Use chevron-right Getting started chevron-right Installation Guide Production setup through Helm The below scripts will help the adopters to deploy SunbirdRC services in the Kubernetes environment.
System requirements
Please note that the below numbers are only for reference, they will vary based on the business domain and scale.
Kubernetes cluster (any version above v1.26.3)
Master Node: 2 vCPU, 4 GB RAM, Disc Size: 50 GB, Nodes: 1
Worker Nodes: 4 vCPU, 8 GB RAM, Disc size: 100 GB, Nodes: 3
Bastion server: 2 vCPU, 4 GB RAM, Disc Size: 50GB
Postgres with a read replica: 4 vCPU 8 GB RAM, Disc Size: 100GB
ElasticSearch: 4 vCPU, 8 GB RAM, Disc Size: 100GB
Server for Minio: 2 vCPU, 4 GB RAM, Disc Size: 100GB (Optional)
CDN / any other alternative for hosting UI
Kubernetes Cluster with minimum 3 nodes
Postgres DB (create a database for keycloak and registry)
Domain URL (domain url mapped to Kubernetes cluster)
The above optional services are not mandatory for SunbirdRC services. It can be installed based on the requirement of the project. For more details https://docs.sunbirdrc.dev/learn/readme-1/high-level-architecturearrow-up-right
Deployment steps
Make sure from the current directory you're able to run the below commands
Create namespace
Feel free to use a different name for the namespace. Use the same name in the rest of the commands.
Convert all the passwords/secrets into base64 format and update these values in values.yaml file
Secrets
DB_PASSWORD: Postgres database password
KEYCLOAK_ADMIN_PASSWORD: Keycloak admin password used to login to admin console
KEYCLOAK_DEFAULT_USER_PASSWORD: Default password to be set for new users created by registry
MINIO_SECRET_KEY: Minio secret key
ELASTIC_SEARCH_PASSWORD: Elastic search connection password
KEYCLOAK_ADMIN_CLIENT_SECRET: Client secret of keycloak admin client for registry
DB_PASSWORD, KEYCLOAK_ADMIN_PASSWORD and KEYCLOAK_DEFAULT_USER_PASSWORD are mandotry secrets to be set. Other secrets can be set to empty
Modify configuration values
Configuration values like database address, elastic search address etc should be modified in values.yaml file.
All schema files should be placed in the schemas directory located at sunbird-rc-core/infra/helm_charts/charts/registry/schemas.
The signing keys should be placed in the below directories
Both public and private keys for signing
sunbird-rc-core/infra/helm_charts/charts/certificate-signer/keys
Only public key for exposure to verifiers
sunbird-rc-core/infra/helm_charts/charts/public-key-service/keys
Please note that by default a sample key is added. It is highly recommended to update this key before going to live.
Deploy helm charts
Output
Check if all the pods are running
Import keycloak realm
Goto keycloak admin console <host>/auth/
Login with username admin and use the same password configured in secrets
Click on Master and select Add realm
Select https://github.com/Sunbird-RC/sunbird-rc-core/blob/main/imports/realm-export.json file
Get the keycloak secret from the keycloak admin console
Goto keycloak admin console <host>/auth/
Login with username admin and use the same password configured in the secrets
Goto clients page and click on admin-api
Goto Credentials tab and click on Regenerate Secret
Configure secret in the registry
Encode the secret in base64 format
Open the secret in edit mode
Replace empty string for KEYCLOAK_ADMIN_CLIENT_SECRET with the base64 encoded secret
Check registry APIs
Open the below url in the browser and check if you're able to get the swagger JSON <host>/registry/api/docs/swagger.json