-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deploy binderHub and other K8s apps on AWS curvenote #2698
Changes from all commits
bea7996
fc3fdb5
728ce81
16c5ae2
f624b5a
1c607b6
683a8a9
e8f9a96
dadee41
0d141e2
409a8ff
767cdbb
66eb7e5
4eda516
0a17b2d
12617a1
20c3b38
c235f3e
f222b83
abcd1f0
7973a0f
c5f3c64
65b4d6d
a8bf805
a399120
baab6b7
964e329
309d537
59f3b87
1a1de38
5fc3591
4042775
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1,2 @@ | ||
mybinder/templates/ | ||
terraform/aws/curvenote/cni/ |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
# Install the more modern load-balancer controller: | ||
# https://docs.aws.amazon.com/eks/latest/userguide/aws-load-balancer-controller.html | ||
aws-load-balancer-controller: | ||
enabled: true | ||
clusterName: binderhub | ||
clusterSecretsPermissions: | ||
allowAllSecrets: true | ||
enableShield: false | ||
enableWaf: false | ||
enableWafv2: false | ||
logLevel: debug | ||
serviceAccount: | ||
# Must match the IRSA service account name | ||
name: aws-load-balancer-controller | ||
annotations: | ||
eks.amazonaws.com/role-arn: "arn:aws:iam::166088433508:role/binderhub-IRSA-aws-load-balancer-controller" | ||
|
||
aws-ebs-csi-driver: | ||
enabled: true | ||
controller: | ||
serviceAccount: | ||
# Must match the IRSA service account name | ||
name: ebs-csi-controller-sa | ||
annotations: | ||
eks.amazonaws.com/role-arn: "arn:aws:iam::166088433508:role/binderhub-IRSA-ebs-csi-controller-sa" | ||
storageClasses: | ||
- name: ebs-sc | ||
# Note this results in EKS having two default StorageClasses, so to be sure | ||
# always specify the storage class in the PVC. | ||
annotations: | ||
storageclass.kubernetes.io/is-default-class: "true" |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,324 @@ | ||
projectName: curvenote | ||
|
||
binderhub: | ||
config: | ||
BinderHub: | ||
hub_url: https://hub.binder.curvenote.dev | ||
hub_url_local: http://proxy-public | ||
badge_base_url: https://mybinder.org | ||
sticky_builds: true | ||
image_prefix: 166088433508.dkr.ecr.us-east-2.amazonaws.com/binderhub/ | ||
# log_level: DEBUG | ||
# TODO: we should have CPU requests, too | ||
# use this to limit the number of builds per node | ||
# complicated: dind memory request + KubernetesBuildExecutor.memory_request * builds_per_node ~= node memory | ||
KubernetesBuildExecutor: | ||
memory_request: "2G" | ||
|
||
LaunchQuota: | ||
total_quota: 10 | ||
|
||
ExternalRegistryHelper: | ||
service_url: http://curvenote-binderhub-container-registry-helper:8080 | ||
|
||
extraEnv: | ||
BINDERHUB_CONTAINER_REGISTRY_HELPER_AUTH_TOKEN: | ||
valueFrom: | ||
secretKeyRef: | ||
name: curvenote-binderhub-container-registry-helper | ||
key: auth_token | ||
|
||
registry: | ||
url: 166088433508.dkr.ecr.us-east-2.amazonaws.com | ||
username: "" | ||
password: "" | ||
|
||
# extraVolumes: | ||
# - name: secrets | ||
# secret: | ||
# secretName: events-archiver-secrets | ||
# extraVolumeMounts: | ||
# - name: secrets | ||
# mountPath: /secrets | ||
# readOnly: true | ||
# extraEnv: | ||
# GOOGLE_APPLICATION_CREDENTIALS: /secrets/service-account.json | ||
|
||
extraConfig: | ||
01-eventlog: | | ||
# Disabled until GOOGLE_APPLICATION_CREDENTIALS secret is available | ||
# and secrets/events-archiver/curvenote.json is created | ||
|
||
10-external-registry-helper: | | ||
import json | ||
from os import getenv | ||
from tornado import httpclient | ||
from traitlets import Unicode | ||
from binderhub.registry import DockerRegistry | ||
|
||
|
||
class ExternalRegistryHelper(DockerRegistry): | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'm guessing this will eventually go upstream into binderhub There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Hopefully! I think we should try it in production for a bit, and if there are no unforeseen issues add it upstream. |
||
service_url = Unicode( | ||
"http://binderhub-container-registry-helper:8080", | ||
allow_none=False, | ||
help="The URL of the registry helper micro-service.", | ||
config=True, | ||
) | ||
|
||
auth_token = Unicode( | ||
getenv("BINDERHUB_CONTAINER_REGISTRY_HELPER_AUTH_TOKEN"), | ||
help="The auth token to use when accessing the registry helper micro-service.", | ||
config=True, | ||
) | ||
|
||
async def _request(self, endpoint, **kwargs): | ||
client = httpclient.AsyncHTTPClient() | ||
repo_url = f"{self.service_url}{endpoint}" | ||
headers = {"Authorization": f"Bearer {self.auth_token}"} | ||
repo = await client.fetch(repo_url, headers=headers, **kwargs) | ||
return json.loads(repo.body.decode("utf-8")) | ||
|
||
async def _get_image(self, image, tag): | ||
repo_url = f"/image/{image}:{tag}" | ||
self.log.debug(f"Checking whether image exists: {repo_url}") | ||
try: | ||
image_json = await self._request(repo_url) | ||
return image_json | ||
except httpclient.HTTPError as e: | ||
if e.code == 404: | ||
return None | ||
raise | ||
|
||
async def get_image_manifest(self, image, tag): | ||
""" | ||
Checks whether the image exists in the registry. | ||
|
||
If the container repository doesn't exist create the repository. | ||
|
||
The container repository name may not be the same as the BinderHub image name. | ||
|
||
E.g. Oracle Container Registry (OCIR) has the form: | ||
OCIR_NAMESPACE/OCIR_REPOSITORY_NAME:TAG | ||
|
||
These extra components are handled automatically by the registry helper | ||
so BinderHub repository names such as OCIR_NAMESPACE/OCIR_REPOSITORY_NAME | ||
can be used directly, it is not necessary to remove the extra components. | ||
|
||
Returns the image manifest if the image exists, otherwise None | ||
""" | ||
|
||
repo_url = f"/repo/{image}" | ||
self.log.debug(f"Checking whether repository exists: {repo_url}") | ||
try: | ||
repo_json = await self._request(repo_url) | ||
except httpclient.HTTPError as e: | ||
if e.code == 404: | ||
repo_json = None | ||
else: | ||
raise | ||
|
||
if repo_json: | ||
return await self._get_image(image, tag) | ||
else: | ||
self.log.debug(f"Creating repository: {repo_url}") | ||
await self._request(repo_url, method="POST", body="") | ||
return None | ||
|
||
async def get_credentials(self, image, tag): | ||
""" | ||
Get the registry credentials for the given image and tag if supported | ||
by the remote helper, otherwise returns None | ||
|
||
Returns a dictionary of login fields. | ||
""" | ||
token_url = f"/token/{image}:{tag}" | ||
self.log.debug(f"Getting registry token: {token_url}") | ||
token_json = None | ||
try: | ||
token_json = await self._request(token_url, method="POST", body="") | ||
except httpclient.HTTPError as e: | ||
if e.code == 404: | ||
return None | ||
raise | ||
self.log.debug(f"Token: {*token_json.keys(),}") | ||
token = dict( | ||
(k, v) | ||
for (k, v) in token_json.items() | ||
if k in ["username", "password", "registry"] | ||
) | ||
return token | ||
|
||
|
||
c.BinderHub.registry_class = ExternalRegistryHelper | ||
|
||
ingress: | ||
hosts: | ||
- binder.curvenote.dev | ||
|
||
jupyterhub: | ||
hub: | ||
db: | ||
pvc: | ||
storageClassName: ebs-sc | ||
config: | ||
KubeSpawner: | ||
extra_pod_config: | ||
enableServiceLinks: false | ||
image_pull_policy: Always | ||
extraPodSpec: | ||
priorityClassName: binderhub-core | ||
networkPolicy: | ||
ingress: | ||
# AWS VPC CNI only works if the name of the service port name is the same as | ||
# the name of the pod port and the port number is the same | ||
# https://docs.aws.amazon.com/eks/latest/userguide/cni-network-policy.html#cni-network-policy-considerations | ||
- from: | ||
- podSelector: | ||
matchLabels: | ||
hub.jupyter.org/network-access-hub: "true" | ||
