This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Set up a Datum managed Location backed by GCP

    Before you begin

    This tutorial assumes you have already registered an account, installed and configured the necessary tools to interact with Datum, and have created a Datum project.

    Grant Datum Cloud access to your GCP project

    Datum requires the following roles to be granted to a Datum managed service account which is specific to each Datum project:

    • roles/compute.admin
    • roles/secretmanager.admin
    • roles/iam.serviceAccountAdmin
    • roles/iam.serviceAccountUser

    The service account email will be in the following format:

    PROJECT_NAME@datum-cloud-project.iam.gserviceaccount.com

    Use the gcloud tool to grant IAM Roles to your Datum service account, replacing GCP_PROJECT_ID and PROJECT_NAME with their respective values:

    gcloud projects add-iam-policy-binding GCP_PROJECT_ID \
      --member="serviceAccount:PROJECT_NAME@datum-cloud-project.iam.gserviceaccount.com" \
      --role="roles/compute.admin"
    
    gcloud projects add-iam-policy-binding GCP_PROJECT_ID \
      --member="serviceAccount:PROJECT_NAME@datum-cloud-project.iam.gserviceaccount.com" \
      --role="roles/secretmanager.admin"
    
    gcloud projects add-iam-policy-binding GCP_PROJECT_ID \
      --member="serviceAccount:PROJECT_NAME@datum-cloud-project.iam.gserviceaccount.com" \
      --role="roles/iam.serviceAccountAdmin"
    
    gcloud projects add-iam-policy-binding GCP_PROJECT_ID \
      --member="serviceAccount:PROJECT_NAME@datum-cloud-project.iam.gserviceaccount.com" \
      --role="roles/iam.serviceAccountUser"
    

    For guidance on granting roles via Google’s Console, see Manage access to projects, folders, and organizations.

    Register a Datum Managed Location

    Before creating a workload, a Location must be registered.

    Use the following example manifest to create a location which Datum’s control plane will be responsible for managing, replacing GCP_PROJECT_ID with your GCP project id:

    apiVersion: networking.datumapis.com/v1alpha
    kind: Location
    metadata:
      name: my-gcp-us-south1-a
    spec:
      locationClassName: datum-managed
      topology:
        topology.datum.net/city-code: DFW
      provider:
        gcp:
          projectId: GCP_PROJECT_ID
          region: us-south1
          zone: us-south1-a
    
    1. Replace topology.datum.net/city-code’s value (DFW) with the desired city code for your workloads.
    2. Update the gcp provider settings to reflect your GCP project ID, desired region, and zone.

    Apply the manifest:

    kubectl apply -f <path-to-location-manifest>
    

    List Locations:

    kubectl get locations
    
    NAME                 AGE
    my-gcp-us-south1-a   5s
    

    Create a Network

    Before creating a workload, a Network must be created. You can use the following manifest to do this:

    apiVersion: networking.datumapis.com/v1alpha
    kind: Network
    metadata:
      name: default
    spec:
      ipam:
        mode: Auto
    

    Apply the manifest:

    kubectl apply -f <path-to-network-manifest>
    

    List Networks:

    kubectl get networks
    
    NAME      AGE
    default   5s
    

    Create a Workload

    Create a manifest for a sandbox based workload, for example:

    apiVersion: compute.datumapis.com/v1alpha
    kind: Workload
    metadata:
      name: my-container-workload
    spec:
      template:
        spec:
          runtime:
            resources:
              instanceType: datumcloud/d1-standard-2
            sandbox:
              containers:
                - name: httpbin
                  image: mccutchen/go-httpbin
                  ports:
                    - name: http
                      port: 8080
          networkInterfaces:
            - network:
                name: default
              networkPolicy:
                ingress:
                  - ports:
                    - port: 8080
                    from:
                      - ipBlock:
                          cidr: 0.0.0.0/0
      placements:
        - name: us
          cityCodes: ['DFW']
          scaleSettings:
            minReplicas: 1
    

    Apply the manifest:

    kubectl apply -f <path-to-workload-manifest>
    

    Check the state of the workload

    kubectl get workloads
    

    The output is similar to:

    NAME                    AGE   AVAILABLE   REASON
    my-container-workload   9s    False       NoAvailablePlacements
    

    The REASON field will be updated as the system progresses with attempting to satisfy the workload’s intent.

    Check Workload Deployments

    A Workload will result in one or more WorkloadDeployments being created, one for each unique CityCode per placement.

    kubectl get workloaddeployments
    

    The output is similar to:

    NAME                           AGE   LOCATION NAMESPCE   LOCATION NAME        AVAILABLE   REASON
    my-container-workload-us-dfw   58s   default             my-gcp-us-south1-a   False       LocationAssigned
    

    Similar to workloads, the REASON field will be updated as the system progresses with attempting to satisfy the workload’s intent. In this case, the infra-provider-gcp operator is responsible for these actions.

    Check Instances

    kubectl -n default get instances -o wide
    

    The output is similar to:

    NAME                             AGE   AVAILABLE   REASON              NETWORK IP   EXTERNAL IP
    my-container-workload-us-dfw-0   24s   True        InstanceIsRunning   10.128.0.2   34.174.154.114
    

    Confirm that the go-httpbin application is running:

    curl -s http://34.174.154.114:8080/uuid
    
    {
      "uuid": "8244205b-403e-4472-8b91-728245e99029"
    }
    

    Delete the workload

    Delete the workload when testing is complete:

    kubectl delete workload my-container-workload