From 40f1c51ec364229fed3df427bcf40ecfb3f97a87 Mon Sep 17 00:00:00 2001 From: Maxime Guyot Date: Thu, 31 Jan 2019 16:24:36 +0100 Subject: [PATCH] Add support for Packet with Terraform (#4043) * Add support for Packet with Terraform Co-Author: johnstudarus * removed advanced features to streamline * clarifying usage * Update README.md provide a better test to validate things are working OK * Update README.md clarifying what to set * minor wordsmithing * Fix admin cert path * clarifying how to configure keys * enabling kubeconfig_localhost pull over the configuration file via playbooks rather than the key files individually * Create output.tf * Add support for node specific plans --- contrib/terraform/packet/README.md | 231 ++++++++++++++++++ contrib/terraform/packet/hosts | 1 + contrib/terraform/packet/kubespray.tf | 62 +++++ contrib/terraform/packet/output.tf | 15 ++ .../packet/sample-inventory/cluster.tf | 27 ++ .../packet/sample-inventory/group_vars | 1 + contrib/terraform/packet/variables.tf | 56 +++++ contrib/terraform/terraform.py | 41 ++++ 8 files changed, 434 insertions(+) create mode 100644 contrib/terraform/packet/README.md create mode 120000 contrib/terraform/packet/hosts create mode 100644 contrib/terraform/packet/kubespray.tf create mode 100644 contrib/terraform/packet/output.tf create mode 100644 contrib/terraform/packet/sample-inventory/cluster.tf create mode 120000 contrib/terraform/packet/sample-inventory/group_vars create mode 100644 contrib/terraform/packet/variables.tf diff --git a/contrib/terraform/packet/README.md b/contrib/terraform/packet/README.md new file mode 100644 index 000000000..4cc244815 --- /dev/null +++ b/contrib/terraform/packet/README.md @@ -0,0 +1,231 @@ +# Kubernetes on Packet with Terraform + +Provision a Kubernetes cluster with [Terraform](https://www.terraform.io) on +[Packet](https://www.packet.com). + +## Status + +This will install a Kubernetes cluster on Packet bare metal. It should work in all locations and on most server types. + +## Approach +The terraform configuration inspects variables found in +[variables.tf](variables.tf) to create resources in your Packet project. +There is a [python script](../terraform.py) that reads the generated`.tfstate` +file to generate a dynamic inventory that is consumed by [cluster.yml](../../..//cluster.yml) +to actually install Kubernetes with Kubespray. + +### Kubernetes Nodes +You can create many different kubernetes topologies by setting the number of +different classes of hosts. +- Master nodes with etcd: `number_of_k8s_masters` variable +- Master nodes without etcd: `number_of_k8s_masters_no_etcd` variable +- Standalone etcd hosts: `number_of_etcd` variable +- Kubernetes worker nodes: `number_of_k8s_nodes` variable + +Note that the Ansible script will report an invalid configuration if you wind up +with an *even number* of etcd instances since that is not a valid configuration. This +restriction includes standalone etcd nodes that are deployed in a cluster along with +master nodes with etcd replicas. As an example, if you have three master nodes with +etcd replicas and three standalone etcd nodes, the script will fail since there are +now six total etcd replicas. + +## Requirements + +- [Install Terraform](https://www.terraform.io/intro/getting-started/install.html) +- Install dependencies: `sudo pip install -r requirements.txt` +- Account with Packet Host +- An SSH key pair + +## SSH Key Setup + +An SSH keypair is required so Ansible can access the newly provisioned nodes (bare metal Packet hosts). By default, the public SSH key defined in cluster.tf will be installed in authorized_key on the newly provisioned nodes (~/.ssh/id_rsa.pub). Terraform will upload this public key and then it will be distributed out to all the nodes. If you have already set this public key in Packet (i.e. via the portal), then set the public keyfile name in cluster.tf to blank to prevent the duplicate key from being uploaded which will cause an error. + +If you don't already have a keypair generated (~/.ssh/id_rsa and ~/.ssh/id_rsa.pub), then a new keypair can be generated with the command: + +```ShellSession +ssh-keygen -f ~/.ssh/id_rsa +``` + +## Terraform +Terraform will be used to provision all of the Packet resources with base software as appropriate. + +### Configuration + +#### Inventory files + +Create an inventory directory for your cluster by copying the existing sample and linking