Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release/v0.37.0 #110

Merged
merged 37 commits into from
Jan 17, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
37 commits
Select commit Hold shift + click to select a range
2a8b110
feat: adding vault restore to vault-init-controller
venkatamutyala Dec 3, 2023
d9484d2
feat(vault-backup): adding s3:GetObject for presigned access
venkatamutyala Dec 10, 2023
83b05c6
Update iam-policy-vault-backup-s3.tf
venkatamutyala Dec 10, 2023
0d07f87
Update iam-policy-vault-backup-s3.tf
venkatamutyala Dec 10, 2023
2a08271
Update iam-policy-vault-backup-s3.tf
venkatamutyala Dec 10, 2023
6e8c705
Chore/update glueops platform (#111)
venkatamutyala Dec 11, 2023
33cd8d0
feat: adding list permission to reader role in vault configuration (#…
venkatamutyala Dec 11, 2023
630a5ac
feat: bump platform version and codespaces version
venkatamutyala Dec 11, 2023
90044dd
terraform-docs: automated action
github-actions[bot] Dec 11, 2023
267e154
update to v0.37.0-rc4
AntonBilyk Dec 12, 2023
2096184
terraform-docs: automated action
github-actions[bot] Dec 12, 2023
f3d176f
feat: adding s3 deletion step (#113)
venkatamutyala Dec 12, 2023
c5412be
Feat/adding list permissions for loki s3 user (#114)
venkatamutyala Dec 15, 2023
a6736ad
chore(argocd_app_version): v2.8.6 -> v2.8.7 (#115)
fernandoataoldotcom Dec 18, 2023
a6f0fb4
chore(codespace_version): v0.32.0 -> v0.32.1 (#116)
fernandoataoldotcom Dec 18, 2023
60f4f20
update to v0.37.0-rc7
AntonBilyk Dec 19, 2023
590cb05
terraform-docs: automated action
github-actions[bot] Dec 19, 2023
a32ec63
change to v0.37.0-rc9
AntonBilyk Dec 28, 2023
0c1d36f
terraform-docs: automated action
github-actions[bot] Dec 28, 2023
f1945a7
feat:adding link to k3d repo (#117)
venkatamutyala Dec 28, 2023
ecc5fc3
Update tenant-readme.md.tpl (#118)
venkatamutyala Dec 29, 2023
88beab9
change to v0.37.0-rc10
AntonBilyk Jan 10, 2024
dc6d94a
terraform-docs: automated action
github-actions[bot] Jan 10, 2024
a1d8a58
Change env to v0.37.0-rc12
AntonBilyk Jan 11, 2024
6980ede
terraform-docs: automated action
github-actions[bot] Jan 11, 2024
a213e0a
feat: increase s3 retention in both development and production (#119)
venkatamutyala Jan 15, 2024
dde3460
Change to v0.37.0-rc14
AntonBilyk Jan 15, 2024
eab340c
terraform-docs: automated action
github-actions[bot] Jan 15, 2024
3ae54fa
feat: update codespace version to latest
venkatamutyala Jan 15, 2024
3af92f8
feat: tools version v0.5.1 -> v0.6.0
venkatamutyala Jan 15, 2024
20b734b
feat: update rc14 -> rc15 (#120)
venkatamutyala Jan 15, 2024
1f776ed
change env to v0.37.0-rc14
AntonBilyk Jan 16, 2024
985c78b
terraform-docs: automated action
github-actions[bot] Jan 16, 2024
7ee3812
Change env to v0.37.0-rc15
AntonBilyk Jan 16, 2024
130a1ed
terraform-docs: automated action
github-actions[bot] Jan 16, 2024
2e01a03
feat: bump rc15 -> final release for v0.37.0
venkatamutyala Jan 17, 2024
a5ad553
terraform-docs: automated action
github-actions[bot] Jan 17, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ No requirements.
| <a name="module_captain_repository_files"></a> [captain\_repository\_files](#module\_captain\_repository\_files) | ./modules/github-captain-repository-files/0.1.0 | n/a |
| <a name="module_common_s3"></a> [common\_s3](#module\_common\_s3) | ./modules/multy-s3-bucket/0.1.0 | n/a |
| <a name="module_dnssec_key"></a> [dnssec\_key](#module\_dnssec\_key) | git::https://github.com/GlueOps/terraform-module-cloud-aws-dnssec-kms-key.git | v0.1.0 |
| <a name="module_glueops_platform_helm_values"></a> [glueops\_platform\_helm\_values](#module\_glueops\_platform\_helm\_values) | git::https://github.com/GlueOps/platform-helm-chart-platform.git | v0.35.1 |
| <a name="module_glueops_platform_helm_values"></a> [glueops\_platform\_helm\_values](#module\_glueops\_platform\_helm\_values) | git::https://github.com/GlueOps/platform-helm-chart-platform.git | v0.37.0 |
| <a name="module_loki_s3"></a> [loki\_s3](#module\_loki\_s3) | ./modules/multy-s3-bucket/0.1.0 | n/a |
| <a name="module_opsgenie_teams"></a> [opsgenie\_teams](#module\_opsgenie\_teams) | ./modules/opsgenie/0.1.0 | n/a |
| <a name="module_tenant_readmes"></a> [tenant\_readmes](#module\_tenant\_readmes) | ./modules/tenant-readme/0.1.0 | n/a |
Expand Down
2 changes: 1 addition & 1 deletion captain-repo.tf
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ EOT

