Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Building CI/CD Systems Using Tekton

You're reading from  Building CI/CD Systems Using Tekton

Product type Book
Published in Sep 2021
Publisher Packt
ISBN-13 9781801078214
Pages 278 pages
Edition 1st Edition
Languages
Author (1):
Joel Lord Joel Lord
Profile icon Joel Lord

Table of Contents (20) Chapters

Preface 1. Section 1: Introduction to CI/CD
2. Chapter 1: A Brief History of CI/CD 3. Chapter 2: A Cloud-Native Approach to CI/CD 4. Section 2: Tekton Building Blocks
5. Chapter 3: Installation and Getting Started 6. Chapter 4: Stepping into Tasks 7. Chapter 5: Jumping into Pipelines 8. Chapter 6: Debugging and Cleaning Up Pipelines and Tasks 9. Chapter 7: Sharing Data with Workspaces 10. Chapter 8: Adding when Expressions 11. Chapter 9: Securing Authentication 12. Section 3: Tekton Triggers
13. Chapter 10: Getting Started with Triggers 14. Chapter 11: Triggering Tekton 15. Section 4: Putting It All Together
16. Chapter 12: Preparing for a New Pipeline 17. Chapter 13: Building a Deployment Pipeline 18. Assessments 19. Other Books You May Enjoy

Configuring the incoming webhooks

Now that you have the necessary YAML files to create your trigger, you will need a few more configurations to ensure that your cluster is listening. First, you will need to create a secret to be used to validate that the incoming requests. Then, you will need to expose a route so it can be reached from outside of the cluster. You will need the help of ngrok here to make sure that it is also available from the public internet, which you installed in Chapter 10, Getting Started with Triggers. Finally, you will need to add a webhook to a GitHub repository. This webhook will connect to your newly created trigger.

Creating a secret

To ensure that your pipeline is not launched every time a robot accidentally hits your trigger URL, you will need to create a secret. You could use any arbitrary string as a key, but it is a good practice to use a random key for each one of your triggers. For this reason, we will be using a random number converted...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}