-
Notifications
You must be signed in to change notification settings - Fork 499
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tidb-operator: fix documentation usability issues in GCP document #519
Merged
tennix
merged 27 commits into
pingcap:master
from
yikeke:Fix-documentation-usability-issues-found-in-GCP-deployment-doc
May 28, 2019
Merged
Changes from 22 commits
Commits
Show all changes
27 commits
Select commit
Hold shift + click to select a range
360adec
tidb-operator: fix documentation usability issues in GCP document
713afe8
update wording
bbd543c
address hailong's comments
ad5e2d6
update configure terraform
7fc8b82
Update README.md
69f675f
add more descriptions for configure terraform
1a9f650
update wording
8345618
update wording
0ca9498
add descriptions and examples
c7545b4
update wording
6197efb
add some examples and update wording
b12270a
update examples and wording
d8da9fc
address hailong's comment
c4868b4
improve display
02e9e27
update code block
05ac1c3
unify wording
c223730
update wording
eaf5853
update descriptions
7a90aa9
Update README.md
90d1732
fix messy code
b54ae79
Merge remote-tracking branch 'upstream/master' into Fix-documentation…
43adae1
fix messy code for dind tutorial
03717ef
Update README.md
jlerche ad02659
address jacob's comments
2a2a8a4
update wording
6928911
update descriptions
43cf493
Merge branch 'master' into Fix-documentation-usability-issues-found-i…
lilin90 File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
@@ -1,38 +1,26 @@ | ||||||
# Deploy TiDB Operator and TiDB cluster on GCP GKE | ||||||
|
||||||
## Requirements: | ||||||
* [gcloud](https://cloud.google.com/sdk/install) | ||||||
This document describes how to deploy TiDB Operator and a TiDB cluster on GCP GKE with your laptop (Linux or macOS) for development or testing. | ||||||
|
||||||
## Prerequisites | ||||||
|
||||||
First of all, make sure the following items are installed on your machine: | ||||||
|
||||||
* [Google Cloud SDK](https://cloud.google.com/sdk/install) | ||||||
* [terraform](https://www.terraform.io/downloads.html) | ||||||
* [kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl/#install-kubectl) >= 1.11 | ||||||
* [helm](https://github.com/helm/helm/blob/master/docs/install.md#installing-the-helm-client) >= 2.9.0 | ||||||
* [jq](https://stedolan.github.io/jq/download/) | ||||||
|
||||||
## Configure gcloud | ||||||
|
||||||
https://cloud.google.com/sdk/docs/initializing | ||||||
|
||||||
## Setup | ||||||
## Configure | ||||||
|
||||||
The default setup will create a new VPC, two subnetworks, and an f1-micro instance as a bastion machine. The GKE cluster is created with the following instance types as worker nodes: | ||||||
Before deploying, you need to configure several items to guarantee a smooth deployment. | ||||||
|
||||||
* 3 n1-standard-4 instances for PD | ||||||
* 3 n1-highmem-8 instances for TiKV | ||||||
* 3 n1-standard-16 instances for TiDB | ||||||
* 3 n1-standard-2 instances for monitor | ||||||
### Configure Cloud SDK | ||||||
|
||||||
> *NOTE*: The number of nodes created depends on how many availability zones there are in the chosen region. Most have 3 zones, but us-central1 has 4. See https://cloud.google.com/compute/docs/regions-zones/ for more information. Please refer to the `Customize` section for information on how to customize node pools in a regional cluster. | ||||||
After you install Google Cloud SDK, you need to run `gcloud init` to [perform initial setup tasks](https://cloud.google.com/sdk/docs/initializing). | ||||||
|
||||||
> *NOTE*: The default setup, as listed above, will exceed the default CPU quota of a GCP project. To increase your project's quota, please follow the instructions [here](https://cloud.google.com/compute/quotas). The default setup will require at least 91 CPUs, more if you need to scale out. | ||||||
|
||||||
