Skip to content
This repository has been archived by the owner on Jun 13, 2024. It is now read-only.

Latest commit

 

History

History
407 lines (324 loc) · 19.2 KB

how-admin-deploy-the-broker.md

File metadata and controls

407 lines (324 loc) · 19.2 KB

How a Cloud Foundry Admin manages the meta Azure service broker

Prerequisites

  • Install git on your machine, no matter it is a local workstation or the devbox on Azure.

  • Install NodeJS.

  • Install CF CLI, and login to Cloud Foundry. Please refer to Login CF.

  • A SQL database to store the data of the meta service broker

    1. Create a SQL server and SQL database.

      You have several options to create a SQL database.

    2. Configure an Azure SQL Database server-level firewall rule

      Please follow the steps to make sure the SQL database can be accessed by the service broker.

    3. By default, the tables instances and bindings are created when the broker starts. If not, please create them manually with the following steps.

      Use your favorite way to connect to the SQL database. For example:

      sudo npm install -g sql-cli
      mssql --server "<server-name>.database.windows.net" --database <database> --user <username>@<server-name> --pass <pass> --encrypt
      

      In the mssql command line, create tables instances and bindings by loading schema.sql.

  • The following outbound ports and endpoints are available for your app:

    Service Name Ports Azure Cloud Endpoint Azure China Cloud Endpoint Azure German Cloud Endpoint Azure US Government Endpoint
    CosmoDB 443, 10255 *.documents.azure.com *.documents.chinacloudapi.cn *.documents.cloudapi.de *.documents.usgovcloudapi.net
    DocumentDB 443 *.documents.azure.com *.documents.chinacloudapi.cn *.documents.cloudapi.de *.documents.usgovcloudapi.net
    Event Hubs 443, 5671, 5672 *.servicebus.windows.net *.servicebus.chinacloudapi.cn *.servicebus.cloudapi.de *.servicebus.usgovcloudapi.net
    MySQL 3306 *.mysql.database.azure.com / / /
    Postgres 5432 *.postgres.database.azure.com / / /
    Redis 6379, 6380 *.redis.cache.windows.net *.redis.cache.chinacloudapi.cn *.redis.cache.cloudapi.de *.redis.cache.usgovcloudapi.net
    Service Bus 443, 5671, 5672 *.servicebus.windows.net *.servicebus.chinacloudapi.cn *.servicebus.cloudapi.de *.servicebus.usgovcloudapi.net
    SQL 1433 *.database.windows.net *.database.chinacloudapi.cn *.database.cloudapi.de *.database.usgovcloudapi.net
    Storage 443 *.core.windows.net *.core.chinacloudapi.cn *.core.cloudapi.de *.core.usgovcloudapi.net

    For meta Azure service broker app, ports 443 and 3306 should be available.

Deploy the meta Azure service broker as an application in Cloud Foundry

  1. Get the source code from Github.

    git clone https://github.com/Azure/meta-azure-service-broker
    cd meta-azure-service-broker
    
  2. Update manifest.yml with your credentials. The contents of manifest.yml are:

    ---
    applications:
    - name: meta-azure-service-broker
      buildpack: https://github.com/cloudfoundry/nodejs-buildpack
      instances: 1
      env:
        ENVIRONMENT: REPLACE-ME
        SUBSCRIPTION_ID: REPLACE-ME
        TENANT_ID: REPLACE-ME
        CLIENT_ID: REPLACE-ME
        CLIENT_SECRET: REPLACE-ME
        SECURITY_USER_NAME: REPLACE-ME
        SECURITY_USER_PASSWORD: REPLACE-ME
        SPACE_SCOPING_ENABLED: true | false
        AZURE_BROKER_DATABASE_PROVIDER: REPLACE-ME
        AZURE_BROKER_DATABASE_SERVER: REPLACE-ME
        AZURE_BROKER_DATABASE_USER: REPLACE-ME
        AZURE_BROKER_DATABASE_PASSWORD: REPLACE-ME
        AZURE_BROKER_DATABASE_NAME: REPLACE-ME
        AZURE_BROKER_DATABASE_ENCRYPTION_KEY: REPLACE-ME
    
    • ENVIRONMENT

      Four options AzureCloud, AzureChinaCloud, AzureUSGovernment, and AzureGermanCloud are supported as an ENVIRONMENT. For example, if you want to create services in AzureChinaCloud, you should specify AzureChinaCloud as the ENVIRONMENT.

