This describes how to run demo scenarios for Lightstep.
Requirements
- DigitalOcean Account w/PAT
- Terraform
- Lightstep Observability Account
- Create a DigitalOcean account and generate a Personal Access Token (PAT) with
read/write access to the API. This will be used to create necessary
resources for the demo. You will also need to upload your public SSH key to
DigitalOcean with the name
terraform
. - Create a Lightstep Observability account. You will need your project access token, as well as an API key with member or admin access.
- In
k8s-tracing
, createterraform.tfvars
and populate the following variables:do_token
- DigitalOcean PATpvt_key
- Path to theterraform
private key, locally.ls_access_token
- Lightstep project access tokenls_project
- Lightstep project namels_org
- Lightstep organization name (case-sensitive)ls_api_key
- Lightstep API key (member or admin)
- In
k8s-tracing
, runterraform init
to initialize the Terraform environment. - In
k8s-tracing
, runterraform apply
to create the necessary resources.
This will create a k3s cluster with API Server, containerd, etcd, and kubelet tracing enabled. You can view these traces in Lightstep.
Requirements
- DigitalOcean Account w/PAT and
doctl
installed kubectl
to access the k8s cluster if desired- Helm
- Terraform
- Lightstep Observability Account
- Create a DigitalOcean account and generate a Personal Access Token (PAT) with read/write access to the API.
- Create a Lightstep Observability account. You will need your project access token, as well as an API key with member or admin access.
- In
otel-demo
, create aterraform.tfvars
file and populate the following variables:do_token
- DigitalOcean PATls_access_token
- Lightstep project access tokenls_org
- Lightstep organization name (case-sensitive)ls_api_key
- Lightstep API key (member or admin)ls_project
- Lightstep project namek8s_cluster_name
- Name of the k8s cluster to create
- In
otel-demo
, runterraform init
to initialize the Terraform environment. - In
otel-demo
, runterraform apply
to create the necessary resources.
To enable interesting failure scenarios, connect to the Feature Flag service pod
with kubectl port-forward
on port 8081 and enable one or both flags.