Platform v7.8-Deployment Process

Contents

  1. Overview
  2. Existing Environment Migration Using SmartPkg
    1. Smartpkg Installation in bastion
    2. kubeseal Installation in Bastion Machine
    3. Sealed Secret Controller Installation
    4. Generate sealed secret from the existing secret
    5. Take a backup for all the helm manifests
    6. Delete helm releases
  3. Application Deployment
    1. Create product and env files
    2. Create or update new sealed-secret
    3. Secret Additions As per Release
      1. Platform 7.8
    4. Deploy Core Platform package

Overview

SmartOps product deployment configuration has been revised to support better flexibility and configuration. Products will be packaged in new format referred as “Smart package” and will be deployable using tool “smartpkg”. This document covers instructions to migrate existing environment configuration to new format and installation of core-platform 7.8.1 using new mechanism. Same set of instructions can be followed hereafter except the migration steps, which applies only for first time.

Existing Environment Migration Using SmartPkg

Smartpkg Installation in bastion

Smartpkg is a python-based tool to help managing and deploying smartops Product packages based on helm charts. This is a prerequisite to deploy smartOps products. SmartPkg should be installed in machine from where the Kubernetes deployment happens which is usually a bastion machine.

Below are the pre-requisites for installing smartpkg 

Installation Steps

  1. Login to the machine you want to install smartpkg 

  2. Execute => sudo apt-get install python3-pip

  3. Execute => python3 -m pip install ConfigArgParse wheel pyyaml jsonschema

  4. Execute => python3 -m pip install smartpkg==0.0.11 -i https://3thxl5c3tscnjmg3cxjwmc2lnw2i7gwtug7xookemzo6mmrutzcq@pkgs.dev.azure.com/USTInnovationEngineering/SmartOps/_packaging/python-lib/pypi/simple  --  

  5. Verify the installation by => smartpkg –help

Note: If smartpkg: command not found error shows up, logout and login or open a new session. 

kubeseal Installation in Bastion Machine

 

Sealed Secret Controller Installation

Reference Link: https://github.com/bitnami-labs/sealed-secrets#installation

 

 

Generate sealed secret from the existing secret

Take a backup for all the helm manifests

 

Delete helm releases

 

Application Deployment

Create product and env files

 

Picture 3

For References

Create or update new sealed-secret

 

Picture 14

Note - for updating new secrets follow the same steps above and update sealed-secrets block in env.yaml and redeploy.

 

Secret Additions As per Release

Platform 7.8

<namespace>-rhub-adapters-rabbitmq-amqp-password with value “pqmaqmtibbar”

<namespace>-rhub-adapters-rabbitmq-amqp-username with value “rabbitmq_amqp”

<namespace>-app-to-app-clones-password with value “M@$terClones”

<namespace>-app-to-app-clones-username with value “clones”

<namespace>-app-to-app-ihub-password with value “M@$terIhub”

<namespace>-app-to-app-ihub-username with value “ihub”

<namespace>-rhub-adapters-api-agent-password with value “tnegaipa”

<namespace>-rhub-adapters-api-agent-username with value “api_agent”

 

Deploy Core Platform package

Run the smartpkg deploy command from the path where values folder and product.yaml file are present.

smartpkg clean,deploy --kubeContext <kubeconfig> --jfrogUser ${JFROG_USERNAME}