From b0b71cacb7c93c0d13250863a3eecd41ac842670 Mon Sep 17 00:00:00 2001 From: Keke Yi <40977455+yikeke@users.noreply.github.com> Date: Tue, 28 May 2019 13:07:33 +0800 Subject: [PATCH] tidb-operator: fix documentation usability issues in GCP document (#519) --- deploy/gcp/README.md | 210 +++++++++++++++++++++++++++--------- docs/local-dind-tutorial.md | 2 +- 2 files changed, 163 insertions(+), 49 deletions(-) diff --git a/deploy/gcp/README.md b/deploy/gcp/README.md index db9575b59e..06575cfee2 100644 --- a/deploy/gcp/README.md +++ b/deploy/gcp/README.md @@ -1,38 +1,26 @@ # Deploy TiDB Operator and TiDB cluster on GCP GKE -## Requirements: -* [gcloud](https://cloud.google.com/sdk/install) +This document describes how to deploy TiDB Operator and a TiDB cluster on GCP GKE with your laptop (Linux or macOS) for development or testing. + +## Prerequisites + +First of all, make sure the following items are installed on your machine: + +* [Google Cloud SDK](https://cloud.google.com/sdk/install) * [terraform](https://www.terraform.io/downloads.html) * [kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) >= 1.11 * [helm](https://github.com/helm/helm/blob/master/docs/install.md#installing-the-helm-client) >= 2.9.0 * [jq](https://stedolan.github.io/jq/download/) -## Configure gcloud - -https://cloud.google.com/sdk/docs/initializing - -## Setup - -The default setup will create a new VPC, two subnetworks, and an f1-micro instance as a bastion machine. The GKE cluster is created with the following instance types as worker nodes: - -* 3 n1-standard-4 instances for PD -* 3 n1-highmem-8 instances for TiKV -* 3 n1-standard-16 instances for TiDB -* 3 n1-standard-2 instances for monitor - -> *NOTE*: The number of nodes created depends on how many availability zones there are in the chosen region. Most have 3 zones, but us-central1 has 4. See https://cloud.google.com/compute/docs/regions-zones/ for more information. Please refer to the `Customize` section for information on how to customize node pools in a regional cluster. - -> *NOTE*: The default setup, as listed above, will exceed the default CPU quota of a GCP project. To increase your project's quota, please follow the instructions [here](https://cloud.google.com/compute/quotas). The default setup will require at least 91 CPUs, more if you need to scale out. - -The terraform script expects three environment variables. You can let Terraform prompt you for them, or `export` them ahead of time. If you choose to export them, they are: +## Configure -* `TF_VAR_GCP_CREDENTIALS_PATH`: Path to a valid GCP credentials file. It is generally considered a good idea to create a service account to be used by Terraform. See [this page](https://cloud.google.com/iam/docs/creating-managing-service-accounts) for more information on how to manage them. See [this page](https://cloud.google.com/iam/docs/creating-managing-service-account-keys) for creating and managing service account keys which, when downloaded, will be the needed credentials file. -* `TF_VAR_GCP_REGION`: The region to create the resources in, for example: `us-west1` -* `TF_VAR_GCP_PROJECT`: The name of the GCP project +Before deploying, you need to configure several items to guarantee a smooth deployment. +### Configure Cloud SDK +After you install Google Cloud SDK, you need to run `gcloud init` to [perform initial setup tasks](https://cloud.google.com/sdk/docs/initializing). -The service account should have sufficient permissions to create resources in the project. The `Project Editor` primitive will accomplish this. +### Configure APIs If the GCP project is new, make sure the relevant APIs are enabled: @@ -44,7 +32,43 @@ gcloud services enable compute.googleapis.com && \ gcloud services enable container.googleapis.com ``` -Now we can launch the script: +### Configure Terraform + +The terraform script expects three environment variables. You can let Terraform prompt you for them, or `export` them in the `~/.bash_profile` file ahead of time. The required environment variables are: + +* `TF_VAR_GCP_CREDENTIALS_PATH`: Path to a valid GCP credentials file. + - It is recommended to create a new service account to be used by Terraform. See [this page](https://cloud.google.com/iam/docs/creating-managing-service-accounts) to create a service account and grant `Project Editor` role to it. + - See [this page](https://cloud.google.com/iam/docs/creating-managing-service-account-keys) to create service account keys, and choose `JSON` key type during creation. The downloaded `JSON` file that contains the private key is the credentials file you need. +* `TF_VAR_GCP_REGION`: The region to create the resources in, for example: `us-west1`. +* `TF_VAR_GCP_PROJECT`: The name of the GCP project. + +> *Note*: The service account must have sufficient permissions to create resources in the project. The `Project Editor` primitive will accomplish this. + +To set the three environment variables, for example, you can enter in your terminal: + +```bash +# Replace the values with the path to the JSON file you have downloaded, the GCP region and your GCP project name. +export TF_VAR_GCP_CREDENTIALS_PATH="/Path/to/my-project.json" +export TF_VAR_GCP_REGION="us-west1" +export TF_VAR_GCP_PROJECT="my-project" +``` + +You can also append them in your `~/.bash_profile` so they will be exported automatically next time. + +## Deploy + +The default setup creates a new VPC, two subnetworks, and an f1-micro instance as a bastion machine. The GKE cluster is created with the following instance types as worker nodes: + +* 3 n1-standard-4 instances for PD +* 3 n1-highmem-8 instances for TiKV +* 3 n1-standard-16 instances for TiDB +* 3 n1-standard-2 instances for monitor + +> *Note*: The number of nodes created depends on how many availability zones there are in the chosen region. Most have 3 zones, but us-central1 has 4. See [Regions and Zones](https://cloud.google.com/compute/docs/regions-zones/) for more information and see the [Customize](#customize) section on how to customize node pools in a regional cluster. + +The default setup, as listed above, requires at least 91 CPUs which exceed the default CPU quota of a GCP project. To increase your project's quota, follow the instructions [here](https://cloud.google.com/compute/quotas). You need more CPUs if you need to scale out. + +Now that you have configured everything needed, you can launch the script to deploy the TiDB cluster: ```bash git clone --depth=1 https://github.com/pingcap/tidb-operator @@ -53,74 +77,164 @@ terraform init terraform apply ``` +When you run `terraform apply`, you may be asked to set three environment variables if you have not exported them in advance. See [Configure Terraform](#configure-terraform) for details. + +It might take 10 minutes or more to finish the process. A successful deployment gives the output like: + +``` +Apply complete! Resources: 17 added, 0 changed, 0 destroyed. + +Outputs: + +cluster_id = my-cluster +cluster_name = my-cluster +how_to_connect_to_mysql_from_bastion = mysql -h 172.31.252.20 -P 4000 -u root +how_to_ssh_to_bastion = gcloud compute ssh bastion --zone us-west1-b +kubeconfig_file = ./credentials/kubeconfig_my-cluster +monitor_ilb_ip = 35.227.134.146 +monitor_port = 3000 +region = us-west1 +tidb_ilb_ip = 172.31.252.20 +tidb_port = 4000 +tidb_version = v2.1.8 +``` + +## Access the database + After `terraform apply` is successful, the TiDB cluster can be accessed by SSHing into the bastion machine and connecting via MySQL: + ```bash +# Replace the `<>` parts with values from the output. gcloud compute ssh bastion --zone mysql -h -P 4000 -u root ``` -It is possible to interact with the cluster using `kubectl` and `helm` with the kubeconfig file `credentials/kubeconfig_`. The default `cluster_name` is `my-cluster`, it can be changed in `variables.tf` +> *Note*: You need to install the MySQL client before you connect to TiDB via MySQL. + +## Interact with the cluster + +You can interact with the cluster using `kubectl` and `helm` with the kubeconfig file `credentials/kubeconfig_` as follows. The default `cluster_name` is `my-cluster`, which can be changed in `variables.tf`. + ```bash -# By specifying --kubeconfig argument +# By specifying --kubeconfig argument. kubectl --kubeconfig credentials/kubeconfig_ get po -n tidb helm --kubeconfig credentials/kubeconfig_ ls -# Or setting KUBECONFIG environment variable +# Or setting KUBECONFIG environment variable. export KUBECONFIG=$PWD/credentials/kubeconfig_ kubectl get po -n tidb helm ls ``` -When done, the infrastructure can be torn down by running `terraform destroy` +## Upgrade +To upgrade the TiDB cluster, modify the `tidb_version` variable to a higher version in the `variables.tf` file, and run `terraform apply`. -## Upgrade TiDB cluster +For example, to upgrade the cluster to the 2.1.10 version, modify the `tidb_version` to `v2.1.10`: -To upgrade TiDB cluster, modify `tidb_version` variable to a higher version in variables.tf and run `terraform apply`. +``` +variable "tidb_version" { + description = "TiDB version" + default = "v2.1.10" +} +``` -> *Note*: The upgrading doesn't finish immediately. You can watch the upgrading process by `watch kubectl --kubeconfig credentials/kubeconfig_ get po -n tidb` +The upgrading does not finish immediately. You can run `kubectl --kubeconfig credentials/kubeconfig_ get po -n tidb --watch` to verify that all pods are in `Running` state. Then you can [access the database](#access-the-database) and use `tidb_version()` to see whether the cluster has been upgraded successfully: + +```sql +MySQL [(none)]> select tidb_version(); +*************************** 1. row *************************** +tidb_version(): Release Version: 2.1.10 +Git Commit Hash: v2.1.10 +Git Branch: master +UTC Build Time: 2019-05-22 11:12:14 +GoVersion: go version go1.12.4 linux/amd64 +Race Enabled: false +TiKV Min Version: 2.1.0-alpha.1-ff3dd160846b7d1aed9079c389fc188f7f5ea13e +Check Table Before Drop: false +1 row in set (0.001 sec) +``` -## Scale TiDB cluster +## Scale -To scale TiDB cluster, modify `tikv_count`, `tikv_replica_count`, `tidb_count`, and `tidb_replica_count` to your desired count, and then run `terraform apply`. +To scale the TiDB cluster, modify `tikv_count`, `tikv_replica_count`, `tidb_count`, and `tidb_replica_count` in the `variables.tf` file to your desired count, and run `terraform apply`. -> *Note*: Currently, scaling in is not supported since we cannot determine which node to remove. Scaling out needs a few minutes to complete, you can watch the scaling out by `watch kubectl --kubeconfig credentials/kubeconfig_ get po -n tidb` +Currently, scaling in is not supported since we cannot determine which node to remove. Scaling out needs a few minutes to complete, you can watch the scaling-out process by `kubectl --kubeconfig credentials/kubeconfig_ get po -n tidb --watch`. -> *Note*: Incrementing the node count will create a node per GCP availability zones. +For example, to scale out the cluster, you can modify the number of TiDB instances from 1 to 2: + +``` +variable "tidb_count" { + description = "Number of TiDB nodes per availability zone" + default = 2 +} +``` + +> *Note*: Incrementing the node count creates a node per GCP availability zone. ## Customize +You can change default values in `variables.tf` (such as the cluster name and the TiDB version) as needed. + ### Customize GCP resources GCP allows attaching a local SSD to any instance type that is `n1-standard-1` or greater. This allows for good customizability. -### Customize TiDB Parameters +### Customize TiDB parameters -Currently, there are not too many parameters exposed to be customized. However, you can modify `templates/tidb-cluster-values.yaml.tpl` before deploying. If you modify it after the cluster is created and then run `terraform apply`, it will not take effect unless the pod(s) is manually deleted. +Currently, there are not too many parameters exposed to be customized. However, you can modify `templates/tidb-cluster-values.yaml.tpl` before deploying. If you modify it after the cluster is created and then run `terraform apply`, it can not take effect unless the pod(s) is manually deleted. -### Customizing node pools +### Customize node pools -The cluster is created as a regional, as opposed to a zonal cluster. This means that GKE will replicate node pools to each availability zone. This is desired to maintain high availability, however for the monitoring services, like Grafana, this is potentially unnecessary. It is possible to manually remove nodes if desired via `gcloud`. +The cluster is created as a regional, as opposed to a zonal cluster. This means that GKE replicates node pools to each availability zone. This is desired to maintain high availability, however for the monitoring services, like Grafana, this is potentially unnecessary. It is possible to manually remove nodes if desired via `gcloud`. -> *NOTE*: GKE