debian-mirror-gitlab/doc/install/openshift_and_gitlab/index.md
2019-12-26 22:10:19 +05:30

18 KiB

type date
howto 2016-06-28

How to install GitLab on OpenShift Origin 3

CAUTION: Deprecated: This article is deprecated. Use the official Kubernetes Helm charts for installing GitLab to OpenShift. Check out the official installation docs for details.

Introduction

OpenShift Origin (Note: renamed to OKD in Aug 2018) is an open source container application platform created by RedHat, based on Kubernetes and Docker. That means you can host your own PaaS for free and almost with no hassle.

In this tutorial, we will see how to deploy GitLab in OpenShift using GitLab's official Docker image while getting familiar with the web interface and CLI tools that will help us achieve our goal.

For a video demonstration on installing GitLab on OpenShift, check the article In 13 minutes from Kubernetes to a complete application development tool.

Prerequisites

CAUTION: Caution: This information is no longer up to date, as the current versions have changed and products have been renamed.

OpenShift 3 is not yet deployed on RedHat's offered Online platform, so in order to test it, we will use an all-in-one Virtualbox image that is offered by the OpenShift developers and managed by Vagrant. If you haven't done already, go ahead and install the following components as they are essential to test OpenShift easily:

It is also important to mention that for the purposes of this tutorial, the latest Origin release is used:

  • oc v1.3.0 (must be installed locally on your computer)
  • OpenShift v1.3.0 (is pre-installed in the VM image)
  • Kubernetes v1.3.0 (is pre-installed in the VM image)

Note: If you intend to deploy GitLab on a production OpenShift cluster, there are some limitations to bare in mind. Read on the limitations section for more information and follow the linked links for the relevant discussions.

Now that you have all batteries, let's see how easy it is to test OpenShift on your computer.

Getting familiar with OpenShift Origin

The environment we are about to use is based on CentOS 7 which comes with all the tools needed pre-installed: Docker, Kubernetes, OpenShift, etcd.

Test OpenShift using Vagrant

As of this writing, the all-in-one VM is at version 1.3, and that's what we will use in this tutorial.

In short:

  1. Open a terminal and in a new directory run:

    vagrant init openshift/origin-all-in-one
    
  2. This will generate a Vagrantfile based on the all-in-one VM image

  3. In the same directory where you generated the Vagrantfile enter:

    vagrant up
    

This will download the VirtualBox image and fire up the VM with some preconfigured values as you can see in the Vagrantfile. As you may have noticed, you need plenty of RAM (5GB in our example), so make sure you have enough.

Now that OpenShift is set up, let's see how the web console looks like.

Explore the OpenShift web console

Once Vagrant finishes its thing with the VM, you will be presented with a message which has some important information. One of them is the IP address of the deployed OpenShift platform and in particular https://10.2.2.2:8443/console/. Open this link with your browser and accept the self-signed certificate in order to proceed.

Let's login as admin with username/password admin/admin. This is what the landing page looks like:

openshift web console

You can see that a number of projects are already created for testing purposes.

If you head over the openshift-infra project, a number of services with their respective pods are there to explore.

openshift web console

We are not going to explore the whole interface, but if you want to learn about the key concepts of OpenShift, read the core concepts reference in the official documentation.

Explore the OpenShift CLI

OpenShift Client (oc), is a powerful CLI tool that talks to the OpenShift API and performs pretty much everything you can do from the web UI and much more.

Assuming you have installed it, let's explore some of its main functionalities.

Let's first see the version of oc:

$ oc version

oc v1.3.0
kubernetes v1.3.0+52492b4

With oc help you can see the top level arguments you can run with oc and interact with your cluster, Kubernetes, run applications, create projects and much more.

Let's login to the all-in-one VM and see how to achieve the same results like when we visited the web console earlier. The username/password for the administrator user is admin/admin. There is also a test user with username/ password user/user, with limited access. Let's login as admin for the moment:

$ oc login https://10.2.2.2:8443

Authentication required for https://10.2.2.2:8443 (openshift)
Username: admin
Password:
Login successful.

You have access to the following projects and can switch between them with 'oc project <projectname>':

- cockpit
- default (current)
- delete
- openshift
- openshift-infra
- sample

Using project "default".

Switch to the openshift-infra project with:

oc project openshift-infra

And finally, see its status:

oc status

The last command should spit a bunch of information about the statuses of the pods and the services, which if you look closely is what we encountered in the second image when we explored the web console.

You can always read more about oc in the OpenShift CLI documentation.

Troubleshooting the all-in-one VM

Using the all-in-one VM gives you the ability to test OpenShift whenever you want. That means you get to play with it, shutdown the VM, and pick up where you left off.

Sometimes though, you may encounter some issues, like OpenShift not running when booting up the VM. The web UI may not responding or you may see issues when trying to login with oc, like:

The connection to the server 10.2.2.2:8443 was refused - did you specify the right host or port?

In that case, the OpenShift service might not be running, so in order to fix it:

  1. SSH into the VM by going to the directory where the Vagrantfile is and then run:

    vagrant ssh
    
  2. Run systemctl and verify by the output that the openshift service is not running (it will be in red color). If that's the case start the service with:

    sudo systemctl start openshift
    
  3. Verify the service is up with:

    systemctl status openshift -l
    

Now you will be able to login using oc (like we did before) and visit the web console.

Deploy GitLab

Now that you got a taste of what OpenShift looks like, let's deploy GitLab!

Create a new project

First, we will create a new project to host our application. You can do this either by running the CLI client:

oc new-project gitlab

or by using the web interface:

Create a new project from the UI

If you used the command line, oc automatically uses the new project and you can see its status with:

$ oc status

In project gitlab on server https://10.2.2.2:8443

You have no services, deployment configs, or build configs.
Run 'oc new-app' to create an application.

If you visit the web console, you can now see gitlab listed in the projects list.

The next step is to import the OpenShift template for GitLab.

Import the template

The template is basically a JSON file which describes a set of related object definitions to be created together, as well as a set of parameters for those objects.

The template for GitLab resides in the Omnibus GitLab repository under the docker directory. Let's download it locally with wget:

wget https://gitlab.com/gitlab-org/omnibus-gitlab/raw/master/docker/openshift-template.json

And then let's import it in OpenShift:

oc create -f openshift-template.json -n openshift

Note: The -n openshift namespace flag is a trick to make the template available to all projects. If you recall from when we created the gitlab project, oc switched to it automatically, and that can be verified by the oc status command. If you omit the namespace flag, the application will be available only to the current project, in our case gitlab. The openshift namespace is a global one that the administrators should use if they want the application to be available to all users.

We are now ready to finally deploy GitLab!

Create a new application

The next step is to use the template we previously imported. Head over to the gitlab project and hit the Add to Project button.

Add to project

This will bring you to the catalog where you can find all the pre-defined applications ready to deploy with the click of a button. Search for gitlab and you will see the previously imported template:

Add GitLab to project

Select it, and in the following screen you will be presented with the predefined values used with the GitLab template:

GitLab settings

Notice at the top that there are three resources to be created with this template:

  • gitlab-ce
  • gitlab-ce-redis
  • gitlab-ce-postgresql

While PostgreSQL and Redis are bundled in Omnibus GitLab, the template is using separate images as you can see from this line in the template.

The predefined values have been calculated for the purposes of testing out GitLab in the all-in-one VM. You don't need to change anything here, hit Create to start the deployment.

If you are deploying to production you will want to change the GitLab instance hostname and use greater values for the volume sizes. If you don't provide a password for PostgreSQL, it will be created automatically.

Note: The gitlab.apps.10.2.2.2.nip.io hostname that is used by default will resolve to the host with IP 10.2.2.2 which is the IP our VM uses. It is a trick to have distinct FQDNs pointing to services that are on our local network. Read more on how this works in https://nip.io.

Now that we configured this, let's see how to manage and scale GitLab.

Manage and scale GitLab

Setting up GitLab for the first time might take a while depending on your internet connection and the resources you have attached to the all-in-one VM. GitLab's docker image is quite big (~500MB), so you'll have to wait until it's downloaded and configured before you use it.

Watch while GitLab gets deployed

Navigate to the gitlab project at Overview. You can notice that the deployment is in progress by the orange color. The Docker images are being downloaded and soon they will be up and running.

GitLab overview

Switch to the Browse > Pods and you will eventually see all 3 pods in a running status. Remember the 3 resources that were to be created when we first created the GitLab app? This is where you can see them in action.

Running pods

You can see GitLab being reconfigured by taking look at the logs in realtime. Click on gitlab-ce-2-j7ioe (your ID will be different) and go to the Logs tab.

GitLab logs

At a point you should see a gitlab Reconfigured! message in the logs. Navigate back to the Overview and hopefully all pods will be up and running.

GitLab running

Congratulations! You can now navigate to your new shinny GitLab instance by visiting http://gitlab.apps.10.2.2.2.nip.io where you will be asked to change the root user password. Login using root as username and providing the password you just set, and start using GitLab!

Scale GitLab with the push of a button

If you reach to a point where your GitLab instance could benefit from a boost of resources, you'd be happy to know that you can scale up with the push of a button.

In the Overview page just click the up arrow button in the pod where GitLab is. The change is instant and you can see the number of replicas now running scaled to 2.

GitLab scale

Upping the GitLab pods is actually like adding new application servers to your cluster. You can see how that would work if you didn't use GitLab with OpenShift by following the HA documentation for the application servers.

Bare in mind that you may need more resources (CPU, RAM, disk space) when you scale up. If a pod is in pending state for too long, you can navigate to Browse > Events and see the reason and message of the state.

No resources

Scale GitLab using the oc CLI

Using oc is super easy to scale up the replicas of a pod. You may want to skim through the basic CLI operations to get a taste how the CLI commands are used. Pay extra attention to the object types as we will use some of them and their abbreviated versions below.

In order to scale up, we need to find out the name of the replication controller. Let's see how to do that using the following steps.

  1. Make sure you are in the gitlab project:

    oc project gitlab
    
  2. See what services are used for this project:

    oc get svc
    

    The output will be similar to:

    NAME                   CLUSTER-IP       EXTERNAL-IP   PORT(S)         AGE
    gitlab-ce              172.30.243.177   <none>        22/TCP,80/TCP   5d
    gitlab-ce-postgresql   172.30.116.75    <none>        5432/TCP        5d
    gitlab-ce-redis        172.30.105.88    <none>        6379/TCP        5d
    
  3. We need to see the replication controllers of the gitlab-ce service. Get a detailed view of the current ones:

    oc describe rc gitlab-ce
    

    This will return a large detailed list of the current replication controllers. Search for the name of the GitLab controller, usually gitlab-ce-1 or if that failed at some point and you spawned another one, it will be named gitlab-ce-2.

  4. Scale GitLab using the previous information:

    oc scale --replicas=2 replicationcontrollers gitlab-ce-2
    
  5. Get the new replicas number to make sure scaling worked:

    oc get rc gitlab-ce-2
    

    which will return something like:

    NAME          DESIRED   CURRENT   AGE
    gitlab-ce-2   2         2         5d
    

And that's it! We successfully scaled the replicas to 2 using the CLI.

As always, you can find the name of the controller using the web console. Just click on the service you are interested in and you will see the details in the right sidebar.

Replication controller name

Autoscaling GitLab

In case you were wondering whether there is an option to autoscale a pod based on the resources of your server, the answer is yes, of course there is.

We will not expand on this matter, but feel free to read the documentation on OpenShift's website about autoscaling.

Current limitations

As stated in the all-in-one VM page:

By default, OpenShift will not allow a container to run as root or even a non-random container assigned userid. Most Docker images in the Dockerhub do not follow this best practice and instead run as root.

The all-in-one VM we are using has this security turned off so it will not bother us. In any case, it is something to keep in mind when deploying GitLab on a production cluster.

In order to deploy GitLab on a production cluster, you will need to assign the GitLab service account to the anyuid Security Context Constraints.

For OpenShift v3.0, you will need to do this manually:

  1. Edit the Security Context:

    oc edit scc anyuid
    
  2. Add system:serviceaccount:<project>:gitlab-ce-user to the users section. If you changed the Application Name from the default the user will will be <app-name>-user instead of gitlab-ce-user

  3. Save and exit the editor

For OpenShift v3.1 and above, you can do:

oc adm policy add-scc-to-user anyuid system:serviceaccount:gitlab:gitlab-ce-user

Conclusion

By now, you should have an understanding of the basic OpenShift Origin concepts and a sense of how things work using the web console or the CLI.

GitLab was hard to install in previous versions of OpenShift, but now that belongs to the past. Upload a template, create a project, add an application and you are done. You are ready to login to your new GitLab instance.

And remember that in this tutorial we just scratched the surface of what Origin is capable of. As always, you can refer to the detailed documentation to learn more about deploying your own OpenShift PaaS and managing your applications with the ease of containers.