Skip to content
This repository has been archived by the owner on Dec 21, 2023. It is now read-only.

Provide keptn support for PKS (Pivotal/VMWare) #5

Closed
5 tasks done
AloisReitbauer opened this issue Feb 12, 2019 · 4 comments
Closed
5 tasks done

Provide keptn support for PKS (Pivotal/VMWare) #5

AloisReitbauer opened this issue Feb 12, 2019 · 4 comments
Assignees
Labels
doc documentation

Comments

@AloisReitbauer
Copy link
Member

AloisReitbauer commented Feb 12, 2019

To close this issue, following tasks need to be completed:

Documentation on keptn.sh:

CLI / Installer support:

Testing the new feature:

  • keptn install -p=pks
@AloisReitbauer AloisReitbauer added the doc documentation label Feb 12, 2019
@johannes-b johannes-b self-assigned this Jun 6, 2019
@johannes-b
Copy link
Member

johannes-b commented Jun 7, 2019

Installation process:

  • the keptn/installer repos has a branch: feature/5/install-pks
    • difference to develop branch: Installation of Istio 1.1.3
  • the branch feature/5/install-pks was used to install keptn on the PKS cluster: my-cluster
    • added the property "gclouduser" to the creds.json file
    • executed: ./installKepnt.sh

Current status:

  • keptn auth works, meaning that we can connect to the keptn control component
  • keptn configure fails. The reason is that Knative evening does not work. Even though the control component receives the event and sends it to the keptn-channel, the dispatcher in the knative-eventing namespace does not forward it. (consequently, the github-service does not receive it.)

Next steps:

  • We need to get Knative eventing running.
  • Maybe Istio 1.1.3 is too new.

@johannes-b
Copy link
Member

johannes-b commented Jun 7, 2019

Hmm, after re-installing Istio and Knative, the dispatcher now receives the event.

However, it runs into an error:
kubectl logs in-memory-channel-dispatcher-8595c7f8d7-xqzgc -n knative-eventing-c dispatcher

{"level":"info","ts":1559908738.6197615,"caller":"provisioners/message_receiver.go:118","msg":"Received request for keptn-channel.keptn.channels.cluster.local"}
{"level":"info","ts":1559908738.6199577,"caller":"provisioners/message_dispatcher.go:104","msg":"Dispatching message to http://github-service.keptn.svc.cluster.local/"}
{"level":"error","ts":1559908768.6204684,"caller":"fanout/fanout_handler.go:118","msg":"Fanout had an error","error":"Unable to complete request Post http://github-service.keptn.svc.cluster.local/: dial tcp 10.100.200.24:80: i/o timeout","stacktrace":"github.com/knative/eventing/pkg/sidecar/fanout.(*Handler).dispatch\n\t/go/src/github.com/knative/eventing/pkg/sidecar/fanout/fanout_handler.go:118\ngithub.com/knative/eventing/pkg/sidecar/fanout.createReceiverFunction.func1\n\t/go/src/github.com/knative/eventing/pkg/sidecar/fanout/fanout_handler.go:96\ngithub.com/knative/eventing/pkg/provisioners.(*MessageReceiver).HandleRequest\n\t/go/src/github.com/knative/eventing/pkg/provisioners/message_receiver.go:134\ngithub.com/knative/eventing/pkg/sidecar/fanout.(*Handler).ServeHTTP\n\t/go/src/github.com/knative/eventing/pkg/sidecar/fanout/fanout_handler.go:101\ngithub.com/knative/eventing/pkg/sidecar/multichannelfanout.(*Handler).ServeHTTP\n\t/go/src/github.com/knative/eventing/pkg/sidecar/multichannelfanout/multi_channel_fanout_handler.go:128\ngithub.com/knative/eventing/pkg/sidecar/swappable.(*Handler).ServeHTTP\n\t/go/src/github.com/knative/eventing/pkg/sidecar/swappable/swappable.go:105\nnet/http.serverHandler.ServeHTTP\n\t/root/sdk/go1.12rc1/src/net/http/server.go:2774\nnet/http.(*conn).serve\n\t/root/sdk/go1.12rc1/src/net/http/server.go:1878"}

Instructions to address this problem are provided here: https://knative.dev/v0.4-docs/eventing/debugging/ at the end of the page.

