BOSH workspace is intimately related to how deployment manifests were handled with BOSH v1. At the time, most projects were providing Bash-based ad-hoc toolchains for building large YAML deployment manifests out of somewhat smaller YAML pieces called Spiff templates and stubs.
In this landscape, BOSH Workspace introduced an effort for providing a standard toolchain around Spiff, giving a chance for better organizing Spiff templates and stubs into what could be called “infrastructure-as-code“ git repositories, that could precisely describe staging and production environments managed by BOSH.
Later, the development of BOSH Workspace has been abandonned in favor of other tools like Genesis v1, then v2. And on the BOSH side, the v2 CLI has deprecated Spiff and thus the way BOSH Workspace works. Plus, reference deployment manifests are progressively being distributed as *-deployment (example: bosh, cf) git repos containing a base BOSH v2 deployment along with operation files that implement variants around the base deployment. So, fewer and fewer projects are shipping Spiff templates anymore.
So, newer ways of organizing BOSH deployment manifests have emerged like Genesis that has pivoted to Genesis v2 to support BOSH v2 or Gstack BOSH Environment (or GBE for intimates) that is natively built around the BOSH v2 CLI.
BOSH Workspace is in essence a bosh
v1 CLI plugin for managing an organized
layout of Spiff stubs and templates that are the basis of typical BOSH v1
deployments. Such organized layout helps in managing consistently the various
infrastructure-as-code environments you might have, like “sandbox”, “pre-prod”
or ”production”, all made of BOSH deployments that are similar but not exactly
the same.
BOSH Workspace aslo noticeably introduces new handly verbs in the bosh
v1
CLI that make it easier to deploy things. Indeed, running
bosh prepare deployment
automates the uploading of BOSH Releases and BOSH
Stemcells (the required bits for a BOSH deployment) to the BOSH server.
For a good introduciton on the initial goals of the project (back in 2015), see the Introducing bosh-workspace: how we deploy all things BOSH video.
Before you start make sure ruby
, bundler
and spiff
are available on your
system. Instructions for installing spiff can found
here.
First you will have to create a new repo for our company called Foo Group (short FG).
git init fg-boshworkspace
cd fg-boshworkspace
Lets create the initial files & directories.
mkdir deployments templates
echo -e 'source "https://rubygems.org"\n\ngem "bosh-workspace"' > Gemfile
echo "2.1.0" > .ruby-version
echo -e '.stemcells*\n.deployments*\n.releases*\n.stubs*\n' > .gitignore
Now install the gems by running bundler.
bundle install
Lets finish by making an initial commit.
git add .
git commit -m "Initial commit"
For demonstration purposes we will deploy Cloud Foundry on bosh-lite. The steps below will show the bosh-workspace equivalent of bosh-lite manual deploy instructions.
Before we start make sure you have access to properly installed bosh-lite.
We will start by targetting our bosh-lite.
bosh target 192.168.50.4
bosh login admin admin
Now lets create our deployment file.
cat >deployments/cf-warden.yml <<EOL
---
name: cf-warden
director_uuid: current
releases:
- name: cf
version: latest
git: https://github.com/cloudfoundry/cf-release.git
stemcells:
- name: bosh-warden-boshlite-ubuntu-lucid-go_agent
version: 60
templates:
- cf/cf-deployment.yml
- cf/cf-jobs.yml
- cf/cf-properties.yml
- cf/cf-resource-pools.yml
- cf/cf-infrastructure-warden.yml
- cf/cf-minimal-dev.yml
meta:
default_quota_definitions:
default:
memory_limit: 102400 # Increased limit for demonstration purposes
EOL
Now lets use this deployment and upload it's dependencies.
bosh deployment cf-warden
bosh prepare deployment
Lets make sure to above template paths exist.
ln -s ../.releases/cf/templates templates/cf
To finish we only have to start the deployment process and commit our changes.
bosh deploy
git add . && git commit -m "Added cf-warden deployment"
Congratulations you should now have a running Cloud Foundry. For further reference on how to start using it go to the bosh-lite documentation.
The suggested way of doing this is to create many similar deployments in the
deployments/
folder. They typically have tha same radix like cf
or mysql
as prefix of their name, and be distinguished by a -sandbox.yml
suffix or
-prod.yml
depending on your environments names.
Then each of those similar deployment can express variants by including
environment-specific Spiff stubs, or specifying specific configuration in the
meta
root YAML node. Easy as that. Examples of deployment variants can be
found in cf-boshworkspace.
When using a boshrelease from a location which requires authentication
a .credentials.yml
file is required, located at the root of your boshworkspace.
Two types of authentication are supported: username/password
and sshkey
.
Example .credentials.yml
file:
- url: https://github.com/example/top-secret-boshrelease.git
username: foo
password: bar
- url: ssh://git@github.com/example/super-secret-boshrelease.git
private_key: |
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
cmake isneeded and libssh2 is optionally (only needed when using cloning over ssh)
brew install cmake libssh2 pkg-config
cmake and libcurl4-openssl-dev is needed for rugged install
sudo apt-get install cmake libcurl4-openssl-dev libssh2-1-dev
Dns support can be enabled by adding a domain_name
property to your deployment.
For example: domain_name: microbosh
or if you are using a normal bosh just use bosh
.
When enabled, a transformation step will be executed after the spiff merge.
Which will transform all the static ip references into domain names.
- Fork it
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Add some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create new Pull Request