-
Notifications
You must be signed in to change notification settings - Fork 31
Trial Landscape
The shared XSK Trial instance is available at: https://trial.apps.xsk.io
NOTE: You can Provision Landscape with helm
To create new landscape (dedicated instance) go through the following steps:
-
Create new SAP HANA Database User, as described here.
-
Obtain access to the XSK Trial Kubernetes cluster (kubeconfig).
-
Create separate Kubernetes namespace for the new landscape:
kubectl create namespace <namespace-name> kubectl label namespace <namespace-name> istio-injection=enabled
-
Create hana-cloud-database secret as described in the
Create an SAP HANA Cloud secret
step.Note: Add
-n <namespace-name>
to the original command, so that the secret would be created in the dedicated namespace:kubectl -n <namespace-name> create secret generic hana-cloud-database \ --from-literal=DIRIGIBLE_DATABASE_PROVIDER=custom \ ...
-
Deploy XSK in the target namespace/landscape as described in the
Deploy XSK
step.Note: Use the Deployment (Only) option and replace all occurrences of the default namespace with the
<namespace-name>
as shown:apiVersion: apps/v1 kind: Deployment metadata: name: xsk namespace: <namespace-name> ... apiVersion: v1 kind: Service metadata: labels: app: xsk name: xsk namespace: <namespace-name> ... apiVersion: v1 kind: PersistentVolumeClaim metadata: name: xsk-claim namespace: <namespace-name>
Note: Replace the DIRIGIBLE_HOST environment variable as follows:
... - name: DIRIGIBLE_HOST value: https://<landscape-domain>.apps.xsk.io ...
-
Create XSUAA Service Instance as described in the
Create an XSUAA service instance
step:Note: For better isolation create a separate Subaccount, and create there the XSUAA service instance, by using the JSON definition.
Note: Update the redirect-uris section with the following pattern to match the xsk.io domain:
"redirect-uris":[ "https://<landscape-domain>.apps.xsk.io" ]
-
Create xsuaa-credentials secret with the following command:
Note: Create Service Key/Service Binding to obtain the XSUAA credentials:
kubectl -n <namespace-name> create secret generic xsuaa-credentials \ --from-literal=url='<xsuaa-url>' \ --from-literal=clientid='<xsuaa-clientid>' \ --from-literal=clientsecret='<xsuaa-clientsecret>' \ --from-literal=verificationkey='<xsuaa-verificationkey>' \ --from-literal=xsappname='<xsuaa-xsappname>'
-
Bind the xsuaa-credentials to the XSK deployment by executing the following command:
Note: Due to an issue related to the case sensitivity of the secret keys, first the deployment should be scaled to zero, then the secret should be set and finally the deployment should be edited and scaled up again.
kubectl -n <namespace-name> scale --replicas=0 deployment/xsk
kubectl -n <namespace-name> set env --from=secret/xsuaa-credentials deployment/xsk
Note: Set XSUAA related secrets to lowercase -> URL, CLIENTID, CLIENTSECRET, VERIFICATIONKEY, XSAPPNAME
kubectl -n <namespace-name> edit deployment xsk
- name: CLIENTSECRET valueFrom: secretKeyRef: key: clientsecret name: xsuaa-credentials
->
- name: clientsecret valueFrom: secretKeyRef: key: clientsecret name: xsuaa-credentials
kubectl -n <namespace-name> scale --replicas=1 deployment/xsk
-
Create
Gateway
,VirtualService
andDNSEntry
with the following descriptor:apiVersion: networking.istio.io/v1beta1 kind: VirtualService metadata: name: xsk namespace: <namespace-name> spec: gateways: - xsk-gateway hosts: - <landscape-domain>.apps.xsk.io http: - match: - uri: regex: /.* route: - destination: host: xsk.<namespace-name>.svc.cluster.local port: number: 8080 --- apiVersion: networking.istio.io/v1beta1 kind: Gateway metadata: name: xsk-gateway namespace: <namespace-name> spec: selector: istio: ingressgateway servers: - hosts: - <landscape-domain>.apps.xsk.io port: name: http number: 80 protocol: HTTP tls: httpsRedirect: true - hosts: - <landscape-domain>.apps.xsk.io port: name: https number: 443 protocol: HTTPS tls: credentialName: wildcard-tls mode: SIMPLE --- apiVersion: dns.gardener.cloud/v1alpha1 kind: DNSEntry metadata: annotations: dns.gardener.cloud/class: garden name: dns-xsk namespace: default spec: dnsName: "<landscape-domain>.apps.xsk.io" ttl: 600 targets: - <dns-entry-target>
Note: Replace all occurrences of the following placeholders:
-
<namespace-name>
with the name of the created namespace -
<landscape-domain>
with the landscape domain name -
<dns-entry-target>
with the DNS Entry Target, the value could be obtain by executing the following command:kubectl get service -n istio-system istio-ingressgateway -o jsonpath="{.status.loadBalancer.ingress[0].hostname}"
-
-
Assign the necessary roles as described in the
Assign the Developer and Operator roles
step. -
Login by going to
https://<landscape-domain>.apps.xsk.io
Scale Deployment to zero:
kubectl -n <namespace-name> scale --replicas=0 deployment/xsk
To create new landscape (dedicated instance) go through the following steps:
-
Create new SAP HANA Database User, as described here.
-
Obtain access to the XSK Trial Kubernetes cluster (kubeconfig).
-
Create XSUAA Service Instance as described in the
Create an XSUAA service instance
step:Note: For better isolation create a separate Subaccount, and create there the XSUAA service instance, by using the JSON definition.
Note: Update the redirect-uris section with the following pattern to match the xsk.io domain:
"redirect-uris":[ "https://<landscape-domain>.apps.xsk.io" ]
-
Get ingress hostname
kubectl get service -n istio-system istio-ingressgateway -o jsonpath="{.status.loadBalancer.ingress[0].hostname}"
- Deploy XSK in the target namespace using values from previous steps.
helm repo add xsk https://sap.github.io/xsk
helm repo update
helm install <demo-..> xsk/xsk-landscape \
--set namespace.name='<xsk-demo-..>' \
--set secretHana.hanaUsername='<HANA-Username>' \
--set secretHana.hanaPassword='<HANA-Password>' \
--set secretHana.hanaUrl='<HANA-Url>' \
--set secretXsuaa.url='<XSUAA-Url>' \
--set secretXsuaa.clientId='<XSUAA-client-id>' \
--set secretXsuaa.clientSecret='<XSUAA-client-secret>' \
--set secretXsuaa.verificationKey='<XSUAA-verification-key>' \
--set secretXsuaa.xsappname='<XSUAA-xsappname>' \
--set deployment.landscapeDomain='<landscape-domain-name>' \
--set dnsentry.targets='<dnsentry>'
This helm chart will create Hana secret and XSUAA secret in XSK deployment.
deployment.landscapeDomain
will add the name in <landscape-domain-name>.apps.xsk.io
.
dnsentry.targets
will create dns record for this landscape, you can take the value from step Get ingress hostname
.
It's take a while to create dns record, namespace and deployment.
Assign the necessary roles as described in the Assign the Developer and Operator roles
step.
Login by going to https://<landscape-domain>.apps.xsk.io