A hush house is an enclosed, noise-suppressed facility used for testing aircraft systems, including propulsion, mechanics, electronics, pneumatics, and others.
This repository contains the configuration of hush-house.pivotal.io, metrics-hush-house.concourse-ci.org, and any other Kubernetes (K8S) deployments using the hush-house
Kubernetes cluster available in the shared Concourse Google Cloud account.
Table of contents
.
│
├── deployments # Where you can find all deployments that get
│ │ # continuously deployed by `hush-house` when changes
│ │ # to configurations in this repository are made.
│ │
│ │
│ ├── with-creds # Deployments that require credentials that do not exist
│ │ │ # in this repository (as they're not public)
│ │ │
│ │ ├── Makefile # Scripting related to the deployments
│ │ │
│ │ ├── hush-house # The web nodes of the `hush-house` Concourse deployment
│ │ ├── worker # The deployment of the kgeneric pool of workers that connect to `hush-house`
│ │ └── metrics # The `metrics` deployment
│ │
│ │
│ │
│ └── without-creds # Deployments that require NO credentials, i.e., that rely
│ │ # solely on public values from this repository.
│ │
│ ├── Makefile # Scripting related to the deployments.
│ │
│ └── bananas # Fully functioning example deployment.
│
│
├── helm # Scripts to automate the provisioning of Helm and its
│ # server-side component (tiller)
│
│
├── Makefile # General scripting for getting access to the cluster and
│ # setting up the pipelines.
│
│
└── terraform # Terraform files for bringing up the K8S cluster and other
│ # configuring other infrastructure components necessary
│ # for the deployments (addresses + cloudsql).
│
├── main.tf # Entrypoint that makes use of modules to set up the IaaS
│ # resources.
│
├── address # Module to create addresses ...
├── cluster # Module for creating GKE clusters w/ node pools
│ └── vpc # Module for setting up the VPC of the cluster
└── database # Module for setting up CloudSQL
lpass-cli
)
brew install lastpass-cli
terraform
)
brew install terraform
helm
)
brew install kubernetes-cli
brew install helm && mv /usr/local/bin/helm{,3}
(for ci
)brew install helm@2
(for the other deployments)kapp
) (for ci
)
brew tap k14s/tap
brew install kapp
helm diff
)
helm plugin install https://github.com/databus23/helm-diff --version master
brew cask install google-cloud-sdk
ps.: if you're creating your own environment based on an existing k8s cluster, you'll probably only need helm
.
Install the dependencies
Configure access to the Google Cloud project
gcloud config set project cf-concourse-production
gcloud config set compute/zone us-central1-a
gcloud auth login
gcloud container clusters get-credentials hush-house
Note.: this is only needed if you've never initialized helm
locally.
helm init --client-only
# fetch the creds to lpass
make helm-creds
# copy the credentials to $HELM_HOME
make helm-set-client-creds
--tls
.For example,helm install ... --tls
As hush-house
is a complete environment for deploying Concourse and any other Helm charts, it requires few infrastructure pieces to be in place.
All of that is provisioned using terraform
, having its configuration under the ./terraform
directory.
Make sure you DON'T change the IaaS parameters in the Google Cloud Console - modifications MUST be made through terraform
.
In the hush-house
cluster, there are currently a few Helm charts deployments running.
As mentioned in the repository structure section, these all live under ./deployments
.
Check the deployments
README to know more about them.
To create a new deployment of your own, a Chart under ./deployments/(with|without)-crekds
needs to be created (given that every deployment corresponds to releasing a custom Chart).
There are two possible types of deployments we can create:
tl;dr: copy the ./deployments/without-creds/bananas
directory and change bananas
to the name of the deployment you want.
./deployments/without-creds
, and get there:mkdir ./deployments/without-creds/bananas
cd ./deployments/without-creds/bananas
Chart.yaml
):# Create the required files
touch ./{Chart.yaml,requirements.yaml,values.yaml}
# Populate `Chart.yaml` file with some info about it
echo '---
name: bananas
version: 0.0.1
description: a test deployment!
maintainers:
- name: ciro
' > ./Chart.yaml
echo '---
dependencies:
- name: concourse
version: 0.0.15
repository: https://raw.githubusercontent.com/concourse/charts/gh-pages/
' > ./deployments/bananas/requirements.yaml
ps.: the version can be retrieved from concourse/charts.
pps.: the upstream version of the Chart could be used too! See helm/charts
for instructions.
With that set, hush-house
is ready to have the deployment going.
You can either trigger the deployment from your own machine if you have Helm already set up, or make a PR to hush-house
so that the pipeline does it all for you.
