This folder contains Helm charts that can easily create a Kubernetes deployment of a demo Project Kerberus app.
These charts depend on the nginx-ingress
controller being present in the cluster. If it's not already installed you
can run:
helm repo add ingress-nginx https://kubernetes.github.io/ingress-nginx
helm install nginx-ingress ingress-nginx/ingress-nginx
or
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v0.48.1/deploy/static/provider/cloud/deploy.yaml
Create values.yaml
organization: "Kiratech"
frontendUrl: https://kerberus-dashboard.test.io
backendUrl: https://kerberus-dashboard.test.io
lighthouseUrl: https://kerberus-dashboard.test.io/lighthouse-api
Then use it to run:
git clone https://github.com/projectkerberus/kerberus-dashboard.git
helm dependency update
helm install -f values.yaml kerberus .
This command will deploy the following pieces:
- Project Kerberus frontend
- Project Kerberus backend with scaffolder and auth plugins
- (optional) a PostgreSQL instance
- lighthouse plugin
- ingress
After a few minutes Project Kerberus should be up and running in your cluster under the DNS specified earlier.
Make sure to create the appropriate DNS entry in your infrastructure. To find the public IP address run:
$ kubectl get ingress
NAME HOSTS ADDRESS PORTS AGE
kerberus-<Release Name>-ingress * 123.1.2.3 80, 443 6m
NOTE: this is not a production ready deployment.
These charts can install or reuse a clusterIssuer
to generate certificates for the Project Kerberus ingress
. To do that:
- Install or make sure cert-manager is installed in the cluster.
- Enable the issuer in the charts. This will first check if there is a
letsencrypt
issuer already deployed in your cluster and deploy one if it doesn't exist.
To enable it you need to provide a valid email address in the chart's values:
issuer:
email: [email protected]
clusterIssuer: 'letsencrypt-prod'
By default, the charts use letsencrypt-staging
so in the above example we instruct helm to use the production issuer
instead.
Configuring a connection to an existing PostgreSQL instance is possible through the chart's values.
First create a yaml file with the configuration you want to override, for example kerberus-prod.yaml
:
postgresql:
enabled: false
host: <host>
global:
postgresql:
postgresqlUsername: <username>
postgresqlPassword: <password>
Now install the helm chart:
helm install -f kerberus-prod.yaml prod-kerberus .
The docker images used for the deployment can be configured through the charts values:
frontend:
image:
repository: <image-name>
tag: <image-tag>
backend:
image:
repository: <image-name>
tag: <image-tag>
lighthouse:
image:
repository: <image-name>
tag: <image-tag>
Create a docker-registry secret
kubectl create secret docker-registry <docker_registry_secret_name> # args
For private images on docker hub --docker-server can be set to docker.io
Reference the secret in your chart values
dockerRegistrySecretName: <docker_registry_secret_name>
To install the charts a specific namespace use --namespace <ns>
:
helm install -f my_values.yaml --namespace demos kerberus .
To deploy Project Kerberus with the pre-loaded demo data disable backend.demoData
:
helm install -f my_values.yaml --set backend.demoData=false kerberus .
For more customization options take a look at the values.local.yaml file.
Some resources created by these charts are meant to survive after upgrades and even after uninstalls. When troubleshooting these charts it can be useful to delete these resources between re-installs.
Secrets:
<release-name>-postgresql-certs -- contains the certificates used by the deployed PostgreSQL
Persistent volumes:
data-<release-name>-postgresql-0 -- this is the data volume used by PostgreSQL to store data and configuration
NOTE: this volume also stores the configuration for PostgreSQL which includes things like the password for the
postgres
user. This means that uninstalling and re-installing the charts withpostgres.enabled
set totrue
and auto generated passwords will fail. The solution is to delete this volume withkubectl delete pvc data-<release-name>-postgresql-0
ConfigMaps:
<release-name>-postgres-ca -- contains the generated CA certificate for PostgreSQL when `postgres` is enabled
If you are running a multi-platform Kubernetes service with Windows and Linux nodes then you will need to apply a nodeSelector
to the Helm chart to ensure that pods are scheduled onto the correct platform nodes.
Add the following to your Helm values file:
global:
nodeSelector:
kubernetes.io/os: linux
# If using Postgres Chart also add
postgresql:
master:
nodeSelector:
kubernetes.io/os: linux
slave:
nodeSelector:
kubernetes.io/os: linux
To uninstall Project Kerberus simply run:
RELEASE_NAME=<release-name> # use `helm list` to find out the name
helm uninstall ${RELEASE_NAME}
kubectl delete pvc data-${RELEASE_NAME}-postgresql-0
kubectl delete secret ${RELEASE_NAME}-postgresql-certs
kubectl delete configMap ${RELEASE_NAME}-postgres-ca