TKG Lab
In this lab, we will deploy Tanzu Kubernetes Grid to vSphere, AWS, or Azure. We will additionally deploy TKG packages for ingress, logging, metrics, service discovery and container registry services.
OSS Signed and Supported Packages:
- Contour for ingress
- Fluent-bit for logging
- Cert-manager for certificate management
- Harbor for image registry
- Velero for backup/restore, via Tanzu Mission Control Data Protection
- Prometheus and Grafana for monitoring
- External DNS as Kubernetes native way to manage DNS records
Incorporates the following Tanzu SaaS products:
- Tanzu Mission Control for multi-cluster management
- Tanzu Observability by Wavefront for enterprise full-stack observability (via optional Bonus Lab)
Leverages the following external services:
- AWS S3 as an object store for Velero backups
- AWS Route 53, GCP Cloud DNS or Azure DNS as DNS provider
- Okta as an OIDC provider
- Let's Encrypt as Certificate Authority
Additional OSS components not supported by VMware
- Elasticsearch and Kibana for log aggregation and viewing
- Minio for object storage
Goals and Audience
The following demo is for Tanzu field team members to see how various components of Tanzu and OSS ecosystem come together to build a modern application platform. We will highlight two different roles of the platform team and the application team's devops role. This could be delivered as a presentation and demo. Or it could be extended to include having the audience actually deploy the full solution on their own using thier cloud resources. The latter would be for SE’s and likely require a full day.
What we do have is a combination of open source and proprietary components, with a bias towards providing VMware built/signed OSS components by default, with flexibility to swap components and flexible integrations.
VMware commercial products included are: TKG, TO and TMC.
3rd-party SaaS services included are: AWS S3, AWS Route 53, GCP Cloud DNS, Azure DNS, Let's Encrypt, Okta. Note: There is flexibility in deployment planning. For instance, You could swap GCP Cloud DNS with Route53. Or you could swap Okta for Google or Auth0 for OpenID Connect.
Scenario Business Context
The acme corporation is looking to grow its business by improving their customer engagement channels and quickly testing various marketing and sales campaigns. Their current business model and methods can not keep pace with this anticipated growth. They recognize that software will play a critical role in this business transformation. Their development and ops engineers have chosen microservices and Kubernetes as foundational components to their new delivery model. They have engaged as a partner to help them with their ambitious goals.
App Team
The acme fitness team has reached out the platform team requesting platform services. They have asked for:
- Kubernetes based environment to deploy their acme-fitness microservices application
- Secure ingress for customers to access their application
- Ability to access application logs in real-time as well as 30 days of history
- Ability to access application metrics as well as 90+ days of history
- Visibility into overall platform settings and policy
- Daily backups of application deployment configuration and data
- 4 Total GB RAM, 3 Total CPU Core, and 10GB disk for persistent application data
Shortly after submitting their request, the acme fitness team received an email with the following:
- Cluster name
- Namespace name
- Base domain for ingress
- Link to view overall platform data, high-level observability, and policy
- Link to login to kubernetes and retrieve kubeconfig
- Link to search and browse logs
- Link to access detailed metrics
DEMO: With this information, let’s go explore and make use of the platform…
- Retrieve kubeconfig with tanzu cli
- Update ingress definition based upon base domain and deploy application (acme-fitness)
- Test access to the app as an end user (contour)
- View application logs (kibana, elasticsearch, fluent-bit)
- View application metrics (prometheus and grafana or tanzu observability)
- View backup configuration (velero)
- Browse overall platform data, observability, and policy (tmc)
Wow, that was awesome, what happened on the other side of the request for platform services? How did that all happen?
Required CLIs
- kubectl
- tmc
- tanzu v1.5.1
- velero v1.7.0
- helm v3
- yq v4.12+ (to install use
brew
for Mac andapt-get
for Linux). - kind (helpful, but not required)
- ytt, kapp, imgpkg, kbld (bundled with tanzu cli)
- jq
- aws (for deploying on AWS or using Route53 DNS)
- az (when deploying to Azure or using Azure DNS)
- terraform (for deploying on AWS)
Foundational Lab Setup Guides
There are are few options to setup the foundation lab setup of three clusters: management cluster, shared services cluster, and workload cluster.
- Step by Step Guide - Provides instructional guidance for each step, along with validation actions. This is the best option for really learning how each cluster is setup and develop experience with the enterprise packages and integrations configured for the lab.
- One Step Scripted Deployment - This method assumes you have done any required manual steps. There is one script that will deploy all clusters and perform integrations. It is best to use this after you have already completed the step by step guide, as any specific configuration issue you may would have been worked out in that process previously.
Acme Fitness Lab
This lab will go through our simulated experience of receiving a request from an app team for cloud resources and following the steps for both the platform team receiving the request and the app team accessing and deploying their app once the request has been fulfilled.
Platform Team Steps
Update Okta for Application Team Users and Group
1.Set policy on Workload Cluster and Namespace
2.Switch to the App Team Perspective
Log-in to workload cluster and setup kubeconfig
3.Get, update, and deploy Acme-fitness app
4.Bonus Labs
The following labs additional labs can be run on the base lab configuration.