4.9 KiB
Linode Static Site Infrastructure (in Kube!)
The following configuration will deploy a Linode Kubernetes Cluster and NodeBalancer with Terraform, install the necessary Kubernetes resources to serve a static website, and deploy a Jekyll site using Helm.
The jekyll site provided in this repo is an example and includes a basic Dockerfile and script for building and pushing the images to Dockerhub.
Usage
Hard-mode
Infrastructure
-
Clone the repo.
-
Edit the values in
.envrc
to values appropriate for your project. Rundirenv allow
once set.# The DockerHub repo associated with the image to build. export IMGREPO= # The Linode API key of the account to create the resources. # Storing API keys for an account in this fashion is _NOT RECOMMENDED_! Consider using a secrets manager to store this value locally for your project (i.e. doppler). export TF_VAR_token= # This file is created automatically when the infra is created in Terraform. export KUBECONFIG=./.kube-config
-
Change to the
/terraform
directory and create the LKE cluster.terraform apply
-
Once the infrastructure has been created, change directory to the root of the project
cd ..
and check Kubernetes connection.kubectl get namespaces
-
Apply the Kubernetes manifest configurations for necessary services. Apply in order!
# /manifests kubectl apply -f nginx-ingress-controller-v4.0.19.yaml kubectl apply -f cert-manager-v1.7.2.yaml kubectl apply -f cert-manager-clusterissuer.yaml
-
Navigate to the Linode NodeBalancer page, or use the following command, to acquire the Public IP address of the new LoadBalancer.
kubectl get services
-
Create an
A
record in your DNS provider using the acquired public IP address.
Site Development
-
Change to the
/site
directory. Refer toabout.markdown
in this directory for information on applying a custom Jekyll theme. -
Run
./deploy/docker.sh
to build a new image of the site and push it to Dockerhub.
Deploy
-
Use
charts/site/override.yaml
to set the necessary values for the project site. -
Install the new site. Uses LetsEncrypt Staging setup. Apply override.yaml to apply production certs
helm install site charts/site --values charts/site/values.yaml
Update the website
-
If not using latest as your image tag, set the new image version tag using
appVersion
in/charts/site/Chart.yaml
. This may also be set by usingimage.tag
in/charts/site/values.yaml
or/charts/site/override.yaml
. -
Use
/site/deploy/docker.sh
to build the new image. -
Use Helm to perform a rolling upgrade. Value files are read left->right and will overwrite in that order.
helm upgrade site charts/site -f charts/site/values.yaml -f charts/site/override.yaml
Secrets Support
Using this repo requires providing a Linode API key in an environment variable. It is highly recommended to use a secrets manager to pass TF_VAR_token
.
If you do not have a password manager, I recommend checking out Doppler. Here are the steps to get started.
- Signup for a Doppler account.
- Create a project. (example-project is created by default and is not recommended)
- Inside one of the new project's environments, create a secret named
TOKEN
and provide the Linode API key. - Install the Doppler CLI.
- Login from any directory:
doppler login
. - From this project's directory:
doppler setup
. Choose the project and environment created in step 2. - Uncomment the Doppler line in the provided
.envrc
. direnv allow
Improvement Notes
-
If the NGINX Ingress Controller is not destroyed prior to destroying the infrastructure using Terraform, the Linode NodeBalancer will continue to exist within the account. This must be deleted manually. Automation for this process will come with a new version of this project.
-
The kube-config only works properly in the root directory.
-
Automation for the entire infra build process.
- Image tags need an env var.
- Helm should use env vars to identify new for deployment.
- CI/CD pipeline for use in Gitlab/Github/etc.
- Implement terraform backend support for state management.
-
Add autoscaler support to LKE cluster.
-
CertManager Helm flag did not generate namespace as indicated in the docs. This step had to be manually added to
cert-manager-v1.7.2.yaml
. This will be a problem for upgrading in the future.