The terraform script expects three environment variables. You can let Terraform prompt you for them, or `export` them ahead of time. If you choose to export them, they are: | ||||||
|
||||||
* `TF_VAR_GCP_CREDENTIALS_PATH`: Path to a valid GCP credentials file. It is generally considered a good idea to create a service account to be used by Terraform. See [this page](https://cloud.google.com/iam/docs/creating-managing-service-accounts) for more information on how to manage them. See [this page](https://cloud.google.com/iam/docs/creating-managing-service-account-keys) for creating and managing service account keys which, when downloaded, will be the needed credentials file. | ||||||
* `TF_VAR_GCP_REGION`: The region to create the resources in, for example: `us-west1` | ||||||
* `TF_VAR_GCP_PROJECT`: The name of the GCP project | ||||||
|
||||||
|
||||||
|
||||||
The service account should have sufficient permissions to create resources in the project. The `Project Editor` primitive will accomplish this. | ||||||
### Configure APIs | ||||||
|
||||||
If the GCP project is new, make sure the relevant APIs are enabled: | ||||||
|
||||||
|
@@ -44,7 +32,43 @@ gcloud services enable compute.googleapis.com && \ | |||||
gcloud services enable container.googleapis.com | ||||||
``` | ||||||
|
||||||
Now we can launch the script: | ||||||
### Configure Terraform | ||||||
|
||||||
The terraform script expects three environment variables. You can let Terraform prompt you for them, or `export` them in the `~/.bash_profile` file ahead of time. The required environment variables are: | ||||||
|
||||||
* `TF_VAR_GCP_CREDENTIALS_PATH`: Path to a valid GCP credentials file. | ||||||
- It is recommended to create a new service account to be used by Terraform. See [this page](https://cloud.google.com/iam/docs/creating-managing-service-accounts) to create a service account and grant `Project Editor` role to it. | ||||||
- See [this page](https://cloud.google.com/iam/docs/creating-managing-service-account-keys) to create service account keys, and choose `JSON` key type during creation. The downloaded `JSON` file that contains the private key is the credentials file you need. | ||||||
* `TF_VAR_GCP_REGION`: The region to create the resources in, for example: `us-west1`. | ||||||
* `TF_VAR_GCP_PROJECT`: The name of the GCP project. | ||||||
|
||||||
> *Note*: The service account must have sufficient permissions to create resources in the project. The `Project Editor` primitive will accomplish this. | ||||||
|
||||||
To set the three environment variables, you can first run `vi ~/.bash_profile`, append the `export` statements to it and run `source ~/.bash_profile`. | ||||||
|
||||||
Here is an example of `~/.bash_profile`: | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Updated. PTAL again. @jlerche @DanielZhangQD |
||||||
|
||||||
```bash | ||||||
# Replace the values with the path to the JSON file you have downloaded, the GCP region and your GCP project name. | ||||||
export TF_VAR_GCP_CREDENTIALS_PATH="/Path/to/my-project.json" | ||||||
export TF_VAR_GCP_REGION="us-west1" | ||||||
export TF_VAR_GCP_PROJECT="my-project" | ||||||
``` | ||||||
|
||||||
## Deploy | ||||||
|
||||||
The default setup creates a new VPC, two subnetworks, and an f1-micro instance as a bastion machine. The GKE cluster is created with the following instance types as worker nodes: | ||||||
|
||||||
* 3 n1-standard-4 instances for PD | ||||||
* 3 n1-highmem-8 instances for TiKV | ||||||
* 3 n1-standard-16 instances for TiDB | ||||||
* 3 n1-standard-2 instances for monitor | ||||||
|
||||||
> *Note*: The number of nodes created depends on how many availability zones there are in the chosen region. Most have 3 zones, but us-central1 has 4. See [Regions and Zones](https://cloud.google.com/compute/docs/regions-zones/) for more information and see the [Customize](#customize) section on how to customize node pools in a regional cluster. | ||||||
|
||||||
