This repo contains materials for one-day Java apps on Azure Kubernetes Service training scheduled for 30th of January 2019.
WORK IN PROGRESS
We will use shell.azure.com cloud shell (bash) for experiments.
Before you will start please create FORK of our repo git@github.com:azurecz/java-k8s-workshop.git
mkdir myexperiment
cd myexperiment
# clone repo first
git clone https://github.com/azurecz/java-k8s-workshop.git
# and now lets step into folder with project files.
cd java-k8s-workshop
We will use Azure container registry for our images, lets deploy ACR and push images there ..
Please use especially for ACR_NAME your unique name - it is unique in whole Azure environment.
Pleace update file rc
with your unique names for services.
# variables
source rc
# create resource group
az group create --location ${LOCATION} --name ${RESOURCE_GROUP}
# create ACR
az acr create --name $ACR_NAME --resource-group $RESOURCE_GROUP --sku Standard --location ${LOCATION} --admin-enabled true
# Get ACR_URL for future use with docker-compose and build
export ACR_URL=$(az acr show --name $ACR_NAME --resource-group $RESOURCE_GROUP --query "loginServer" --output tsv)
echo $ACR_URL
# Get ACR key for our experiments
export ACR_KEY=$(az acr credential show --name $ACR_NAME --resource-group $RESOURCE_GROUP --query "passwords[0].value" --output tsv)
echo $ACR_KEY
# aks - create cluster
az aks create --resource-group ${RESOURCE_GROUP} --name ${AKS_CLUSTER_NAME} \
--no-ssh-key --kubernetes-version 1.12.8 \
--node-count 3 --node-vm-size Standard_DS1_v2 \
--location ${LOCATION}
# kube config
az aks get-credentials --name ${AKS_CLUSTER_NAME} --resource-group ${RESOURCE_GROUP}
# patch kubernetes configuration to be able to access dashboard
kubectl create clusterrolebinding kubernetes-dashboard \
-n kube-system --clusterrole=cluster-admin \
--serviceaccount=kube-system:kubernetes-dashboard
# Get the id of the service principal configured for AKS
CLIENT_ID=$(az aks show --resource-group $RESOURCE_GROUP --name $AKS_CLUSTER_NAME --query "servicePrincipalProfile.clientId" --output tsv)
# Get the ACR registry resource id
ACR_ID=$(az acr show --name $ACR_NAME --resource-group $RESOURCE_GROUP --query "id" --output tsv)
# Create role assignment
az role assignment create --assignee $CLIENT_ID --role Reader --scope $ACR_ID