"terraform/vault/configuration/main.tf" = <<EOT
module "configure_vault_cluster" {
source = "git::https://github.com/GlueOps/terraform-module-kubernetes-hashicorp-vault-configuration.git?ref=v0.6.0"
source = "git::https://github.com/GlueOps/terraform-module-kubernetes-hashicorp-vault-configuration.git?ref=v0.7.0"
oidc_client_secret = "${random_password.dex_vault_client_secret[each.key].result}"
captain_domain = "${each.value.environment_name}.${aws_route53_zone.main.name}"
org_team_policy_mappings = [
Expand Down
2 changes: 1 addition & 1 deletion generate-helm-values.tf
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ locals {

module "glueops_platform_helm_values" {
for_each = local.environment_map
source = "git::https://github.com/GlueOps/platform-helm-chart-platform.git?ref=v0.35.1"
source = "git::https://github.com/GlueOps/platform-helm-chart-platform.git?ref=v0.37.0"
captain_repo_b64encoded_private_deploy_key = base64encode(module.captain_repository[each.value.environment_name].private_deploy_key)
captain_repo_ssh_clone_url = module.captain_repository[each.value.environment_name].ssh_clone_url
this_is_development = var.this_is_development
Expand Down
2 changes: 1 addition & 1 deletion generate-tenant-readmes.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
locals {
argocd_app_version = "v2.8.6"
argocd_app_version = "v2.8.7"

}

Expand Down
16 changes: 12 additions & 4 deletions iam-policy-loki-xptr-s3.tf
Original file line number Diff line number Diff line change
Expand Up @@ -10,15 +10,23 @@ resource "aws_iam_policy" "loki_logs_exporter_s3" {
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:ListObject",
"s3:HeadObject",
"s3:ListBucket",
"s3:GetObject"
"s3:GetObject",
"s3:List*"
],
"Resource": [
"${module.common_s3.primary_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/loki_exported_logs/*",
"${module.common_s3.replica_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/loki_exported_logs/*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:ListBucket"
],
"Resource": [
"${module.common_s3.primary_s3_bucket_arn}",
"${module.common_s3.replica_s3_bucket_arn}"
]
}
]
}
Expand Down
13 changes: 12 additions & 1 deletion iam-policy-vault-backup-s3.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,12 +9,23 @@ resource "aws_iam_policy" "vault_s3_backup" {
{
"Effect": "Allow",
"Action": [
"s3:PutObject"
"s3:PutObject",
"s3:GetObject"
],
"Resource": [
"${module.common_s3.primary_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/hashicorp-vault-backups/*",
"${module.common_s3.replica_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/hashicorp-vault-backups/*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:GetObject"
],
"Resource": [
"${module.common_s3.primary_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/hashicorp-vault-init/*",
"${module.common_s3.replica_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/hashicorp-vault-init/*"
]
}
]
}
Expand Down
11 changes: 11 additions & 0 deletions iam-policy-vault-init-s3.tf
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,17 @@ resource "aws_iam_policy" "vault_init_s3" {
"${module.common_s3.replica_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/hashicorp-vault-init/*"
]
},
{
"Effect": "Allow",
"Action": [
"s3:GetObject*",
"s3:List*"
],
"Resource": [
"${module.common_s3.primary_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/hashicorp-vault-backups/*",
"${module.common_s3.replica_s3_bucket_arn}/${aws_route53_zone.clusters[each.key].name}/hashicorp-vault-backups/*"
]
},
{
"Effect": "Allow",
"Action": [
Expand Down
2 changes: 1 addition & 1 deletion modules/multy-s3-bucket/0.1.0/s3-backup-bucket.tf
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ resource "aws_s3_bucket_lifecycle_configuration" "replica" {
filter {}

noncurrent_version_expiration {
noncurrent_days = var.this_is_development ? 1 : 90
noncurrent_days = var.this_is_development ? 14 : 180
}
status = "Enabled"
}
Expand Down
4 changes: 2 additions & 2 deletions modules/multy-s3-bucket/0.1.0/s3-primary-bucket.tf
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ resource "aws_s3_bucket_lifecycle_configuration" "primary" {
filter {}

noncurrent_version_expiration {
noncurrent_days = var.this_is_development ? 1 : 90
noncurrent_days = var.this_is_development ? 14 : 180
}
status = "Enabled"
}
Expand All @@ -54,4 +54,4 @@ resource "aws_s3_bucket_public_access_block" "primary" {
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
6 changes: 3 additions & 3 deletions modules/tenant-readme/0.1.0/readme.tf
Original file line number Diff line number Diff line change
Expand Up @@ -39,11 +39,11 @@ data "local_file" "readme" {
}

locals {
codespace_version = "v0.31.4"
codespace_version = "v0.33.1"
argocd_crd_version = var.argocd_app_version
argocd_helm_chart_version = "5.50.1"
glueops_platform_version = "v0.35.1" # this also needs to be updated in the module.glueops_platform_helm_values // generate-helm-values.tf
tools_version = "v0.5.1"
glueops_platform_version = "v0.37.0" # this also needs to be updated in the module.glueops_platform_helm_values // generate-helm-values.tf
tools_version = "v0.6.0"
}


Expand Down
22 changes: 21 additions & 1 deletion modules/tenant-readme/0.1.0/tenant-readme.md.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ This README will outline the steps required to:
4. Tear down the cluster when it is no longer needed.

<br /><br />
## Prerequisites
## Prerequisites (not k3d)

1. User account in the desired cloud with necessary permissions to create Service Users capable of deploying a Kubernetes cluster.
2. [Create a new Codespace.](https://github.com/codespaces/new?hide_repo_select=true&ref=%F0%9F%9A%80%F0%9F%92%8E%F0%9F%99%8C%F0%9F%9A%80&repo=527049979&skip_quickstart=true&machine=basicLinux32gb&devcontainer_path=.devcontainer%2Fplaceholder_codespace_version%2Fdevcontainer.json)
Expand All @@ -26,6 +26,7 @@ gh repo clone placeholder_github_owner/placeholder_repo_name
## Select Cloud
- [GCP](#GCP)
- [AWS](#AWS)
- [k3d](https://github.com/GlueOps/k3d)

## GCP

Expand Down Expand Up @@ -125,10 +126,21 @@ In addition to creating the `deployment-configurations` repository, you must ins

<br /><br />

## Delete Tenant Data From S3

Use the following command to destroy any backups/ephemeral data when you created your cluster.
* [Launch a CloudShell](https://us-east-1.console.aws.amazon.com/cloudshell/home?region=us-west-2) within the Primary/Root AWS Account.
* Execute the following command in the cloudshell. When prompted, enter the name of your captain domain (e.g. test-001-np.earth.onglueops.rocks ).

```sh
bash <(curl -s https://raw.githubusercontent.com/GlueOps/development-only-utilities/placeholder_tools_version/tools/aws/tenant-s3-nuke.sh)
```

## Teardown Kubernetes

- [AWS](#AWS-Teardown)
- [GCP](#GCP-Teardown)
- [k3d](#k3d-teardown)

### AWS Teardown

Expand All @@ -150,3 +162,11 @@ Use the following command to destroy the cluster when it is no longer needed.
source <(curl -s https://raw.githubusercontent.com/GlueOps/development-only-utilities/placeholder_tools_version/tools/gcp/gcp-project-teardown) && \
gcp-project-teardown -p placeholder_tenant_key-placeholder_cluster_environment
```

### k3d Teardown

Login to the AWS Lightsail account and delete the nodes with your captain domain. You can tear down your cluster locally with:

```bash
k3d cluster delete captain
```