Models application uses NGINX as a web server and is configured to serve only static content. This application is pre-configured with an SSL certificate. While you are installing the application using the steps below, you must replace the certificate with your own valid SSL certificate.
This application uses NGINX to serve static web content.
This application exposes two endpoints: HTTP on port 80 and HTTPS on port 443.
This application uses pre-generated certificates to configure the HTTPS
endpoint. The certificate is valid for 365 days. The certificate is stored as
https1.cert
secret and private key is stored as https1.key
secret.
If you want to use this application in a production environment, you must:
- Configure your own valid SSL certificate, and associate it with your domain name.
- Upload your web content to the application
The steps to update the certificate for the application are in Update your SSL certificate.
Get up and running with a few clicks! Install this Models app to a Google Kubernetes Engine cluster using Google Cloud Marketplace. Follow the on-screen instructions.
You can use Google Cloud Shell or a local workstation to complete the following steps.
You'll need the following tools in your development environment. If you are
using Cloud Shell, gcloud
, kubectl
, Docker, and Git are installed in your
environment by default.
Configure gcloud
as a Docker credential helper:
gcloud auth configure-docker
Create a new cluster from the command line:
export CLUSTER=models-cluster
export ZONE=us-west1-a
gcloud container clusters create "$CLUSTER" --zone "$ZONE"
Configure kubectl
to connect to the new cluster.
gcloud container clusters get-credentials "$CLUSTER" --zone "$ZONE"
Clone this repo and the associated tools repo.
git clone --recursive git@github.com:ElectrifAi/pai-gcp-marketplace.git
An Application resource is a collection of individual Kubernetes components, such as Services, Deployments, and so on, that you can manage as a group.
To set up your cluster to understand Application resources, run the following command:
kubectl apply -f "https://raw.githubusercontent.com/GoogleCloudPlatform/marketplace-k8s-app-tools/master/crd/app-crd.yaml"
You need to run this command once.
The Application resource is defined by the Kubernetes SIG-apps community. The source code can be found on github.com/kubernetes-sigs/application.
Navigate to the main directory:
cd pai-gcp-marketplace
Choose the instance name and namespace for the app:
export APP_INSTANCE_NAME=models
export NAMESPACE=models
export REPLICAS=1
Enable Stackdriver Metrics Exporter:
NOTE: Your GCP project must have Stackdriver enabled. If you are using a non-GCP cluster, you cannot export metrics to Stackdriver.
By default, application export metrics to Stackdriver as free curated metrics.
The metrics prefix would be kubernetes.io/nginx/
. To disable this option,
change the value of CURATED_METRICS_EXPORTER_ENABLED
to false
.
To keep backward compatibility, users can still export metrics as custom metrics.
To enable this option, change the value of METRICS_EXPORTER_ENABLED
to true
.
We encourage users migrate to the free metrics as it saves cost for the users.
export CURATED_METRICS_EXPORTER_ENABLED=true
export METRICS_EXPORTER_ENABLED=false
Set up the image tag:
You can use a tag which points to the latest image for selected version.
export TAG="1.0.0"
Configure the container images:
export IMAGE_NGINX="marketplace.gcr.io/electrifai-public/models"
export IMAGE_NGINX_INIT="marketplace.gcr.io/electrifai-public/debian9:${TAG}"
export IMAGE_METRICS_EXPORTER="marketplace.gcr.io/electrifai-public/prometheus-to-sd:${TAG}"
-
If you already have a certificate that you want to use, copy your certificate and key pair to the
/tmp/tls.crt
, and/tmp/tls.key
files, then skip to the next step.To create a new certificate, run the following command:
openssl req -x509 -nodes -days 365 -newkey rsa:2048 \ -keyout /tmp/tls.key \ -out /tmp/tls.crt \ -subj "/CN=nginx/O=nginx"
-
Set
TLS_CERTIFICATE_KEY
andTLS_CERTIFICATE_CRT
variables:export TLS_CERTIFICATE_KEY="$(cat /tmp/tls.key | base64)" export TLS_CERTIFICATE_CRT="$(cat /tmp/tls.crt | base64)"
If you use a different namespace than default
, run the command below to create
a new namespace:
kubectl create namespace "$NAMESPACE"
Use helm template
to expand the template. We recommend that you save the
expanded manifest file for future updates to the application.
helm template chart/nginx \
--name "$APP_INSTANCE_NAME" \
--namespace "$NAMESPACE" \
--set nginx.replicas="$REPLICAS" \
--set nginx.initImage="$IMAGE_NGINX_INIT" \
--set nginx.image.repo="$IMAGE_NGINX" \
--set nginx.image.tag="$TAG" \
--set nginx.persistence.storageClass="${DEFAULT_STORAGE_CLASS}" \
--set nginx.persistence.size="${PERSISTENT_DISK_SIZE}" \
--set metrics.image="$IMAGE_METRICS_EXPORTER" \
--set metrics.curatedExporter.enabled="$CURATED_METRICS_EXPORTER_ENABLED" \
--set metrics.exporter.enabled="$METRICS_EXPORTER_ENABLED" \
--set tls.base64EncodedPrivateKey="$TLS_CERTIFICATE_KEY" \
--set tls.base64EncodedCertificate="$TLS_CERTIFICATE_CRT" \
> "${APP_INSTANCE_NAME}_manifest.yaml"
Use kubectl
to apply the manifest to your Kubernetes cluster:
kubectl apply -f "${APP_INSTANCE_NAME}_manifest.yaml" --namespace "${NAMESPACE}"
To get the GCP Console URL for your app, run the following command:
echo "https://console.cloud.google.com/kubernetes/application/${ZONE}/${CLUSTER}/${NAMESPACE}/${APP_INSTANCE_NAME}"
To view your app, open the URL in your browser.
