A hush house is an enclosed, noise-suppressed facility used for testing aircraft systems, including propulsion, mechanics, electronics, pneumatics, and others.
This repository contains the configuration of hush-house.pivotal.io, metrics-hush-house.concourse-ci.org, and any other Kubernetes (K8S) deployments using the hush-house
Kubernetes cluster available in the shared Concourse Google Cloud account.
Table of contents
- Repository structure
- Dependencies
- Gathering acccess to the cluster
- IaaS
- Deployments
- SSHing into the Kubernetes node VM
- k8s cheat-sheet
- Bootstrapping the cluster
.
│
├── deployments # Where you can find all deployments that get
│ │ # continuously deployed by `hush-house` when changes
│ │ # to configurations in this repository are made.
│ │
│ │
│ ├── with-creds # Deployments that require credentials that do not exist
│ │ │ # in this repository (as they're not public)
│ │ │
│ │ ├── Makefile # Scripting related to the deployments
│ │ │
│ │ ├── hush-house # The web nodes of the `hush-house` Concourse deployment
│ │ ├── worker # The deployment of the kgeneric pool of workers that connect to `hush-house`
│ │ └── metrics # The `metrics` deployment
│ │
│ │
│ │
│ └── without-creds # Deployments that require NO credentials, i.e., that rely
│ │ # solely on public values from this repository.
│ │
│ ├── Makefile # Scripting related to the deployments.
│ │
│ └── bananas # Fully functioning example deployment.
│
│
├── helm # Scripts to automate the provisioning of Helm and its
│ # server-side component (tiller)
│
│
├── Makefile # General scripting for getting access to the cluster and
│ # setting up the pipelines.
│
│
└── terraform # Terraform files for bringing up the K8S cluster and other
│ # configuring other infrastructure components necessary
│ # for the deployments (addresses + cloudsql).
│
├── main.tf # Entrypoint that makes use of modules to set up the IaaS
│ # resources.
│
├── address # Module to create addresses ...
├── cluster # Module for creating GKE clusters w/ node pools
│ └── vpc # Module for setting up the VPC of the cluster
└── database # Module for setting up CloudSQL
- LastPass CLI (
lpass-cli
)brew install lastpass-cli
- Terraform CLI (
terraform
)brew install terraform
- Helm (
helm
)brew install kubernetes-cli
brew install helm && mv /usr/local/bin/helm{,3}
(forci
)brew install helm@2
(for the other deployments)
- Kapp (
kapp
) (forci
)brew tap k14s/tap
brew install kapp
- Helm diff plugin (
helm diff
)helm plugin install https://github.com/databus23/helm-diff --version master
- Google Cloud CLI
brew cask install google-cloud-sdk
ps.: if you're creating your own environment based on an existing k8s cluster, you'll probably only need helm
.
-
Install the dependencies
-
Configure access to the Google Cloud project
gcloud config set project cf-concourse-production
gcloud config set compute/zone us-central1-a
gcloud auth login
- Retrieve the k8s credentials for the cluster
gcloud container clusters get-credentials hush-house
- Initialize the Helm local configuration
Note.: this is only needed if you've never initialized helm
locally.
helm init --client-only
- Retrieve the Helm TLS certificates and the CA certificate
# fetch the creds to lpass
make helm-creds
# copy the credentials to $HELM_HOME
make helm-set-client-creds
- Run Helm command against Hush-House requires
--tls
.For example,
helm install ... --tls
As hush-house
is a complete environment for deploying Concourse and any other Helm charts, it requires few infrastructure pieces to be in place.
All of that is provisioned using terraform
, having its configuration under the ./terraform
directory.
Make sure you DON'T change the IaaS parameters in the Google Cloud Console - modifications MUST be made through terraform
.
In the hush-house
cluster, there are currently a few Helm charts deployments running.
As mentioned in the repository structure section, these all live under ./deployments
.
Check the deployments
README to know more about them.
To create a new deployment of your own, a Chart under ./deployments/(with|without)-crekds
needs to be created (given that every deployment corresponds to releasing a custom Chart).
There are two possible types of deployments we can create:
- without any credentials setup, and
- with credentials.
tl;dr: copy the ./deployments/without-creds/bananas
directory and change bananas
to the name of the deployment you want.
- Create a directory under
./deployments/without-creds
, and get there:
mkdir ./deployments/without-creds/bananas
cd ./deployments/without-creds/bananas
- Populate the repository with the required files for a Helm Chart, as well as metadata about itself (
Chart.yaml
):
# Create the required files
touch ./{Chart.yaml,requirements.yaml,values.yaml}
# Populate `Chart.yaml` file with some info about it
echo '---
name: bananas
version: 0.0.1
description: a test deployment!
maintainers:
- name: ciro
' > ./Chart.yaml
- Add the concourse release candidate as a dependency
echo '---
dependencies:
- name: concourse
version: 0.0.15
repository: https://raw.githubusercontent.com/concourse/charts/gh-pages/
' > ./deployments/bananas/requirements.yaml
ps.: the version can be retrieved from concourse/charts.
pps.: the upstream version of the Chart could be used too! See helm/charts
for instructions.
With that set, hush-house
is ready to have the deployment going.
You can either trigger the deployment from your own machine if you have Helm already set up, or make a PR to hush-house
so that the pipeline does it all for you.
