Skip to content
This repository has been archived by the owner on Oct 16, 2024. It is now read-only.

Commit

Permalink
Merge pull request #33 from mozilla-it/kfferrando/rm-mig
Browse files Browse the repository at this point in the history
Removing mig configs/mentions sumo-infra issue #27
  • Loading branch information
kfferrando authored Jul 17, 2019
2 parents 6404946 + c6916c2 commit df4ed1b
Show file tree
Hide file tree
Showing 4 changed files with 1 addition and 87 deletions.
1 change: 0 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,6 @@ Deployments, Jenkin builds and Dead man's snitch all report to Slack. To set th
## SUMO Secrets
Secrets are stored in a private location, but to aid in future discoverability the structure is described here:
- Global secrets in the `services` directory
- `mig/` contains a agent certificate and key, a CA cert and a mig agent config all given to us by EIS. The config looks like:
```
[agent]
isimmortal = on
Expand Down
37 changes: 1 addition & 36 deletions k8s/install/post-install.sh
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
#!/bin/bash
# Configure various bits of a SUMO Kubernetes cluster including secrets and cluster services like fluentd, mig, calico, autoscalers, etc.
# Configure various bits of a SUMO Kubernetes cluster including secrets and cluster services like fluentd, calico, autoscalers, etc.
# Requires GNU sed vs BSD sed. `brew install gnu-sed`

set -u
Expand Down Expand Up @@ -80,37 +80,6 @@ BASHEOF
echo "You may want to git commit the modified ./out/terraform/kubernetes.tf with increased max_size"
}

install_mig() {
echo "Installing mig"
kubectl apply -f "${KOPS_INSTALLER}/services/mig/mig-namespace.yaml"

# Check we have access to the secrets repo
if [ ! -f "${SECRETS_PATH}/services/mig/agent.key" ]; then
echo "Error: could not access ${SECRETS_PATH}/services/mig/agent.key"
echo "Check \$SECRETS_PATH env var is set in your config.sh for this cluster and sourced"
exit 8
fi

# Export mqpassword
# Check if the secret already exists so we don't error out on kubectl create secret step
set +e
kubectl -n mig get secret mig-agent-secrets > /dev/null 2>&1
if [ $? -ne 0 ]; then
set -e
echo "Creating mig secret in k8s cluster"
kubectl -n mig create secret generic mig-agent-secrets \
--from-file=${SECRETS_PATH}/services/mig/agent.key \
--from-file=${SECRETS_PATH}/services/mig/agent.crt \
--from-file=${SECRETS_PATH}/services/mig/ca.crt \
--from-file=${SECRETS_PATH}/services/mig/mig-agent.cfg
else
set -e
echo "Mig secret already exists in k8s cluster. If you need to update it, delete it first with 'kubectl -n mig delete secret mig-agent-secrets' and rerun this script"
fi
kubectl -n mig apply -f ${KOPS_INSTALLER}/services/mig/migdaemonset.yaml
echo "Done installing mig"
}

install_yar() {
echo "Installing yar"

Expand Down Expand Up @@ -294,7 +263,6 @@ install_all() {
install_cluster_autoscaler
install_calico_rbac
install_fluentd
install_mig
install_block-aws
install_ark
install_newrelic
Expand All @@ -310,7 +278,6 @@ usage() {
echo " cluster_autoscaler install cluster autoscaler"
echo " calico install calico networking"
echo " newrelic install newrelic"
echo " mig install mig"
echo " block-aws install the AWS metadata block"
echo " ark install ark/velero for backups"
echo " metrics-server install metrics-server"
Expand All @@ -330,8 +297,6 @@ if [ $# -eq 1 ]; then
install_calico_rbac;;
newrelic)
install_newrelic;;
mig)
install_mig;;
block-aws)
install_block-aws;;
ark)
Expand Down
4 changes: 0 additions & 4 deletions k8s/install/services/mig/mig-namespace.yaml

This file was deleted.

46 changes: 0 additions & 46 deletions k8s/install/services/mig/migdaemonset.yaml

This file was deleted.

0 comments on commit df4ed1b

Please sign in to comment.