Configuring SecureAuth on Kubernetes via GitOps
Configuring SecureAuth on Kubernetes using the GitOps methodology.
Deploying On Existing Kubernetes Cluster
While the default setup creates a new Kubernetes cluster using Kind, you might want to deploy SecureAuth and its infrastructure on an already existing cluster. Here's how:
Ensure your kubeconfig, pointing to the desired cluster, exists at
~/.kube/config
and is set as the default context.Execute
make deploy
to initiate FluxCD installation and bootstrap all resources from the acp-on-k8s repository.Monitor the deployment progress using
make wait
.Confirm a successful deployment by running
make run-lightweight-tests
.
Kubernetes cluster considerations:
The stack has been architected to operate optimally on a minimum of 3 nodes due to pod affinity considerations.
Ensure that nodes are distributed across a minimum of 3 distinct zones, identified by the
topology.kubernetes.io/zone
label.The nodes should possess the following labels, as they are leveraged as node selectors for specific components:
compute=true fission=true nginx=true cockroachdb=true timescaledb=true redis=true spicedb=true elastic=true system=true clusterCritical=true
By adhering to these requirements, you ensure that the stack functions as intended and can achieve its intended performance and reliability characteristics. If these specifications don't align with your needs, remember that you can adjust any of these considerations by customizing the stack, see section below.
Customizing the Deployment
Adhering to the principles of GitOps, all configuration changes must be tracked in a Git repository. Since the public repository is maintained by SecureAuth, we recommend forking it for custom modifications.
To deploy from a customized repository:
Fork the acp-on-k8s repository.
Make the necessary changes in your forked repository.
You can find SecureAuth configuration in the
apps/acp/base/release.yaml
file. Add any configuration using theconfig.data
setting to, for example, enable feature flags.Note
Please note that the configuration added in the acp-on-k8s repository can be treated as production ready. SecureAuth does not take any responsibility for any changes made in the forked repositories.
To import data, SecureAuth recommends utilizing a dedicated acp-cd Helm Chart, but for quick and local testing you may utilize the
importJob.data
configuration built into therelease.yaml
file.To learn more, visit:
Deploy the stack from your repository with
make deploy REPO=<url>
, where<url>
is the link to your forked project.To specify a branch other than the default
main
, usemake deploy REPO=<url> BRANCH=<branch>
.
For authenticated access to private repositories, include credentials in the repository URL, for example: REPO=https://user:token@github.com/myorganization/myrepository
.
Upon completion, the stack is deployed from your personal repository, and any subsequent changes you commit are auto-deployed thanks to the GitOps methodology.
Access Local Services
To access local services provided by the SecureAuth platform, you need to update your system's hosts file to recognize specific domain names. Open your /etc/hosts
file and append the following entries:
# tenants 127.0.0.1 default.acp.local 127.0.0.1 system.acp.local 127.0.0.1 lightweight-tests.acp.local # databases 127.0.0.1 cockroachdb.tools.local.acp.local 127.0.0.1 redisinsight.tools.local.acp.local # logs and traces 127.0.0.1 kibana.tools.local.acp.local # metrics and alerts 127.0.0.1 grafana.tools.local.acp.local 127.0.0.1 prometheus.tools.local.acp.local 127.0.0.1 alertmanager.tools.local.acp.local # thanos 127.0.0.1 query.tools.local.acp.local 127.0.0.1 ruler.tools.local.acp.local 127.0.0.1 store.tools.local.acp.local 127.0.0.1 compactor.tools.local.acp.local
This configuration ensures that when you access these domain names on your local machine, they resolve to the local IP address (127.0.0.1).
If you are integrating additional tenants into the system, remember to add corresponding entries to the hosts file. For instance, for a tenant named mytest
, you would add:
127.0.0.1 mytest.acp.local
Once set up, you can access specific services that require login credentials:
Kibana - Access using
admin
:p@ssw0rd!
.Grafana - Access using
admin
:p@ssw0rd!
.Cockroachdb - Access using
dev
:p@ssw0rd!
.