Skip to main content

Quickstart demo stack on Kubernetes

With this step-by-step guide kubriX with its default demo stack gets deployed on your preferred Kubernetes cluster.

Prerequisites

Installation steps

  1. create new empty customer repo on your Git-Server (GitLab, GitHub, Gitea, ...). We fully tested this with GitHub, but others should also work.

    IMPORTANT: the repo needs to be empty (also no initial README!!!)

  2. create an access token for this new repo with write access

    Instead of a newly created access token you can also use your personal access tokens, but this is not recommended since your personal access token has probably more permissions than needed.

    If you create a fine-grained token on Github, these are the needed permissions:

    image

  3. set the repo url and token in this variables like this:

    export KUBRIX_REPO="https://github.com/kubriX-demo/kubriX-demo-customerXY"
    export KUBRIX_REPO_PASSWORD="blabla"
  4. optional: set the DNS provider, which external-dns should connect to.

    default: ionos
    supported: ionos, aws, stackit, cloudflare

    export KUBRIX_DNS_PROVIDER="ionos"
  5. optional: set the domain, under which kubriX should be available.

    This domain will be used by external-dns. Your provider in step 4 needs to be able to manage this domain with the credentials set in step 8.

    export KUBRIX_DOMAIN="demo-johnny.kubrix.cloud"

    if this variable is not set, a subdomain of "kubrix.cloud" is randomly created (for example "demo-2faf23d.kubrix.cloud")

  6. optional: set the kubrix target type which should be used

    export KUBRIX_TARGET_TYPE="DEMO-STACK"

    if this variable is not set, "DEMO-STACK" is used.

  7. create a new Kubernetes cluster and be sure that kubectl is connected to it. check with kubectl cluster-info

  8. provide external-dns secrets depending on your DNS provider

    ionos

    create a secret with your DNS api-key like this:

    kubectl create ns external-dns
    kubectl create secret generic ionos-credentials -n external-dns --from-literal=api-key='your-api-key'

    aws

    create a credentials file like this:

    [default]
    aws_access_key_id = your-key-id
    aws_secret_access_key = your-access-key

    and then create the secret on the K8s cluster based on this credentials file:

    kubectl create ns external-dns
    kubectl create secret generic -n external-dns sx-external-dns --from-file credentials

    stackit

    kubectl create ns external-dns
    kubectl create secret generic external-dns-webhook -n external-dns --from-literal=AUTH_TOKEN='your-auth-token'
    --from-literal=PROJECT_ID='your-project-id'

    cloudflare

    kubectl create ns external-dns
    kubectl create secret generic cloudflare-api-key -n external-dns --from-literal=apiKey='YOUR_API_TOKEN'
  9. If you need to prepare something else on your cluster before kubriX gets installed, do this now.

  10. Create a kubrix-install Namespace and a Secret kubrix-installer-secrets to configure the installer.

    kubectl create ns kubrix-install
    kubectl create secret generic kubrix-install-secrets -n kubrix-install \
    --from-literal KUBRIX_REPO=${KUBRIX_REPO} \
    --from-literal KUBRIX_REPO_PASSWORD=${KUBRIX_REPO_PASSWORD} \
    --from-literal KUBRIX_DOMAIN=${KUBRIX_DOMAIN} \
    --from-literal KUBRIX_DNS_PROVIDER=${KUBRIX_DNS_PROVIDER} \
    --from-literal KUBRIX_TARGET_TYPE=${KUBRIX_TARGET_TYPE} \
    --from-literal KUBRIX_BOOTSTRAP=true \
    --from-literal KUBRIX_INSTALLER=true
  11. Then apply the installer manifests:

    kubectl apply -f https://raw.githubusercontent.com/suxess-it/kubriX/refs/heads/main/install-manifests.yaml

    These manifests will create a Kubernetes Job which creates a clone of the upstream kubriX OSS repo with some customizations in your newly created repo and starts the installation on your Kubernetes cluster.

    This could take up to 30 minutes, depending how powerful your local environment is.

    You can watch the logs of the job with

    kubectl logs -n kubrix-install -f "pod/$(kubectl get pod -n kubrix-install -l "job-name=kubrix-install-job" -o jsonpath='{.items[0].metadata.name}')" --all-containers=true

    Especially Keycloak could take a while, since there are many resources created via Crossplane in different ArgoCD sync-waves. After 300 seconds the sync process gets terminated and restarted. This could happend sometimes and is not always indicating a problem. Also, sometimes the Keycloak app could be in temporary Degraded state during installation, but gets Healthy afterwards.

Next steps