the `hosts` script (used to build the inventory based on Terraform state): + +```ShellSession +$ cp -LRp contrib/terraform/packet/sample-inventory inventory/$CLUSTER +$ cd inventory/$CLUSTER +$ ln -s ../../contrib/terraform/packet/hosts +``` + +This will be the base for subsequent Terraform commands. + +#### Packet API access + +Your Packet API key must be available in the `PACKET_AUTH_TOKEN` environment variable. +This key is typically stored outside of the code repo since it is considered secret. +If someone gets this key, they can startup/shutdown hosts in your project! + +For more information on how to generate an API key or find your project ID, please see: +https://support.packet.com/kb/articles/api-integrations + +The Packet Project ID associated with the key will be set later in cluster.tf. + +For more information about the API, please see: +https://www.packet.com/developers/api/ + +Example: +```ShellSession +$ export PACKET_AUTH_TOKEN="Example-API-Token" +``` + +Note that to deploy several clusters within the same project you need to use [terraform workspace](https://www.terraform.io/docs/state/workspaces.html#using-workspaces). + +#### Cluster variables +The construction of the cluster is driven by values found in +[variables.tf](variables.tf). + +For your cluster, edit `inventory/$CLUSTER/cluster.tf`. + +The `cluster_name` is used to set a tag on each server deployed as part of this cluster. +This helps when identifying which hosts are associated with each cluster. + +While the defaults in variables.tf will successfully deploy a cluster, it is recommended to set the following values: + +* cluster_name = the name of the inventory directory created above as $CLUSTER +* packet_project_id = the Packet Project ID associated with the Packet API token above + +#### Enable localhost access +Kubespray will pull down a Kubernetes configuration file to access this cluster by enabling the +`kubeconfig_localhost: true` in the Kubespray configuration. + +Edit `inventory/$CLUSTER/group_vars/k8s-cluster/k8s-cluster.yml` and comment back in the following line and change from `false` to `true`: +`\# kubeconfig_localhost: false` +becomes: +`kubeconfig_localhost: true` + +Once the Kubespray playbooks are run, a Kubernetes configuration file will be written to the local host at `inventory/$CLUSTER/artifacts/admin.conf` + +#### Terraform state files + +In the cluster's inventory folder, the following files might be created (either by Terraform +or manually), to prevent you from pushing them accidentally they are in a +`.gitignore` file in the `terraform/packet` directory : + +* `.terraform` +* `.tfvars` +* `.tfstate` +* `.tfstate.backup` + +You can still add them manually if you want to. + +### Initialization + +Before Terraform can operate on your cluster you need to install the required +plugins. This is accomplished as follows: + +```ShellSession +$ cd inventory/$CLUSTER +$ terraform init ../../contrib/terraform/packet +``` + +This should finish fairly quickly telling you Terraform has successfully initialized and loaded necessary modules. + +### Provisioning cluster +You can apply the Terraform configuration to your cluster with the following command +issued from your cluster's inventory directory (`inventory/$CLUSTER`): +```ShellSession +$ terraform apply -var-file=cluster.tf ../../contrib/terraform/packet +$ export ANSIBLE_HOST_KEY_CHECKING=False +$ ansible-playbook -i hosts ../../cluster.yml +``` + +### Destroying cluster +You can destroy your new cluster with the following command issued from the cluster's inventory directory: + +```ShellSession +$ terraform destroy -var-file=cluster.tf ../../contrib/terraform/packet +``` + +If you've started the Ansible run, it may also be a good idea to do some manual cleanup: + +* remove SSH keys from the destroyed cluster from your `~/.ssh/known_hosts` file +* clean up any temporary cache files: `rm /tmp/$CLUSTER-*` + +### Debugging +You can enable debugging output from Terraform by setting `TF_LOG` to `DEBUG` before running the Terraform command. + +## Ansible + +### Node access + +#### SSH + +Ensure your local ssh-agent is running and your ssh key has been added. This +step is required by the terraform provisioner: + +``` +$ eval $(ssh-agent -s) +$ ssh-add ~/.ssh/id_rsa +``` + +If you have deployed and destroyed a previous iteration of your cluster, you will need to clear out any stale keys from your SSH "known hosts" file ( `~/.ssh/known_hosts`). + +#### Test access + +Make sure you can connect to the hosts. Note that Container Linux by CoreOS will have a state `FAILED` due to Python not being present. This is okay, because Python will be installed during bootstrapping, so long as the hosts are not `UNREACHABLE`. + +``` +$ ansible -i inventory/$CLUSTER/hosts -m ping all +example-k8s_node-1 | SUCCESS => { + "changed": false, + "ping": "pong" +} +example-etcd-1 | SUCCESS => { + "changed": false, + "ping": "pong" +} +example-k8s-master-1 | SUCCESS => { + "changed": false, + "ping": "pong" +} +``` + +If it fails try to connect manually via SSH. It could be something as simple as a stale host key. + +### Deploy Kubernetes + +``` +$ ansible-playbook --become -i inventory/$CLUSTER/hosts cluster.yml +``` + +This will take some time as there are many tasks to run. + +## Kubernetes + +### Set up kubectl + +* [Install kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl/) on the localhost. + +* Verify that Kubectl runs correctly +``` +kubectl version +``` + +* Verify that the Kubernetes configuration file has been copied over +``` +cat inventory/alpha/$CLUSTER/admin.conf +``` + +* Verify that all the nodes are running correctly. +``` +kubectl version +kubectl --kubeconfig=inventory/$CLUSTER/artifacts/admin.conf get nodes +``` + +## What's next + +Try out your new Kubernetes cluster with the [Hello Kubernetes service](https://kubernetes.io/docs/tasks/access-application-cluster/service-access-application-cluster/). diff --git a/contrib/terraform/packet/hosts b/contrib/terraform/packet/hosts new file mode 120000 index 000000000..804b6fa60 --- /dev/null +++ b/contrib/terraform/packet/hosts @@ -0,0 +1 @@ +../terraform.py \ No newline at end of file diff --git a/contrib/terraform/packet/kubespray.tf b/contrib/terraform/packet/kubespray.tf new file mode 100644 index 000000000..0f584d624 --- /dev/null +++ b/contrib/terraform/packet/kubespray.tf @@ -0,0 +1,62 @@ +# Configure the Packet Provider +provider "packet" { +} + +resource "packet_ssh_key" "k8s" { + count = "${var.public_key_path != "" ? 1 : 0}" + name = "kubernetes-${var.cluster_name}" + public_key = "${chomp(file(var.public_key_path))}" +} + +resource "packet_device" "k8s_master" { + depends_on = ["packet_ssh_key.k8s"] + + count = "${var.number_of_k8s_masters}" + hostname = "${var.cluster_name}-k8s-master-${count.index+1}" + plan = "${var.plan_k8s_masters}" + facility = "${var.facility}" + operating_system = "${var.operating_system}" + billing_cycle = "${var.billing_cycle}" + project_id = "${var.packet_project_id}" + tags = ["cluster-${var.cluster_name}", "k8s-cluster", "kube-master", "etcd", "kube-node"] + +} + +resource "packet_device" "k8s_master_no_etcd" { + depends_on = ["packet_ssh_key.k8s"] + + count = "${var.number_of_k8s_masters_no_etcd}" + hostname = "${var.cluster_name}-k8s-master-${count.index+1}" + plan = "${var.plan_k8s_masters_no_etcd}" + facility = "${var.facility}" + operating_system = "${var.operating_system}" + billing_cycle = "${var.billing_cycle}" + project_id = "${var.packet_project_id}" + tags = ["cluster-${var.cluster_name}", "k8s-cluster", "kube-master"] +} + +resource "packet_device" "k8s_etcd" { + depends_on = ["packet_ssh_key.k8s"] + + count = "${var.number_of_etcd}" + hostname = "${var.cluster_name}-etcd-${count.index+1}" + plan = "${var.plan_etcd}" + facility = "${var.facility}" + operating_system = "${var.operating_system}" + billing_cycle = "${var.billing_cycle}" + project_id = "${var.packet_project_id}" + tags = ["cluster-${var.cluster_name}", "etcd"] +} + +resource "packet_device" "k8s_node" { + depends_on = ["packet_ssh_key.k8s"] + + count = "${var.number_of_k8s_nodes}" + hostname = "${var.cluster_name}-k8s-node-${count.index+1}" + plan = "${var.plan_k8s_nodes}" + facility = "${var.facility}" + operating_system = "${var.operating_system}" + billing_cycle = "${var.billing_cycle}" + project_id = "${var.packet_project_id}" + tags = ["cluster-${var.cluster_name}", "k8s-cluster", "kube-node"] +} diff --git a/contrib/terraform/packet/output.tf b/contrib/terraform/packet/output.tf new file mode 100644 index 000000000..89e78800d --- /dev/null +++ b/contrib/terraform/packet/output.tf @@ -0,0 +1,15 @@ +output "k8s_masters" { + value = "${packet_device.k8s_master.*.access_public_ipv4}" +} + +output "k8s_masters_no_etc" { + value = "${packet_device.k8s_master_no_etcd.