Once the process is completed, you should be able to see your resources under the deployment namespace:
kubectl get pods --namespace=bananas
NAME READY STATUS RESTARTS AGE
bananas-postgresql-7f779c5c96-c8f4v 1/1 Running 0 2m
bananas-web-78db545cc9-xrzd9 1/1 Running 1 2m
bananas-worker-78f6cddccb-brvm9 1/1 Running 0 2m
bananas-worker-78f6cddccb-qd6zn 1/1 Running 0 2m
bananas-worker-78f6cddccb-xv7p5 1/1 Running 0 2m
A deployment that requires credentials that can't be publicly shared involve all of the steps above, including some few more. Once those steps were finish, proceed with the following :
- Create the
values.yaml
file with public configurations
echo '---
concourse:
worker:
replicas: 3
concourse:
web:
prometheus:
enabled: true
' > ./deployments/bananas/values.yaml
- Populate the
.values.yaml
file with credentials
echo '---
concourse:
secrets:
localUsers: test:something
' > ./deployments/bananas/.values.yaml
ps.: this can be left blank
- Populate the
hush-house-main
namespace with your credentials
Having kubectl
configured (see gathering access to the cluster) with access to hush-house-main
, create the secret using the hush-house-creds-secrets-$DEPLOYMENT
target from ./deployments/with-creds/Makefile
:
# go back to `./deployments/with-creds`
cd ..
make hush-house-creds-secrets-bananas
When using the Concourse Helm chart, metrics get scrapped and graphed by default under https://metrics-hush-house.concourse-ci.org if Prometheus integration is enabled.
To do so, make sure you have concourse.web.prometheus.enabled
set to true
and the prometheus.io
annotations added to concourse.web
:
concourse:
web:
annotations:
prometheus.io/scrape: "true"
prometheus.io/port: "9391"
concourse:
web:
prometheus:
enabled: true
With that set, head to the Concourse
dashboard under the metrics address provided above and change the Namespace
dropdown to the one corresponding to the name of your deployment.
As the worker nodes created by worker pools declared in the main Terraform file are just regular GCP instances, these can be accessed using the regular ways of accessing VMs through gcloud
.
# The name of the instance can be retrieved from the
# command that lists nodes connected to the k8s cluster:
# - `kubectl get nodes`.
NODE_NAME="gke-hush-house-test-workers-1-46b1d860-65mf"
# Use `gcloud` to facilitate the process of getting the
# right credentials set up for SSHing into the machine.
#
# ps.: you must have `gcloud` credentials set up before
# proceeding - check out the section `Gathering acccess to the cluster`
# in this README file.
gcloud compute \
ssh \
--zone us-central1-a \
$NODE_NAME
Here's a quick cheat-sheet that might help you get started with kubectl
if you've never used it before.
These are the equivalent of Concourse target
s, storing auth, API endpoint, and namespace information in each of them.
- Get all configured contexts:
kubectl config get-contexts
- Change something in a context (for instance, the
namespace
to a default one):
kubectl config set-context $context \
--namespace=$new_default_namespace
- Set the context to use:
kubectl config use-context $context
A virtual segregation between resources in a single cluster.
It's common to have environments associated with namespaces such that their resources get isolated too. In this scenario, you can think of namespaces as BOSH deployments - they're all managed by the same director, but they get their instances and other resources isolated from each other.
The namespace to target is supplied via the --namespace
flag, or having a default namespace set to the context (see #contexts).
Similar to bosh vms
, it's possible to gather the list of instances that compose our cluster.
- Retrieve the list of all registered k8s nodes:
kubectl get nodes
- Describe (get events and extra information of) a particular node:
kubectl describe node $node_name
Just like you can tie Vault or CredHub to your Concourse instances in order to have secrets suport, you can also make use of Kubernetes secret for that, with some specialties:
- Can't make use of
_
in the names (a limitation from k8s secrets)
For instance, the Secret something_a
is invalid:
metadata.name:
Invalid value: "something_a":
a DNS-1123 subdomain must consist of lower case alphanumeric characters, '-' or '.',
and must start and end with an alphanumeric character (e.g. 'example.com', regex used
for validation is '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*')
-
Names must not be longer than
63
characters -
for interpolating ((mything)):
kubectl create generic mything \
--from-literal=value=$value \
--namespace $prefix$team
- for interpolating nested structures ((mything.foo)):
kubectl create generic mything \
--from-literal=foo=$foo \
--namespace $prefix$team
Creating the hush-house
cluster on GKE from the ground up requires:
- having GCP credentials,
- applying the Terraform definition under
./terraform
, then - creating few objects in the Kubernetes cluster.
Below you find instructions to how to do those steps.
Access to the GCP credentials for hush-house
can be granted through a GCP JSON key stored in LastPass.
The Makefile
at the root of this repository contains a target for retrieving that key and placing it at the right place:
make gcp-key
With the credential obtained, we can follow up creating the underlying resources in the IaaS (GCP), using the defitnions under the ./terraform
directory.
cd ./terraform
terraform apply
A fully working hush-house
Kubernetes clusters requires few components: a Tiller deployment (the server-side compoennt of Helm), and a custom StorageClass
(so we can create PersistentVolumeClaims based of SSD storage).
To configure Tiller, first get the Helm certificates and keys from LastPass and then run the script that bootstraps it.
Note.: the script is meant to be run with the current working directory pointing to cluster-bootstrap
.
make helm-creds
cd ./cluster-bootstrap
./bootstrap-tiller.sh
To finish the bootstrapping, we now need to create the StorageClass. From the root of this repository, run the following:
cd ./cluster-bootstrap/storage
./ssd-storage-class.sh