Armory Spinnaker Documentation: How To Set Up, Safely Administer the System, How to Use the System
Feb 1, 2017 by Isaac Mosquera
This documentation can help you set up Armory Spinnaker, safely administer the system, and learn about how to use the system. If you want to know more about Armory Spinnaker read What is Armory Spinnaker.
See the following for Armory Spinnaker Administration
Deploying Armory Spinnaker
Armory Spinnaker comes with an installer that walks you through deploying Spinnaker with in your AWS account. It should only take around 15 minutes to have an instance of Armory Spinnaker up and running. To get started, open up a terminal and execute the following:
bash -c "$(curl -sS http://get.armory.io)"
If you want to learn more about what is happening behind the scenes, you can go through the components below.
The installer is a script that is responsible for asking the user for customer specific inputs like AWS keys, VPC, subnets and S3 buckets. These inputs are kept locally on your system and then passed to Terraform
Armory Spinnaker relies on Terraform templates to create the infrastructure described above. The
tfstate file is created and backed by S3 for record keeping.
Configuration(s) to set Spinnaker up for the first time.
ha – Configuration for a highly available setup.
stand-alone – Configuration for a development setup.
modules – Common configuration shared by both setups.
Armory-Spinnaker AMI & Debian Distribution
When significant updates are available we intend to distribute a new version of Armory Spinnaker that includes updated components from the OSS community edition as well. We release minor patches every few days for priority fixes.
We provide two methods of installing Spinnaker: Stand-Alone and High-Availability (HA). The stand-alone version is there for development purposes. It’s a simplified deployment and is the quickest way to evaluate Spinnaker. The HA deployment provides redundancy and additional security such that there is no single point of failure.
Below is a diagram of the architecture & components deployed in a stand-alone configuration.
In order to not expose Spinnaker sub-services, we use internal and user-facing security groups. The user-facing security group exposes ports for
deck. We use a separate security group for internal communication between services.
Autoscaling Groups & Launch Configurations
We’ll create an ASG with the name
By default, we create an instance with a private IP and keys which should only be accessible by your team.
We put a load balancer in front of the instance to provide external access.
High Availability (HA)
Below is a diagram of the architecture & components deployed in an HA configuration.
The install provides two security groups: one for user-facing access and the internal sub-service communication. The user-facing security groups access opens 3 ports:
80. This is applied to the ELB and the nodes in the Spinnaker cluster. The security group only exposes access to
deck. The other services communicate using another security group which is the internal security group. The security group is applied to the
Interservice ELB and the nodes on the machine.
Armory Spinnaker is Docker based and uses Docker-Compose to orchestrate it’s deployment, therefore Docker is the primary dependency of Armory Spinnaker. As of the time of this writing, Docker-Compose v1.10.0 is required.
Recently Published Posts
A day in the life of a TAM
I’ve been asked what a Technical Account Manager (TAM) does so I wanted to take the opportunity to illustrate it by walking through a standard day in the life. Before we can look at what a day in a life of a TAM is, I should provide some background in what is a TAM and […]
Read more →
Nikema’s Spinnaker Summit 2021 Recap
My Second Spinnaker Summit is in the Books! Last week I attended and spoke at my second Spinnaker Summit. Like last year’s summit, it was fully virtual. This time Spinnaker Summit was co-located with cdCon and took place on the Hopin platform. Last year, I spoke on a panel about Black professionals a few months […]
Read more →
Announcing General Availability of Armory Policy Engine Plugin
Armory Policy Engine provides support for automating policy compliance with Spinnaker. Policy Engine Plugin is the latest version of Policy Engine and adds support for both advanced role-based access control (RBAC) use-cases and open source Spinnaker. The release of Policy Engine Plugin comes with new documentation, including a library of example policies from across Armory’s […]
Read more →