-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Example 258 fortigate perimeter package deploy procedure/verify for core lz unmanaged client #446
Comments
know oci and gitops are the core - and I agree having the code in github/ado/gitlab/csr is preferred - but some clients have requested the easier kpt option and it should be there as a base deployment option - since mid 2022 To be fair the base case deployment option is actually pure kubernetes krm yaml like in https://cloud.google.com/config-connector/docs/how-to/getting-started see original gitops docs in https://cloud.google.com/anthos-config-management/docs/concepts/config-controller-overview and https://cloud.google.com/anthos-config-management/docs/how-to/unstructured-repo 20230814: revisit kls
re-add kpt documentation at the end of section 2 https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/tree/main/docs/landing-zone-v2#2-create-your-landing-zone
kpt rendering ok
kpt live apply (20230414:1552)
just 1 org policy has an issue
deploying hub package
forgot to init - do this first
render
apply
getting a depends error on an existing resource - the folder reference - it exists - triaging checking it it requires the folder id
comment out dependency - rerun
returning simpler folder
working through failures/iam issues
working out iam permissions issues |
working additions custom FortigateSdnViewer role is in https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/blob/main/solutions/project/hub-env/fortigate/custom-role.yaml#L27
and todo:
Package Inventory
|
add packages
|
Current status (deploying hub) - move from #445 |
Known Issues Workarounds
|
restarting hub-env adjustment
|
Restarting clean org fortigate install for monday Deployment change - we will switch to an in-place kpt render (right in the github repo) - so we can track changes see fine tuning of the wiki documentation in https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/wiki/DevOps#quickstart Install the KCC cluster and minimal set of Landing Zone packages
Scenarios
prereq = billing quota above 5, liens commented in the code, org polices (gatekeeper) omitted create kcc cluster =
but use
delete lz = (including liens)
delete kcc cluster =
Plan
gcp-tools
refresh repo with main 20231019
create dev branch
add setters.yaml changes
undeploy any lz packages updeploy changes - clz package of 4push to remote repowrite part 2 lz sh script
see #567 Delete cluster only
Recreate KCC cluster
deploy changes - clz package of 4
wait for cnrm workloads to come up - 5 min first triage - folder errors
delete partial lz
adjust setters.yamldelete/recreate cluster
Triage pod failures
Adding security Admin to super admin (is in kcc.landing.systems) 2400: got it - should not have commented out the gKE service account - the yakima one
raised services coming up now
|
ssc-spc-ccoe-cei/gcp-tools#53 editupdate: found them in the new 2nd script Issue is that the access script assumes rootsync usage - it leaves out the kpt optionI recommend we put the yakima service account role additions back to the generic setup script. |
automation test target env root at landing.systems skip #296 (comment) need to be done manuallyverify org level sa roles in https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/blob/solutions/core-landing-zone/0.3.0/docs/landing-zone-v2/README.md#1-complete-the-bootstrap-procedure switch to automation
push super admin changes in #570 |
* #446 - fix 596 hardcoded hub-env/project * #446 - fix 599 management-namespace * #446 - fix 599 management-namespace * #466 - adjust script * #625 446 - N2_CPUS quota of 8 requires fortigate management vm to use e2-standard instead Testing in #625 and #446 In certain preconfigured environments the N2_CPUS quota may be above the default of 8 Attempting to increase the quota even to 10 will not always get approved * #710 - #446 - add gke enterprise anthos service enablement * #446 - LINT: add export to vars.sh * #446 - LINT: double management-project-id
* #446 - fix 596 hardcoded hub-env/project * #446 - fix 599 management-namespace * #446 - fix 599 management-namespace * #466 - adjust script * #625 446 - N2_CPUS quota of 8 requires fortigate management vm to use e2-standard instead Testing in #625 and #446 In certain preconfigured environments the N2_CPUS quota may be above the default of 8 Attempting to increase the quota even to 10 will not always get approved * #710 - #446 - add gke enterprise anthos service enablement * #446 - LINT: add export to vars.sh * #446 - LINT: double management-project-id * #446 - LINT warning
* #446 - fix 596 hardcoded hub-env/project * #446 - fix 599 management-namespace * #446 - fix 599 management-namespace * #466 - adjust script * #625 446 - N2_CPUS quota of 8 requires fortigate management vm to use e2-standard instead Testing in #625 and #446 In certain preconfigured environments the N2_CPUS quota may be above the default of 8 Attempting to increase the quota even to 10 will not always get approved * #710 - #446 - add gke enterprise anthos service enablement * #446 - LINT: add export to vars.sh * #446 - LINT: double management-project-id * #446 - LINT warning * #446 - LINT remove export
* #446 - fix 596 hardcoded hub-env/project * #446 - fix 599 management-namespace * #446 - fix 599 management-namespace * #466 - adjust script * #625 446 - N2_CPUS quota of 8 requires fortigate management vm to use e2-standard instead Testing in #625 and #446 In certain preconfigured environments the N2_CPUS quota may be above the default of 8 Attempting to increase the quota even to 10 will not always get approved * #710 - #446 - add gke enterprise anthos service enablement * #446 - LINT: add export to vars.sh * #446 - LINT: double management-project-id * #446 - LINT warning * #446 - LINT remove export * #446 - LINT remove unused email
merge main
|
From #654
line 88
|
* #446 - fix 596 hardcoded hub-env/project * #446 - fix 599 management-namespace * #446 - fix 599 management-namespace * #466 - adjust script * #625 446 - N2_CPUS quota of 8 requires fortigate management vm to use e2-standard instead Testing in #625 and #446 In certain preconfigured environments the N2_CPUS quota may be above the default of 8 Attempting to increase the quota even to 10 will not always get approved * #710 - #446 - add gke enterprise anthos service enablement * #446 - LINT: add export to vars.sh * #446 - LINT: double management-project-id * #446 - LINT warning * #446 - LINT remove export * #446 - LINT remove unused email * add KCC_PROJECT_ID in case gke up w/o clz - #446
State: #446 (comment)
in the larger set of issues There is WIP automation going into automating the hub-env setters.yaml in The yakima role associations are in both scripts in addition to the readme at thank you |
generated kcc project_id propagation to the end in yakima/sa role additions retested in #654
711 |
delete/recreate KCC GKE cluster - then re-acquire resources by id
|
move the partially completed kpt version script in 446 that completed the core-landing-zone and was mid way through hub-envto #766
|
Nat issue fixed by adding a restrictCloudNATUsage project level override for hub-env in #837 |
updates
dev = root landing systems
test = nuage
finops dev.. nua.cl.o
FinOps: PAYG + GKE + GCE costs will be $80/day above the normal $10/day for the GKE cluster alone.
The client requires deployment of the #258 perimeter on top of the core lz with additional DNS zones TBD
Document and reuse on top of #420 and and #421
gcloud deployment testing later 2022 - #158
See pre-kcc deployment run in #158
gcloud reference install: fortinet/fortigate-tutorial-gcp#1
see
https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/wiki/DevOps
mermaid - diagrams as code
See
todo:
Package Inventory
https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/wiki/Architecture
Notes:
The text was updated successfully, but these errors were encountered: