Skip to content

Commit

Permalink
Add EKS App Mesh install guide
Browse files Browse the repository at this point in the history
  • Loading branch information
stefanprodan committed Mar 20, 2019
1 parent d65be6e commit 71988a8
Show file tree
Hide file tree
Showing 3 changed files with 221 additions and 2 deletions.
2 changes: 1 addition & 1 deletion docs/gitbook/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description: Flagger is an Istio progressive delivery Kubernetes operator
# Introduction

[Flagger](https://github.com/weaveworks/flagger) is a **Kubernetes** operator that automates the promotion of canary
deployments using **Istio** routing for traffic shifting and **Prometheus** metrics for canary analysis.
deployments using **Istio** or **App Mesh** routing for traffic shifting and **Prometheus** metrics for canary analysis.
The canary analysis can be extended with webhooks for running
system integration/acceptance tests, load tests, or any other custom validation.

Expand Down
3 changes: 2 additions & 1 deletion docs/gitbook/SUMMARY.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,8 @@
## Install

* [Flagger Install on Kubernetes](install/flagger-install-on-kubernetes.md)
* [Flagger Install on Google Cloud](install/flagger-install-on-google-cloud.md)
* [Flagger Install on GKE Istio](install/flagger-install-on-google-cloud.md)
* [Flagger Install on EKS App Mesh](install/flagger-install-on-eks-appmesh.md)

## Usage

Expand Down
218 changes: 218 additions & 0 deletions docs/gitbook/install/flagger-install-on-eks-appmesh.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,218 @@
# Flagger install on AWS

This guide walks you through setting up Flagger and AWS App Mesh on EKS.

### App Mesh

The App Mesh integration with EKS is made out of the following components:

* Kubernetes custom resources
* `mesh.appmesh.k8s.aws` defines a logical boundary for network traffic between the services
* `virtualnode.appmesh.k8s.aws` defines a logical pointer to a Kubernetes workload
* `virtualservice.appmesh.k8s.aws` defines the routing rules for a workload inside the mesh
* CRD controller - keeps the custom resources in sync with the App Mesh control plane
* Admission controller - injects the Envoy sidecar and assigns Kubernetes pods to App Mesh virtual nodes
* Metrics server - Prometheus instance that collects and stores Envoy's metrics

Prerequisites:

* homebrew
* openssl
* kubectl
* AWS CLI (default region us-west-2)

### Create a Kubernetes cluster

In order to create an EKS cluster you can use [eksctl](https://eksctl.io).
Eksctl is an open source command-line utility made by Weaveworks in collaboration with Amazon,
it's written in Go and is based on EKS CloudFormation templates.

On MacOS you can install eksctl with Homebrew:

```bash
brew tap weaveworks/tap
brew install weaveworks/tap/eksctl
```

Create an EKS cluster:

```bash
eksctl create cluster --name=appmesh \
--region=us-west-2 \
--appmesh-access
```

The above command will create a two nodes cluster with App Mesh
[IAM policy](https://docs.aws.amazon.com/app-mesh/latest/userguide/MESH_IAM_user_policies.html)
attached to the EKS node instance role.

Verify the install with:

```bash
kubectl get nodes
```

### Install Helm

Install the [Helm](https://docs.helm.sh/using_helm/#installing-helm) command-line tool:

```text
brew install kubernetes-helm
```

Create a service account and a cluster role binding for Tiller:

```bash
kubectl -n kube-system create sa tiller

kubectl create clusterrolebinding tiller-cluster-rule \
--clusterrole=cluster-admin \
--serviceaccount=kube-system:tiller
```

Deploy Tiller in the `kube-system` namespace:

```bash
helm init --service-account tiller
```

You should consider using SSL between Helm and Tiller, for more information on securing your Helm
installation see [docs.helm.sh](https://docs.helm.sh/using_helm/#securing-your-helm-installation).

### Enable horizontal pod auto-scaling

Install the Horizontal Pod Autoscaler (HPA) metrics provider:

```bash
helm upgrade -i metrics-server stable/metrics-server \
--namespace kube-system
```

After a minute, the metrics API should report CPU and memory usage for pods.
You can very the metrics API with:

```bash
kubectl -n kube-system top pods
```

### Install the App Mesh components

Clone the config repo:

```bash
git clone https://github.com/stefanprodan/appmesh-eks
cd appmesh-eks
```

Create the `appmesh-system` namespace:

```bash
kubectl apply -f /namespaces/appmesh-system.yaml
```

Deploy the App Mesh Kubernetes CRDs and controller:

```bash
kubectl apply -f ./operator/
```

Install the App Mesh sidecar injector in the `appmesh-system` namespace:

```bash
./injector/install.sh
```

The above script generates a certificate signed by Kubernetes CA,
registers the App Mesh mutating webhook and deploys the injector.

Deploy Prometheus in the `appmesh-system` namespace:

```bash
kubectl apply -f ./prometheus
```

Create a mesh called global in the `appmesh-system` namespace:

```bash
kubectl apply -f ./appmesh/global.yaml
```

Verify that the global mesh is active:

```bash
kubectl -n appmesh-system describe mesh

Status:
Mesh Condition:
Status: True
Type: Active
```

### Install Flagger and Grafana

Add Flagger Helm repository:

```bash
helm repo add flagger https://flagger.app
```

Deploy Flagger in the _**appmesh-system**_ namespace:

```bash
helm upgrade -i flagger flagger/flagger \
--namespace=appmesh-system \
--set meshProvider=appmesh \
--set metricsServer=http://prometheus.appmesh:9090
```

You can install Flagger in any namespace as long as it can talk to the Istio Prometheus service on port 9090.

You can enable **Slack** notifications with:

```bash
helm upgrade -i flagger flagger/flagger \
--namespace=appmesh-system \
--set meshProvider=appmesh \
--set metricsServer=http://prometheus.appmesh:9090 \
--set slack.url=https://hooks.slack.com/services/YOUR/SLACK/WEBHOOK \
--set slack.channel=general \
--set slack.user=flagger
```

Flagger comes with a Grafana dashboard made for monitoring the canary analysis.
Deploy Grafana in the _**appmesh-system**_ namespace:

```bash
helm upgrade -i flagger-grafana flagger/grafana \
--namespace=appmesh-system \
--set url=http://prometheus.appmesh-system:9090 \
--set user=admin \
--set password=change-me
```

You can access Grafana using port forwarding:

```bash
kubectl -n appmesh-system port-forward svc/flagger-grafana 3000:3000
```

### Install the load tester

Flagger comes with an optional load testing service that generates traffic
during canary analysis when configured as a webhook.

Create a test namespace with sidecar injector enabled:

```bash
kubectl apply -f ./namespaces/test.yaml
```

Deploy the load test runner with Helm:

```bash
helm upgrade -i flagger-loadtester flagger/loadtester \
--namespace=test \
--set meshName=global.appmesh-system \
--set backends[0]=frontend.test \
--set backends[1]=backend.test
```

0 comments on commit 71988a8

Please sign in to comment.