- Purpose
- Migrating from cf-release to cf-deployment
- TLS validation
- Deploying CF
- Contributing
- Setup and Prerequisites
- Ops Files
- CI
This repo contains a canonical BOSH deployment manifest
for deploying the CF Application Runtime without the use of cf-release
,
relying instead on individual component releases.
It replaces the manifest generation scripts in cf-release
which have finally been deprecated.
It uses several newer features
of the BOSH director and CLI.
Older directors may need to be upgraded
and have their configurations extended
in order to support cf-deployment
.
cf-deployment
embodies several opinions
about the CF Application Runtime.
It:
- prioritizes readability and meaning to a human operator. For instance, only necessary configuration is included.
- emphasizes security and production-readiness by default.
- CredHub is used by default to generate strong passwords, certs, and keys. There are no default credentials, even in bosh-lite.
- TLS/SSL features are enabled on every job which supports TLS.
- uses three AZs, of which two are used to provide redundancy for most instance groups. The third is used only for instance groups that should not have even instance counts, such as consul.
- uses Diego (source code) natively, does not support the deprecated DEAs, and enables diego-specific features such as ssh access to apps by default.
- deploys jobs to handle platform data persistence using singleton versions of the cf-mysql release for databases and the CAPI release's singleton WebDAV job for blob storage. See the database and blobstore sections of the deployment guide for more resilient options.
- assumes load-balancing will be handled by the IaaS or an external deployment.
The Release Integration team
supports a transition path from cf-release
.
You can find tooling and documentation for performing the migration
in our cf-deployment-transition repo.
Many test, development, and "getting started" environments
do not have valid TLS
certificates
installed in their load balancers.
cf-deployment
skips TLS
validation
on some components
that access each other via the "front door"
of the Cloud Foundry load balancer
for ease of use
in such environments.
This is a temporary solution
that will be addressed soon
by the BOSH Trusted Certificates workflow.
Production deployers who have valid
or otherwise trusted
load balancer certificates should use the
stop-skipping-tls-validation.yml opsfile
to force the validation of TLS
certificates
for all components.
Deployment instructions have become verbose, so we've moved them into a dedicated deployment guide here.
There's a small section in that doc that tries to help operators reason about choices they can make in their deployments. Take a look at Notes for operators.
See the rest of this document for more on the new CLI, deployment vars, and configuring your BOSH director.
Although the default branch for the repository is master
,
we ask that all pull requests be made against
the develop
branch.
Please also take a look at the "style guide",
which lays out some guidelines for adding properties or jobs
to the deployment manifest.
Before submitting a pull request
or pushing to develop,
please run ./scripts/test
which interpolates all of our ops files
with the bosh
cli.
By default, the test suite omits semantic
tests,
which require both jq
and yq installed.
If you wish to run them,
please install these requirements and
set RUN_SEMANTIC=true
in your environment.
Note: it is necessary to run the tests from the root of the repo.
If you add an Ops-file,
you will need to document it in its corresponding README
and add it to the ops file tests in scripts/test
.
We ask that pull requests and other changes be successfully deployed, and tested with the latest sha of CATs.
cf-deployment
relies on newer BOSH features,
and requires a bosh director with a valid cloud-config that has been configured with a certificate authority.
It also requires the new bosh
CLI,
which it relies on to generate and fill-in needed variables.
cf-deployment
requires BOSH v262
.
cf-deployment
requires the new BOSH CLI.
cf-deployment
assumes that
you've uploaded a compatible cloud-config to the BOSH director.
The cloud-config produced by bbl
is compatible by default,
which covers GCP, AWS, and Azure.
The iaas-support
directory includes tools and templates for building cloud-configs for other IaaSes,
including bosh-lite, vSphere, Openstack, and Alibaba Cloud.
For other IaaSes,
you may need to do some engineering work to figure out the right cloud config (and possibly ops files)
to get it working for cf-deployment
.
cf-deployment.yml
requires additional information
to provide environment-specific or sensitive configuration
such as the system domain and various credentials.
To do this in the default configuration,
we use CredHub,
which is deployed on your BOSH director by default if you are using bbl
.
Where necessary credential values are not present,
CredHub will generate new values
based on the type information stored in cf-deployment.yml
.
Note: BOSH vars-store
is no longer the default way to store
and generate credentials and will be deprecated in
cf-deployment
3.0.
Necessary variables that BOSH can't ask CredHub to generate need to be supplied as well. In the default case this is just the system domain, but some ops files introduce additional variables. See the summary for the particular ops files you're using for any additional necessary variables.
There are three ways to supply such additional variables.
- They can be provided by passing individual
-v
arguments. The syntax for-v
arguments is-v <variable-name>=<variable-value>
. This is the recommended method for supplying the system domain. - They can be provided in a yaml file
accessed from the command line with the
-l
or--vars-file
flag. This is the recommended method for configuring external persistence services. - They can be stored in CredHub directly with the CredHub CLI. If you do this, then you need follow variable namespacing rules respected by BOSH described here.
Before using CredHub for cf-deployment,
you will need to migrate your credentials from vars-store
to CredHub.
We have a utility to help you migrate.
The configuration of CF represented by cf-deployment.yml
is intended to be a workable, secure, fully-featured default.
When the need arises to make different configuration choices,
we accomplish this with the -o
/--ops-file
flags.
These flags read a single .yml
file that details operations to be performed on the manifest
before variables are generated and filled.
We've supplied some common manifest modifications in the operations
directory.
More details can be found in the Ops-file README.
The operations
directory includes subdirectories
for "community", "experimental", and "test" ops-files.
These ops-files make changes to most or all instance groups. They can be applied to the BOSH Director's runtime config, or directly to an individual deployment manifest.
The ops-file to configure platform component logging with rsyslog is such an add-on. Please see the Addon Ops-file README for details.
"Community" ops-files are contributed by the Cloud Foundry community. They are not maintained or supported by the Release Integration team. For details, see the Community Ops-file README
"Experimental" ops-files represent configurations that we expect to promote to blessed configuration eventually, meaning that, once the configurations have been sufficiently validated, they will become part of cf-deployment.yml and the ops-files will be removed. For details, see the Experimental Ops-file README.
"Test" ops-files are configurations that we run in our testing pipeline to enable certain features. We include them in the public repository (rather than in our private CI repositories) for a few reasons, depending on the particular ops-file.
Some files are included
because we suspect that the configurations will be commonly needed
but not easily generalized.
For example,
add-persistent-isolation-segment.yml
shows how a deployer can add an isolated Diego cell,
but the ops-file is hard to apply repeatably.
In this case, the ops-file is an example.
The ci for cf-deployment
automatically bumps to the latest versions of its component releases on the develop
branch.
These bumps, along with any other changes made to develop
, are deployed to a single long-running environment
and tested with CATs before being merged to master if CATs goes green.
Each version of cf-deployment is given a corresponding branch in the CATs repo,
so that users can discover which version of CATs to run against their deployments.
For example, if you've deployed cf-deployment v0.35.0,
check out the cf0.35
branch in cf-acceptance-tests to run CATs.
The configuration for our pipeline can be found here.