dtzar / azure-managed-cluster-capz-helm

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CAPI Azure

Prerequisites

Prerequisites Installations

Docker Desktop https://www.docker.com/products/docker-desktop

Install Kind

curl -Lo ./kind https://kind.sigs.k8s.io/dl/v0.11.1/kind-linux-amd64
chmod +x ./kind
mv ./kind /usr/local/bin/kind

Install Clusterctl

curl -L https://github.com/kubernetes-sigs/cluster-api/releases/download/v0.4.4/clusterctl-linux-amd64 -o clusterctl
chmod +x ./clusterctl
sudo mv ./clusterctl /usr/local/bin/clusterctl
clusterctl version

Install Helm3

curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3
chmod 700 get_helm.sh
./get_helm.sh

Deploy

Clone this repo

git clone https://github.com/ams0/azure-managed-cluster-capz-helm.git
cd azure-managed-cluster-capz-helm

Create an Azure Service Principal

az ad sp create-for-rbac -n "capz" --role Contributor

Save outuput of this command somewhere. AppId is the AZURE_CLIENT_ID used on the next step, and Password is the CLIENT_SECRET

Create and Update Environment variables Edit your ~/.bashrc file to include Azure Service Principal environment variables or just export on your current terminal session

export AZURE_CLIENT_ID=""

export AZURE_CLIENT_SECRET=""

export AZURE_SUBSCRIPTION_ID=""

export AZURE_TENANT_ID=""

Load Environment variables

source clusterctl.env

Create a KIND cluster:

kind create cluster --name capi-helm

Identity: Two ways to authenticate to Azure, using a Service Principal or Managed Identity.

use a Service Principal:

Create a secret to include the password of the Service Principal identity created in Azure This secret will be referenced by the AzureClusterIdentity used by the AzureCluster

kubectl create secret generic "${AZURE_CLUSTER_IDENTITY_SECRET_NAME}" --from-literal=clientSecret="${AZURE_CLIENT_SECRET}"

Use Managed Identity(recommended):

Initialize Cluster API and install Azure CAPZ provider version v1.13.1(uses v1beta1 capi)

clusterctl init --infrastructure azure

Deploy a cluster with Helm (please customize parameters as required)

Using Service Principal:

helm install capz1 charts/azure-managed-cluster/  \
--namespace default \
--set subscriptionID="${AZURE_SUBSCRIPTION_ID}" \
--set identity.clientId="${AZURE_CLIENT_ID}" \
--set identity.clientSecret="${AZURE_CLIENT_SECRET}" \
--set identity.type=ServicePrincipal \
--set identity.tenantId="${AZURE_TENANT_ID}" \
--set cluster.resourceGroupName=aksclusters \
--set cluster.nodeResourceGroupName=capz1 \
--set cluster.name=aks1 \
--set agentpools.agentpool0.name=capz1np0 \
--set agentpools.agentpool0.nodecount=1 \
--set agentpools.agentpool0.sku=Standard_B4ms \
--set agentpools.agentpool0.osDiskSizeGB=100 \
--set agentpools.agentpool0.mode=System \
--set agentpools.agentpool1.name=capz1np1 \
--set agentpools.agentpool1.nodecount=1 \
--set agentpools.agentpool1.sku=Standard_B4ms \
--set agentpools.agentpool1.osDiskSizeGB=10 \
--set agentpools.agentpool1.mode=User 

or more simply (after you edit the values file with your own values):

helm install capz1 charts/azure-managed-cluster/ --values aks1.yaml \
--namespace default \
--set controlplane.sshPublicKey="$(cat ~/.ssh/id_rsa.pub)" \
--set subscriptionID="${AZURE_SUBSCRIPTION_ID}" \
--set identity.clientID="${AZURE_CLIENT_ID}" \
--set identity.tenantID="${AZURE_TENANT_ID}" \
--set identity.clientSecret="${AZURE_CLIENT_SECRET}" \
--set identity.type=ServicePrincipal 

Using Managed Identity

NB: Ensure the AZURE_USER_ASSIGNED_IDENTITY_RESOURCE_ID is set by getting the resource id of the managed identity created in Azure

helm install capz1 charts/azure-managed-cluster/  \
--namespace default \
--set subscriptionID="${AZURE_SUBSCRIPTION_ID}" \
--set identity.clientID="${AZURE_CLIENT_ID}" \
--set identity.tenantID="${AZURE_TENANT_ID}" \
--set identity.type=UserAssignedMSI \
--set identity.resourceID="${AZURE_USER_ASSIGNED_IDENTITY_RESOURCE_ID}" 



Check the status with:

kubectl get cluster-api kubectl logs -n capz-system -l control-plane=capz-controller-manager -c manager -f


Get the credentials

kubectl get secret capi-helm-kubeconfig -o yaml -o jsonpath={.data.value} | base64 --decode > aks1.kubeconfig


Test the cluster!

kubectl --kubeconfig=aks1.kubeconfig cluster-info


Deploy a second cluster
Create second namespace
```bash
kubectl create namespace default2
helm install capz2 charts/azure-managed-cluster/  \
--namespace default2 \
--set subscriptionID="${AZURE_SUBSCRIPTION_ID}" \
--set identity.clientID="${AZURE_CLIENT_ID}" \
--set identity.tenantID="${AZURE_TENANT_ID}" \]=
--set cluster.resourceGroupName=aksclusters \
--set cluster.nodeResourceGroupName=capz2 \
--set cluster.name=aks2 \
--set controlplane.sshPublicKey="$(cat ~/.ssh/id_rsa.pub)" \
--set agentpools.0.name=capz2np0 \
--set agentpools.0.nodecount=1 \
--set agentpools.0.sku=Standard_B2s \
--set agentpools.0.osDiskSizeGB=100 \
--set agentpools.0.mode=System \
--set agentpools.1.name=capz2np1 \
--set agentpools.1.nodecount=1 \
--set agentpools.1.sku=Standard_B2s \
--set agentpools.1.osDiskSizeGB=10 \
--set agentpools.1.mode=User 

or more simply (after you edit the values file with your own values):

helm install capz2 charts/azure-managed-cluster/ --values aks2.yaml \
--namespace default2 \
--set controlplane.sshPublicKey="$(cat ~/.ssh/id_rsa.pub)" \
--set subscriptionID="${AZURE_SUBSCRIPTION_ID}" \
--set identity.clientID="${AZURE_CLIENT_ID}" \
--set identity.tenantID"${AZURE_TENANT_ID}" 

Clean up:

helm delete capz1
helm delete capz2 -n default2
kubectl delete namespace default2

kind delete clusters capi
kind delete clusters capi-helm

About

License:Apache License 2.0


Languages

Language:Smarty 100.0%