Deploy to Kubernetes
Before you begin
Set the PROJECT_ID environment variable:
export PROJECT_ID="my-project-id"Initialize gcloud CLI:
gcloud init gcloud config set project $PROJECT_IDYou must have the following APIs enabled:
gcloud services enable artifactregistry.googleapis.com \ cloudbuild.googleapis.com \ container.googleapis.com \ iam.googleapis.comkubectlis used to manage Kubernetes, the cluster orchestration system used by GKE. Verify if you havekubectlinstalled:kubectl version --clientIf needed, install
kubectlcomponent using the Google Cloud CLI:gcloud components install kubectl
Create a service account
Specify a name for your service account with an environment variable:
export SA_NAME=toolboxCreate a backend service account:
gcloud iam service-accounts create $SA_NAMEGrant any IAM roles necessary to the IAM service account. Each source has a list of necessary IAM permissions listed on its page. The example below is for cloud sql postgres source:
gcloud projects add-iam-policy-binding $PROJECT_ID \ --member serviceAccount:$SA_NAME@$PROJECT_ID.iam.gserviceaccount.com \ --role roles/cloudsql.client
Deploy to Kubernetes
Set environment variables:
export CLUSTER_NAME=toolbox-cluster export DEPLOYMENT_NAME=toolbox export SERVICE_NAME=toolbox-service export REGION=us-central1 export NAMESPACE=toolbox-namespace export SECRET_NAME=toolbox-config export KSA_NAME=toolbox-service-accountCreate a GKE cluster.
gcloud container clusters create-auto $CLUSTER_NAME \ --location=us-central1Get authentication credentials to interact with the cluster. This also configures
kubectlto use the cluster.gcloud container clusters get-credentials $CLUSTER_NAME \ --region=$REGION \ --project=$PROJECT_IDView the current context for
kubectl.kubectl config current-contextCreate namespace for the deployment.
kubectl create namespace $NAMESPACECreate a Kubernetes Service Account (KSA).
kubectl create serviceaccount $KSA_NAME --namespace $NAMESPACEEnable the IAM binding between Google Service Account (GSA) and Kubernetes Service Account (KSA).
gcloud iam service-accounts add-iam-policy-binding \ --role="roles/iam.workloadIdentityUser" \ --member="serviceAccount:$PROJECT_ID.svc.id.goog[$NAMESPACE/$KSA_NAME]" \ $SA_NAME@$PROJECT_ID.iam.gserviceaccount.comAdd annotation to KSA to complete binding:
kubectl annotate serviceaccount \ $KSA_NAME \ iam.gke.io/gcp-service-account=$SA_NAME@$PROJECT_ID.iam.gserviceaccount.com \ --namespace $NAMESPACEPrepare the Kubernetes secret for your
tools.yamlfile.kubectl create secret generic $SECRET_NAME \ --from-file=./tools.yaml \ --namespace=$NAMESPACECreate a Kubernetes manifest file (
k8s_deployment.yaml) to build deployment.apiVersion: apps/v1 kind: Deployment metadata: name: toolbox namespace: toolbox-namespace spec: selector: matchLabels: app: toolbox template: metadata: labels: app: toolbox spec: serviceAccountName: toolbox-service-account containers: - name: toolbox # Recommend to use the latest version of toolbox image: us-central1-docker.pkg.dev/database-toolbox/toolbox/toolbox:latest args: ["--address", "0.0.0.0"] ports: - containerPort: 5000 volumeMounts: - name: toolbox-config mountPath: "/app/tools.yaml" subPath: tools.yaml readOnly: true volumes: - name: toolbox-config secret: secretName: toolbox-config items: - key: tools.yaml path: tools.yamlCreate the deployment.
kubectl apply -f k8s_deployment.yaml --namespace $NAMESPACECheck the status of deployment.
kubectl get deployments --namespace $NAMESPACECreate a Kubernetes manifest file (
k8s_service.yaml) to build service.apiVersion: v1 kind: Service metadata: name: toolbox-service namespace: toolbox-namespace annotations: cloud.google.com/l4-rbs: "enabled" spec: selector: app: toolbox ports: - port: 5000 targetPort: 5000 type: LoadBalancerCreate the service.
kubectl apply -f k8s_service.yaml --namespace $NAMESPACEYou can find your IP address created for your service by getting the service information through the following.
kubectl describe services $SERVICE_NAME --namespace $NAMESPACETo look at logs, run the following.
kubectl logs -f deploy/$DEPLOYMENT_NAME --namespace $NAMESPACEYou might have to wait a couple of minutes. It is ready when you can see
EXTERNAL-IPwith the following command:kubectl get svc -n $NAMESPACEAccess toolbox locally.
curl <EXTERNAL-IP>:5000
Clean up resources
Delete secret.
kubectl delete secret $SECRET_NAME --namespace $NAMESPACEDelete deployment.
kubectl delete deployment $DEPLOYMENT_NAME --namespace $NAMESPACEDelete the application’s service.
kubectl delete service $SERVICE_NAME --namespace $NAMESPACEDelete the Kubernetes cluster.
gcloud container clusters delete $CLUSTER_NAME \ --location=$REGION