The Jitera CLI allows developers to interact with a Jitera Self-Hosted environment from their local machine. To enable CLI access, the administrator generates an RSA key pair, configures the private key in the Helm chart, and distributes the public key to CLI users.Documentation Index
Fetch the complete documentation index at: https://docs.jitera.ai/llms.txt
Use this file to discover all available pages before exploring further.
Overview
CLI setup consists of two sides:| Side | Responsibility |
|---|---|
| Administrator | Generate an RSA key pair, configure the private key in values.yaml, distribute the public key to CLI users |
| CLI user | Install the CLI, configure the backend/frontend endpoints, set the public key on each operating machine |
Endpoint and public key configuration on the CLI side is required only once per operating machine, on the first use.
1. Generate an RSA Key Pair
Generate a 2048-bit RSA key pair. The private key is configured in the Helm chart; the public key is distributed to CLI users.- macOS / Linux
- Windows
Use the built-in
openssl tool:private_key.pem— the private key (used invalues.yaml)public_key.pem— the public key (distributed to CLI users)
2. Configure the Private Key in values.yaml
Set the private key underultron.secret.CLI_ZIPPER_PRIVATE_KEY in your Helm values.yaml. The key must be written as a YAML literal block scalar so that newlines are preserved exactly:
Why the blank lines are required: The Helm chart renders
CLI_ZIPPER_PRIVATE_KEY into the Kubernetes Secret without a YAML block scalar indicator (| or >). As a result, the value is parsed as an implicit multi-line plain scalar — YAML folds single newlines between non-empty lines into a single space, which would collapse the PEM into one line and break the key. Only blank lines between content lines are preserved as actual newlines in the rendered Secret. The | in values.yaml itself is not enough — the blank lines must be present inside the block.3. Install the CLI
CLI users install the Jitera CLI on their local machine.4. Configure Endpoints
On each CLI machine, configure the backend API and frontend URLs for your self-hosted environment. Both endpoints are served from the same ingress domain (ingress.domainName in values.yaml):
Replace
app.yourdomain.com with the actual ingress.domainName configured in your Helm values. The /automation/private path suffix on PRIVATE_API_ENDPOINT is required — the CLI appends /graphql and other paths to this base URL, and Kong routes the /automation/private prefix to the Automation Rails service.5. Configure the Public Key
On each CLI machine, set the public key generated in Step 1. The public key must match the private key configured invalues.yaml.
- macOS / Linux
- Windows
Related Documentation
Deployment Upgrade
Apply changes to values.yaml via Helm upgrade

