Mar 10, 2025
Kubernetes CI/CD: Build a Pipeline with ArgoCD + GHCR
In this tutorial, we'll build a modern CI/CD pipeline for Kubernetes applications using GitHub Actions, GitHub Container Registry, and ArgoCD. This represents a real-world GitOps workflow that many organizations use for deploying applications to Kubernetes.
What We'll Build
Our pipeline will have these components:
GitHub Actions: Builds Docker images and updates deployment manifests
GitHub Container Registry (GHCR): Stores our Docker images
ArgoCD: Monitors our GitOps repository and deploys to Kubernetes
Kubernetes: Runs our application
Prerequisites
Docker Desktop with Kubernetes enabled
Git installed
GitHub account
Basic understanding of Kubernetes, Docker, and YAML
New to Kubernetes? Check out our comprehensive Kubernetes Training course
Overview of the CI/CD Process
Developer pushes code to the application repository
GitHub Actions builds a Docker image and pushes it to GHCR
GitHub Actions updates the deployment manifest in the GitOps repository
ArgoCD detects the change and deploys the updated manifest to Kubernetes
Part 1: Setting Up the Application Repository
Fork the existing repository which already has the application code and configurations:
Click the "Fork" button in the top right corner
Wait for the repository to be forked to your GitHub account
The repository already contains a CI/CD workflow file at .github/workflows/ci-cd.yml
. We will explore how the pipeline works very shortly. For now,
From the Github UI, navigate to
.github/workflows/ci-cd.yml
Edit the file and look for these lines:
Replace
rslim087a
with your GitHub username:
Part 4 will explain how the workflow works.
Part 2: Setting Up the GitOps Repository
Instead of creating a GitOps repository from scratch, fork the existing one:
Click the "Fork" button in the top right corner
Wait for the repository to be forked to your GitHub account
From the Github UI, update the deployment.yaml file to use your GitHub username:
Part 3: Creating GitHub Personal Access Tokens
You'll need two Personal Access Tokens (PATs) for this tutorial. Let's create them one at a time:
Creating CR_PAT (Container Registry Token)
Go to GitHub → Settings → Developer Settings → Personal Access Tokens
Click "Generate new token" → "Generate new token (classic)"
In the "Note" field, enter "Container Registry Access" (this is just for your reference)
Select the following scopes:
repo
write:packages
workflow
Click "Generate token"
IMPORTANT: Copy this token immediately and save it securely - you will only see it once!
Creating GITOPS_PAT (GitOps Repository Token)
Go back to GitHub → Settings → Developer Settings → Personal Access Tokens
Click "Generate new token" → "Generate new token (classic)" again
In the "Note" field, enter "GitOps Repository Access" (this is just for your reference)
Select the following scope:
repo
Click "Generate token"
IMPORTANT: Copy this token immediately and save it securely - you will only see it once!
You'll use these tokens in Part 5 when setting up GitHub Secrets. The secret names in your repository must be exactly "CR_PAT" and "GITOPS_PAT" to match what's referenced in the CI/CD workflow.
Part 4: Understanding the GitHub Actions Workflow
Let's understand the CI/CD workflow file at .github/workflows/ci-cd.yml
.
CI/CD Pipeline Overview
This workflow is triggered whenever:
Code is pushed to the
main
branchA pull request is created against the
main
branch
Key Components of the Pipeline
1. Build and Push Steps:
The pipeline runs on a self-hosted runner (
runs-on: self-hosted
)It checks out your code (
actions/checkout@v3
)Logs into GitHub Container Registry using your PAT (
docker/login-action@v2
withsecrets.CR_PAT
)Sets up Docker Buildx for efficient builds (
docker/setup-buildx-action@v2
)Builds your Docker image and pushes it to GHCR with two tags (
docker/build-push-action@v4
):latest
- Always points to the most recent version[commit-sha]
- A unique tag based on the commit hash for versioning
2. GitOps Update Step:
After pushing the image, the workflow updates your GitOps repository
It uses your GITOPS_PAT to authenticate (
env: GIT_TOKEN: ${{ secrets.GITOPS_PAT }}
)Clones your GitOps repository (
git clone <https://github.com/rslim087a/grade-api-gitops.git> gitops
)Updates the image tag in the
deployment.yaml
file to match the new commit SHA (sed -i "s|image: ghcr.io/...
)Commits and pushes the change to your GitOps repository (
git add
,git commit
,git push
)
This is the "GitOps" part of the workflow - your application code repo automatically updates the deployment manifest in your infrastructure repo.