node pools are managed instance groups, so a node deleted by `gcloud compute instances delete` will be automatically recreated and added back to the cluster. +> *Note*: GKE node pools are managed instance groups, so a node deleted by `gcloud compute instances delete` will be automatically recreated and added back to the cluster. + +Suppose that you need to delete a node from the monitor pool. You can first do: -Suppose we wish to delete a node from the monitor pool, we can do ```bash -$ gcloud compute instance-groups managed list | grep monitor +gcloud compute instance-groups managed list | grep monitor ``` -and the result will be something like this + +And the result will be something like this: + ```bash gke-my-cluster-monitor-pool-08578e18-grp us-west1-b zone gke-my-cluster-monitor-pool-08578e18 0 0 gke-my-cluster-monitor-pool-08578e18 no gke-my-cluster-monitor-pool-7e31100f-grp us-west1-c zone gke-my-cluster-monitor-pool-7e31100f 1 1 gke-my-cluster-monitor-pool-7e31100f no gke-my-cluster-monitor-pool-78a961e5-grp us-west1-a zone gke-my-cluster-monitor-pool-78a961e5 1 1 gke-my-cluster-monitor-pool-78a961e5 no ``` -The first column is the name of the managed instance group, and the second column is the zone it was created in. We will also need the name of the instance in that group, we can get it as follows + +The first column is the name of the managed instance group, and the second column is the zone in which it was created. You also need the name of the instance in that group, and you can get it by running: + +```bash +gcloud compute instance-groups managed list-instances --zone +``` + +For example: + ```bash $ gcloud compute instance-groups managed list-instances gke-my-cluster-monitor-pool-08578e18-grp --zone us-west1-b + NAME ZONE STATUS ACTION INSTANCE_TEMPLATE VERSION_NAME LAST_ERROR gke-my-cluster-monitor-pool-08578e18-c7vd us-west1-b RUNNING NONE gke-my-cluster-monitor-pool-08578e18 ``` -Now we can delete the instance + +Now you can delete the instance by specifying the name of the managed instance group and the name of the instance, for example: + ```bash -$ gcloud compute instance-groups managed delete-instances gke-my-cluster-monitor-pool-08578e18-grp --instances=gke-my-cluster-monitor-pool-08578e18-c7vd --zone us-west1-b -``` \ No newline at end of file +gcloud compute instance-groups managed delete-instances gke-my-cluster-monitor-pool-08578e18-grp --instances=gke-my-cluster-monitor-pool-08578e18-c7vd --zone us-west1-b +``` + +## Destroy + +When you are done, the infrastructure can be torn down by running: + +```bash +terraform destroy +``` + +You have to manually delete disks in the Google Cloud Console, or with `gcloud` after running `terraform destroy` if you do not need the data anymore. + +> *Note*: When `terraform destroy` is running, an error with the following message might occur: `Error reading Container Cluster "my-cluster": Cluster "my-cluster" has status "RECONCILING" with message""`. This happens when GCP is upgrading the kubernetes master node, which it does automatically at times. While this is happening, it is not possible to delete the cluster. When it is done, run `terraform destroy` again. + +> *Note*: When `terraform destroy` is running, an error with the following message might occur: `Error deleting NodePool: googleapi: Error 400: Operation operation-1558952543255-89695179 is currently deleting a node pool for cluster my-cluster. Please wait and try again once it is done., failedPrecondition`. This happens when terraform issues delete requests to cluster resources concurrently. To resolve, wait a little bit and then run `terraform destroy` again. diff --git a/docs/local-dind-tutorial.md b/docs/local-dind-tutorial.md index e16d71e6c4..73af503f06 100644 --- a/docs/local-dind-tutorial.md +++ b/docs/local-dind-tutorial.md @@ -297,7 +297,7 @@ Use `kubectl get pod -n tidb` to verify the number of each compoments equal to v Use `kubectl get pod -n tidb` to verify that all pods are in `Running` state. Then you can connect to the database and use `tidb_version()` function to verify the version: ```sh -MySQL [(none)]> select tidb_version()\G +MySQL [(none)]> select tidb_version(); *************************** 1. row *************************** tidb_version(): Release Version: 2.1.10 Git Commit Hash: v2.1.10