Once the process is completed, you should be able to see your resources under the deployment namespace:
kubectl get pods --namespace=bananas
NAME READY STATUS RESTARTS AGE
bananas-postgresql-7f779c5c96-c8f4v 1/1 Running 0 2m
bananas-web-78db545cc9-xrzd9 1/1 Running 1 2m
bananas-worker-78f6cddccb-brvm9 1/1 Running 0 2m
bananas-worker-78f6cddccb-qd6zn 1/1 Running 0 2m
bananas-worker-78f6cddccb-xv7p5 1/1 Running 0 2m
A deployment that requires credentials that can't be publicly shared involve all of the steps above, including some few more. Once those steps were finish, proceed with the following :
values.yaml
file with public configurationsecho '---
concourse:
worker:
replicas: 3
concourse:
web:
prometheus:
enabled: true
' > ./deployments/bananas/values.yaml
.values.yaml
file with credentialsecho '---
concourse:
secrets:
localUsers: test:something
' > ./deployments/bananas/.values.yaml
ps.: this can be left blank
hush-house-main
namespace with your credentialsHaving kubectl
configured (see gathering access to the cluster) with access to hush-house-main
, create the secret using the hush-house-creds-secrets-$DEPLOYMENT
target from ./deployments/with-creds/Makefile
:
# go back to `./deployments/with-creds`
cd ..
make hush-house-creds-secrets-bananas
When using the Concourse Helm chart, metrics get scrapped and graphed by default under https://metrics-hush-house.concourse-ci.org if Prometheus integration is enabled.
To do so, make sure you have concourse.web.prometheus.enabled
set to true
and the prometheus.io
annotations added to concourse.web
:
concourse:
web:
annotations:
prometheus.io/scrape: "true"
prometheus.io/port: "9391"
concourse:
web:
prometheus:
enabled: true
With that set, head to the Concourse
dashboard under the metrics address provided above and change the Namespace
dropdown to the one corresponding to the name of your deployment.
As the worker nodes created by worker pools declared in the main Terraform file are just regular GCP instances, these can be accessed using the regular ways of accessing VMs through gcloud
.
# The name of the instance can be retrieved from the
# command that lists nodes connected to the k8s cluster:
# - `kubectl get nodes`.
NODE_NAME="gke-hush-house-test-workers-1-46b1d860-65mf"
# Use `gcloud` to facilitate the process of getting the
# right credentials set up for SSHing into the machine.
#
# ps.: you must have `gcloud` credentials set up before
# proceeding - check out the section `Gathering acccess to the cluster`
# in this README file.
gcloud compute \
ssh \
--zone us-central1-a \
$NODE_NAME
Here's a quick cheat-sheet that might help you get started with kubectl
if you've never used it before.
These are the equivalent of Concourse target
s, storing auth, API endpoint, and namespace information in each of them.
kubectl config get-contexts
namespace
to a default one):kubectl config set-context $context \
--namespace=$new_default_namespace
kubectl config use-context $context
A virtual segregation between resources in a single cluster.
It's common to have environments associated with namespaces such that their resources get isolated too. In this scenario, you can think of namespaces as BOSH deployments - they're all managed by the same director, but they get their instances and other resources isolated from each other.
The namespace to target is supplied via the --namespace
flag, or having a default namespace set to the context (see #contexts).
Similar to bosh vms
, it's possible to gather the list of instances that compose our cluster.
kubectl get nodes
kubectl describe node $node_name
Just like you can tie Vault or CredHub to your Concourse instances in order to have secrets suport, you can also make use of Kubernetes secret for that, with some specialties:
_
in the names (a limitation from k8s secrets)For instance, the Secret something_a
is invalid:
metadata.name:
Invalid value: "something_a":
a DNS-1123 subdomain must consist of lower case alphanumeric characters, '-' or '.',
and must start and end with an alphanumeric character (e.g. 'example.com', regex used
for validation is '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*')
Names must not be longer than 63
characters
for interpolating ((mything)):
kubectl create generic mything \
--from-literal=value=$value \
--namespace $prefix$team
kubectl create generic mything \
--from-literal=foo=$foo \
--namespace $prefix$team
Creating the hush-house
cluster on GKE from the ground up requires:
./terraform
, thenBelow you find instructions to how to do those steps.
Access to the GCP credentials for hush-house
can be granted through a GCP JSON key stored in LastPass.
The Makefile
at the root of this repository contains a target for retrieving that key and placing it at the right place:
make gcp-key
With the credential obtained, we can follow up creating the underlying resources in the IaaS (GCP), using the defitnions under the ./terraform
directory.
cd ./terraform
terraform apply
A fully working hush-house
Kubernetes clusters requires few components: a Tiller deployment (the server-side compoennt of Helm), and a custom StorageClass
(so we can create PersistentVolumeClaims based of SSD storage).
To configure Tiller, first get the Helm certificates and keys from LastPass and then run the script that bootstraps it.
Note.: the script is meant to be run with the current working directory pointing to cluster-bootstrap
.
make helm-creds
cd ./cluster-bootstrap
./bootstrap-tiller.sh
To finish the bootstrapping, we now need to create the StorageClass. From the root of this repository, run the following:
cd ./cluster-bootstrap/storage
./ssd-storage-class.sh