The next generation of
furyctl, called "furyctl next", has been officially released. It is now in a stable state and available starting from version v0.25.0. The previous version, furyctl 0.11, is considered legacy and will only receive bug fixes. It will be maintained under the v0.11 branch.
furyctl is the command line companion for the SIGHUP Distribution (SKD) to manage the full lifecycle of your SKD Kubernetes clusters.
💡 Learn more about the SIGHUP Distribution in the documentation site.
If you're looking for the old documentation for furyctl legacy, you can find it here.
EKSCluster: Provides comprehensive lifecycle management for an EKS cluster on AWS. It handles the installation of the VPC, VPN, EKS using the installers, and deploys the Distribution onto the EKS cluster.KFDDistribution: Dedicated provider for the distribution, which installs the SIGHUP Distribution (modules only) on an existing Kubernetes cluster.OnPremises: Provider to install a SKD Cluster on VMs.
Check the compatibility matrix for additional information about furyctl and SKD compatibility.
You can find furyctl binaries on the Releases page.
To download the latest release, run:
curl -L "https://github.com/sighupio/furyctl/releases/latest/download/furyctl-$(uname -s)-amd64.tar.gz" -o /tmp/furyctl.tar.gz && tar xfz /tmp/furyctl.tar.gz -C /tmp
chmod +x /tmp/furyctl
sudo mv /tmp/furyctl /usr/local/bin/furyctlAlternatively, you can install furyctl using the asdf plugin.
Installing with asdf
Add furyctl asdf plugin:
asdf plugin add furyctlCheck that everything is working correctly with furyctl version:
$ furyctl version
...
goVersion: go1.23
osArch: amd64
version: 0.XX.XPrerequisites:
make >= 4.1go >= 1.23goreleaser >= 2.3
You can install
goreleaserwith the following command once you have Go in your system:go install github.com/goreleaser/goreleaser/v2@v2.3.2
Once you've ensured the above dependencies are installed, you can proceed with the installation.
-
Clone the repository:
git clone git@github.com:sighupio/furyctl.git # cd into the cloned repository cd furyctl
-
Build the binaries by running the following command:
go build . -
You will find the binaries for your current architecture inside the current folder:
$ ls furyctl furyctl
-
Check that the binary is working as expected:
$ ./furyctl version buildTime: 2024-10-08T07:46:28Z gitCommit: 217cdcc8bf075fccfdb11c41ccc6bb317ec704bc goVersion: go1.23.2 osArch: arm64 version: 0.30.1
-
(optional) move the binary to your
binfolder, in macOS:sudo mv ./furyctl /usr/local/bin/furyctl
See all the available commands and their usage by running furyctl help.
💡 TIP
Enable command tab autocompletion for
furyctlon your shell (bash,zsh,fishare supported). See the instruction on how to enable it withfuryctl completion --help
💡 TIP
You can follow the SIGHUP Distribution quick start guides for cloud and on-premises installations in SKD's official documentation site: https://docs.sighup.io/docs/quickstart/quickstart
Check SKD Compatibility matrix for the furyctl / SKD versions to use.
Basic usage of furyctl for a new project consists on the following steps:
- Creating a configuration file defining the required infrastructure, Kubernetes cluster details, and KFD modules configuration.
- Creating a cluster as defined in the configuration file.
- Destroying the cluster and its related resources.
furyctl provides a command that outputs a sample configuration file (by default called furyctl.yaml) with all the possible fields explained in comments.
furyctl configuration files have a kind that specifies what type of cluster will be created, for example the EKSCluster kind has all the parameters needed to create a SKD cluster using the EKS managed clusters from AWS.
You can also use the KFDDistribution kind to install the SKD distribution on top of an existing Kubernetes cluster or OnPremises kind to install a SKD cluster on VMs.
Additionally, the schema of the file is versioned with the apiVersion field, so when new features are introduced you can switch to a newer version of the configuration file structure.
To scaffold a configuration file to use as a starter, you use the following command:
furyctl create config --version v1.30.0 --kind "EKSCluster"💡 TIP
You can pass some additional flags, like the schema (API) version of the configuration file or a different configuration file name.
See
furyctl create config --helpfor more details.
Open the generated configuration file with your editor of choice and edit it according to your needs. You can follow the instructions included as comments in the file.