I will continue working on that issue on Tuesday.

@johannes-b johannes-b reopened this Jun 7, 2019
@johannes-b
Copy link
Member

johannes-b commented Jun 11, 2019

The issue is that the isio-proxy is missing. see

Now I try it with Istio 1.0.6

To configuring outbound network access for Knative: set istio.sidecar.includeOutboundIPRanges: '10.200.0.0/16,10.100.200.0/24' in configmap config-network see docu here

And keptn works!! YEAH !!

@johannes-b
Copy link
Member

johannes-b commented Jun 11, 2019

Summary:

  • checkout branch: feature/5/install-pks

  • go to ./install/scripts/

  • provide a creds.json with values for (1), (2), (3), (4) and (5):

    {
      "jenkinsUser": "admin",
      "jenkinsPassword": "AiTx4u8VyUV8tCKk",
      "githubUserName": "**(1)**",
      "githubPersonalAccessToken": "**(2)**",
      "githubUserEmail": "**(3)**",
      "githubOrg": "**(4)**",
      "clusteripv4cidr": "10.200.0.0/16",
      "serveripv4cidr": "10.100.200.0/24",
      "gclouduser": "**(5)**"
    }
    
  • execute ./installKeptn.sh

  • go to your Jenkins and click the Save button as explained at point Important

  • go to onboarding a service use case to find instructions for:

    • keptn auth --endpoint=**** --api-token=****
    • keptn configure --org=***** --user=***** --token=***********
  • go to onboarding a service use case to find instructions for:

    • keptn create project sockshop shipyard.yaml
    • keptn onboard service --project=sockshop --values=values_carts.yaml
    • keptn onboard service --project=sockshop --values=values_carts_db.yaml --deployment=deployment_carts_db.yaml --service=service_carts_db.yaml
  • Finally, trigger deployment with: keptn send event new-artifact --project=sockshop --service=carts --image=docker.io/keptnexamples/carts --tag=0.7.1

Note If it fails due to following error:

error: unable to recognize "https://github.com/knative/serving/releases/download/v0.4.0/serving.yaml": no matches for kind "Image" in version "caching.internal.knative.dev/v1alpha1"
[keptn|ERROR] [2019-06-11 15:12:19] Applying knative serving components failed.
[keptn|ERROR] [2019-06-11 15:12:19] Stopping keptn installation. Already created resources are not deleted; execute the uninstallKeptn.sh script to clean-up.

then comment out the line kubectl create clusterrolebinding keptn-cluster-admin-binding --clusterrole=cluster-admin --user=$GCLOUD_USER in ./installKeptn.sh and re-run the ./installKeptn.sh script.

Note If helm-service runs into the error: Error: Unauthorized
then delete tiller-deploy pod:

kubectl get pods -n kube-system
kubectl delete pod tiller-deploy-xxxxx-xxxxx -n kube-system

@dirkwall dirkwall added this to the sprint7 milestone Jun 19, 2019
@dirkwall dirkwall removed this from the sprint7 milestone Jul 4, 2019
@johannes-b johannes-b reopened this Oct 4, 2019
johannes-b added a commit that referenced this issue Oct 7, 2019
johannes-b added a commit that referenced this issue Oct 7, 2019
johannes-b added a commit that referenced this issue Oct 9, 2019
johannes-b added a commit that referenced this issue Oct 14, 2019
#5 Implementation of PKS support in Keptn CLI
agrimmer pushed a commit that referenced this issue Jan 21, 2020
agrimmer pushed a commit that referenced this issue Jan 21, 2020
agrimmer pushed a commit that referenced this issue Jan 21, 2020
agrimmer pushed a commit that referenced this issue Jan 21, 2020
#5 Implementation of PKS support in Keptn CLI
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
doc documentation
Projects
None yet
Development

No branches or pull requests

4 participants