This repository contains the source code for the Runtime Bootstrapper (rt-bootstrapper) Kyma component used to configure Kyma runtime components running in markets with individual infrastructure setups.
Runtime Bootstrapper contains two functional parts:
-
Kubernetes admission webhook that intercepts the creation of Pods. It modifies the Pod specifications to include necessary configurations, modifies image paths to use the configured remote registry, and provides pull Secrets with credentials.
-
Kubernetes Controller that watches for namespaces and ensures that the Secrets with required credentials are present and synchronized in those namespaces.
Note
This component is implemented as part of the SAP BTP, Kyma runtime delivery to specific landscapes with unique constraints.
Installing Runtime Bootstrapper in Kyma runtime, or in a self-managed Kyma cluster may negatively impact your workloads.
- SAP BTP, Kyma runtime instance
- Access to the Kyma runtime cluster with a kubeconfig
In environments with individual infrastructure setups, Runtime Bootstrapper is installed and configured automatically by Kyma Control Plane (KCP) in all provisioned Kyma runtimes.
To enable Runtime Bootstrapper in your Kyma cluster, apply the release manifest using kubectl:
kubectl apply -f https://github.com/kyma-project/rt-bootstrapper/releases/latest/download/rt-bootstrapper.yamlFor architecture details, see Architectural Documentation of Runtime Bootstrapper.
-
Clone the project.
git clone https://github.com/kyma-project/rt-boostrapper.git && cd rt-boostrapper/
-
Create a new k3d cluster and run Runtime Bootstrapper from the main branch.
k3d cluster create test-cluster make deploy
To use Runtime Bootstrapper, label your Kubernetes namespaces and Pods accordingly. The admission webhook intercepts the creation of these resources and applies the necessary configurations.
See the Contributing Rules.
See the Code of Conduct document.
See the license file.