tpl/aws/README.md in kite-0.0.5 vs tpl/aws/README.md in kite-0.0.6

- old
+ new

@@ -11,93 +11,19 @@ Requirements ----- - Install [terraform](https://www.terraform.io/intro/getting-started/install.html) -- Install [bosh-init](https://bosh.io/docs/install-bosh-init.html) -- Install the [bosh_cli](https://bosh.io/docs/bosh-cli.html) +- Install [bosh](https://bosh.io/docs/cli-v2.html#install) -Ensure you have created a `terraform/terraform.tfvars` file with your variables, or set suitable [environment variables](https://www.terraform.io/docs/configuration/variables.html). An example tfvars file can be found in `terraform/terraform.tfvars.example` - -Assumptions ------ - -You already have: - -- A Route53 Zone in AWS. -- An EC2 SSH keypair -- An SSL certificate in AWS for your Concourse ELB - Usage ----- -Set your desired AWS region in `terrform/variables.tf`. Ensure terraform is in your path, then apply the configuration to prepare the IaaS for BOSH and Concourse: +To deploy a BOSH Director: +- Apply the terraform IaC from `terraform` folder +- Run `bin/setup_tunnel.sh` to create an SSH CLI tunnel +- Run `kite render bosh --cloud aws` to render BOSH deployment files +- Run `bin/bosh_setup.sh` to deploy the BOSH Director -``` -cd terraform/ -terraform apply -``` -Set the following environment variables: +To access BOSH Director information, use bosh -e *bosh_name* env -``` -$AWS_ACCESS_KEY_ID -$AWS_SECRET_ACCESS_KEY -$AWS_REGION -$AWS_AZ -$BOSH_PASSWORD -$AWS_KEYPAIR_KEY_NAME -$PRIVATE_KEY_PATH -``` - -Then create the `bosh-director.yml` manifest: -``` -./bin/make_manifest_bosh-init.sh -``` - -You are ready to deploy the BOSH Director -``` -bosh-init deploy bosh-director.yml -``` - -Go and make a cup of tea. - -Once the director is deployed, target it and apply your cloud-config for AWS. -Remember to set your chosen AZ and the subnet-id output by terraform in `aws-cloud.yml`. - -``` -bosh target <your EIP address> -bosh update cloud-config aws-cloud.yml -``` - -Set a database password and external URL for your deployment in these environment variables: - -``` -$DB_PASSWORD -$CONCOURSE_URL -``` -Create a new OAuth application in GitHub as described [here](http://concourse.ci/authentication.html). The manifest assumes the existance of a 'CI' team that contains your authorised users, so create that too. Then set the following environment variables: - -``` -$GITHUB_ORG -$GITHUB_CLIENT_ID -$GITHUB_CLIENT_SECRET -``` - -Then create a concourse manifest for a single server deployment: -``` -./bin/make_manifest_concourse.sh -``` -Or, create a concourse manifest for small cluster: -``` -./bin/make_manifest_concourse-cluster.sh -``` - -Upload the necessary stemcell & releases, then deploy concourse: -``` -bosh upload stemcell https://bosh.io/d/stemcells/bosh-aws-xen-hvm-ubuntu-trusty-go_agent -bosh upload release https://bosh.io/d/github.com/concourse/concourse -bosh upload release https://bosh.io/d/github.com/cloudfoundry-incubator/garden-runc-release -bosh deployment concourse.yml -bosh deploy -``` - -Congratulations, you should now be able to see your new CI server at https://your-concourse-url. +To connect to Bastion over SSH, use ssh jumpbox@*bastion ip* -i jumpbox.key