- Notifications
You must be signed in to change notification settings - Fork928
example: Add Kubernetes multi-service#1092
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
Uh oh!
There was an error while loading.Please reload this page.
Changes fromall commits
File filter
Filter by extension
Conversations
Uh oh!
There was an error while loading.Please reload this page.
Jump to
Uh oh!
There was an error while loading.Please reload this page.
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
--- | ||
name:Develop multiple services in Kubernetes | ||
description:Get started with Kubernetes development. | ||
tags:[cloud, kubernetes] | ||
--- | ||
#Authentication | ||
This template has several ways to authenticate to a Kubernetes cluster. | ||
##kubeconfig (Coder host) | ||
If the Coder host has a local`~/.kube/config`, this can be used to authenticate with Coder. Make sure this is on the same user running the`coder` service. | ||
##ServiceAccount | ||
Create a ServiceAccount and role on your cluster to authenticate your template with Coder. | ||
1. Run the following command on a device with Kubernetes context: | ||
```sh | ||
CODER_NAMESPACE=default | ||
kubectl apply -n$CODER_NAMESPACE -f -<<EOF | ||
apiVersion: v1 | ||
kind: ServiceAccount | ||
metadata: | ||
name: coder | ||
--- | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: Role | ||
metadata: | ||
name: coder | ||
rules: | ||
- apiGroups: ["", "apps", "networking.k8s.io"] # "" indicates the core API group | ||
resources: ["persistentvolumeclaims", "pods", "deployments", "services", "secrets", "pods/exec","pods/log", "events", "networkpolicies", "serviceaccounts"] | ||
verbs: ["create", "get", "list", "watch", "update", "patch", "delete", "deletecollection"] | ||
- apiGroups: ["metrics.k8s.io", "storage.k8s.io"] | ||
resources: ["pods", "storageclasses"] | ||
verbs: ["get", "list", "watch"] | ||
--- | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: RoleBinding | ||
metadata: | ||
name: coder | ||
subjects: | ||
- kind: ServiceAccount | ||
name: coder | ||
roleRef: | ||
kind: Role | ||
name: coder | ||
apiGroup: rbac.authorization.k8s.io | ||
EOF | ||
``` | ||
1. Use the following commands to fetch the values: | ||
**Cluster IP:** | ||
```sh | ||
kubectl cluster-info | grep "control plane" | ||
``` | ||
**CA certificate** | ||
```sh | ||
kubectl get secrets -n$CODER_NAMESPACE -o jsonpath="{.items[?(@.metadata.annotations['kubernetes\.io/service-account\.name']=='coder')].data['ca\.crt']}{'\n'}" | ||
``` | ||
**Token** | ||
```sh | ||
kubectl get secrets -n$CODER_NAMESPACE -o jsonpath="{.items[?(@.metadata.annotations['kubernetes\.io/service-account\.name']=='coder')].data['token']}{'\n'}" | ||
``` | ||
**Namespace** | ||
This should be the same as`$CODER_NAMESPACE`,setin step 1. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,132 @@ | ||
terraform { | ||
required_providers { | ||
coder={ | ||
source="coder/coder" | ||
version="~> 0.3.1" | ||
} | ||
kubernetes={ | ||
source="hashicorp/kubernetes" | ||
version="~> 2.10" | ||
} | ||
} | ||
} | ||
variable"step1_use_kubeconfig" { | ||
type=bool | ||
sensitive=true | ||
description="Use local ~/.kube/config? (true/false)" | ||
} | ||
variable"step2_cluster_host" { | ||
type=string | ||
sensitive=true | ||
description=<<-EOF | ||
Hint: You can use: | ||
$ kubectl cluster-info | grep "control plane" | ||
Leave blank if using ~/.kube/config (from step 1) | ||
EOF | ||
} | ||
variable"step3_certificate" { | ||
type=string | ||
sensitive=true | ||
description=<<-EOF | ||
Use docs at https://github.com/coder/coder/tree/main/examples/kubernetes-multi-service#serviceaccount to create a ServiceAccount for Coder and grab values. | ||
Enter CA certificate | ||
Leave blank if using ~/.kube/config (from step 1) | ||
EOF | ||
} | ||
variable"step4_token" { | ||
type=string | ||
sensitive=true | ||
description=<<-EOF | ||
Enter token (refer to docs at https://github.com/coder/coder/tree/main/examples/kubernetes-multi-service#serviceaccount) | ||
Leave blank if using ~/.kube/config (from step 1) | ||
EOF | ||
} | ||
variable"step5_coder_namespace" { | ||
type=string | ||
sensitive=true | ||
description=<<-EOF | ||
Enter namespace (refer to docs at https://github.com/coder/coder/tree/main/examples/kubernetes-multi-service#serviceaccount) | ||
Leave blank if using ~/.kube/config (from step 1) | ||
EOF | ||
} | ||
provider"kubernetes" { | ||
# Authenticate via ~/.kube/config or a Coder-specific ServiceAccount, depending on admin preferences | ||
config_path=var.step1_use_kubeconfig==true?"~/.kube/config":null | ||
host=var.step1_use_kubeconfig==false? var.step2_cluster_host:null | ||
cluster_ca_certificate=var.step1_use_kubeconfig==false?base64decode(var.step3_certificate):null | ||
token=var.step1_use_kubeconfig==false?base64decode(var.step4_token):null | ||
} | ||
data"coder_workspace""me" {} | ||
resource"coder_agent""go" { | ||
os="linux" | ||
arch="amd64" | ||
} | ||
resource"coder_agent""java" { | ||
os="linux" | ||
arch="amd64" | ||
} | ||
resource"coder_agent""ubuntu" { | ||
os="linux" | ||
arch="amd64" | ||
} | ||
resource"kubernetes_pod""main" { | ||
count=data.coder_workspace.me.start_count | ||
metadata { | ||
name="coder-${data.coder_workspace.me.owner}-${data.coder_workspace.me.name}" | ||
} | ||
spec { | ||
container { | ||
name="go" | ||
image="mcr.microsoft.com/vscode/devcontainers/go:1" | ||
command=["sh","-c",coder_agent.go.init_script] | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others.Learn more. I've noticed all of these containers bring you to strange locations when you ssh in for the first time go: Should the init script always do something like There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others.Learn more. It will in my other PR now! | ||
security_context { | ||
run_as_user="1000" | ||
} | ||
env { | ||
name="CODER_AGENT_TOKEN" | ||
value=coder_agent.go.token | ||
} | ||
} | ||
container { | ||
name="java" | ||
image="mcr.microsoft.com/vscode/devcontainers/java" | ||
command=["sh","-c",coder_agent.java.init_script] | ||
security_context { | ||
run_as_user="1000" | ||
} | ||
env { | ||
name="CODER_AGENT_TOKEN" | ||
value=coder_agent.java.token | ||
} | ||
} | ||
container { | ||
name="ubuntu" | ||
image="mcr.microsoft.com/vscode/devcontainers/base:ubuntu" | ||
command=["sh","-c",coder_agent.ubuntu.init_script] | ||
security_context { | ||
run_as_user="1000" | ||
} | ||
env { | ||
name="CODER_AGENT_TOKEN" | ||
value=coder_agent.ubuntu.token | ||
} | ||
} | ||
} | ||
} |