# For unknown reasons the hub <-> notebook traffic is partially blocked if | ||
# this is included: | ||
# ports: | ||
# # service/hub port name is "hub" | ||
# # pod/hub port name is "http" | ||
# - port: 8081 | ||
# protocol: TCP | ||
|
||
singleuser: | ||
networkPolicy: | ||
ingress: | ||
# AWS VPC CNI only works if the name of the service port name is the same as | ||
# the name of the pod port and the port number is the same | ||
# https://docs.aws.amazon.com/eks/latest/userguide/cni-network-policy.html#cni-network-policy-considerations | ||
- from: | ||
- podSelector: | ||
matchLabels: | ||
hub.jupyter.org/network-access-singleuser: "true" | ||
ports: | ||
# proxy/pod port name is "notebook-port" | ||
# I've no idea why that doesn't work | ||
- port: 8888 | ||
protocol: TCP | ||
|
||
proxy: | ||
chp: | ||
extraPodSpec: | ||
priorityClassName: binderhub-core | ||
networkPolicy: | ||
ingress: | ||
# AWS VPC CNI only works if the name of the service port name is the same as | ||
# the name of the pod port and the port number is the same | ||
# https://docs.aws.amazon.com/eks/latest/userguide/cni-network-policy.html#cni-network-policy-considerations | ||
- from: | ||
- podSelector: | ||
matchLabels: | ||
hub.jupyter.org/network-access-proxy-api: "true" | ||
ports: | ||
# service/proxy-api port doesn't have a name | ||
# proxy/pod port name is "api" | ||
- port: 8001 | ||
protocol: TCP | ||
- from: | ||
ports: | ||
# service/proxy-public port is 80 | ||
# proxy/pod port is 8000 | ||
- port: 8000 | ||
protocol: TCP | ||
- port: 80 | ||
protocol: TCP | ||
|
||
ingress: | ||
hosts: | ||
- hub.binder.curvenote.dev | ||
tls: | ||
- secretName: kubelego-tls-hub | ||
hosts: | ||
- hub.binder.curvenote.dev | ||
scheduling: | ||
userPlaceholder: | ||
enabled: false | ||
userScheduler: | ||
enabled: false | ||
cull: | ||
# maxAge: 1 hour since we're just testing | ||
maxAge: 3600 | ||
|
||
imageCleaner: | ||
enabled: true | ||
# Use 40GB as upper limit, size is given in bytes | ||
imageGCThresholdHigh: 40e9 | ||
imageGCThresholdLow: 30e9 | ||
imageGCThresholdType: "absolute" | ||
|
||
cryptnono: | ||
enabled: true | ||
|
||
grafana: | ||
enabled: false | ||
ingress: | ||
hosts: | ||
# - grafana.binder.curvenote.dev | ||
tls: | ||
- hosts: | ||
# - grafana.binder.curvenote.dev | ||
secretName: kubelego-tls-grafana | ||
datasources: | ||
datasources.yaml: | ||
apiVersion: 1 | ||
datasources: | ||
- name: prometheus | ||
orgId: 1 | ||
type: prometheus | ||
url: https://prometheus.binder.curvenote.dev | ||
access: direct | ||
isDefault: true | ||
editable: false | ||
|
||
prometheus: | ||
enabled: true | ||
server: | ||
persistentVolume: | ||
size: 50Gi | ||
retention: 30d | ||
ingress: | ||
hosts: | ||
- prometheus.binder.curvenote.dev | ||
tls: | ||
- hosts: | ||
- prometheus.binder.curvenote.dev | ||
secretName: kubelego-tls-prometheus | ||
|
||
ingress-nginx: | ||
controller: | ||
service: | ||
annotations: | ||
service.beta.kubernetes.io/aws-load-balancer-scheme: "internet-facing" | ||
|
||
static: | ||
ingress: | ||
hosts: | ||
- static.binder.curvenote.dev | ||
|
||
analyticsPublisher: | ||
enabled: false | ||
|
||
minesweeper: | ||
enabled: true | ||
|
||
priorityClasses: | ||
binderhub-core: 10000 | ||
|
||
binderhub-container-registry-helper: | ||
enabled: true | ||
# auth_token: Autogenerated | ||
replicaCount: 2 | ||
serviceAccount: | ||
name: binderhub-container-registry-helper | ||
annotations: | ||
eks.amazonaws.com/role-arn: "arn:aws:iam::166088433508:role/binderhub-IRSA-aws-binderhub-ecr" | ||
|
||
awsEcrRegistryCleaner: | ||
enabled: true | ||
serviceAccount: | ||
annotations: | ||
eks.amazonaws.com/role-arn: "arn:aws:iam::166088433508:role/binderhub-IRSA-aws-binderhub-ecr-registry-cleaner" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is the main thing missing- how do I create the credentials?