The pipeline ensures:
Every code change is containerized
Every container is uniquely tagged
Your deployment manifest is always updated to match your latest code
You'll need to add two secrets to your forked repository for this workflow to function, which we'll cover in Part 5.
Part 5: Setting Up GitHub Secrets
Add your PATs as secrets in your application repository:
Go to your application repository on GitHub
Click Settings → Secrets and variables → Actions
Click "New repository secret"
Create two secrets:
Name:
CR_PAT
, Value: your Container Registry PATName:
GITOPS_PAT
, Value: your GitOps repository PAT
Part 6: Setting Up a Self-Hosted GitHub Actions Runner
To connect your local environment to GitHub Actions:
Go to your application repository on GitHub
Click Settings → Actions → Runners
Click "New self-hosted runner"
Select your operating system
Follow the instructions to download and configure the runner
Start the runner with
./run.sh
(Unix) orrun.cmd
(Windows)
Keep this terminal window open as it will listen for and execute jobs.
Part 7: Creating Image Pull Secret
Before ArgoCD can deploy your application, you need to create a secret that allows Kubernetes to pull images from GitHub Container Registry:
Important Notes:
Use your GitHub username for
YOUR_GITHUB_USERNAME
Use the CR_PAT token you created earlier for
YOUR_CR_PAT
Even though the command uses "docker-registry" in its name, this is the standard Kubernetes secret type for all container registries, including GitHub Container Registry
The secret must be named
ghcr-secret
as that's the name referenced in your deployment.yaml
This secret allows Kubernetes to authenticate with GitHub Container Registry to pull your private images. The deployment.yaml in your GitOps repository already includes a reference to this secret:
Part 8: Triggering Your First Build
Before setting up ArgoCD, let's trigger a build to make sure your image exists in GHCR:
Make a small change to your application code:
Go to the Actions tab in your GitHub repository and confirm that the workflow runs successfully
Check that your image was pushed to GHCR under your account
Part 9: Installing ArgoCD in Your Kubernetes Cluster
Let's install and access ArgoCD in your Kubernetes cluster:
Get the initial password:
Access the ArgoCD UI at https://localhost:8080 with:
Username: admin
Password: (the output from the command above)
Part 10: Configuring ArgoCD to Deploy Your Application
In the ArgoCD UI, click "New App" and fill in these details:
Application Name: grade-submission-api
Project: default
Sync Policy: Automatic
Repository URL: https://github.com/YOUR_USERNAME/grade-api-gitops
Revision: HEAD
Path: .
Cluster URL: https://kubernetes.default.svc
Namespace: default
Click "Create"
Alternatively, you can create the application using kubectl:
Save this as argocd-application.yaml
and apply it:
Part 11: Testing the Complete Pipeline
Now let's test our CI/CD pipeline:
Make a change to your application code:
Watch the GitHub Actions workflow run in your repository's Actions tab
Observe ArgoCD detecting and applying the changes
Check that your application is running:
Test your API:
How It All Works Together
Let's break down what happens when you push a change:
CI Phase (GitHub Actions):
GitHub Actions detects the push and runs your workflow
It builds a Docker image with your application code
It pushes the image to GitHub Container Registry with a unique tag
It updates the deployment manifest in your GitOps repository
CD Phase (ArgoCD):
ArgoCD continuously monitors your GitOps repository
When it detects a change, it compares the desired state with the current state
It applies the necessary changes to your Kubernetes cluster
Kubernetes pulls the new image and updates the running application
This represents a true GitOps approach, where:
Git is the single source of truth
All changes are declarative
The system automatically converges to the desired state
Troubleshooting Tips
If you encounter issues with your pipeline:
ImagePullBackOff errors:
Check if your image is public or if you've configured image pull secrets correctly
Verify that the image tag in your deployment matches what was pushed
GitHub Actions failures:
Check your workflow logs for detailed error messages
Verify that your PATs have the correct permissions
ArgoCD sync issues:
Check the ArgoCD UI for sync errors
Verify that your GitOps repository is accessible to ArgoCD
Conclusion
You've now built a complete CI/CD pipeline for Kubernetes using GitHub Actions and ArgoCD! This represents a modern, GitOps approach to application deployment that many organizations are adopting.
By separating your application code from your deployment configuration, you've created a more maintainable and scalable system. The CI process updates both your application image and your deployment configuration, while the CD process automatically applies those changes to your cluster.
This pattern can be extended to support multiple environments, canary deployments, and other advanced deployment strategies.
Kubernetes Training
If you find these guides helpful, check out our Kubernetes Training course