starkandwayne / Bucc
Licence: apache-2.0
The fastest way to get a BUCC (BOSH, UAA Credhub and Concourse)
Stars: ✭ 130
Programming Languages
shell
77523 projects
Projects that are alternatives of or similar to Bucc
Gardener
Kubernetes-native system managing the full lifecycle of conformant Kubernetes clusters as a service on Alicloud, AWS, Azure, GCP, OpenStack, EquinixMetal, vSphere, MetalStack, and Kubevirt with minimal TCO.
Stars: ✭ 2,093 (+1510%)
Mutual labels: aws, azure, gcp, openstack, vsphere
Docker Swarm
🐳🐳🐳 This repository is part of a blog series on Docker Swarm example using VirtualBox, OVH Openstack, Azure and Amazon Web Services AWS
Stars: ✭ 43 (-66.92%)
Mutual labels: aws, azure, openstack, virtualbox
Machine Controller Manager
Declarative way of managing machines for Kubernetes cluster
Stars: ✭ 186 (+43.08%)
Mutual labels: aws, azure, gcp, openstack
Hybrid multicloud overlay
MutiCloud_Overlay demonstrates a use case of overlay over one or more clouds such as AWS, Azure, GCP, OCI, Alibaba and a vSphere private infrastructure in Hub and spoke topology, point to point topology and in a Single cloud. Overlay protocols IPv6 and IPv4 are independent of underlying infrastructure. This solution can be integrated with encryption and additional security features.
Stars: ✭ 127 (-2.31%)
Mutual labels: aws, azure, gcp, vsphere
Kcli
Management tool for libvirt/aws/gcp/kubevirt/openstack/ovirt/vsphere/packet
Stars: ✭ 219 (+68.46%)
Mutual labels: aws, gcp, openstack, vsphere
Go Cloud
The Go Cloud Development Kit (Go CDK): A library and tools for open cloud development in Go.
Stars: ✭ 8,124 (+6149.23%)
Mutual labels: aws, azure, gcp
Cloudsploit
Cloud Security Posture Management (CSPM)
Stars: ✭ 1,338 (+929.23%)
Mutual labels: aws, azure, gcp
Mist Ce
Mist is an open source, multi-cloud management platform
Stars: ✭ 1,391 (+970%)
Mutual labels: aws, openstack, vsphere
Cloudquery
cloudquery transforms your cloud infrastructure into SQL or Graph database for easy monitoring, governance and security.
Stars: ✭ 1,300 (+900%)
Mutual labels: aws, azure, gcp
Offensive Terraform.github.io
Offensive Terraform Website
Stars: ✭ 25 (-80.77%)
Mutual labels: aws, azure, gcp
Devops Exercises
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
Stars: ✭ 20,905 (+15980.77%)
Mutual labels: aws, azure, openstack
Seldon Server
Machine Learning Platform and Recommendation Engine built on Kubernetes
Stars: ✭ 1,435 (+1003.85%)
Mutual labels: aws, azure, gcp
Pulumi
Pulumi - Developer-First Infrastructure as Code. Your Cloud, Your Language, Your Way 🚀
Stars: ✭ 10,887 (+8274.62%)
Mutual labels: aws, azure, gcp
Learning Cloud
List of resources - courses, sample code, articles and screencasts for learning AWS, Azure, GCP and Alibaba Cloud
Stars: ✭ 100 (-23.08%)
Mutual labels: aws, azure, gcp
Cloudguardiaas
Check Point CloudGuard Network Security repository containing solution templates, Terraform templates, tools and scripts for deploying and configuring CloudGuard Network Security products.
Stars: ✭ 27 (-79.23%)
Mutual labels: aws, azure, gcp
Kubernetes Guides
Crosswalk Playbooks and Code for Teams to Manage Kubernetes in Production
Stars: ✭ 51 (-60.77%)
Mutual labels: aws, azure, gcp
Manageiq
ManageIQ Open-Source Management Platform
Stars: ✭ 1,089 (+737.69%)
Mutual labels: aws, azure, openstack
Cloud Portal
Self service web portal for different Cloud platforms like Azure, AWS and VMWare vSphere.
Stars: ✭ 60 (-53.85%)
Mutual labels: aws, azure, vsphere
Pragmaticai
[Book-2019] Pragmatic AI: An Introduction to Cloud-based Machine Learning
Stars: ✭ 79 (-39.23%)
Mutual labels: aws, azure, gcp
Gbt
Highly configurable prompt builder for Bash, ZSH and PowerShell written in Go.
Stars: ✭ 457 (+251.54%)
Mutual labels: aws, azure, gcp
BOSH, UAA, Credhub and Concourse)
BUCC (The bucc command line utility allows for easy bootstrapping of the BUCC stack (Bosh Uaa Credhub and Concourse). Which is the starting point for many deployments.
