Tools used in this repo
Tools used in this repo#
These are helpful for everyone, and not cloud provider-specific.
The canonical commandline tool for talking to kubernetes clusters.
Debugging and understanding runtime behavior of our hubs is greatly
enhanced by knowledge of how to use
kubectl. Understanding how to
kubectl really helps understand how kubernetes itself works.
Consider aliasing it to
k, as you might be typing it a lot!
It is easy to accidentally operate on the wrong kubernetes cluster! Putting the current kubernetes context in your terminal prompt (via something like starship) can help a lot!
Additional resources and tools#
The official cheatsheet, with extremely helpful tips.
Lens is an amazing GUI for exploring various objects in a kubernetes cluster. It can do almost everything
kubectldoes, in a fairly intuitive way. Highly recommended as a supplement (or even alternative) to
k9s is a similar tool to Lens, but a terminal based UI.
Check out the list of kubectl plugins to see if anything will help with your workflow.
kubectxhelps with switching between different k8s clusters and namespaces, which we might have to do often.
Helm is used in two ways:
By our deployment scripts to deploy our hubs.
To deploy cluster-wide support components (such as prometheus, grafana, nginx-ingress) for each cluster.
--repoflag allow you to specify a Helm repo directly instead of needing to do
helm repo addand
helm repo updatefirst.
helm template --repo https://jupyterhub.github.io/helm-chart/ jupyterhub
helm templatecommand can quickly render templates for you which is a big part of developing a helm chart.
helm template --show-onlyflag can help you review a specific template.
# 1. An example on how to access a specific template helm template --repo https://jupyterhub.github.io/helm-chart/ jupyterhub \ --show-only templates/hub/deployment.yaml # 2. An example on how to access a specific template from a subchart # # Note we need to specify version as the helm repo doesn't contain a valid # binderhub version that isn't considered a pre-release. helm template --repo https://jupyterhub.github.io/helm-chart/ binderhub \ --version=0.2.0-n611.he777436 \ --set jupyterhub.hub.services.binder.apiToken=asd \ --show-only charts/jupyterhub/templates/hub/deployment.yaml
helm template --validateflag can help you both render and then validate the rendered templates with a k8s api-server. This is an excellent lightweight test of a Helm chart in a CI system.
In line with 2i2c’s Customer Right to Replicate,
we try to keep all our deployment repositories as open as possible. But
some values must be secret - like access tokens, cookie secret seeds, etc.
sops to store them encrypted in our Git repo, so they can be version
controlled and reviewed along with the rest of the repo. We use
Google Cloud KMS
to encrypt our secrets, so you need the Google Cloud tools installed and
authenticated locally (following the instructions here)
before you can use sops.
sops is called programatically by our deployment scripts to decrypt
files for deployment, and you will use it interactively to modify or encrypt
Terraform is an “Infrastructure as Code” (IaC) tool that allows you to build, change, and version infrastructure in the cloud. We use terraform to provision cloud infrastructure and modify it directly. We then deploy applications on top of that infrastructure via Helm.
The minimum required version is
Google Cloud tools#
google-cloud-sdk is the primary
commandline tool used to interact with Google Cloud Platform (GCP). Our deployment
scripts use it to authenticate to GCP, and it is very helpful in debugging node
gcloud has two authentication flows, and that can get quite confusing since we
work on a number of clusters with different Google credentials.
gcloud auth login
provides credentials for
gcloud commands like
gcloud compute instances list
gcloud container clusters list.
gcloud auth application-default login
provides credentials for other tools (such as
authenticate to Google Cloud Platform on your behalf. So if
kubectl is complaining about authentication, make sure you are authenticated
The AWS Command Line Interface (CLI) is a unified tool to manage your AWS services. With just one tool to download and configure, you can control multiple AWS services from the command line and automate them through scripts.
eksctl is a simple CLI tool for creating and managing clusters on EKS - Amazon’s
managed Kubernetes service for EC2. See the
eksctl documentation for more information.
Make sure you are using at least version 0.115. You
can check the installed version with