4.3.1 Verify servers & create a "provision" user
These are the steps you need to perform after receiving a server IP address and an SSH user before you can run the provisioning scripts for any given environment. E.G: qa, staging, production (1, 2, 3 or 5 server cluster).
Verify the Ubuntu version is 24.04
First, login as root, or if you only have sudoer access, do sudo su root
.
If not, either recreate the server or upgrade Ubuntu.
Verify the disk has been partitioned correctly and that you have enough space for your chosen environment
We want to ensure the partition mounted to / has enough disk space. Like we se here, we have 311G in total which would be enough for a qa, production or staging environment.
Check the internet connection from the servers.
Check you can ping google.com from the servers.
Create a user named provision
provision
The next commands will create a user named provision, make it a sudoer (needed for provisioning) and finally generate an SSH key for logging in as the user. The SSH private key will not persist on the server as it should only be stored in Github Secrets.
Create SSH keys for each environment for provision
provision
The deploy Github Action uses this library to SSH into your environments. This library depends on an PEM(RSA), PKCS8, and RFC4716(OpenSSH) SSH key.
For production servers, SSH keys should only be created for the manager node.
After running the commands, you see the SSH private key in the terminal window. It will look like this:
Copy this key and save it into secure password manager software. It is the private key used by the provision user to SSH into the servers automatically from Github environments. We will use it when setting up our Github environments.
For additional replicas (worker) servers in a production cluster
SSH into the production manager node and copy the public key for the provision user.
SSH into the worker node and create the provision user, but DO NOT create new SSH keys for the provision user. Instead make the user and then the .ssh directory to store the public key above in an authorized_keys text file:
Paste in the public key for the manager node provision user. Exit & save.
Add the staging and production "provision" user's id_rsa.pub to the backup server
So that the Github Action can provision the staging and production server to backup in the correct way, their public keys must be also added to the backup server's provision users' authorized_keys file.
SSH into the production manager node and copy the public key for the provision user.
SSH into the staging manager node and copy the public key for the provision user.
SSH into the backup server as the provision user and paste these keys at the bottom of the /home/provision/.ssh/authorized_keys file.
Next, you need to consider how your servers are networked, and how you plan to generate TLS. A lot depends on your VPN approach.
Last updated