The default setup, as listed above, requires at least 91 CPUs which exceed the default CPU quota of a GCP project. To increase your project's quota, follow the instructions [here](https://cloud.google.com/compute/quotas). You need more CPUs if you need to scale out. | ||||||
|
||||||
Now that you have configured everything needed, you can launch the script to deploy the TiDB cluster: | ||||||
|
||||||
```bash | ||||||
git clone --depth=1 https://github.com/pingcap/tidb-operator | ||||||
|
@@ -53,74 +77,158 @@ terraform init | |||||
terraform apply | ||||||
``` | ||||||
|
||||||
When you run `terraform apply`, you may be asked to set three environment variables if you have not exported them in advance. See [Configure Terraform](#configure-terraform) for details. | ||||||
|
||||||
It might take 10 minutes or more to finish the process. A successful deployment gives the output like: | ||||||
|
||||||
``` | ||||||
Apply complete! Resources: 8 added, 0 changed, 1 destroyed. | ||||||
|
||||||
Outputs: | ||||||
|
||||||
cluster_id = my-cluster | ||||||
cluster_name = my-cluster | ||||||
how_to_connect_to_mysql_from_bastion = mysql -h 172.31.252.20 -P 4000 -u root | ||||||
how_to_ssh_to_bastion = gcloud compute ssh bastion --zone us-west1-b | ||||||
kubeconfig_file = ./credentials/kubeconfig_my-cluster | ||||||
monitor_ilb_ip = 35.227.134.146 | ||||||
monitor_port = 3000 | ||||||
region = us-west1 | ||||||
tidb_ilb_ip = 172.31.252.20 | ||||||
tidb_port = 4000 | ||||||
tidb_version = v2.1.8 | ||||||
``` | ||||||
|
||||||
## Access the database | ||||||
|
||||||
After `terraform apply` is successful, the TiDB cluster can be accessed by SSHing into the bastion machine and connecting via MySQL: | ||||||
|
||||||
```bash | ||||||
# Replace the `<>` parts with values from the output. | ||||||
gcloud compute ssh bastion --zone <zone> | ||||||
mysql -h <tidb_ilb_ip> -P 4000 -u root | ||||||
``` | ||||||
|
||||||
It is possible to interact with the cluster using `kubectl` and `helm` with the kubeconfig file `credentials/kubeconfig_<cluster_name>`. The default `cluster_name` is `my-cluster`, it can be changed in `variables.tf` | ||||||
> *Note*: You need to install the MySQL client before you connect to TiDB via MySQL. | ||||||
|
||||||
## Interact with the cluster | ||||||
|
||||||
You can interact with the cluster using `kubectl` and `helm` with the kubeconfig file `credentials/kubeconfig_<cluster_name>` as follows. The default `cluster_name` is `my-cluster`, which can be changed in `variables.tf`. | ||||||
|
||||||
```bash | ||||||
# By specifying --kubeconfig argument | ||||||
# By specifying --kubeconfig argument. | ||||||
kubectl --kubeconfig credentials/kubeconfig_<cluster_name> get po -n tidb | ||||||
helm --kubeconfig credentials/kubeconfig_<cluster_name> ls | ||||||
|
||||||
# Or setting KUBECONFIG environment variable | ||||||
# Or setting KUBECONFIG environment variable. | ||||||
export KUBECONFIG=$PWD/credentials/kubeconfig_<cluster_name> | ||||||
kubectl get po -n tidb | ||||||
helm ls | ||||||
``` | ||||||
|
||||||
When done, the infrastructure can be torn down by running `terraform destroy` | ||||||
## Upgrade | ||||||
|
||||||
To upgrade the TiDB cluster, modify the `tidb_version` variable to a higher version in the `variables.tf` file, and run `terraform apply`. | ||||||
|
||||||
## Upgrade TiDB cluster | ||||||
For example, to upgrade the cluster to the 2.1.10 version, modify the `tidb_version` to `v2.1.10`: | ||||||
|
||||||
To upgrade TiDB cluster, modify `tidb_version` variable to a higher version in variables.tf and run `terraform apply`. | ||||||
``` | ||||||
variable "tidb_version" { | ||||||
description = "TiDB version" | ||||||
default = "v2.1.10" | ||||||
} | ||||||
``` | ||||||
|
||||||
> *Note*: The upgrading doesn't finish immediately. You can watch the upgrading process by `watch kubectl --kubeconfig credentials/kubeconfig_<cluster_name> get po -n tidb` | ||||||