You can get the IP addresses for your Models solution either from the command line, or from the Google Cloud Platform Console.
In the GCP Console, do the following:
- Open the Kubernetes Engine Services page.
- Identify the Models solution using its name (typically
models-nginx-svc
) - From the Endpoints column, note the IP addresses for ports 80 and 443.
If you are using the command line, run the following command:
kubectl get svc -l app.kubernetes.io/name=$APP_INSTANCE_NAME --namespace "$NAMESPACE"
This command shows the internal and external IP address of your Models NGINX service.
The application is configured to expose its metrics through Nginx Exporter in the Prometheus format. For more detailed information about setting up the plugin, see the Nginx Exporter documentation.
You can access the metrics at [POD_IP]:9113/metrics
, where [POD_IP]
is the
IP address from the Kubernetes headless service
$APP_INSTANCE_NAME-nginx-prometheus-svc
.
Prometheus can be configured to automatically collect the application's metrics. Follow the steps in Configuring Prometheus.
You configure the metrics in the
scrape_configs
section.
The deployment includes a
Prometheus to Stackdriver (prometheus-to-sd
)
container. If you enabled the option to export metrics to Stackdriver, the
metrics are automatically exported to Stackdriver and visible in
Stackdriver Metrics Explorer.
The name of each metric starts with the application's name, which you define in
the APP_INSTANCE_NAME
environment variable.
The exporting option might not be available for GKE on-prem clusters.
Note: Stackdriver has quotas for the number of custom metrics created in a single GCP project. If the quota is met, additional metrics might not show up in the Stackdriver Metrics Explorer.
You can remove existing metric descriptors using Stackdriver's REST API.
By default, the Models application is deployed using 1 replicas. You can manually scale it up or down using the following command:
kubectl scale deploy "$APP_INSTANCE_NAME-nginx" \
--namespace "$NAMESPACE" \
--replicas=[NEW_REPLICAS]
where [NEW_REPLICAS]
is the new number of replicas.
We strongly recommend that you use a valid certificate issued by an approved Certificate Authority (CA) for your Models NGINX server.
To update the certificate, you need:
- The certificate file, such as an X509 certificate
- The private key file, in the PEM format. If you are using a signed certificate, use a bundled file that contains your domain certificate and the intermediate certificate
To update the certificate for a running server:
Caution: To avoid accidentally committing your certificate to your Git repository, perform these steps outside the cloned repo.
-
Save the certificate as
https1.cert
in a folder on your workstation. -
Save the private key of your certificate as
https1.key
in the same folder. -
Copy
pai-gcp-marketplace/scripts/nginx-update-cert.sh
to the folder wherehttps1.cert
andhttps1.key
are stored. -
Define the
APP_INSTANCE_NAME
environment variable:export APP_INSTANCE_NAME=application_name # for example, Models
-
Define the
NAMESPACE
environment variable:export NAMESPACE=default
-
Run the update script:
./nginx-update-cert.sh
.
If you want to create a self-signed certificate, typically used for testing, use
the
pai-gcp-marketplace/scripts/nginx-create-key.sh
script.
These steps assume that you have a new image for the Models container available
to your Kubernetes cluster. The new image is used in the following commands as
[NEW_IMAGE_REFERENCE]
.
In the Models Deployment, modify the image used for the Pod template:
kubectl set image deployment "$APP_INSTANCE_NAME-nginx" \
--namespace "$NAMESPACE" nginx=[NEW_IMAGE_REFERENCE]
where [NEW_IMAGE_REFERENCE]
is the new image.
To check the status of Pods in the Deployment, and the progress of deploying the new image, run the following command:
kubectl get pods -l app.kubernetes.io/name=$APP_INSTANCE_NAME --namespace "$NAMESPACE"
To check the current image used by Pods in the Models
Kubernetes application,
run the following command:
kubectl get pods -l app.kubernetes.io/name=$APP_INSTANCE_NAME --namespace "$NAMESPACE" -o=jsonpath='{range .items[*]}{"\n"}{.metadata.name}{":\t"}{range .spec.containers[*]}{.image}{", "}{end}{end}' | sort
You can delete the Models application using the Google Cloud Platform Console, or using the command line.
-
In the GCP Console, open Kubernetes Applications.
-
From the list of applications, click Models.
-
On the Application Details page, click Delete.
-
Navigate to the main directory.
cd pai-gcp-marketplace
-
Run the
kubectl delete
command:kubectl delete -f ${APP_INSTANCE_NAME}_manifest.yaml --namespace $NAMESPACE
Optionally, if you don't need the deployed application or the Kubernetes Engine cluster, delete the cluster using this command:
gcloud container clusters delete "$CLUSTER" --zone "$ZONE"