      The following table is about the support for each service in different environments.

      Service Name AzureCloud AzureChinaCloud AzureUSGovernment AzureGermanCloud
      DocumentDB Service (deprecated) yes yes yes yes
      CosmosDB Service yes no no yes
      Event Hub Service yes yes yes yes
      Redis Cache Service yes yes yes yes
      Service Bus Service yes yes yes yes
      Storage Service yes yes yes yes
      SQL Database Service yes yes yes yes
      SQL Database Failover Group Service (preview) yes yes yes yes
      Database for MySQL Service (preview) yes no no no
      Database for PostgreSQL Service (preview) yes no no no
    • SUBSCRIPTION_ID

      You can list the providers in the subscription, and make sure that the namespace is registered. For example, if you want to enable Service Bus service, Microsoft.ServiceBus should be registered. If the specific provider is not registered, you need to run azure provider register <PROVIDER-NAME> to register it.

      $ azure provider list
      info:    Executing command provider list
      + Getting ARM registered providers
      data:    Namespace                  Registered
      data:    -------------------------  -------------
      data:    Microsoft.Batch            Registered
      data:    Microsoft.Cache            Registered
      data:    Microsoft.Compute          Registered
      data:    Microsoft.DocumentDB       Registered
      data:    Microsoft.EventHub         Registered
      data:    microsoft.insights         Registered
      data:    Microsoft.KeyVault         Registered
      data:    Microsoft.MySql            Registered
      data:    Microsoft.Network          Registering
      data:    Microsoft.ServiceBus       Registered
      data:    Microsoft.Sql              Registered
      data:    Microsoft.Storage          Registered
      data:    Microsoft.ApiManagement    NotRegistered
      data:    Microsoft.Authorization    Registered
      data:    Microsoft.ClassicCompute   NotRegistered
      data:    Microsoft.ClassicNetwork   NotRegistered
      data:    Microsoft.ClassicStorage   NotRegistered
      data:    Microsoft.Devices          NotRegistered
      data:    Microsoft.Features         Registered
      data:    Microsoft.HDInsight        NotRegistered
      data:    Microsoft.Resources        Registered
      data:    Microsoft.Scheduler        Registered
      data:    Microsoft.ServiceFabric    NotRegistered
      data:    Microsoft.StreamAnalytics  NotRegistered
      data:    Microsoft.Web              NotRegistered
      info:    provider list command OK
      
    • TENANT_ID, CLIENT_ID and CLIENT_SECRET

      A service principal is composed of TENANT_ID, CLIENT_ID and CLIENT_SECRET.

      In Azure CPI guidance, the roles Virtual Machine Contributor and Network Contributor are recommended to deploy Cloud Foundry on Azure. However, for the service broker, these two roles are not enough. You can follow RBAC: Built-in roles to get the appropriate roles.

      For example, you can use Storage Account Contributor if you only use the service broker to create a storage account.

      If you want to create all the services, you may need the role Contributor.

    • SECURITY_USER_NAME and SECURITY_USER_PASSWORD

      Cloud Controller authenticates with the Broker using HTTP basic authentication (the Authorization: header) on every request and will reject any broker registrations that do not contain a username and password. SECURITY_USER_NAME and SECURITY_USER_PASSWORD are the username and password of HTTP basic authentication. They are maken up by yourself. When you register the service broker using cf create-service-broker, the same values should be used.

    • SPACE_SCOPING_ENABLED

      Needs to be set to true if the service broker will be deployed in multiple spaces of the same Cloud Foundry environment with the option --space-scoped specified when executing cf create-service-broker to register the service broker with the Cloud Controller. This option will ensure, that Service Names, Service IDs and Plan IDs are unique for the entire Cloud Foundry environment in case multiple instances of the broker are deployed in different spaces of the same CF environment. The reason for this is, that Service Names, Service IDs and Plan IDs need to be unique even if the broker is deployed with the option --space-scoped specified when executing cf create-service-broker. The default assumes, that one instance of the service broker is deployed for the entire Cloud Foundry environment, hence you should set this to false in most of the cases.

      Note: when deploying the broker in a multi-tenant environment, also the name and the route to the broker needs to be unique. The safest way for guaranteeing a unique route for the space-scoped instance of the service broker is to postfix the route-name with the space-id, for example:

      brokerName='myMetaServiceBroker'
      spaceId=$(cf space yourspacename --guid)
      echo "Your broker name should be: $brokerName$spaceId"
      echo "Example Manifest Excerpt:"
      echo "applications:"
      echo "- name: $brokerName$spaceId"

      The script above helps you generating a name for your service broker instance that will have a unique route that is unique across the entire targeted Cloud Foundry landscape/environment. If you use this, all conditions are met for enabling a space-scoped broker in a multi-tenant environment.

      Note: enabling access explicitly through cf enable-service-access is typically not required for space-scoped broker deployments. If the targeted CF environment requires enabling service access to space-scoped brokers, then it would work similar to the following:

      spaceId=$(cf space yourspacename --guid)
      cf enable-service-access [service-broker-service-name]-$spaceId
    • Database related configurations

      AZURE_BROKER_DATABASE_PROVIDER: REPLACE-ME
      AZURE_BROKER_DATABASE_SERVER: REPLACE-ME
      AZURE_BROKER_DATABASE_USER: REPLACE-ME
      AZURE_BROKER_DATABASE_PASSWORD: REPLACE-ME
      AZURE_BROKER_DATABASE_NAME: REPLACE-ME
      AZURE_BROKER_DATABASE_ENCRYPTION_KEY: REPLACE-ME
      

      AZURE_BROKER_DATABASE_ENCRYPTION_KEY is used to encrypt the information in the database. It should contain 32 character. You need to keep it same if you re-deploy the service broker. Otherwise, the information can't be decrypted so that the service broker can't manage the service instances.

      Currently, only sqlserver is supported for AZURE_BROKER_DATABASE_PROVIDER.

      AZURE_BROKER_DATABASE_PROVIDER: sqlserver
      AZURE_BROKER_DATABASE_SERVER: <sql-server-name>.database.windows.net
      AZURE_BROKER_DATABASE_USER: <username>
      AZURE_BROKER_DATABASE_PASSWORD: <password>
      AZURE_BROKER_DATABASE_NAME: <database-name>
      AZURE_BROKER_DATABASE_ENCRYPTION_KEY: <encryption-key-with-32-length>
      
    • Modules related configurations

      It is allow to pre-configure some SQL server credentials for SQL database service. The default value of AZURE_SQLDB_ALLOW_TO_CREATE_SQL_SERVER is true. The default value of AZURE_SQLDB_ENABLE_TRANSPARENT_DATA_ENCRYPTION is false. AZURE_SQLDB_SQL_SERVER_POOL is an array of SQL server credentials. Each element in the array should contain all the five parameters: resourceGroup, location, sqlServerName, administratorLogin and administratorLoginPassword.

      AZURE_SQLDB_ALLOW_TO_CREATE_SQL_SERVER: true | false
      AZURE_SQLDB_ENABLE_TRANSPARENT_DATA_ENCRYPTION: true | false
      AZURE_SQLDB_SQL_SERVER_POOL: '[
        {
          "resourceGroup": "REPLACE-ME",
          "location": "REPLACE-ME",
          "sqlServerName": "REPLACE-ME",
          "administratorLogin": "REPLACE-ME",
          "administratorLoginPassword": "REPLACE-ME"
        },
        {
          "resourceGroup": "REPLACE-ME",
          "location": "REPLACE-ME",
          "sqlServerName": "REPLACE-ME",
          "administratorLogin": "REPLACE-ME",
          "administratorLoginPassword": "REPLACE-ME"
        }
      ]'
      
    • Modules default parameters

      Default parameters can be set.

      1. If Allow to Generate Names and Passwords for the Missing set to true, the broker can fix those missing names and passwords in the parameters for creating service instances. Check generated-string in the json examples for details.

      2. Default Resource Group and Default Location can be set to fix missing resource group and location in the parameters for creating service instances.

      3. For each service, you can set default parameters for it. The broker can fix those missing parameters in the parameters for creating service instances. Set them with {} if you don't require any fixing. The priority of this rule is higher than the rules above.