Install the bucc-cli
Prepare the Environment
-
Install BOSH CLI v2.0.1+ and dependencies.
-
Optionally install
direnv
-
Clone this repository
git clone https://github.com/starkandwayne/bucc.git
cd bucc
source .envrc # if not using direnv
Boot your BUCC VM
Choose your cpi:
bucc up --help
--cpi Cloud provider: [aws, virtualbox, gcp, docker-desktop, softlayer, openstack, azure, docker, vsphere]
--lite Created bosh will use the warden cpi with garden runc
--recreate Recreate VM in deployment, also when there are no changes
--debug Show arguments passed to 'bosh create-env'
--concourse-ca-certs
--concourse-lb
--concourse-syslog
--ldap
--oauth-providers
--proxy
Optional cpi specific flags:
aws: --auto-assign-public-ip --lb-target-groups --security-groups --spot-instance
virtualbox: --remote
gcp: --ephemeral-external-ip --service-account --target-pool
softlayer: --cpi-dynamic
openstack: --custom-ca --disk-az --dns --floating-ip --ignore-server-availability-zone --keystone-v2 --ntp --root-disk-size --trusted-certs
azure: --load-balancer --managed-disks
docker: --unix-sock
vsphere: --dns --resource-pool
From the repo root run:
$ bucc up --lite
To delete your VM run:
$ bucc down
(Optional) Add a Certificate for Concourse
By default, BUCC will generate self-signed certificates for all components. If you would like to add a true certificate for the Concourse web interface, follow these steps:
- Generate a certificate with the domain name you wish to use for Concourse. This is easily done with Let's Encrypt if you don't have another option.
- Add a variable to
vars.yml
file with the domain name you chose:concourse_domain: concourse.foo.com
- Add your certificate to
vars.yml
as follows:atc_ssl: ca: | -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE----- certificate: | -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE----- private_key: | -----BEGIN PRIVATE KEY----- ... -----END PRIVATE KEY-----
- Add the intermediate certificate to
vars.yml
as follows:concourse_ca_certs: | -----BEGIN CERTIFICATE----- ... -----END CERTIFICATE-----
- Run bucc with the flags
--concourse-lb
and--concourse-ca-certs
Using BUCC
Using BOSH
$ source <(bucc env) # should not be necessary when using direnv
$ bosh alias-env bucc
Using environment '192.168.50.6' as client 'admin'
Name bosh
UUID 94e87b44-a7eb-4b67-a568-52553f87cd6e
Version 268.6.0 (00000000)
Director Stemcell ubuntu-xenial/170.9
CPI warden_cpi
Features compiled_package_cache: disabled
config_server: enabled
local_dns: enabled
power_dns: disabled
snapshots: disabled
User admin
Succeeded
$ bosh vms
Using environment '192.168.50.6' as client 'admin'
Succeeded
Using UAA
- Use UAA
$ bucc uaa
installing uaa cli '0.0.1' into: /Users/dcarter/fun/tryagain/bucc/bin/
Target set to https://192.168.50.6:8443
Access token successfully fetched and added to context.
$ uaa get-client admin
{
"client_id": "admin",
"scope": [
"uaa.none"
],
"resource_ids": [
"none"
],
"authorized_grant_types": [
"client_credentials"
],
"authorities": [
"bosh.admin"
],
"lastModified": 1549969159011 .
}
Using Credhub
$ source <(bucc env) # should not be necessary when using direnv
$ bucc credhub
Setting the target url: https://192.168.50.6:8844
Login Successful
$ credhub api
https://192.168.50.6:8844
$ credhub generate -t password --name test
id: 63947a28-ee47-4d3c-9320-7972c70ec431
name: /test
type: password
value: <redacted>
version_created_at: "2019-02-10T13:35:06Z"
Using Concourse
Via the GUI
To get the login details for your concourse GUI run:
bucc info
With Fly
$ bucc fly
logging in to team 'main'
target saved
Example fly commands:
fly -t bucc pipelines
fly -t bucc builds
$ fly -t bucc pipelines
name paused public
Backup & Restore
BUCC works with BBR.
To make a backup of your deployed BUCC vm, run:
bucc bbr backup
To recreate your environment from a backup run:
cd bucc
last_backup=$(find . -type d -regex ".+_.+Z" | sort -r | head -n1)
tar -xf ${last_backup}/bosh-0-bucc-creds.tar -C state
bucc up # clean BUCC with credentials (creds.yml) from backup
bucc bbr restore --artifact-path=${last_backup}
Support for air-gapped environments
To use bucc in an offline environment run:
bucc offline --cpi virtualbox --lite --destination /tmp/offline
# copy /tmp/offline/bucc-*.tgz to your offline envrionment
tar -xf bucc-*.tgz && bucc
./bin/bucc up
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].