Google Cloud
Before you can perform a ForgeOps deployment on a Kubernetes cluster running on Google Cloud, you must complete these prerequisite tasks:
forgeops
and forgeops-extras
repositories
Get the forgeops
and forgeops-extras
repositories:
-
Clone the repositories. For example:
$ git clone https://github.com/ForgeRock/forgeops.git $ git clone https://github.com/ForgeRock/forgeops-extras.git
Both repositories are public; you do not need credentials to clone them.
-
Check out the
forgeops
repository’srelease/7.5-20240618
branch:$ cd /path/to/forgeops $ git checkout
release/7.5-20240618
Depending on your organization’s repository strategy, you might need to clone the repository from a fork. You might also need to create a working branch from the
release/7.5-20240618
branch of your fork. Learn more about Repository Updates here. -
Check out the
forgeops-extras
repository’smaster
branch:$ cd /path/to/forgeops-extras $ git checkout
master
Third-party software
Before performing a ForgeOps deployment, obtain third-party software and install it on your local computer.
ForgeOps team recommends that you install third-party software using Homebrew on macOS and Linux[1] .
The versions listed in the following table have been validated for ForgeOps deployments on Google Cloud. Earlier and later versions will probably work. If you want to try using versions that are not in the table, it is your responsibility to validate them.
Install the following third-party software:
Software | Version | Homebrew package |
---|---|---|
Python 3 |
3.12.4 |
|
Bash |
5.2.26 |
|
Docker client |
26.1.4 |
|
Kubernetes client (kubectl) |
1.30.2 |
|
Kubernetes context switcher (kubectx) |
0.9.5 |
|
Kustomize |
5.4.2 |
|
Helm |
3.15.2 |
|
JSON processor jq |
1.7.1 |
|
Terraform |
1.5.7 |
|
Six (Python compatibility library) |
1.16.0 |
|
Setup tools (Python) |
70.1.1 |
|
Google Cloud SDK |
482.0.0 |
|
Docker engine
In addition to the software listed in the preceding table, you’ll need to start a virtual machine that runs Docker engine.
-
On macOS systems, use Docker Desktop or an alternative, such as Colima.
-
On Linux systems, use Docker Desktop for Linux, install Docker machine from your Linux distribution, or use an alternative, such as Colima.
For more information about using Colima when performing ForgeOps deployments, refer to this article.
The default configuration for a Docker virtual machine provides adequate resources for a ForgeOps deployment.
For users running Microsoft Windows
ForgeOps deployments are supported on macOS and Linux. If you have a Windows computer, you’ll need to create a Linux VM. We tested the following configurations:
-
Hypervisor: Hyper-V, VMWare Player, or VMWare Workstation
-
Guest OS: Current Ubuntu LTS release with 12 GB memory and 60 GB disk space
-
Nested virtualization enabled in the Linux VM.
Perform all the procedures in this documentation within the Linux VM. In this documentation, the local computer refers to the Linux VM for Windows users.
The Minikube implementation on Windows Subsystem for Linux (WSL2) has networking issues. As a result, consistent access to the ingress controller or the apps deployed on Minikube is not possible. This issue is tracked here. Do not attempt to perform ForgeOps deployments on WSL2 until this issue is resolved. |
Google Cloud project setup
Perform these steps to set up a Google Cloud project that meets the requirements for ForgeOps deployments:
-
Log in to the Google Cloud Console and create a new project.
-
Authenticate to the Google Cloud SDK to obtain the permissions you’ll need to create a cluster:
-
Configure the gcloud CLI to use your Google account. Run the following command:
$ gcloud auth application-default login
-
A browser window appears, prompting you to select a Google account. Select the account you want to use for cluster creation.
A second screen requests several permissions. Select Allow.
A third screen should appear with the heading, You are now authenticated with the gcloud CLI!
-
-
Assign the following roles to users who will be creating Kubernetes clusters and performing ForgeOps deployments:
-
Editor
-
Kubernetes Engine Admin
-
Kubernetes Engine Cluster Admin
-
Project IAM Admin
Remember, a ForgeOps deployment is a reference implementation, and is not for production use. The roles you assign in this step are suitable for ForgeOps deployments. When you create a project plan, you’ll need to determine which Google Cloud roles are required.
-
Kubernetes cluster creation
ForgeOps provides Terraform artifacts for GKE cluster creation. Use them to create a cluster that supports ForgeOps deployments. After performing a ForgeOps deployment, you can use your cluster as a sandbox to explore Ping Identity Platform customization.
When you create a project plan, you’ll need to identify your organization’s preferred infrastructure-as-code solution, and, if necessary, create your own cluster creation automation scripts.
Here are the steps the ForgeOps team follows to create a Kubernetes cluster on GKE:
-
Copy the file that contains default Terraform variables to a new file:
-
Change to the /path/to/forgeops-extras/terraform directory.
-
Copy the terraform.tfvars file to override.auto.tfvars [2].
Copying the terraform.tfvars file to a new file preserves the original content in the file.
-
-
Determine the deployment size: small, medium, or large.
-
Define your cluster’s configuration:
-
Open the override.auto.tfvars file.
-
Determine the location of your cluster’s configuration in the override.auto.tfvars file:
Cluster size Section containing the cluster configuration Small
cluster.tf_cluster_gke_small
Medium
cluster.tf_cluster_gke_medium
Large
cluster.tf_cluster_gke_large
-
Modify your cluster’s configuration by setting values in the section listed in the table:
-
Set the value of the
enabled
variable totrue
. -
Set the value of the
auth.project_id
variable to your new Google Cloud project. Specify the project ID, not the project name. -
Set the value of the
meta.cluster_name
variable to the name of the GKE cluster you’ll create. -
Set the values of the
location.region
andlocation.zones
variables to the region and zones where perform your ForgeOps deployment.Before continuing, go to Google’s Regions and Zones page and verify that the zones you have specified are available in your region you specified.
-
-
Save and close the override.auto.tfvars file.
-
-
Ensure your region has an adequate CPU quota for a ForgeOps deployment.
Locate these two variables in your cluster’s configuration in the override.auto.tfvars file:
-
node_pool.type
: the machine type to be used in your cluster -
node_pool.max_count
: the maximum number of machines to be used in your cluster
Your quotas must be large enough to let you allocate the maximum number of machines in your region. If your quotas are too low, request and wait for a quota increase from Google Cloud before attempting to create your cluster.
-
-
Create a cluster using Terraform artifacts in the
forgeops-extras
repository:-
Change to the directory that contains Terraform artifacts:
$ cd /path/to/forgeops-extras/terraform
-
Run the tf-apply script to create your cluster:
$ ./tf-apply
Respond
yes
to theDo you want to perform these actions?
prompt.When the tf-apply script finishes, it issues a message that provides the path to a kubeconfig file for the cluster.
The script creates:
-
The GKE cluster
-
The
fast
storage class -
The
ds-snapshot-class
volume snapshot class
The script deploys:
-
An ingress controller
-
Certificate manager
-
-
-
Set your Kubernetes context to reference the new cluster by setting the
KUBECONFIG
environment variable as shown in the message from the tf-apply command’s output. -
To verify that the tf-apply script created the cluster, log in to the Google Cloud console. Select the Kubernetes Engine option. The new cluster should appear in the list of Kubernetes clusters.
Hostname resolution
Set up hostname resolution for the Ping Identity Platform servers you’ll deploy in your namespace:
-
Get the ingress controller’s external IP address:
$ kubectl get services --namespace ingress-nginx NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE ingress-nginx-controller LoadBalancer 10.4.6.154 35.203.145.112 80:30300/TCP,443:30638/TCP 58s ingress-nginx-controller-admission ClusterIP 10.4.4.9 <none> 443/TCP 58s
The ingress controller’s IP address should appear in the
EXTERNAL-IP
column. There can be a short delay while the ingress starts before the IP address appears in thekubectl get services
command’s output; you might need to run the command several times. -
Configure hostname resolution for the ingress controller:
-
Choose an FQDN (referred to as the deployment FQDN) that you’ll use when you deploy the Ping Identity Platform, and when you access its GUIs and REST APIs.
Examples in this documentation use
forgeops.example.com
as the deployment FQDN. You are not required to useforgeops.example.com
; you can specify any FQDN you like. -
If DNS does not resolve your deployment FQDN, add an entry to the /etc/hosts file that maps the ingress controller’s external IP address to the deployment FQDN. For example:
35.203.145.112 forgeops.example.com
-
forgerock
that adds labels required for clusters created by Ping Identity employees. If you’re a Ping Identity employee creating a cluster, set values for these variables.