follow the instructions for the prerequisites here to create an API token. Save the token in ~/install_values.txt.
    2. Follow the instructions here to configure your endpoint. Save the URL in ~/install_values.txt.
  2. In your CLI, login to the OpenShift cluster where you plan to install RHTAP.
  3. Run the integration command. Replace $ENDPOINT with your ACS central endpoint URL, and $TOKEN with your ACS API token.

    rhtap-cli integration acs --endpoint="$ENDPOINT" --token="$TOKEN" --config="$CONFIG"
    Copy to Clipboard Toggle word wrap

3.2. (Optional) Integrating Quay

In this procedure, you obtain two values from your instance of Quay. Then you integrate your instance into RHTAP.

Prerequisites:

  • A Quay account
  • Ownership of a Quay organization (you can use any plan, including the free option).
Note

We recommend using a robot account in Quay for this procedure. This way, once RHTAP is installed, multiple users can authenticate to your organization’s namespace in Quay.

Procedure:

  1. In your web browser, login to Quay. On the right side of the banner, select your username and select Account Settings from the dropdown menu.
  2. On your user settings page, under Docker CLI Password, select Generate Encrypted Password. In the popup window, enter your password to authenticate.
  3. Next, still in the popup window, select Docker Configuration > View [username]-auth.json. Copy the string, without the quotation marks, following "auth":.
  4. In your ~/install_values.txt file, label and create the Docker configuration value with the following format, using your username and auth token where appropriate: {"auths": {"quay.io": {"auth": "[auth token]","email": ""}}}
  5. Back in the Quay UI, return to the default Repositories page. On the right side, under Users and Organizations, select the Quay organization you want to use for RHTAP.
  6. From the tabs on the left side, select Applications.
  7. Click Create New Application. Give your application a name.
  8. Click on the application’s name.
  9. From the tabs on the left, select Generate Token.
  10. From the options for permissions for the token, select View all visible repositories.
  11. Click Generate Access Token.
  12. Click Authorize Applicaiton.
  13. The UI displays an access token. Label and save this token in ~/install_values.txt, too.
  14. In your CLI, run the following command to integrate your instance of Quay. Replace $DOCKERCONFIGJSON with the Docker configuration value. Replace $API_TOKEN with the token you just generated. And replace $URL with the address for your instance of Quay (https://quay.io if you have not installed Quay in your cluster).

    $ rhtap-cli integration quay --dockerconfigjson="$DOCKERCONFIGJSON" --token="$API_TOKEN" --url="$URL" --config="$CONFIG"
    Copy to Clipboard Toggle word wrap

3.3. (Optional) Integrating GitLab

If you want to use GitLab to host your source code, or as a CI provider, complete the steps in the following procedure.

Prerequisites

  • You must have the necessary permissions to create and manage GitLab jobs.
  • You must have a GitLab API token.
  • You must have a host URL, if you plan to integrate with a custom GitLab host. If you do not specify a GitLab host URL, the system defaults to gitlab.com.

Procedure

  1. In your CLI, run the integration command. Replace $API_TOKEN with your GitLab API token. If you are integrating with a custom GitLab host, replace $URL with you GitLab host URL. If you are using the default gitlab.com host, you can remove the --host option.

    $ rhtap-cli integration gitlab --token="$API_TOKEN" --host="$URL" --config="$CONFIG"
    Copy to Clipboard Toggle word wrap

3.4. (Optional) Integrating Jenkins

Prerequisites

  • You must have the necessary permissions to create and manage Jenkins jobs.
  • You must have a URL using which you access Jenkins, a Jenkins user ID, and an API token.

Procedure

  1. In your CLI, run the integration command. Replace $API_TOKEN with your Jenkins API token, $URL with you Jenkins instance URL, $USERNAME with your Jenkins user ID.

    $ rhtap-cli integration jenkins --token="$API_TOKEN" --url="$URL" --username="$USERNAME" --config="$CONFIG"
    Copy to Clipboard Toggle word wrap

3.5. (Optional) Integrating JFrog Artifactory

Prerequisites

  • Admin access to an instance of Artifactory
  • A repository in Artifactory that you want to use with RHTAP

Procedure

  1. In the Artifactory UI, in the Administration view, click the green Set Up Client/CI Tool button next to the repository that you want to use.
  2. Select Docker Client
  3. Follow the UI instructions to authenticate in your CLI.

    1. The UI generates a token to use as a password. Make sure to save it in ~/install_values.txt.
    2. When you login to JFrog in your CLI, you should get a message saying your password has been stored in a location such as ~/.docker/config.json. If you do not see this message, a later step in this procedure explains what to do.
  4. In your CLI, run the integration command. Set the value of ARTIFACTORY_URL to the URL of your instance (for example, "https://myusername.jfrog.io"). Set the value of ARTIFACTORY_DOCKERCONFIGJSON to the contents of the file where your password was stored. Set the value of ARTIFACTORY_API_TOKEN to the token that JFrog generated.

    $ rhtap-cli integration artifactory --url="$ARTIFACTORY_URL" --dockerconfigjson="$ARTIFACTORY_DOCKERCONFIGJSON" --token="$ARTIFACTORY_API_TOKEN" --config="$CONFIG"
    Copy to Clipboard Toggle word wrap
Note

If your CLI did not print a message about the config.json file, you can create its contents as follows: { "auths": { "<URL for your JFrog instance>":{ "auth": "<base64 format of username:password>", "email": "" }}}

3.6. (Optional) Integrating Bitbucket

If you want to use Bitbucket cloud to host your source code, complete the steps in the following procedure.

Prerequisites

  • You must have Bitbucket username. To find your username:

    1. On the sidebar in Bitbucket, click your profile picture and select View profile.
    2. In the sidebar, select Settings. The system displays your username in the account settings.
  • You must have a app password.

Procedure

  1. In your CLI, run the integration command. Replace $username with your Bitbucket username, and $appPassword with your Bitbucket access tokens. If you are integrating with a custom Bitbucket host, replace $URL with you Bitbucket host URL. If you are using the default bitbucket.org host, you can remove the --host option.

    $ rhtap-cli integration bitbucket --username="$username" --app-password="$access_token" --host="$URL" --config="$CONFIG"
    Copy to Clipboard Toggle word wrap
맨 위로 이동
Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2025 Red Hat