Deploy an Application to Amazon EC2
How Spinnaker deploys applications
The primary objective of SpinnakerTM is to deploy your software. To do that, you need to bake an image and then use that same image to deploy to all of your environments.
The typical type of distributed application that Spinnaker deploys is one with a cluster of homogeneous instances behind a load balancer. The load balancer is responsible for detecting healthy and unhealthy instances.
This guide continues the example in the Bake Amazon Machine Images in a Spinnaker Pipeline guide. Here, you deploy a simple web server that serves a page with details about its environment.
Prerequisites for deploying an application to EC2
- You know how to create pipelines.
- You have read the Bake Amazon Machine Images in a Spinnaker Pipeline guide and completed the steps to bake an image.
- You have read the Spinnaker Nomenclature and Naming Conventions guide.
- You are familiar with Elastic Load Balancing (ELB) configuration.
- You have already created a security group to use in your application.
Create a load balancer
Go to the application screen to create a load balancer. Select the Load Balancers tab:
Press the ‘+’ on the right to create a new load balancer, you may need to select AWS > then select a Load Balance Type.
We’ll enter ‘prod’ into the ‘Stack’ field because our environment contains dev, stage, and prod.
Set the VPC Subnet Type grouping by tagging VPCs so that they appear in the VPC dropdown selection in Spinnaker. This change may take some time to cache and reflect in Spinnaker. In the Firewalls section, select your firewall, which maps to the preconfigured security group. Create the forwarding ports in the Listeners section. Finally, create the Health Check.
Then press Create.
Create a deploy pipeline
Navigate to the configuration screen of the previously created pipeline from the Bake Amazon Machine Images in a Spinnaker Pipeline guide.
Select Add Stage and select Deploy from the Type dropdown.
Select Add server group option in the ‘Deploy Configuration’
Select AWS option for the provider.
We’ll be shown the option to copy a configuration from a currently running server group if a server group for this application already exists. In our case, let’s select ‘None’ and continue.
Select the same VPC Subnet type as the ELB you just made. Remember to input ‘prod’ to the Stack field since that is what you used when creating the ELB.
If you skipped the ELB steps above and do not see the VPCs grouping available, or you need to crate a new VPC group, follow the instructions in the VPC Subnet Type guide. Tag your VPCs so that they are available for selection in the dropdown.
For this example, we’ll use a Red/Black (also known as Blue/Green) deployment strategy. Leave 3 maximum server groups alive for normal services allows you to manually rollback in case of emergency easily.
Scroll down and select the load balancer that was just created from the list and select the pre-configured security group.
Note, the Firewall in this case will be for the EC2 instances.
Under the Instance Type section, select ‘Micro Utility’.
We’ll set the capacity at 1 for now, but we can later set it up to do auto-scaling.
Scroll all the way down to the Advanced Settings section and change the Health Check Type from ‘EC2’ to ‘ELB’, we’ll later see green boxes for health instances, gray for EC2 healthcheck instances, or red for unhealthy instances.
Select the keypair for the EC2 instances in Key Name.
Erase the IAM Instance Profile field. In our example, we don’t need access to any other AWS resources and the field may be filled in by default depending on your configurations.
Then click Add to complete this step.
We return back to the deploy stage, with it now looking like:
Finally, we can click Save Changes and select the back arrow to return to the Pipeline Executions screen.
I press ‘Start Manual Execution’ on my pipeline. This is what I see:
When this pipeline finishes the Bake stage, we can see it’s current stage/tasks status and we can also see it in the Clusters tab to see a new server group come up.
For more information about the details of this screen, see the Spinnaker's Application Screen guide.
I can see here that a new server has indeed come up and is healthy. Healthy in this case means that it has passed the ELB health check. If you are having problems with your instances not passing the health check, see the common errors section.
Now, to demonstrate the Blue/Green, go back to the Pipeline Executions screen and press ‘Start Manual Execution’ again. Then go back to the ‘Clusters’ tab to watch the execution process.
First you see that a new server group named v001
is being created. It doesn’t have any instances in it yet:
After a few moments an instance is created and is initially ‘unhealthy’:
Once it passes its healthchecks and becomes healthy, it will visually indicate so by turning green. At this point Armory will add the server group to the load balancer.
Immediately after that, the old server group is removed from the load balancer. Armory will turn the old server group’s instances blue. This means that they are disabled and no longer receiving traffic.
Because of how I configured my deploy stage, the old Blue server group will stick around until I either manually scale it down or destroy it. If you like, you can configure your deploy stage to automatically scale down the old server group after the new one is healthy.
Common errors and troubleshooting
If you are having trouble try checking out some of these topics:
Deploy times out
Often when your deploy stage is timing out, it is because your instances are never becoming healthy. In this case, Armory will keep terminating and replacing the instances.
Investigating red instances
Select your red instance and hover your cursor over the red triangle next to the load balancer under the ‘Status’ section. This should display some helpful information for understanding why your instance is not deploying correctly.
Incorrect health check
You have the option when deploying a new server group to use either EC2 or ELB health checking. When instances aren’t passing this health check they will be terminated and replaced. If you are experiencing strange behavior, double check that the correct health check is selected.
Deploy AZs vs ELB AZs
It is possible to set your ELB to work with certain AZs but then deploy your server group to another AZ. If you have your health check set to ELB, then your instances will never become healthy. You can tell when this happens by hovering you mouse over the red triangle described above.
