9 Commits

5 changed files with 62 additions and 38 deletions

34
Jenkinsfile vendored
View File

@ -1,34 +0,0 @@
pipeline {
agent any
stages {
stage('Checkout') {
steps {
checkout scm
}
}
stage('Get credentials to Cluster') {
steps {
sh '''
az login --identity
az aks get-credentials --resource-group tst-aks-rg --name edu
kubelogin convert-kubeconfig -l azurecli
'''
}
}
stage('Apply to Cluster') {
steps {
sh '''
kubectl apply -f namespace.yaml
kubectl apply -f secret-store.yaml
kubectl apply -f deploy.yaml
kubectl apply -f ingress.yaml
'''
}
}
}
post {
cleanup {
sh 'rm -f ~/.kube/config || true'
}
}
}

View File

@ -0,0 +1,58 @@
apiVersion: argoproj.io/v1alpha1
kind: Workflow
metadata:
generateName: deploy-user-microservice-
spec:
entrypoint: deploy
serviceAccountName: argo-workflows-user
arguments:
parameters:
- name: branch
value: ArgoWorkflows-deploy
templates:
- name: deploy
container:
image: marcin00.azurecr.io/azure-cli-kubectl:latest
command: [sh, -c]
env:
- name: CLIENT_ID
value: "c302726f-fafb-4143-94c1-67a70975574a"
- name: CLUSTER_NAME
value: "build"
- name: RESOURCE_GROUP
value: "tst-aks-rg"
- name: DEPLOY_FILES
value: "namespace.yaml secret-store.yaml deploy.yaml ingress.yaml"
- name: DEPLOYMENT
value: "api"
- name: NAMESPACE
value: "user-microservice"
- name: HEALTHCHECK_URL
value: "https://user-microservice.marcin00.pl/health"
args:
- |
echo "===> Logging in to Azure"
az login --identity --client-id $CLIENT_ID
az aks get-credentials --resource-group $RESOURCE_GROUP --name $CLUSTER_NAME --overwrite-existing
kubelogin convert-kubeconfig -l azurecli
echo "===> Applying Kubernetes manifests"
for file in $DEPLOY_FILES; do
kubectl apply -f "$file"
done
echo "===> Waiting for deployment to complete"
kubectl rollout status deployment/$DEPLOYMENT -n $NAMESPACE --timeout=60s
echo "===> Running health check"
for i in $(seq 1 120); do
if curl -sf $HEALTHCHECK_URL; then
echo "Health check OK"
exit 0
else
echo "Health check failed. Retry $i..."
sleep 5
fi
done
echo "Health check failed"
exit 1

View File

@ -81,7 +81,7 @@ spec:
spec:
containers:
- name: api
image: marcin00.azurecr.io/user-microservice:76a351710fffe2be1ae10471bc1a2f511f481126
image: marcin00.azurecr.io/user-microservice:e6c68f839a877035bebaa04c1f1b3805862a60e3
ports:
- containerPort: 80
env:

View File

@ -4,7 +4,7 @@ metadata:
name: deployer-binding
subjects:
- kind: User
name: daabce80-f745-413f-8377-00472517521c
name: f91aef65-7d2a-4df8-a884-e33b05d54a31
apiGroup: rbac.authorization.k8s.io
roleRef:
kind: ClusterRole

View File

@ -24,8 +24,8 @@ spec:
parameters:
usePodIdentity: "false"
useVMManagedIdentity: "true"
userAssignedIdentityID: "0c2780e4-8594-4aab-8f1a-8a19f71924bd" # client_id of the user-assigned managed identity
clientID: "0c2780e4-8594-4aab-8f1a-8a19f71924bd" # client_id of the user-assigned managed identity
userAssignedIdentityID: "f91aef65-7d2a-4df8-a884-e33b05d54a31" # client_id of the user-assigned managed identity
clientID: "f91aef65-7d2a-4df8-a884-e33b05d54a31" # client_id of the user-assigned managed identity
keyvaultName: "dev-aks"
objects: |
array: