forked from spinnaker/orca
-
Notifications
You must be signed in to change notification settings - Fork 3
/
steps.txt
150 lines (69 loc) · 2.64 KB
/
steps.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
Step 1:
a) Create AWS-IAM Role:
Attach Policies:
SpinEC2PassRole
AWSLambdaBasicExecutionRole-3ec3b99f-4258-4f3b-96ee-18f353a637c9
SpinnakerAssumeRolePolicy
AWSLambdaFullAccess
AdministratorAccess
AWSCodeDeployRoleForLambda
AWSLambdaExecute
AWSLambdaBasicExecutionRole
b) Trust RelationShip for the Role:
{
"Sid": "2",
"Effect": "Allow",
"Principal": {
"Service": "lambda.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
Step 2:
Configuring an Amazon SQS Dead-Letter Queue
AWS Console:
search For SQS
Create New Queue
name:
select : standard Queue
configure queue
click on Create
After creation of select the selected Queue then we get the "SQS ARN"
Now can create function from spinnaker UI
Step 3:
we can create Spinnaker pipeline with lambda functions
1)Lambda - Get Functions
2)Lambda - Update Function Code
3)Lambda - Update Function Configuration
1)Lambda - Get Functions:
2)Lambda - Update Function Code:
3)Lambda - Update Function Configuration:
---->> upload it as key.zip
from future import print_function
---->> Policies added to spinEC2Role
---->> updated trustyrelation ship
{ "Version": "2012-10-17", "Statement": [ { "Sid": "1", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::732813442182:user/spinEC2" }, "Action": "sts:AssumeRole" }, { "Sid": "2", "Effect": "Allow", "Principal": { "Service": "lambda.amazonaws.com" }, "Action": "sts:AssumeRole" } ] }
---->> Created Dead Config of Target ARN without fifo.
arn:aws:sqs:us-east-1:732813442182:forspinnaker (used)
1.
clouddriver-local.yml
setting.js
orca-local.yml
2.
create role
create bucket
create
createnfunction from ui
--- Basic infomation:
Account:
Region:
FunctionName:
Runtime:
S3 Bucket:
S3 key:
Handler:
Publish:
----Role ARN:
---Tag:
foo 000
----Debugging and error Handling:
Target ARN: To this