Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 1.0.5-GA #162

Merged
merged 8 commits into from
Apr 23, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
55 changes: 47 additions & 8 deletions INSTALLATION.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,7 @@ Prerequisites:
export AWS_TERRAFORM_BACKEND_BUCKET_NAME=mybucket
export AWS_TERRAFORM_BACKEND_BUCKET_REGION=myregion
```
- You will need `velero cli` to create the cluster backups. Learn how to install velero cli at ([Velero cli](https://velero.io/docs/v1.3.0/velero-install/))

#### Steps:
* Execute the below steps in the same terminal session:
Expand All @@ -51,9 +52,24 @@ Prerequisites:
terragrunt apply -target=module.get_kubeconfig -auto-approve
terragrunt apply
```
The installer will ask for user inputs twice:
- Before creating the EKS cluster
- Before creating rest of the components
The installer will ask for user inputs twice:
- Before creating the EKS cluster
- Before creating rest of the components

* Create a velero backup:
- After the cluster is created velero backup needs to be triggered manually
- We need to create a backup and schedule manually
- Run the below commands to create a backup and schedule
```bash
velero backup create <backup_name>
velero backup schedule <backup_schedule_name>
```
- Below example Creates a backup and schedule it for every 24h and retain the backup for 50h
```bash
velero backup create obsrv-dev-full-cluster-backup
velero backup schedule obsrv-dev-full-cluster-daily-backup --schedule="@every 24h" --ttl 50h0m0s
```


#### Tip:
Add `-auto-approve` to the above `terragrunt` command to install without providing user inputs as shown below
Expand All @@ -64,8 +80,8 @@ terragrunt apply -target=module.eks -auto-approve && terragrunt apply -target=mo
**Azure**
### Prerequisites:
* Log into your cloud environment in your terminal. Please see [Sign in with Azure CLI](https://learn.microsoft.com/en-us/cli/azure/authenticate-azure-cli) for reference.
```
az login
``` bash
az login --allow-no-subscriptions
```
* Create a storage account and export the below variables in your terminal. Please see [Create a storage container](https://learn.microsoft.com/en-us/azure/storage/common/storage-account-create?toc=/azure/storage/blobs/toc.json) for reference. Export the below variables in your terminal session
```
Expand All @@ -75,12 +91,35 @@ terragrunt apply -target=module.eks -auto-approve && terragrunt apply -target=mo
```
### Steps:
* Execute the below commands in the same terminal session:
```
```bash
cd terraform/azure
terragrunt init
terragrunt plan
terragrunt apply
terragrunt apply -target module.aks -auto-approve
```
* Pass the following variables when prompted:
```bash
env: dev
building_block: obsrv
location: East US 2
```
- Note: All the above variable values are given for example
* Export the below variables:
``` bash
export KUBE_CONFIG_PATH=<path_to_kubeconfig>( default to current directory)
export KUBECONFIG=<path_to_kubeconfig>( default to current directory)
```
* Execute the below commands in the same terminal session:
``` bash
terragrunt apply -auto-approve
```
* Pass the following variables when prompted:
```bash
env: dev
building_block: obsrv
location: East US 2
```
- Note: All the above variable values are given for example

**GCP**
### Prerequisites:
* Setup the gcoud CLI. Please see [Installing Google Cloud SDK](https://cloud.google.com/sdk/docs/install) for reference.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@

## Configuration

Define the necessary configurations in the `setup.conf` file:
Define the necessary configurations in the `obsrv.conf` file:

### setup.conf

Expand Down Expand Up @@ -34,20 +34,12 @@ Ensure the installation of the following tools:

## Setup Process

Before executing the `setup` shell script, ensure that the `curl` and `unzip` utilities are present on your system. If they are not installed, you can use the following commands to install them. Execute the provided `setup.sh`` script as a root user to avoid potential permission issues:

**Prerequisites**
```bash
sudo apt-get update
sudo apt-get install -y curl
sudo apt-get install -y unzip
```

Once the `curl` and `unzip` utility is successfully installed, proceed with the setup by running the following command:

```bash
sh setup.sh ./setup.conf
```

This command utilizes the configurations specified in the `setup.conf` file to initiate the setup process.
1. Run Installation Script: Execute the following command to start the installation process:
- Before installing please provide executable permission to installation script
`chmod +x ./obsrv.sh`
```bash
./obsrv.sh install --config ./obsrv.conf --install_dependencies false
```
- Note: Setting install_dependencies=true will automatically download and install all required dependencies. If preferred, you can manually download the dependencies instead.
2. Monitor Installation Progress: The script will begin installing Obsrv within the AWS cluster. Monitor the progress and follow any on-screen prompts or instructions.

7 changes: 0 additions & 7 deletions automation-scripts/infra-setup/setup.conf

This file was deleted.

202 changes: 0 additions & 202 deletions automation-scripts/infra-setup/setup.sh

This file was deleted.

10 changes: 10 additions & 0 deletions terraform/azure/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -51,4 +51,14 @@ provider "helm" {
client_key = module.aks.client_key
cluster_ca_certificate = module.aks.cluster_ca_certificate
}
}

module "unified_helm" {
source = "../modules/helm/unified_helm"
building_block = var.building_block
env = var.env
depends_on = [ module.storage,module.aks ]
azure_storage_account_key = module.storage.azurerm_storage_account_key
azure_storage_account_name = module.storage.azurerm_storage_account_name
azure_storage_container = module.storage.azurerm_storage_container
}
36 changes: 0 additions & 36 deletions terraform/azure/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -23,40 +23,4 @@ variable "druid_deepstorage_type" {
type = string
description = "Druid deep strorage type."
default = "azure"
}

variable "flink_checkpoint_store_type" {
type = string
description = "Flink checkpoint store type."
default = "azure"
}

variable "dataset_api_container_registry" {
type = string
description = "Container registry. For example docker.io/obsrv"
default = "sanketikahub"
}

variable "dataset_api_image_tag" {
type = string
description = "Dataset api image tag."
default = "1.0.0"
}

variable "flink_container_registry" {
type = string
description = "Container registry. For example docker.io/obsrv"
default = "manjudr"
}

variable "flink_image_tag" {
type = string
description = "Flink kubernetes service name."
default = "1.1.0"
}

variable "command_service_image_tag" {
type = string
description = "CommandService image tag."
default = "1.0.0"
}
Loading