pivotal-cf/pks-kubo-deployment

Name: pks-kubo-deployment

Owner: Pivotal Cloud Foundry

Description: Contains scripts and configuration files used to build and deploy Kubo (Kubernetes on Bosh)

Created: 2018-02-21 14:39:07.0

Updated: 2018-02-21 14:39:48.0

Pushed: 2018-03-14 12:10:26.0

Homepage: https://pivotal.io/kubo

Size: 11403

Language: Go

GitHub Committers

UserMost Recent Commit# Commits

Other Committers

UserEmailMost Recent Commit# Commits

README

kubo-deployment

Kubo is a BOSH release for Kubernetes. It provides a solution for deploying and managing Kubernetes with BOSH

This repository contains the documentation and manifests for deploying kubo-release with BOSH.

Slack: #kubo on https://slack.cloudfoundry.org Pivotal Tracker: https://www.pivotaltracker.com/n/projects/2093412

CI Status

Build Kubo Release status Build Kubo Release Badge

IaaS specific jobs

| Job | GCP with CF routing pipeline Status |GCP with load balancer status|vSphere status| |———|——–|——–|——–| | Install BOSH | BOSH GCP Badge | BOSH GCP LB Badge | BOSH vSphere Badge | | Deploy K8s | Deploy K8s GCP Badge | Deploy K8s GCP LB Badge | Deploy K8s vSphere Badge | | Run smoke tests | Run smoke tests GCP Badge | Run smoke tests GCP LB Badge | Run smoke tests vSphere Badge |

See the complete pipeline for more details. The CI pipeline definitions are stored in the kubo-ci repository.

Table of Contents
Design
Components

A specialized BOSH director manages the virtual machines for the Kubo instance. This involves VM creation, health checking, and resurrection of missing or unhealthy VMs. The BOSH director includes CredHub and PowerDNS to handle certificate generation within the kubo clusters. Additionally, Credhub is used to store the auto-generated passwords.

Networking Topology - using IaaS Load Balancers

Diagram describing how traffic is routed to Kubo

The nodes that run the Kubernetes API (master nodes) are exposed through an IaaS specific load balancer. The load balancer will have an external static IP address that is used as a public and internal endpoint for traffic to the Kubernetes API.

Kubernetes services can be exposed using a second IaaS specific load balancer which forwards traffic to the Kubernetes worker nodes.

Networking Topology - using Cloud Foundry routing

Diagram describing how traffic is routed to Kubo using CF

The nodes that run the Kubernetes API (master nodes) register themselves with the Cloud Foundry TCP router. The TCP Router acts as both public and internal endpoint for the Kubernetes API to route traffic to the master nodes of a Kubo instance. All traffic to the API goes through the Cloud Foundry TCP router and then to a healthy node.

The Cloud Foundry subnet must be able to route traffic directly to the Kubo subnet. It is recommended to keep them in separate subnets when possible to avoid the BOSH directors from trying to provision the same addresses. This diagram specifies CIDR ranges for demonstration purposes as well as a public router in front of the Cloud Foundry gorouter and tcp-router which is typical.

Glossary
Installation

Please follow the install guide for installation instructions.

Troubleshooting

Please refer to the troubleshooting guide to look for solutions to the most common issues.

Documentation

Review the following documentation to get a better understanding of Cloud Foundry and Kubernetes architectures.

Contributing

For instructions on contributing to this project, please see CONTRIBUTING.md.


This work is supported by the National Institutes of Health's National Center for Advancing Translational Sciences, Grant Number U24TR002306. This work is solely the responsibility of the creators and does not necessarily represent the official views of the National Institutes of Health.