Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

change logging cluster name to logging-tracing cluster #11

Merged
merged 1 commit into from
Nov 24, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ The purpose of this project is to develop and deploy a machine learning applicat
[4. Setup CI/CD](#4-setup-cicd)

## 1. System architecture with Kubernetes (K8s)
![](images/archi.png?)
![](images/archi.png)


### Note
Expand Down Expand Up @@ -86,7 +86,7 @@ You can access different tool at:

We deploy our system on Google Cloud Platform (GCP) using three distinct clusters:

1. **Logging Cluster**: Hosts the ELK stack and Jaeger for comprehensive logging and tracing.
1. **Logging & Tracing Cluster**: Hosts the ELK stack and Jaeger for comprehensive logging and tracing.
2. **Metrics Cluster**: Contains the Prometheus server and Grafana for effective monitoring.
3. **Model Serving Cluster**: Dedicated to model serving operations.

Expand Down Expand Up @@ -149,16 +149,16 @@ You can do `source ./deployments/variables.sh` to set these env variables in you
When the process finishes, you put the IP (`$APP_IP`) in your `/etc/hosts`: `THE_IP_OF_APP app.example.com`

**Kibana**
- `echo $KIBANA_IP` to get kibana address.
- `echo http://$KIBANA_IP:5601` to get kibana address.
- Connect with username `elastic` and password $KIBANA_PASSWORD.
![](images/kibana_log.png)

**Jaeger**
- `echo $JAEGER_QUERY_HOST` to get JaegerUI address.
- `echo http://$JAEGER_QUERY_HOST` to get JaegerUI address.
![](images/jaegerui.png)

**Grafana**
- `echo $GRAFANA_IP` and you can access to grafana with that address.
- `echo http://$GRAFANA_IP` and you can access to grafana with that address.
- Username is `admin` and Password
```bash
echo $GRAFANA_PASSWORD
Expand Down
12 changes: 6 additions & 6 deletions deployments/STEP-BY-STEP.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Deploy system on Google Cloud Platform

## 1. Deploy Logging Cluster
## 1. Deploy Logging & Tracing Cluster

### Step 1: Create **monitoring** namespace
- Connect
Expand All @@ -9,12 +9,12 @@ gcloud container clusters get-credentials logging-cluster --zone us-central1-c -
```
- Create namespace
```bash
kubectl create namespace logging && kubens logging
kubectl create namespace logging_tracing && kubens logging_tracing
```

### Step 2: Add secret
```bash
cd deployments/logging
cd deployments/logging-tracing
kubectl apply -f secret.yaml
```

Expand All @@ -25,7 +25,7 @@ helm upgrade --install elasticsearch ./elasticsearch
```
- Wait until the elasticsearch pod is ready. Then get `certificate` generated by `elasticsearch` which is needed for model-serving cluster to push logs to `elasticsearch`.
```bash
k get secrets --namespace=logging elasticsearch-master-certs -ojsonpath='{.data}' > cert.json
k get secrets --namespace=logging_tracing elasticsearch-master-certs -ojsonpath='{.data}' > cert.json
```
Copy `ca.crt`, `tls.crt` and `tls.key` value and place in model-serving cluster's [certificate](model-serving/elasticsearch-cert.yaml) and metric-cluster 's [certificate](metrics/elasticsearch-cert.yaml).

Expand Down Expand Up @@ -60,12 +60,12 @@ k get svc kibana-kibana --output jsonpath='{.status.loadBalancer.ingress[0].ip}'
```
- Connect to kibana platform. Sign in with username `elastic`, you can get password by the following command
```bash
kubectl get secrets --namespace=logging elasticsearch-master-credentials -ojsonpath='{.data.password}' | base64 -d
kubectl get secrets --namespace=logging_tracing elasticsearch-master-credentials -ojsonpath='{.data.password}' | base64 -d
```

- In case you need to reinstall `kibana`, these are commands to remove kibana.
```bash
kubectl get all --namespace=logging --no-headers | grep kibana | awk '{print $1}' | xargs -I {} kubectl delete {} --namespace=logging
kubectl get all --namespace=logging_tracing --no-headers | grep kibana | awk '{print $1}' | xargs -I {} kubectl delete {} --namespace=logging_tracing
k delete serviceaccounts pre-install-kibana-kibana && k delete configmaps kibana-kibana-helm-scripts && k delete roles.rbac.authorization.k8s.io pre-install-kibana-kibana && k delete rolebindings.rbac.authorization.k8s.io pre-install-kibana-kibana
```