The upgrading does not finish immediately. You can run `kubectl --kubeconfig credentials/kubeconfig_<cluster_name> get po -n tidb --watch` to verify that all pods are in `Running` state. Then you can [access the database](#access-the-database) and use `tidb_version()` to see whether the cluster has been upgraded successfully: | ||||||
|
||||||
```sql | ||||||
MySQL [(none)]> select tidb_version(); | ||||||
*************************** 1. row *************************** | ||||||
tidb_version(): Release Version: 2.1.10 | ||||||
Git Commit Hash: v2.1.10 | ||||||
Git Branch: master | ||||||
UTC Build Time: 2019-05-22 11:12:14 | ||||||
GoVersion: go version go1.12.4 linux/amd64 | ||||||
Race Enabled: false | ||||||
TiKV Min Version: 2.1.0-alpha.1-ff3dd160846b7d1aed9079c389fc188f7f5ea13e | ||||||
Check Table Before Drop: false | ||||||
1 row in set (0.001 sec) | ||||||
``` | ||||||
|
||||||
## Scale | ||||||
|
||||||
## Scale TiDB cluster | ||||||
To scale the TiDB cluster, modify `tikv_count`, `tikv_replica_count`, `tidb_count`, and `tidb_replica_count` in the `variables.tf` file to your desired count, and run `terraform apply`. | ||||||
|
||||||
To scale TiDB cluster, modify `tikv_count`, `tikv_replica_count`, `tidb_count`, and `tidb_replica_count` to your desired count, and then run `terraform apply`. | ||||||
Currently, scaling in is not supported since we cannot determine which node to remove. Scaling out needs a few minutes to complete, you can watch the scaling-out process by `kubectl --kubeconfig credentials/kubeconfig_<cluster_name> get po -n tidb --watch`. | ||||||
|
||||||
> *Note*: Currently, scaling in is not supported since we cannot determine which node to remove. Scaling out needs a few minutes to complete, you can watch the scaling out by `watch kubectl --kubeconfig credentials/kubeconfig_<cluster_name> get po -n tidb` | ||||||
For example, to scale out the cluster, you can modify the number of TiDB instances from 1 to 2: | ||||||
|
||||||
``` | ||||||
variable "tidb_count" { | ||||||
description = "Number of TiDB nodes per availability zone" | ||||||
default = 2 | ||||||
} | ||||||
``` | ||||||
|
||||||
> *Note*: Incrementing the node count will create a node per GCP availability zones. | ||||||
> *Note*: Incrementing the node count creates a node per GCP availability zone. | ||||||
|
||||||
## Customize | ||||||
|
||||||
You can change default values in `variables.tf` (such as the cluster name and the TiDB version) as needed. | ||||||
|
||||||
### Customize GCP resources | ||||||
|
||||||
GCP allows attaching a local SSD to any instance type that is `n1-standard-1` or greater. This allows for good customizability. | ||||||
|
||||||
### Customize TiDB Parameters | ||||||
### Customize TiDB parameters | ||||||
|
||||||
Currently, there are not too many parameters exposed to be customized. However, you can modify `templates/tidb-cluster-values.yaml.tpl` before deploying. If you modify it after the cluster is created and then run `terraform apply`, it will not take effect unless the pod(s) is manually deleted. | ||||||
Currently, there are not too many parameters exposed to be customized. However, you can modify `templates/tidb-cluster-values.yaml.tpl` before deploying. If you modify it after the cluster is created and then run `terraform apply`, it can not take effect unless the pod(s) is manually deleted. | ||||||
|
||||||
### Customizing node pools | ||||||
### Customize node pools | ||||||
|
||||||
The cluster is created as a regional, as opposed to a zonal cluster. This means that GKE will replicate node pools to each availability zone. This is desired to maintain high availability, however for the monitoring services, like Grafana, this is potentially unnecessary. It is possible to manually remove nodes if desired via `gcloud`. | ||||||