Once you have filled your configuration file, you can check that it's content is valid by running the following command:
furyctl validate config --config /path/to/your/furyctl.yaml📖 NOTE
The
--configflag is optional, set it if your configuration file is not namedfuryctl.yaml
Requirements (EKSCluster):
- AWS CLI
- OpenVPN (when filling the
vpnfield in the configuration file)
In the previous step, you have created and validated a configuration file that defines the Kubernetes cluster and its surroundings, you can now proceed to actually creating the resources.
furyctl divides the cluster creation in four phases: infrastructure, kubernetes, distribution and plugins.
- The first phase,
infrastructure, creates all the prerequisites needed to be able to create a cluster. For example, the VPC and its networks. - The second phase,
kubernetes, creates the actual Kubernetes clusters. For example, the EKS cluster and its node pools. - The third phase,
distribution, deploys SKD modules to the Kubernetes cluster. - The fourth phase,
plugins, installs Helm and Kustomize plugins into the cluster.
📖 NOTE
You will find these four phases when editing the furyctl.yaml file.
Just like you can validate that your configuration file is well-formed, furyctl let you check that you have all the needed dependencies (environment variables, binaries, etc.) before starting a cluster creation process.
To validate that your system has all the dependencies needed to create the cluster defined in your configuration file, run the following command:
furyctl validate dependenciesLast but not least, you can launch the creation of the resources defined in the configuration file by running the following command:
❗️ WARNING
You are about to create cloud resources that could have billing impact.
📖 NOTE
The cluster creation process, by default, will create a VPN in the
infrastructurephase and connect your machine to it automatically before proceeding to thekubernetesphase.
furyctl create cluster --config /path/to/your/furyctl.yaml💡 TIP
You can use the alias
furyctl applyinstead offuryctl create cluster.
📖 NOTE
The creation process will take a while.
🎉 Congratulations! You have created your production-grade Kubernetes Fury Cluster from scratch and it is now ready to go into battle.
Note
This is a quick overview of the process. For a more complete documentation please see the universal upgrade guide.
Upgrading a cluster is a process that can be divided into two steps: upgrading the SKD version and running the migrations (if present).
The first step consists in bringing the cluster up to date with the latest version of the SIGHUP Distribution. This is done by:
-
Identifying the target version to which upgrade to with:
furyctl get upgrade-paths
-
Bumping the version in the configuration file to the desired one.
-
Upgrading the cluster:
furyctl apply --upgrade --config /path/to/your/furyctl.yamlOnce that is done, if you were also planning to move to a different configuration (e.g.: changing from logging type opensearch to loki), you can run the following command to run the migrations as usual:
furyctl apply --config /path/to/your/furyctl.yaml❗️ WARNING
You must first upgrade the cluster using the old configuration (e.g.: logging type
opensearch), update the configuration file to use the new type (e.g.:loki) and then run the command above.
You can also split nodes upgrade process into several steps, for example, you can upgrade the control plane nodes first:
furyctl apply --upgrade --config /path/to/your/furyctl.yaml --skip-nodes-upgradeAnd then upgrade the worker nodes, one by one:
furyctl apply --upgrade --config /path/to/your/furyctl.yaml --upgrade-node workerNode1At the end of the node upgrade process, a check is performed to ensure every pod is either Running or in a Completed state. You can specify a timeout for this check with the --pod-running-check-timeout flag or skip it with the --force pods-running-check flag.
Destroying a cluster will run through the four phases mentioned above, in reverse order, starting from distribution.
To destroy a cluster created using furyctl and all its related resources, run the following command:
❗️ WARNING
You are about to run a destructive operation.
furyctl delete cluster --dry-runCheck that the dry-run output is what you expect and then run the command again without the --dry-run flag to actually delete all the resources.
💡 TIP
Notice the
--dry-runflag, used to check what the command would do. This flag is available for other commands too.
The following steps will guide you through the process of creating a Kubernetes Fury cluster from zero.
- Follow the previous steps to generate a
furyctl.yamland download the modules. - Edit the
furyctl.yamlto customize the cluster configuration by filling the sectionsinfrastructure,kubernetesanddistribution. - Check that the configuration file is valid by running
furyctl validate config. - Run
furyctl create clusterto create the cluster. - (Optional) Watch the logs of the cluster creation process with
tail -f ~/.furyctl/furyctl.<timestamp>-<random>.log.
