-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically deploy carbonplan hub #632
Comments
@damianavila what's your carbonplan AWS username? I can give you access to the EKS cluster by following https://docs.aws.amazon.com/eks/latest/userguide/add-user-role.html |
I have pinged you in Slack with that info 😉 . |
@damianavila I added you to list of users who can access the EKS cluster, with
|
Does this issue depend on #627 being resolved? It feels like this is not possible until we have the infrastructure to automatically deploy AWS hubs. |
It depends but it is not a blocker to make progress on this one... We can decouple this issue (hub deployment automation) from the #627 issue (cluster deployment automation) if we manually add the "2i2c deployer user" to the existing EKS carbonplan cluster as @yuvipanda did with my user in his previous comment. In fact, the approach I am following is essentially impersonating 😜 the "2i2c deployer user" with my credentials. Eventually, we should be able to manually create the real "2i2c deployer user", manually get its credentials and manually add it to the cluster and when #627 is ready, all of these steps should be done automatically. Unless I am missing something, which is usually the case 😉 . |
Update: Draft PR #636 tries to deal with this item. |
Update:
Tested manually (after some adjusting in the logic) and it seems to be working as expected. |
Some commands I have used for the above update:
|
The auth_aws function will retrieve the credentials from a new "deployer" user living under the 2i2c group (in AWS carbonplan land). That user also needs admin access to the EKS cluster to get the kubeconfig. Details about how to create the user, get credentials and add it to the EKS cluster live in [1]. Btw, I have modified the auth_aws function a little bit so it can find the needed information in the "native" credentials json file produced by the awscli tool. The files is encrypted by sops. Finally, I added an enum to the schema because I believe we would just have eks and kops options in the future. [1] #632 (comment)
For posterity, this one was deployed successfully after merging it: https://github.com/2i2c-org/pilot-hubs/runs/3533569179?check_suite_focus=true |
Description
Currently when you change things in pilot-hubs, it doesn't actually update CarbonPlan's hub. We should build auto-deployment infrastructure instead.
Was tried in yuvipanda@f687264 but reverted, as the auth provided by the checked-in kubeconfig is not enough. We need #381 with eks support to be able to deploy automatically from CI
Tasks
The text was updated successfully, but these errors were encountered: