Files
smom-dbis-138/scripts/deployment/canary-region.sh
defiQUG 2a4753eb2d feat: restore operator WIP — PMM JSON sync entrypoint, dotenv RPC trim + secrets, pool env alignment
- Resolve stash: merge load_deployment_env path with secure-secrets and CR/LF RPC strip
- create-pmm-full-mesh-chain138.sh delegates to sync-chain138-pmm-pools-from-json.sh
- env.additions.example: canonical PMM pool defaults (cUSDT/USDT per crosscheck)
- Include Chain138 scripts, official mirror deploy scaffolding, and prior staged changes

Made-with: Cursor
2026-03-27 19:02:30 -07:00

104 lines
3.1 KiB
Bash
Executable File

#!/usr/bin/env bash
set -euo pipefail
# Canary deployment for a single workload region.
# - Applies Terraform only for one region's AKS + networking + storage
# - Uses lock timeouts (no -lock=false)
# - Runs basic health checks on the AKS cluster and Besu pods
#
# Usage:
# scripts/deployment/canary-region.sh <region-name>
# scripts/deployment/canary-region.sh northeurope
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
PROJECT_ROOT="$(cd "$SCRIPT_DIR/../.." && pwd)"
# Load .env via dotenv (RPC CR/LF trim). Fallback: raw source.
if [[ -f "$SCRIPT_DIR/../lib/deployment/dotenv.sh" ]]; then
# shellcheck disable=SC1090
source "$SCRIPT_DIR/../lib/deployment/dotenv.sh"
load_deployment_env --repo-root "${PROJECT_ROOT:-$REPO_ROOT}"
elif [[ -n "${PROJECT_ROOT:-}" && -f "$PROJECT_ROOT/.env" ]]; then
set -a
# shellcheck disable=SC1090
source "$PROJECT_ROOT/.env"
set +a
elif [[ -n "${REPO_ROOT:-}" && -f "$REPO_ROOT/.env" ]]; then
set -a
# shellcheck disable=SC1090
source "$REPO_ROOT/.env"
set +a
fi
TERRAFORM_DIR="$PROJECT_ROOT/terraform"
REGION="${1:-northeurope}"
echo "=== Canary deployment for region: ${REGION} ==="
cd "$TERRAFORM_DIR"
echo "Running Terraform plan for canary region (AKS + networking + storage)..."
terraform plan \
-lock-timeout=5m \
-compact-warnings \
-target="module.aks_global_multi_region[\"${REGION}\"]" \
-target="module.networking_global_multi_region[\"${REGION}\"]" \
-target="module.storage_global_multi_region[\"${REGION}\"]" \
-out="tfplan.canary.${REGION}"
echo
echo "Applying Terraform canary plan for ${REGION}..."
terraform apply \
-lock-timeout=5m \
"tfplan.canary.${REGION}"
echo
echo "Fetching cluster info for ${REGION} from Terraform outputs..."
CLUSTERS_JSON="$(terraform output -json global_multi_region_clusters || echo '{}')"
if [[ "$CLUSTERS_JSON" == "null" || -z "$CLUSTERS_JSON" ]]; then
echo "ERROR: global_multi_region_clusters output is empty or null."
exit 1
fi
CLUSTER_NAME="$(echo "$CLUSTERS_JSON" | jq -r --arg R "$REGION" '.[$R].cluster_name')"
CLUSTER_LOCATION="$(echo "$CLUSTERS_JSON" | jq -r --arg R "$REGION" '.[$R].location')"
if [[ -z "$CLUSTER_NAME" || "$CLUSTER_NAME" == "null" ]]; then
echo "ERROR: could not resolve cluster_name for region ${REGION} from Terraform outputs."
exit 1
fi
echo "Cluster name: ${CLUSTER_NAME}"
echo "Cluster location: ${CLUSTER_LOCATION}"
echo
echo "Getting AKS credentials..."
az aks get-credentials \
--resource-group "$(terraform output -raw resource_group_name)" \
--name "${CLUSTER_NAME}" \
--overwrite-existing
echo
echo "=== Health checks for canary region: ${REGION} ==="
echo "- AKS provisioning state:"
az aks show \
--resource-group "$(terraform output -raw resource_group_name)" \
--name "${CLUSTER_NAME}" \
--query "provisioningState" \
-o tsv
echo
echo "- Nodes summary:"
kubectl get nodes -o wide
echo
echo "- Besu pods (if deployed) in namespace besu-network:"
kubectl get pods -n besu-network || echo "Namespace besu-network not yet deployed."
echo
echo "Canary deployment for ${REGION} completed. Review the above health checks before rolling out to all regions."