On-premises clusters need a set of certificates authorities and certificate files to work as a prerequisite. Both for the Kubernetes control plane and for the etcd database.
furyctl provides a command that allows the creation of this PKI:
furyctl create pkiThe command supports some additional options, like --etcd to create only the PKI for etcd, or creating the files in a different path.
See all the additional options with the --help flag:
furyctl create pki --helpSame as the previous section, but you can skip the infrastructure creation phase
by not filling the section infrastructure in the furyctl.yaml file and
running furyctl create cluster --start-from kubernetes.
The cluster creation process can be split into three phases:
- Infrastructure
- Kubernetes
- Distribution
The furyctl create cluster command will execute all the phases by default,
but you can limit the execution to a specific phase by using the --phase flag.
To create a cluster step by step, you can run the following command:
furyctl create cluster --phase infrastructureIf you choose to create a VPN in the infrastructure phase, you can automatically connect to it by using the flag --vpn-auto-connect.
furyctl create cluster --phase kubernetesAfter running the command, remember to export the KUBECONFIG environment variable to point to the generated kubeconfig file or
to use the flag --kubeconfig in the following command.
furyctl create cluster --phase distributionThe new furyctl still embeds some legacy features, for example the command furyctl legacy vendor to download SKD dependencies from a deprecated Furyfile.yml.
This can be still used to manually manage all the components of the distribution.
💡 TIP
you can also use
--furyfileto point to aFuryfile.yamlin a different folder
furyctl supports Helm and Kustomize plugins.
To install a Helm plugin (chart), follow these steps:
- Add the repository to the
spec.plugins.helm.repositoriessection of yourfuryctl.yamlfile. - Add the release to the
spec.plugins.helm.releasessection, specifying the chart name, the namespace, the chart version and the values to override. To override the values you can use thespec.plugins.helm.releases[].setor thespec.plugins.helm.releases[].valuessection.
For example to install the Prometheus Helm chart you have to add the following to your furyctl.yaml:
...
spec:
...
plugins:
helm:
repositories:
- name: prometheus-community
url: https://prometheus-community.github.io/helm-charts
releases:
- name: prometheus
namespace: prometheus
chart: prometheus-community/prometheus
version: "24.3.0"
set:
- name: server.replicaCount
value: 3
values:
- path/to/values.yamlTo install a Kustomize plugin (project) you have to configure the spec.plugins.kustomize section of your furyctl.yaml file, specifying a name and the path to the folder.
For example:
...
spec:
...
plugins:
kustomize:
- name: kustomize-project
folder: path/to/kustomize/projectfuryctl comes with the flag --distro-location, allowing you to use a local copy of SKD instead of downloading it from the internet. This allows you to test changes to the SKD without having to push them to the repository, and might come in handy when you need to test new features or bug fixes.
On the same note, the tool comes with the --upgrade-path-location flag, too, allowing you to test changes to the upgrade path without having to push them to the repository, and to support cases that are not covered by the official release, such as upgrading from a beta or release candidate release to a stable one.
If, for any reason, the cluster creation or update process fails, you can restart it from a specific (sub-)phase by using the --start-from flag. Starting from v0.27.0 we introduced the support for sub-phases, to give the operator more control over the process. The supported options are: pre-infrastructure, infrastructure, post-infrastructure, pre-kubernetes, kubernetes, post-kubernetes, pre-distribution, distribution, post-distribution, plugins.
There are four kinds of tests: unit, integration, e2e, and expensive.
Each of them covers specific use cases depending on the speed, cost, and dependencies at play in a given scenario. Anything that uses i/o should be marked as integration, with the only expectation of local files and folders: any test that uses the local filesystem and nothing more can be marked as 'unit'. This is made for convenience and it's open to change in the future should we decide to refactor the code to better isolate that kind of i/o from the logic of the tool.
That said, here's a little summary of the used tags:
- unit: tests that exercise a single component or function in isolation. Tests using local files and dirs are permitted here.
- integration: tests that require external services, such as github. Test using only local files and dirs should not be marked as integration.
- e2e: tests that exercise furyctl binary, invoking it as a cli tool and checking its output
- expensive: e2e tests that incur in some monetary cost, like running an EKS instance on AWS
In case you experience any problems with furyctl, please open a new issue on GitHub.
This software is open-source and it's released under the following LICENSE.