Expand Down
42 changes: 21 additions & 21 deletions deployments/deploy.sh
Original file line number Diff line number Diff line change
Expand Up @@ -30,9 +30,9 @@ deploy_component() {
# Function to get elasticsearch certificate
copy_elasticsearch_certificate() {
echo "Copying elasticsearch certificate..."
CA_CRT=$(kubectl get secrets --namespace=logging elasticsearch-master-certs -o json | jq -r '.data["ca.crt"]')
TLS_CRT=$(kubectl get secrets --namespace=logging elasticsearch-master-certs -o json | jq -r '.data["tls.crt"]')
TLS_KEY=$(kubectl get secrets --namespace=logging elasticsearch-master-certs -o json | jq -r '.data["tls.key"]')
CA_CRT=$(kubectl get secrets --namespace=logging-tracing elasticsearch-master-certs -o json | jq -r '.data["ca.crt"]')
TLS_CRT=$(kubectl get secrets --namespace=logging-tracing elasticsearch-master-certs -o json | jq -r '.data["tls.crt"]')
TLS_KEY=$(kubectl get secrets --namespace=logging-tracing elasticsearch-master-certs -o json | jq -r '.data["tls.key"]')

# Replace the certificate in the model-serving elasticsearch-cert.yaml
sed -i 's|ca.crt:.*|ca.crt: '"$CA_CRT"'|' model-serving/elasticsearch-cert.yaml
Expand All @@ -49,9 +49,9 @@ copy_elasticsearch_certificate() {


# DEPLOY LOGGING CLUSTER
deploy_logging_cluster() {
deploy_logging_tracing_cluster() {
echo "****************************************************"
echo "********** DEPLOY LOGGING CLUSTER... ***************"
echo "********** DEPLOY LOGGING AND TRACING CLUSTER... ***************"
echo "****************************************************"

export ELASTICSEARCH_IP=""
Expand All @@ -61,31 +61,31 @@ deploy_logging_cluster() {
export JAEGER_QUERY_HOST=""
export LOGGING_NODE_IP=""

gcloud container clusters get-credentials logging-cluster --zone $ZONE --project $PROJECT_ID
gcloud container clusters get-credentials logging-tracing-cluster --zone $ZONE --project $PROJECT_ID

if ! kubectl get namespace logging > /dev/null 2>&1; then
kubectl create namespace logging
if ! kubectl get namespace logging-tracing > /dev/null 2>&1; then
kubectl create namespace logging-tracing
fi
kubens logging
kubectl apply -f logging/secret.yaml
deploy_component "elasticsearch" "./logging/elasticsearch" ""
kubens logging-tracing
kubectl apply -f logging-tracing/secret.yaml
deploy_component "elasticsearch" "./logging-tracing/elasticsearch" ""

# Deploy cadvisor, node-exporter
deploy_component "cadvisor" "./logging/cadvisor" ""
deploy_component "cadvisor" "./logging-tracing/cadvisor" ""
echo "Cadvisor is launched."
deploy_component "node-exporter" "./logging/node-exporter" ""
deploy_component "node-exporter" "./logging-tracing/node-exporter" ""
echo "Node exporter is launched."

# To deploy kibana and jaeger, we need to make sure that elasticsearch is ready
echo "Waiting for elasticsearch to be ready..."
kubectl wait --for=condition=ready pod -l app=elasticsearch-master -n logging --timeout=300s
kubectl wait --for=condition=ready pod -l app=elasticsearch-master -n logging-tracing --timeout=300s

# Deploy kibana and jaeger
echo "Elasticsearch is ready. Deploying filebeat, kibana and jaeger..."
deploy_component "filebeat" "./logging/filebeat" ""
deploy_component "filebeat" "./logging-tracing/filebeat" ""
echo "Filebeat is launched."
deploy_component "kibana" "./logging/kibana" ""
deploy_component "jaeger" "./logging/jaeger" ""
deploy_component "kibana" "./logging-tracing/kibana" ""
deploy_component "jaeger" "./logging-tracing/jaeger" ""

# Get elasticsearch certificate and assign to model-serving filebeat and metric-server filebeat
copy_elasticsearch_certificate
Expand All @@ -106,7 +106,7 @@ deploy_logging_cluster() {
KIBANA_IP=$(kubectl get svc kibana-kibana --output jsonpath='{.status.loadBalancer.ingress[0].ip}')
[ -z "$KIBANA_IP" ] && sleep 2
done
KIBANA_PASSWORD=$(kubectl get secrets --namespace=logging elasticsearch-master-credentials -ojsonpath='{.data.password}' | base64 -d)
KIBANA_PASSWORD=$(kubectl get secrets --namespace=logging-tracing elasticsearch-master-credentials -ojsonpath='{.data.password}' | base64 -d)
echo "Kibana Address: http://$KIBANA_IP:5601"
echo "Kibana Username: elastic"
echo "Kibana Password: $KIBANA_PASSWORD"
Expand Down Expand Up @@ -320,8 +320,8 @@ if ! command -v yq &> /dev/null; then
fi


if [ "$1" = "logging" ]; then
deploy_logging_cluster
if [ "$1" = "logging_tracing" ]; then
deploy_logging_tracing_cluster
create_summary
elif [ "$1" = "model-serving" ]; then
deploy_model_serving_cluster
Expand All @@ -330,7 +330,7 @@ elif [ "$1" = "metrics" ]; then
deploy_metrics_cluster
create_summary
elif [ "$1" = "all" ]; then
deploy_logging_cluster
deploy_logging_tracing_cluster
deploy_model_serving_cluster
deploy_metrics_cluster
create_summary
Expand Down
File renamed without changes.
6 changes: 3 additions & 3 deletions deployments/metrics/elasticsearch-cert.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
apiVersion: v1
data:
ca.crt: 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
tls.crt: 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
tls.key: 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
ca.crt: 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
tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURtRENDQW9DZ0F3SUJBZ0lSQU96TWR0SkNwWmVoN3pDZk0wcGZRM013RFFZSktvWklodmNOQVFFTEJRQXcKR3pFWk1CY0dBMVVFQXhNUVpXeGhjM1JwWTNObFlYSmphQzFqWVRBZUZ3MHlOREV4TWpReE5qVXlNamhhRncweQpOVEV4TWpReE5qVXlNamhhTUI4eEhUQWJCZ05WQkFNVEZHVnNZWE4wYVdOelpXRnlZMmd0YldGemRHVnlNSUlCCklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUFwMll6UTd6YUU2cmIzOWhxNnUxbVRjU1gKV1JZZmthUWpCQkJXclhNSU1UYmFKakFuOVBwcDBhd3ZNTkc4ZVNocE9lcFVMOWs1MEQyTDVNYjJ3Y0tDd0NPSgorU0pVRFlFUDdYMUtmVHhRa2g0cFd6bHg2b2NSRW5sbTI5ekcrZDRjSWtDbWZxL0hwYkNYelM4Syswb2VEa3EyCjRPckxqelhNVE5YdU9KZnBINWFzWWtMcnNuQ1N3UzBzS0IwdHJ6RktITEFITVMyTHhqWFRsczZ3ZStHV1JKa3MKeGFtWnNvMU8yK1Q1WDdSbUcvMVdKV1BwR2RZZlVYQjlsaE1KWmJMUlBOTldpY0NVZnN4TGNvWkZwV2h0NzJmbgo2c01iQ2FoVG1qZEpmS245QUhZN3p5aVRMZHVabG41VTVCNlY5VnRzd1l2ZFRGdy9oVUhKMFQ5Qmw4NUd4d0lECkFRQUJvNEhTTUlIUE1BNEdBMVVkRHdFQi93UUVBd0lGb0RBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFRWUkKS3dZQkJRVUhBd0l3REFZRFZSMFRBUUgvQkFJd0FEQWZCZ05WSFNNRUdEQVdnQlI0bzhBVWJMN0V0QWgrN1o1bwp0bHZTcVpoTTNEQnZCZ05WSFJFRWFEQm1naFJsYkdGemRHbGpjMlZoY21Ob0xXMWhjM1JsY29Ja1pXeGhjM1JwClkzTmxZWEpqYUMxdFlYTjBaWEl1Ykc5bloybHVaeTEwY21GamFXNW5naWhsYkdGemRHbGpjMlZoY21Ob0xXMWgKYzNSbGNpNXNiMmRuYVc1bkxYUnlZV05wYm1jdWMzWmpNQTBHQ1NxR1NJYjNEUUVCQ3dVQUE0SUJBUUJjRFZDTQoyOWNLN1YvR1hkM1JLZjRIS1BuTzZJT0w1WXpzd2daWVhqRTBHcVdsNmlZb1EyZmp3RFd3bWlNdUlnRGJIQUlmCnMrTVc4NTNwNy9OMGV2YXVSaFEvZDRQTmdBeDQxKzlOemhDNXdyUVNIVFlOeWRXRUZMTU5LNm15NmM2RWZVQTkKTU9mM2xjTjJnMXRicW9DTFVqL2pZWFgxclJGZTNPN1JyNDRkYUJJNDhScnpjSTJQYjJMMnc5Vlh4N1VIdjlUSwpIVlNFWEJxMzdxTEVhbW1CQUpadzRZQWR1THRqMERXSGdPOHJQeDZVVC9CNGZSc3hyQndpZEgxZlJxOTdSM082CjhNV3RFdmJjTjBEakhqNkIrR2FEK3hnZE9VZkM2RVpYcjBwdVFCQkVjN1J0Z1JGRkx4M1JkY1lWUG9wZFliL1IKSm9HSTI4RGZHbFFyQmVWYgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
tls.key: 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
kind: Secret
metadata:
annotations:
Expand Down
2 changes: 1 addition & 1 deletion deployments/metrics/filebeat/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ daemonset:
# name: config-secret
extraEnvs:
- name: "ELASTICSEARCH_HOSTS"
value: "34.69.4.124:9200"
value: "34.27.1.15:9200"
- name: "ELASTICSEARCH_USERNAME"
valueFrom:
secretKeyRef:
Expand Down
Loading