      ALLOW_TO_GENERATE_NAMES_AND_PASSWORDS_FOR_THE_MISSING: true
      
      DEFAULT_RESOURCE_GROUP: azure-service-broker
      DEFAULT_LOCATION: eastus
      
      DEFAULT_PARAMETERS_AZURE_REDISCACHE: '{
          "parameters": {
              "enableNonSslPort": false,
              "sku": {
                  "name": "Basic",
                  "family": "C",
                  "capacity": 0
              }
          }
      }'
      DEFAULT_PARAMETERS_AZURE_SERVICEBUS: '{
      }'
      DEFAULT_PARAMETERS_AZURE_EVENTHUBS: '{
          "eventHubProperties": {
              "messageRetentionInDays": 1,
              "partitionCount": 2
          }
      }'
      DEFAULT_PARAMETERS_AZURE_STORAGE: '{
          "accountType": "Standard_LRS"
      }'
      DEFAULT_PARAMETERS_AZURE_DOCDB: '{
      }'
      DEFAULT_PARAMETERS_AZURE_COSMOSDB: '{
          "kind": "DocumentDB"
      }'
      DEFAULT_PARAMETERS_AZURE_MYSQLDB: '{
          "mysqlServerParameters": {
              "allowMysqlServerFirewallRules": [
                  {
                    "ruleName": "all",
                    "startIpAddress": "0.0.0.0",
                    "endIpAddress": "255.255.255.255"
                  }
              ],
              "properties": {
                  "version": "5.6",
                  "sslEnforcement": "Disabled",
                  "storageMB": 51200
              }
          }
      }'
      DEFAULT_PARAMETERS_AZURE_POSTGRESQLDB: '{
          "postgresqlServerParameters": {
              "allowPostgresqlServerFirewallRules": [
                  {
                    "ruleName": "all",
                    "startIpAddress": "0.0.0.0",
                    "endIpAddress": "255.255.255.255"
                  }
              ],
              "properties": {
                  "version": "9.6",
                  "sslEnforcement": "Disabled",
                  "storageMB": 51200
              }
          }
      }'
      DEFAULT_PARAMETERS_AZURE_SQLDB: '{
          "sqlServerParameters": {
              "allowSqlServerFirewallRules": [
                  {
                      "ruleName": "all",
                      "startIpAddress": "0.0.0.0",
                      "endIpAddress": "255.255.255.255"
                  }
              ]
          },
          "transparentDataEncryption": true,
          "sqldbParameters": {
              "properties": {
                  "collation": "SQL_Latin1_General_CP1_CI_AS"
              }
          }
      }'
      
  3. Install the Node dependencies for production environment.

    export NODE_ENV=production
    npm install
    
  4. Push the broker to Cloud Foundry

    cf push
    

Register a service broker

cf create-service-broker demo-service-broker $SECURITY_USER_NAME $SECURITY_USER_PASSWORD <URL of the app meta-azure-service-broker>

You can get SECURITY_USER_NAME and SECURITY_USER_PASSWORD from manifest.yml.

For example,

cf create-service-broker demo-service-broker demouser demopassword http://meta-azure-service-broker.<ip-address>.xip.io

Make the plans public

cf enable-service-access <service-name>

For example:

cf enable-service-access azure-cosmosdb
cf enable-service-access azure-eventhubs
cf enable-service-access azure-mysqldb
cf enable-service-access azure-postgresqldb
cf enable-service-access azure-rediscache
cf enable-service-access azure-servicebus
cf enable-service-access azure-sqldb
cf enable-service-access azure-sqldb-failover-group
cf enable-service-access azure-storage

Show the services in the marketplace to verify they are ready.

cf marketplace

Unregister a service broker

cf delete-service-broker demo-service-broker -f

Debug logging

By default, the debug logging is disabled. If you want to enable the debug logging, please change "level": "info" to "level": "debug" in winston.json. Here is the reference.

{
  "console": {
    "level": "info",
    "debugStdout": true,
    "colorize": true,
    "prettyPrint": true
  }
}

You can enable the debug logging when you deploy the service broker at the first time. Then you will get the debug messages. On the other hand, you can also enable it after the service broker is registered, but you need to update the service broker. The steps:

  1. Enable debug logging in winston.json.

  2. Re-push the broker to Cloud Foundry.

  3. Update the service broker.

cf update-service-broker demo-service-broker $authUser $authPassword <URL of the app meta-azure-service-broker>

More information

Managing Service Brokers