- Overview
- Requirements
- Pre-installation
- Preparing the installation
- Installing and configuring the service mesh
- Downloading the installation packages
- Configuring the OCI-compliant registry
- Granting installation permissions
- Installing and configuring the GitOps tool
- Deploying Redis through OperatorHub
- Applying miscellaneous configurations
- Running uipathctl
- Installation
- Post-installation
- Migration and upgrade
- Upgrading Automation Suite
- Migrating standalone products to Automation Suite
- Step 1: Restoring the standalone product database
- Step 2: Updating the schema of the restored product database
- Step 3: Moving the Identity organization data from standalone to Automation Suite
- Step 4: Backing up the platform database in Automation Suite
- Step 5: Merging organizations in Automation Suite
- Step 6: Updating the migrated product connection strings
- Step 7: Migrating standalone Orchestrator
- Step 8: Migrating standalone Insights
- Step 9: Deleting the default tenant
- Performing a single tenant migration
- Migrating between Automation Suite clusters
- Cluster administration
- Product-specific configuration
- Troubleshooting

Automation Suite on OpenShift installation guide
Installing and configuring the GitOps tool
uipathadmin
service account.
-
For the service mesh installation and configuration instructions, see Installing and configuring the service mesh
-
For the installation permissions, see Granting installation permissions.
You can deploy Automation Suite using either an OpenShift GitOps Operator instance dedicated to the UiPath® applications or a shared OpenShift GitOps Operator instance, if it is already installed and available on your cluster.
We recommend using a dedicated OpenShift GitOps Operator instance to install the Automation Suite applications. This method requires minimum permissions to the other namespaces and cluster resources.
For installation and access instructions, see the following sections:
<uipath>
for ArgoCD.
<uipath>
namespace, the ArgoCD UI will not be accessible due to the network policies in the <uipath>
namespace added by the Service Mesh Control Plane. To address this, you must add a network policy, as shown in the following
example, to allow the ingress pods to reach the ArgoCD-server pods in the <uipath>
namespace.
kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: allow-argocd
spec:
podSelector:
matchLabels:
app.kubernetes.io/name: argocd-server
ingress:
- from:
- namespaceSelector:
matchLabels:
network.openshift.io/policy-group: ingress
policyTypes:
- Ingress
kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: allow-argocd
spec:
podSelector:
matchLabels:
app.kubernetes.io/name: argocd-server
ingress:
- from:
- namespaceSelector:
matchLabels:
network.openshift.io/policy-group: ingress
policyTypes:
- Ingress
input.json
file:"argocd": {
"project": "<uipath>"
},
"argocd": {
"project": "<uipath>"
},
To configure ArgoCD for multiple Automation Suite installations in a single OpenShift cluster, follow these steps:
- Check if all the services of ArgoCD are up and running. You can run the following
command to monitor all the pods:
oc get pods -n <argocdNamespace>
oc get pods -n <argocdNamespace> - Once all services are up and running, you can use the following command sequentially
to patch ArgoCD's permissions. This allows ArgoCD to manage different application
namespaces where Automation Suite is installed:
oc patch appprojects.argoproj.io default -n <argocdNamespace> --type='merge' -p '{"spec": {"sourceNamespaces": ["*"]}}' oc patch configmaps argocd-cmd-params-cm -n <argocdNamespace> --type='merge' -p '{"data": {"application.namespaces": "*"}}' oc rollout restart -n <argocdNamespace> deployment argocd-server oc rollout restart -n <argocdNamespace> statefulset argocd-application-controller
oc patch appprojects.argoproj.io default -n <argocdNamespace> --type='merge' -p '{"spec": {"sourceNamespaces": ["*"]}}' oc patch configmaps argocd-cmd-params-cm -n <argocdNamespace> --type='merge' -p '{"data": {"application.namespaces": "*"}}' oc rollout restart -n <argocdNamespace> deployment argocd-server oc rollout restart -n <argocdNamespace> statefulset argocd-application-controller
- Provisioning a dedicated GitOps instance
- Accessing the dedicated ArgoCD instance
- Configuring the private Helm repository and certificates in ArgoCD
- Configuring a shared GitOps instance
- Accessing the shared ArgoCD instance
- Configuring the private Helm repository and certificates in ArgoCD
- Configuring ArgoCD for multiple installations in a single cluster