*.access_public_ipv4}" +} + +output "k8s_etcds" { + value = "${packet_device.k8s_etcd.*.access_public_ipv4}" +} + +output "k8s_nodes" { + value = "${packet_device.k8s_node.*.access_public_ipv4}" +} diff --git a/contrib/terraform/packet/sample-inventory/cluster.tf b/contrib/terraform/packet/sample-inventory/cluster.tf new file mode 100644 index 000000000..2629b97e7 --- /dev/null +++ b/contrib/terraform/packet/sample-inventory/cluster.tf @@ -0,0 +1,27 @@ +# your Kubernetes cluster name here +cluster_name = "mycluster" + +# Your Packet project ID. See https://support.packet.com/kb/articles/api-integrations +packet_project_id = "Example-API-Token" + +# The public SSH key to be uploaded into authorized_keys in bare metal Packet nodes provisioned +# leave this value blank if the public key is already setup in the Packet project +# Terraform will complain if the public key is setup in Packet +public_key_path = "~/.ssh/id_rsa.pub" + +# cluster location +facility = "dfw2" + +# standalone etcds +number_of_etcd = 0 +plan_etcd = "c2.medium.x86" + +# masters +number_of_k8s_masters = 1 +number_of_k8s_masters_no_etcd = 0 +plan_k8s_masters = "c2.medium.x86" +plan_k8s_masters_no_etcd = "c2.medium.x86" + +# nodes +number_of_k8s_nodes = 2 +plan_k8s_nodes = "c2.medium.x86" diff --git a/contrib/terraform/packet/sample-inventory/group_vars b/contrib/terraform/packet/sample-inventory/group_vars new file mode 120000 index 000000000..373595823 --- /dev/null +++ b/contrib/terraform/packet/sample-inventory/group_vars @@ -0,0 +1 @@ +../../../../inventory/sample/group_vars \ No newline at end of file diff --git a/contrib/terraform/packet/variables.tf b/contrib/terraform/packet/variables.tf new file mode 100644 index 000000000..e71b78bbf --- /dev/null +++ b/contrib/terraform/packet/variables.tf @@ -0,0 +1,56 @@ +variable "cluster_name" { + default = "kubespray" +} + +variable "packet_project_id" { + description = "Your Packet project ID. See https://support.packet.com/kb/articles/api-integrations" +} + +variable "operating_system" { + default = "ubuntu_16_04" +} + +variable "public_key_path" { + description = "The path of the ssh pub key" + default = "~/.ssh/id_rsa.pub" +} + +variable "billing_cycle" { + default = "hourly" +} + +variable "facility" { + default = "dfw2" +} + +variable "plan_k8s_masters" { + default = "c2.medium.x86" +} + +variable "plan_k8s_masters_no_etcd" { + default = "c2.medium.x86" +} + +variable "plan_etcd" { + default = "c2.medium.x86" +} + +variable "plan_k8s_nodes" { + default = "c2.medium.x86" +} + +variable "number_of_k8s_masters" { + default = 0 +} + +variable "number_of_k8s_masters_no_etcd" { + default = 0 +} + +variable "number_of_etcd" { + default = 0 +} + +variable "number_of_k8s_nodes" { + default = 0 +} diff --git a/contrib/terraform/terraform.py b/contrib/terraform/terraform.py index 6fb176603..4740a7df5 100755 --- a/contrib/terraform/terraform.py +++ b/contrib/terraform/terraform.py @@ -218,6 +218,47 @@ def triton_machine(resource, module_name): return name, attrs, groups +@parses('packet_device') +def packet_device(resource, tfvars=None): + raw_attrs = resource['primary']['attributes'] + name = raw_attrs['hostname'] + groups = [] + + attrs = { + 'id': raw_attrs['id'], + 'facility': raw_attrs['facility'], + 'hostname': raw_attrs['hostname'], + 'operating_system': raw_attrs['operating_system'], + 'locked': parse_bool(raw_attrs['locked']), + 'tags': parse_list(raw_attrs, 'tags'), + 'plan': raw_attrs['plan'], + 'project_id': raw_attrs['project_id'], + 'state': raw_attrs['state'], + # ansible + 'ansible_ssh_host': raw_attrs['network.0.address'], + 'ansible_ssh_user': 'root', # it's always "root" on Packet + # generic + 'ipv4_address': raw_attrs['network.0.address'], + 'public_ipv4': raw_attrs['network.0.address'], + 'ipv6_address': raw_attrs['network.1.address'], + 'public_ipv6': raw_attrs['network.1.address'], + 'private_ipv4': raw_attrs['network.2.address'], + 'provider': 'packet', + } + + # add groups based on attrs + groups.append('packet_facility=' + attrs['facility']) + groups.append('packet_operating_system=' + attrs['operating_system']) + groups.append('packet_locked=%s' % attrs['locked']) + groups.append('packet_state=' + attrs['state']) + groups.append('packet_plan=' + attrs['plan']) + + # groups specific to kubespray + groups = groups + attrs['tags'] + + return name, attrs, groups + + @parses('digitalocean_droplet') @calculate_mantl_vars def digitalocean_host(resource, tfvars=None):