The cluster is created as a regional, as opposed to a zonal cluster. This means that GKE replicates node pools to each availability zone. This is desired to maintain high availability, however for the monitoring services, like Grafana, this is potentially unnecessary. It is possible to manually remove nodes if desired via `gcloud`. | ||||||
|
||||||
> *NOTE*: GKE node pools are managed instance groups, so a node deleted by `gcloud compute instances delete` will be automatically recreated and added back to the cluster. | ||||||
> *Note*: GKE node pools are managed instance groups, so a node deleted by `gcloud compute instances delete` will be automatically recreated and added back to the cluster. | ||||||
|
||||||
Suppose that you need to delete a node from the monitor pool. You can first do: | ||||||
|
||||||
Suppose we wish to delete a node from the monitor pool, we can do | ||||||
```bash | ||||||
$ gcloud compute instance-groups managed list | grep monitor | ||||||
gcloud compute instance-groups managed list | grep monitor | ||||||
``` | ||||||
and the result will be something like this | ||||||
|
||||||
And the result will be something like this: | ||||||
|
||||||
```bash | ||||||
gke-my-cluster-monitor-pool-08578e18-grp us-west1-b zone gke-my-cluster-monitor-pool-08578e18 0 0 gke-my-cluster-monitor-pool-08578e18 no | ||||||
gke-my-cluster-monitor-pool-7e31100f-grp us-west1-c zone gke-my-cluster-monitor-pool-7e31100f 1 1 gke-my-cluster-monitor-pool-7e31100f no | ||||||
gke-my-cluster-monitor-pool-78a961e5-grp us-west1-a zone gke-my-cluster-monitor-pool-78a961e5 1 1 gke-my-cluster-monitor-pool-78a961e5 no | ||||||
``` | ||||||
The first column is the name of the managed instance group, and the second column is the zone it was created in. We will also need the name of the instance in that group, we can get it as follows | ||||||
|
||||||
The first column is the name of the managed instance group, and the second column is the zone in which it was created. You also need the name of the instance in that group, and you can get it by running: | ||||||
|
||||||
```bash | ||||||
gcloud compute instance-groups managed list-instances <the-name-of-the-managed-instance-group> --zone <zone> | ||||||
``` | ||||||
|
||||||
For example: | ||||||
|
||||||
```bash | ||||||
$ gcloud compute instance-groups managed list-instances gke-my-cluster-monitor-pool-08578e18-grp --zone us-west1-b | ||||||
|
||||||
NAME ZONE STATUS ACTION INSTANCE_TEMPLATE VERSION_NAME LAST_ERROR | ||||||
gke-my-cluster-monitor-pool-08578e18-c7vd us-west1-b RUNNING NONE gke-my-cluster-monitor-pool-08578e18 | ||||||
``` | ||||||
Now we can delete the instance | ||||||
|
||||||
Now you can delete the instance by specifying the name of the managed instance group and the name of the instance, for example: | ||||||
|
||||||
```bash | ||||||
gcloud compute instance-groups managed delete-instances gke-my-cluster-monitor-pool-08578e18-grp --instances=gke-my-cluster-monitor-pool-08578e18-c7vd --zone us-west1-b | ||||||
``` | ||||||
|
||||||
## Destroy | ||||||
|
||||||
When you are done, the infrastructure can be torn down by running: | ||||||
|
||||||
```bash | ||||||
$ gcloud compute instance-groups managed delete-instances gke-my-cluster-monitor-pool-08578e18-grp --instances=gke-my-cluster-monitor-pool-08578e18-c7vd --zone us-west1-b | ||||||
``` | ||||||
terraform destroy | ||||||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can actually type
export FOO=var
or something like that in the terminal, so setting the environment variables in bash_profile is a little overkill. I would suggest removing the line "To set the three environment variables, you can first runvi ~/.bash_profile
, append theexport
statements to it and runsource ~/.bash_profile
. "There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If export in the terminal, after customer quit from the session and then open another session to run terraform, the variables need to be exported again, I think it's not convenient