constellation/debugd
Daniel Weiße 724ee44466
ci: Terraform provider e2e tests (#2712)
* Refactor selfManagedInfra input to clusterCreation in e2e tests
* Run e2e test using terraform provider
* Allow insecure measurement fetching in Terraform provider
* Run Terraform provider test instead of module test in weekly runs

---------

Signed-off-by: Daniel Weiße <dw@edgeless.systems>
2023-12-15 10:37:29 +01:00
..
cmd bazel: use pure Go platform where possible 2023-12-01 09:35:33 +01:00
filebeat deps: update fedora:38 Docker digest to 8285246 (#2467) 2023-10-17 10:47:10 +02:00
internal ci: Terraform provider e2e tests (#2712) 2023-12-15 10:37:29 +01:00
logstash ci: separate logs and metrics indices (#2544) 2023-10-31 12:09:27 +01:00
metricbeat increase period for Metricbeat (#2540) 2023-10-30 15:50:27 +01:00
service deps: update module github.com/sigstore/rekor to v1.2.2 (#2033) 2023-07-06 15:41:14 +02:00
README.md docs: improve developer documentation for folks new to the codebase 2023-11-17 19:16:52 +01:00

debug daemon (debugd)

Debugd is a tool we built to allow for shorter iteration cycles during development. The debugd gets embedded into OS images at the place where the bootstrapper normally sits. Therefore, when a debug image is started, the debugd starts executing instead of the bootstrapper. The debugd will then wait for a request from the cdbg tool to upload a bootstrapper binary. Once the upload is finished debugd will start the bootstrapper. Subsequently you can initialize your cluster with constellation apply as usual.

Build cdbg

The cdbg tool is part of the //:devbuild target, if you follow the generic build instructions at build-develop-deploy.

If you need to build cdbg standalone for your current platform, you can run

bazel build //debugd/cmd/cdbg:cdbg_host

debugd & cdbg usage

Follow the debug-cluster workflow to deploy a bootstrapper with cdbg and debugd.

Logcollection to Opensearch

You can enable the logcollection of debugd to send logs to Opensearch.

On Azure, ensure your user assigned identity has the Key Vault Secrets User role assigned on the key vault opensearch-creds.

On AWS, attach the SecretManagerE2E policy to your control-plane and worker node role.

When deploying with cdbg, enable by setting the logcollect=true and your name logcollect.admin=yourname.

./cdbg deploy --info logcollect=true,logcollect.admin=yourname

# OR

./cdbg deploy --info logcollect=true --info logcollect.admin=yourname

Other available fields can be found in the filed list

For QEMU, the credentials for Opensearch must be parsed via the info flag as well:

./cdbg deploy \
    --info logcollect=true \
    --info logcollect.admin=yourname \
    --info qemu.opensearch-pw='xxxxxxx'

Remember to use single quotes for the password.

You will also need to increase the memory size of QEMU to 4GB.