Unknown errors
Sometimes you may encounter an ‘Unknown Error’ message when executing your deploy. Something like, “Shrink cluster: Exception: No reason provided.” These errors are almost always caused by a field having an incorrect value in the deploy configuration. This particular “Shrink cluster” error was caused by the server group’s region being invalid.
Deployment strategies
Red/Black (also known as Blue/Green)
This strategy will deploy a fresh server group and add it to the load balancer. The older server group will then be disabled.
When you configure this strategy you can choose to scale down the old server group. You can always scale it back up if you need it for a rollback. Also, you can choose how many old server groups to leave in the cluster.
Highlander
This strategy will create a new server group and add it to the load balancer. Once everything is healthy, the old server group(s) will be destroyed.
None
This strategy will deploy a new server group. It won’t do anything about the older server groups. They will just all be in the load balancer together like one big happy family!
What does disabled mean?
When an instance is disabled within Armory, it is removed from all load balancers. Depending on how your application receives work, this may or may not stop your application from doing work. If your application receives work via the load balancer - like a web application - then it should actually be disabled. However, if you have an application that works similarly to pulling workloads off of a distributed queue (SQS, Kafka, etc), then removing it from a load balancer won’t change anything. In fact, it was probably never in a load balancer.
You can re-enable a server group by selecting it from the ‘Cluster’ screen, click the ‘Server Group Actions’ button on the right panel and click ‘Enable’.
UserData
You can pass custom information to your deployed instances through the ‘User Data’ field under the ‘Advanced Settings’ section of the deploy stage configuration.
Make sure to base64 encode the content before putting it into the field in the options.
UserData issues
If the default UserData doesn’t work with your instance launch sequence, there are two work-arounds you can use.
-
If the UserData you want to use is bash-compatible and will fit after that existing chunk of variables that Armory puts in, you can just put your base64 encoded UserData into the cluster config.
-
Adjust the UserData template using information from Clouddriver’s AWS UserData README. When we use that option we normally point udfRoot at something like /opt/spinnaker/config/custom-udf, and then add the custom-udf directory to the config package we release Spinnaker from. If you want to turn it off completely that means just adding the udfRoot option to clouddriver-local.yml, and putting a blank file at /opt/spinnaker/config/custom-udf/udf0 .
Passing environment data to your deployed instances
The default configuration of Spinnaker creates a file /etc/default/server-env
on every instance with information about its environment. In the example above, server-env
looks like:
CLOUD_ACCOUNT="default-aws-account"
CLOUD_ACCOUNT_TYPE="default-aws-account"
CLOUD_ENVIRONMENT="default-aws-account"
CLOUD_SERVER_GROUP="test-example-v001"
CLOUD_CLUSTER="test-example"
CLOUD_STACK="example"
CLOUD_DETAIL=""
EC2_REGION="us-west-2"
LAUNCH_CONFIG="test-example-v001-03302017224619"
Rolling back
Yup. Sometimes you need to rollback to a known previously working state.
Automatically
From the ‘Cluster’ tab, select a server group. Click the button on the right pane labeled ‘Server Group Actions’ and press ‘Rollback’
In the window that pops up, you can select which server group to rollback to.
The server group that you select will re-enabled and scaled up to the necessary number of replicas. Then the rolled back server group will be disabled.
Manually
If you are ever in a situation where you need to roll back without Spinnaker, you can do so from the AWS console. You will basically run through the process that Spinnaker would do automatically:
- Scale up the older Auto Scaling Groups (ASG)
- Add those instances to the ELB
- Remove the newer ASG’s instances from the ELB
- Scale down or delete the new ASG
Additional launch block devices
If you want additional block devices or a larger root partition you’ll need to add an a new list to the pipeline JSON. Unfortunately at this time there is no UI to add block devices.
- Edit your pipeline’s JSON
- Find your deployment dictionary. You’ll need to add the object of pairs for each cluster definition.
- Add your custom block devices for launch under the key
blockDevices
. - Make sure that
AMI Block Device Mappings
is set toDefaults for selected instance type
.
Block devices definition
"blockDevices": [
{
"deleteOnTermination": [true|false],
"deviceName": "[device string]",
"iops": [integer ranging from 100-20000],
"size": [integer, size in GB, range from 1GB-64TB],
"volumeType": "[st1|io1|gp2|sc1]"
}
]
Example of additional block devices
"clusters": [
{
"account": "my-aws-account",
"application": "myapplication",
"blockDevices": [
{
"deleteOnTermination": true,
"deviceName": "/dev/sda1",
"size": 32,
"volumeType": "gp2"
}
]
"copySourceCustomBlockDeviceMappings": false,
"useAmiBlockDeviceMappings": false
},
...
]
VPC subnet type
Throughout Spinnaker, Subnet Type is an abstraction of subnets within AWS.
You can find fields that you use to specify VPC Subnet type when creating load balancers, deploying server groups, etc.
In order to use a subnet within Spinnaker, you will need to tag it in AWS a certain way.
There are two ways you can tag them. One option is to use the convention spinnaker.<internal|external>.<region>
for the subnet’s name. In the screenshot below, you can see that is what I have done on my subnets.
Another option is to create a tag named immutable_metadata
with value {"purpose": "MySubnetNameInsideSpinnaker"}
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.