-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Setup staging #30
Comments
I assume the staging environment will be deployed in our cluster? Not sure if you have the needed access to set up secrets either @valiafetisov |
I assume so too 🙂
Please make sure that those keys doesn't have access to the complete chamber, but rather only to secrets needed by this concrete project.
No, I don't. I suppose only @wkampmann have. Or does @BracketJohn also have more rights than I do? In any case, @DeusAvalon, I would ask you to a) specify what exact rights do you need for this repo (if you think they can be safely given to you) or b) to write a concrete step-by-step instruction on what exactly need to be set where. If |
:D
Yes ofc i would create a dedicated IAM role with only access to the specific SSM path for chamber :)
According to the official docs i would need to become an And a repo fork into our own org would definitly be a simple solution to deploy the application without juggling permissions! |
sadly do not -> Wouter will need to create any github-side credentials. Can we find a workaround in the meantime + make sure that we ping him with a constructive & clear task-list once we have that?
I agree with this proposition + think it even makes sense that we go this route through, so that in the end we have a very clear picture of what Wouter will need to do, to keep his required involvement to a minimum. |
Ok, so let's start working on the fork and see if Wouter will grant @DeusAvalon |
@valiafetisov can you prepare the fork and ping me when everything looks good? :) From this point on i will take over and add the deployment |
Here is the fork. It's ready to be deployed unless you have some specific requirements |
For Kubernetes to know if the pods are in a healthy state a healthcheck endpoint is required. Please add one ASAP, in the meanwhile i will disable the healthcheck to allow kubernetes to start the containers. |
The staging pipeline was implemented using Argo CD in a central (private) repo, therefore it's hasn't been automatically closed. The staging is currently available at https://powerhouse.switchboard.k8s.sidestream.tech |
Goal
Working staging environment re-deployed on merge to main
Context
Since there is something sensible to display now (after merging #29) we would want to deploy this project. Note, that currently it will have 3 services: api, frontend and the database. Have a look at the
docker-compose.yaml
file as well asnginx.conf
for inspiration. Although currently the database is set to be sqlite, in production it will always be postgresql. Note, in this project we're currently using prisma (but that might change in the future).One additional complexity here is that this repo is not owned by our github organisation. We anyway have access to github actions which are already enabled and utilised.
Tasks
JWT_SECRET
contains a long password-like string/
/api
{ coreUnits { id } }
should return no errorsThe text was updated successfully, but these errors were encountered: