Advanced Developer Guide

Taking Chaos Monkey to the Next Level

  • 7 min read
  • Last Updated October 17, 2018

This chapter provides advanced developer tips for Chaos Monkey and other Chaos Engineering tools, including tutorials for manually deploying Spinnaker stacks on a local machine, virtual machine, or with Kubernetes. From there you can configure and deploy Spinnaker itself, along with Chaos Monkey and other Chaos Engineering tools!

How to Install AWS CLI

Start by installing the AWS CLI tool on your machine, if necessary.

bash
1aws configure --profile spinnaker-developer
2AWS Access Key ID [None]: <AWS_ACCESS_KEY_ID>
3AWS Secret Access Key [None]: <AWS_SECRET_ACCESS_KEY>
4Default region name [None]: us-west-2
5Default output format [None]: text
6
7aws configure --profile primary
8AWS Access Key ID [None]: <AWS_ACCESS_KEY_ID>
9AWS Secret Access Key [None]: <AWS_SECRET_ACCESS_KEY>
10Default region name [None]: us-west-2
11Default output format [None]: text |`

In the future, simply add the --profile <profile-name> flag to any AWS CLI command to | force AWS CLI to use that account.

How to Install Halyard

Halyard is the CLI tool that manages Spinnaker deployments and is typically the first step to any manual Spinnaker setup.

  • Download Halyard installation script.

    • For Debian/Ubuntu.
      bash
      1curl -O https://raw.githubusercontent.com/spinnaker/halyard/master/install/debian/InstallHalyard.sh
    • For MacOS.
      bash
      1curl -O https://raw.githubusercontent.com/spinnaker/halyard/master/install/macos/InstallHalyard.sh
  • Install Halyard with the InstallHalyard.sh script. If prompted, default options are usually just fine.

    bash
    1sudo bash InstallHalyard.sh
  • Source your recently-modified .bashrc file (or ~/.bash_profile).

    bash
    1. ~/.bashrc
  • Verify Halyard was installed by checking the version.

    bash
    1hal -v
    2# OUTPUT
    31.9.1-20180830145737
  • That's the basics! Halyard is now ready to be configured and used for manual or quick start Spinnaker deployments.

How to Install Spinnaker

This section walks you through the most basic Spinnaker installation process, suitable for simple Spinnaker deployments.

  • Use the hal version list command to view the current Spinnaker version list.

    bash
    1hal version list
  • Configure Halyard to use the latest version of Spinnaker.

    bash
    1hal config version edit --version 1.9.2
  • (Optional) Enable Chaos Monkey in the Halyard config.

    bash
    1hal config features edit --chaos true
  • Tell Halyard what type of environment you're deploying Spinnaker to. Most production setups will want to use Kubernetes or another distributed solution, but the default deployment is a local installation. The hal config deploy edit --type flag can be used to change the environment.

    bash
    1hal config deploy edit --type localdebian
  • Halyard requires some form of persistent storage, so we'll use AWS S3 for simplicity. Modify the Halyard config and be sure to pass an AWS ACCESS_KEY_ID and SECRET_ACCESS_KEY with privileges to create and use S3 buckets.

    bash
    1hal config storage s3 edit --access-key-id <AWS_ACCESS_KEY_ID> --secret-access-key --region us-west-2
  • Configure Halyard to use the s3 storage type.

    bash
    1hal config storage edit --type s3
  • Now use sudo hal deploy apply to deploy Spinnaker to the local machine.

    bash
    1sudo hal deploy apply
  • After deployment finishes you should have a functioning Spinnaker installation! If you've installed on your local machine you can navigate to the Spinnaker Deck UI at localhost:9000 to see it in action. If Spinnaker was deployed on a remote machine use the hal deploy connect command to quickly establish SSH tunnels and connect.

Next Steps

You're now ready to install and then start using Chaos Monkey or other Simian Army tools.

How to Deploy a Spinnaker Stack for Chaos Monkey

Manually deploying Spinnaker with the help of Halyard is the best way to have the utmost control over your Spinnaker installation, and is ideal for advanced deployments to EC2 instances, EKS/Kubernetes clusters, and the like. Choose one of the three options depending on your needs.

After Spinnaker is running on your chosen platform proceed to our How to Install Chaos Monkey guide to get started with Chaos Monkey!

Deploying a Spinnaker Stack with AWS Console

This section will guide you through deploying a Spinnaker stack with the AWS web console.

Prerequisites

  • In AWS navigate to CloudFormation and click Create Stack.

  • Download this managing.yaml file to your local machine.

  • Under Choose a template click the Choose File button under Upload a template to Amazon S3 and select the downloaded managing.yaml.

  • Click Next.

  • Input spinnaker-managing-infrastructure-setup into the Stack name field.

  • Select false in the UseAccessKeyForAuthentication dropdown.

  • Click Next.

  • On the Options screen leave defaults and click Next.

  • Check the I acknowledge that AWS CloudFormation might create IAM resources with custom names. checkbox and click Create to generate the stack.

  • Once the spinnaker-managing-infrastructure-setup stack has a CREATE_COMPLETE Status, select the Outputs tab and copy all key/value pairs there somewhere convenient. They'll look something like the following.

    KeyValue
    VpcIdvpc-0eff1ddd5f7b26ffc
    ManagingAccountId123456789012
    AuthArnarn:aws:iam::123456789012:role/SpinnakerAuthRole
    SpinnakerInstanceProfileArnarn:aws:iam::123456789012:instance-profile/spinnaker-managing-infrastructure-setup-SpinnakerInstanceProfile-1M72QQCCLNCZ9
    SubnetIdssubnet-0c5fb1e7ab00f20a7,subnet-065af1a1830937f86
  • Add a new AWS account to Halyard named spinnaker-developer with your AWS account id and your appropriate AWS region name.

    bash
    1hal config provider aws account add spinnaker-developer \
    2--account-id 123456789012 \
    3--assume-role role/spinnakerManaged \
    4--regions us-west-2
  • Enable AWS in Halyard.

    bash
    1hal config provider aws enable

Next Steps

You're now ready to install Spinnaker and install Chaos Monkey to begin Chaos Experimentation!

Deploying a Spinnaker Stack with AWS CLI

This section will guide you through deploying a Spinnaker stack with the AWS CLI tool.

Prerequisites

  • Download this managing.yaml template.

    bash
    1curl -OL https://d3079gxvs8ayeg.cloudfront.net/templates/managing.yaml
  • Now we'll use AWS CLI to create the spinnaker-managing-infrastructure stack via CloudFormation. We want to use the primary or managing account for this, so we'll specify the --profile primary, which will grab the appropriate credentials, region, and so forth.

    bash
    1aws cloudformation deploy --stack-name spinnaker-managing-infrastructure --template-file managing.yaml --parameter-overrides UseAccessKeyForAuthentication=true --capabilities CAPABILITY_NAMED_IAM --profile primary
bash
1# ...
2Outputs:
3# ...
4# SpinnakerInstanceProfileArn:
5# Value: !GetAtt SpinnakerInstanceProfile.Arn
  • Once the spinnaker-managing-infrastructure stack has been created open the AWS console, navigate to the CloudFormation service, select the Outputs tab of the spinnaker-managing-infrastructure stack. We'll be using the ManagingAccountId and AuthArn values in the next step, which look something like the following.

    KeyValue
    ManagingAccountId123456789012
    AuthArnarn:aws:iam::123456789012:user/spinnaker-managing-infrastructure-SpinnakerUser-15UU17KIS3EK1
  • Download this managed.yaml template.

    bash
    1curl -OL https://d3079gxvs8ayeg.cloudfront.net/templates/managed.yaml
  • Now enter the following command to create the companion spinnaker-managed-infrastructure stack in CloudFormation. Be sure to specify the profile value and paste the appropriate ManagingAccountId and AuthArn values from above.

    bash
    1aws cloudformation deploy --stack-name spinnaker-managed-infrastructure --template-file managed.yaml \
    2--capabilities CAPABILITY_NAMED_IAM --profile spinnaker-developer --parameter-overrides \
    3AuthArn=<ManagingStack_AuthArnValue> \
    4ManagingAccountId=<ManagingStack_ManagingAccountId>
  • Add your AWS Access Id and Secret Keys to Halyard.

    bash
    1hal config provider aws edit --access-key-id <AWS_ACCESS_KEY_ID> --secret-access-key
  • Add your default managing account to Spinnaker.

    bash
    1hal config provider aws account add default --account-id 123456789012 --assume-role role/spinnakerManaged --regions us-west-2
  • Enable the AWS provider.

    bash
    1hal config provider aws enable

Next Steps

With Spinnaker configured it's now time to install Spinnaker and then install Chaos Monkey.

Deploying a Spinnaker Stack with Kubernetes

Follow these steps to setup a CloudFormation EKS/Kubernetes stack for Spinnaker and Chaos Monkey.

Prerequisites

  • Download this managing.yaml template.

    bash
    1curl -O https://d3079gxvs8ayeg.cloudfront.net/templates/managing.yaml
  • Now we'll use AWS CLI to issue a cloudformation deploy command to create a new spinnaker-managing-infrastructure-setup stack using the managing.yaml template. From here on out this guide will use explicit names where applicable, but feel free to customize options as you see fit (such as the stack name, EksClusterName, and so forth).

    bash
    1aws cloudformation deploy --stack-name spinnaker-managing-infrastructure-setup --template-file managing.yaml --capabilities CAPABILITY_NAMED_IAM \
    2--parameter-overrides UseAccessKeyForAuthentication=false EksClusterName=spinnaker-cluster
  • The step above takes 10 - 15 minutes to complete, but once complete issue the following commands, which will use the AWS CLI to assign some environment variables values from the spinnaker-managing-infrastructure-setup stack we just created. We'll be using these values throughout the remainder of this guide.

    bash
    1VPC_ID=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`VpcId`].OutputValue' --output text)
    2CONTROL_PLANE_SG=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`SecurityGroups`].OutputValue' --output text)
    3AUTH_ARN=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`AuthArn`].OutputValue' --output text)
    4SUBNETS=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`SubnetIds`].OutputValue' --output text)
    5MANAGING_ACCOUNT_ID=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`ManagingAccountId`].OutputValue' --output text)
    6EKS_CLUSTER_ENDPOINT=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`EksClusterEndpoint`].OutputValue' --output text)
    7EKS_CLUSTER_NAME=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`EksClusterName`].OutputValue' --output text)
    8EKS_CLUSTER_CA_DATA=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`EksClusterCA`].OutputValue' --output text)
    9SPINNAKER_INSTANCE_PROFILE_ARN=$(aws cloudformation describe-stacks --stack-name spinnaker-managing-infrastructure-setup --query 'Stacks[0].Outputs[?OutputKey==`SpinnakerInstanceProfileArn`].OutputValue' --output text)
  • Download this managed.yaml template. This template will create the spinnakerManaged AWS::IAM::Role that Spinnaker can use.

    bash
    1curl -O https://d3079gxvs8ayeg.cloudfront.net/templates/managed.yaml
  • Execute this secondary CloudFormation deployment using the managed.yaml. Notice that this command (and many following commands) use some of the environmental variables we assigned previously, so the first stack deployment will need to be complete first.

    bash
    1aws cloudformation deploy --stack-name spinnaker-managed-infrastructure-setup --template-file managed.yaml --capabilities CAPABILITY_NAMED_IAM \
    2--parameter-overrides AuthArn=$AUTH_ARN ManagingAccountId=$MANAGING_ACCOUNT_ID

Next Steps

You now have an EKS/Kubernetes CloudFormation stack ready for Spinnaker. You can now proceed with the deployment of Spinnaker on Kubernetes, and then move on to installing and using Chaos Monkey. If Chaos Monkey doesn't suit all your Chaos Engineering needs check out our Chaos Monkey Alternatives chapter.

How to Deploy Spinnaker on Kubernetes

This guide will walk you through the entire process of setting up a Kubernetes cluster via AWS EKS, attaching some worker nodes (i.e. EC2 instances), deploying Spinnaker to manage the Kubernetes cluster, and then using Chaos Monkey and other Simian Army tools on it! If you're looking for a simpler Spinnaker installation, you might be interested in our Spinnaker AWS Quick Start guide.

Prerequisites

Install Kubectl

We'll need to install the kubectl client and the AWS IAM Authenticator for Kubernetes, which will allow Amazon EKS to use IAM for authentication to our Kubernetes cluster.

Install AWS IAM Authenticator

We'll follow the same basic steps as above to install the AWS IAM Authenticator as well.

Configure Kubectl

Prerequisites

With everything setup you can now edit the kubectl configuration files, which will inform kubectl how to connect to your Kubernetes/EKS cluster.

  • Copy and paste the following into the ~/.kube/config file.

    yaml
    1apiVersion: v1
    2clusters:
    3 - cluster:
    4 server: <endpoint-url>
    5 certificate-authority-data: <base64-encoded-ca-cert>
    6 name: kubernetes
    7contexts:
    8 - context:
    9 cluster: kubernetes
    10 user: aws
    11 name: aws
    12current-context: aws
    13kind: Config
    14preferences: {}
    15users:
    16 - name: aws
    17 user:
    18 exec:
    19 apiVersion: client.authentication.k8s.io/v1alpha1
    20 command: aws-iam-authenticator
    21 args:
    22 - 'token'
    23 - '-i'
    24 - '<cluster-name>'
    25 # - "-r"
    26 # - "<role-arn>"
    27 # env:
    28 # - name: AWS_PROFILE
    29 # value: "<aws-profile>"
  • Replace the <...> placeholder strings with the following EKS_CLUSTER_ environmental variable values from earlier:

    • <endpoint-url>: $EKS_CLUSTER_ENDPOINT
    • <base64-encoded-ca-cert>: $EKS_CLUSTER_CA_DATA
    • <cluster-name>: $EKS_CLUSTER_NAME
  • Your ~/.kube/config file should now look something like this:

    yaml
    1apiVersion: v1
    2clusters:
    3 - cluster:
    4 server: https://51A93D4A4B1228D6D06BE160DA2D3A8A.yl4.us-west-2.eks.amazonaws.com
    5 certificate-authority-data: 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
    6 name: kubernetes
    7contexts:
    8 - context:
    9 cluster: kubernetes
    10 user: aws
    11 name: aws
    12current-context: aws
    13kind: Config
    14preferences: {}
    15users:
    16 - name: aws
    17 user:
    18 exec:
    19 apiVersion: client.authentication.k8s.io/v1alpha1
    20 command: aws-iam-authenticator
    21 args:
    22 - 'token'
    23 - '-i'
    24 - 'spinnaker-cluster'
    25 # - "-r"
    26 # - "<role-arn>"
    27 # env:
    28 # - name: AWS_PROFILE
    29 # value: "<aws-profile>"
  • Save your config file and export the KUBECONFIG variable to include the new config location.

    bash
    1export KUBECONFIG=$KUBECONFIG:~/.kube/config
  • Verify that kubectl is able to use your credentials to connect to your cluster with kubectl get svc:

    bash
    1kubectl get svc
    2
    3NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
    4kubernetes ClusterIP 172.25.0.1 <none> 443/TCP 31m

Create AWS Accounts and Roles

We now need to apply service accounts and roles to the kubectl spinnaker namespace. In Kubernetes, a namespace is a virtual cluster, which can join other virtual clusters and all be housed within the same physical cluster.

  • Issue the following commands to create the spinnaker namespace, spinnaker-service-account service account, and spinnaker-admin binding. The apply command in kubectl applies a configuration based on the passed resource (YAML files, in this case).

    bash
    1CONTEXT=aws
    2kubectl create namespace spinnaker
    3kubectl apply -f https://d3079gxvs8ayeg.cloudfront.net/templates/spinnaker-service-account.yaml
    4kubectl apply -f https://d3079gxvs8ayeg.cloudfront.net/templates/spinnaker-cluster-role-binding.yaml
  • Next, we're creating the authentication TOKEN environmental variable.

    bash
    1TOKEN=$(kubectl get secret --context $CONTEXT \
    2 $(kubectl get serviceaccount spinnaker-service-account \
    3 --context $CONTEXT \
    4 -n spinnaker \
    5 -o jsonpath='{.secrets[0].name}') \
    6 -n spinnaker \
    7 -o jsonpath='{.data.token}' | base64 --decode)
  • Pass the TOKEN to the following configuration commands to set kubectl credentials.

    bash
    1kubectl config set-credentials ${CONTEXT}-token-user --token $TOKEN
    2kubectl config set-context $CONTEXT --user ${CONTEXT}-token-user

Add Kubernetes Provider to Halyard

The next step is to add Kubernetes as a provider to Halyard/Spinnaker. A provider is just an interface to one of many virtual resources Spinnaker will utilize. AWS, Azure, Docker, and many more are all considered providers, and are managed by Spinnaker via accounts.

  • Start by enabling the Kubernetes provider in Halyard.4

    bash
    1hal config provider kubernetes enable
  • Add the kubernetes-master account to Halyard.

    bash
    1hal config provider kubernetes account add kubernetes-master --provider-version v2 --context $(kubectl config current-context)`
  • Enable the artifacts and chaos features of Halyard. Artifacts in Spinnaker merely reference any external resource, such as a remote file, a binary blob, and image, and so forth. The chaos feature allows us to utilize Chaos Monkey, the base form of which is built into Spinnaker by default.

    bash
    1hal config features edit --artifacts true
    2hal config features edit --chaos true

Add AWS Provider to Halyard

Now we need to also add AWS as another provider and account. Be sure to replace <AWS_ACCOUNT_ID> with the primary/managing account ID of your AWS account.

bash
1hal config provider aws account add aws-primary --account-id <AWS_ACCOUNT_ID> --assume-role role/spinnakerManaged
2hal config provider aws enable

Add ECS Provider to Halyard

The last provider to enable is ECS. We'll add the ecs-primary account to Halyard and associate it with the aws-primary AWS account added above:

bash
1hal config provider ecs account add ecs-primary --aws-account aws-primary
2hal config provider ecs enable

Use Distributed Deployment

We also need to ensure Halyard deploys Spinnaker in a distributed fashion among our Kubernetes cluster. Without this step, the default configuration is to deploy Spinnaker onto the local machine.

bash
1hal config deploy edit --type distributed --account-name kubernetes-master

Use S3 for Persistent Storage

Let's tell Spinnaker to use AWS S3 for storing persistent data (in this case, creating a small S3 bucket). Issue the following command by replacing <AWS_ACCESS_KEY_ID> with any AWS access key that has full S3 service privileges.

bash
1hal config storage s3 edit --access-key-id <AWS_ACCESS_KEY_ID> --secret-access-key --region us-west-2
2hal config storage edit --type s3

Create Kubernetes Worker Nodes

Now we'll launch some AWS EC2 instances which will be our worker nodes for our Kubernetes cluster to manage.

  • Download this amazon-eks-nodegroup.yml template file.

    bash
    1curl -O https://d3079gxvs8ayeg.cloudfront.net/templates/amazon-eks-nodegroup.yaml
  • Issue the following command to use the template and create your worker node collection.

    bash
    1aws cloudformation deploy --stack-name spinnaker-eks-nodes --template-file amazon-eks-nodegroup.yaml \
    2--parameter-overrides NodeInstanceProfile=$SPINNAKER_INSTANCE_PROFILE_ARN \
    3NodeInstanceType=t2.large ClusterName=$EKS_CLUSTER_NAME NodeGroupName=spinnaker-cluster-nodes ClusterControlPlaneSecurityGroup=$CONTROL_PLANE_SG \
    4Subnets=$SUBNETS VpcId=$VPC_ID --capabilities CAPABILITY_NAMED_IAM
  • To connect up our newly-launched worker instances with the Spinnaker cluster we previously deployed we need to create a new ~/.kube/aws-auth-cm.yaml file. Paste the following text into aws-auth-cm.yaml, replacing <AUTH_ARN> with the AUTH_ARN variable created previously (Remember, you can use echo $AUTH_ARN to print to console).

    yaml
    1apiVersion: v1
    2kind: ConfigMap
    3metadata:
    4 name: aws-auth
    5 namespace: kube-system
    6data:
    7 mapRoles: |
    8 - rolearn: <AUTH_ARN>
    9 username: system:node:{{EC2PrivateDNSName}}
    10 groups:
    11 - system:bootstrappers
    12 - system:nodes
  • Apply this newly created role mapping by issuing the following command.

    bash
    1kubectl apply -f ~/.kube/aws-auth-cm.yaml
  • Check the status of your Kubernetes nodes with kubectl get nodes. The --watch flag can be added to perform constant updates. Once all nodes have a Ready STATUS you're all set to deploy Spinnaker.

    bash
    1kubectl get nodes
    2NAME STATUS ROLES AGE VERSION
    3ip-10-100-10-178.us-west-2.compute.internal Ready <none> 2m v1.10.3
    4ip-10-100-10-210.us-west-2.compute.internal Ready <none> 2m v1.10.3
    5ip-10-100-11-239.us-west-2.compute.internal Ready <none> 2m v1.10.3

Deploy Spinnaker

  • Start by listing the current Spinnaker versions with hal version list:

    bash
    1hal version list
  • Specify the version you wish to install with the --version flag below. We'll be using the latest at the time of writing, 1.9.2.

    bash
    1hal config version edit --version 1.9.2
  • Now use hal deploy apply to deploy Spinnaker using all the configuration settings we've previously applied. This will go about distributing Spinnaker in your EKS/Kubernetes cluster.

    bash
    1hal deploy apply
bash
1hal config provider aws account edit aws-primary --add-region us-west-2

That's it, you should now have a Spinnaker deployment up and running on a Kubernetes cluster, using EKS and EC2 worker node instances! Issue the hal deploy connect command to provide port forwarding on your local machine to the Kubernetes cluster running Spinnaker, then open http://localhost:9000 to make sure everything is up and running.

Select the spinnaker app and you should see your aws-primary account with a spinnaker-eks-nodes-NodeGroup containing your three EC2 worker node instances.

advanced-tips-kubernetes-spinnaker

Next Steps

From here you can install and start using Chaos Monkey to run Chaos Experiments directly on your Kubernetes cluster worker nodes! Check out our How to Install Chaos Monkey tutorial to get started.

© 2024 Gremlin Inc.All rights reserved.Privacy Policy
Download PDF