You are viewing version 2.21 of the documentation, which is no longer maintained. For up-to-date documentation, see the latest version.

Administration Guides

Administration Guides

Upgrade Spinnaker using Halyard

Upgrading Open Source Spinnaker to Armory Spinnaker

Creating and Adding a Kubernetes Account to Spinnaker as a Deployment Target

Kubernetes: Creating Service Accounts and Kubeconfigs

Dynamic Kubernetes Accounts With Vault

AWS: Deploying to AWS from Spinnaker (using IAM credentials)

AWS: Deploying to AWS from Spinnaker (using IAM Instance roles)

AWS: Configuring AWS Networking

Baking Machine Images (AWS, GCE, etc.) Using Packer

Configuring Spinnaker on AWS for Disaster Recovery


Spinnaker Services TLS

Spinnaker Services mTLS

Generating Certificates

Exposing the API Endpoint

Orca with RDBMS

Clouddriver with RDBMS

Configure Spinnaker to use Github as an Artifact Source

Configure Jenkins

Configure Travis

Docker Registries

AWS: Configuring AWS ECR as a Registry

AWS: Configure S3 Artifacts

Configuring Slack Notifications

Rate Limiting Spinnaker API Calls

Spinnaker GitOps with Halyard

Okta SAML Integration

Sumo Logic Dashboard Integration

Restrict Application Creation

Configuring GitHub OAuth for Spinnaker

Armory Diagnostics

Configure the Armory Splunk App for Spinnaker™

The Armory Splunk App for Spinnaker brings all the SDLC information your organization has into a digestible and familiar format, Splunk dashboards.

Monitoring Spinnaker with Prometheus

Monitoring Spinnaker using Prometheus and Grafana

Working with Secrets

Armory Spinnaker supports several secret stores. Use them to keep your secrets secure and not commit plain text secrets to your configs.