Installing Che on Google Cloud Platform

Preparing Google Cloud Platform for installing Che

Google Cloud Platform (GCP) is a suite of cloud computing services that provides infrastructure as a service, platform as a service, and serverless computing environments.

This section provides information about how to set up the GCP environment for installing Eclipse Che.

Creating a Google Kubernetes Engine instance

This section describes how to create a Google Kubernetes Engine instance.

  • The Google Cloud SDK is available. See Installing Google Cloud SDK.

    To install the SDK on macOS, use the $ brew cask install google-cloud-sdk command.

  1. Ensure the gcloud tool is set up:

    $ gcloud init
  2. Create a new project with the eclipse-che-1 ID:

    $ gcloud projects create eclipse-che-1
  3. Check from GCP webconsole that the Kubernetes engine is available on this project.

  4. Configure the different default options (such as using the europe-west1-b zone) in the shell:

    $ gcloud config set project eclipse-che-1
    $ gcloud config set compute/zone europe-west1-b
    $ gcloud config set compute/region europe-west1
  5. Check all the components are up-to-date:

    $ gcloud components update
    All components are up to date.
  6. Create a cluster with the name eclipse-che:

    $ gcloud container clusters create eclipse-che --zone europe-west1-b
  7. Wait for the cluster to be ready.

  8. This commands updates the Kubernetes context. To verify it:

    $ kubectl config current-context

Installing Ingress on Kubernetes

Eclipse Che uses Ingress.


To install Ingress-nginx:

  1. Install the cloud configuration:

    $ kubectl apply -f

    The following output confirms that the Ingress controller is running:

    $ kubectl get pods --namespace ingress-nginx
    NAME                                        READY   STATUS    RESTARTS   AGE
    nginx-ingress-controller-76c86d76c4-gswmg   1/1     Running   0          9m3s

    Wait for the container to run.

  2. Wait for the external IP. Note that a <pending> status for the external IP is shown before the exact external IP address is displayed.

    $ kubectl get services  --namespace ingress-nginx
    NAME           TYPE          CLUSTER-IP   EXTERNAL-IP    PORT(S)                     AGE
    ingress-nginx  LoadBalancer  80:31107/TCP,443:30629/TCP  8m59s
  3. Get the external IP of Ingress-nginx.

    $ kubectl get services --namespace ingress-nginx \
      -o jsonpath='{.items[].status.loadBalancer.ingress[0].ip}'

Installing DNS on Google Cloud Platform

  1. Using the Cloud DNS, create a zone called eclipse-che and, for example, a DNS name Click the Create button.

    creating dns zone on gcp

    The Cloud DNS zone is created.

    cloud dns zone on gcp
  2. Click the Registrar Setup link in the upper right corner of the window. The name servers (NS) to be added to the registrar are displayed.

    registrar setup gcp
  3. Update the DNS zone (example: ovh domain).

  4. Add the * entry to the external Ingress IP on the cloud DNS.

    dns settings gcp

Enabling the TLS and DNS challenge on Google Cloud Platform


To use the Cloud DNS and TLS, service accounts must be enabled, and cert-manager must manage the DNS challenge for the Let’s Encrypt service.

  1. Create a service account with the given name:

    $ gcloud iam service-accounts create dns01-solver --display-name "dns01-solver"
  2. Add the policy binding to the IAM policy of the eclipse-che-1 project (replace the eclipse-che-1 project name with the name of your project):

    $ gcloud projects add-iam-policy-binding eclipse-che-1 \
      --member \
      --role roles/dns.admin

    The following is the output of this command:

    Updated IAM policy for project [eclipse-che-1].
    - members:
     role: roles/compute.serviceAgent
    - members:
     role: roles/container.serviceAgent
    - members:
     role: roles/dns.admin
    - members:
     role: roles/editor
    - members:
     - user:<email-address>
     role: roles/owner
    etag: <some-tag>
    version: 1

Creating a Service Account Secret on Google Cloud Platform


To access the service account, cert-manager uses a key stored in a Kubernetes Secret.

  1. Create a key for the service account and download it as a JSON file:

    $ gcloud iam service-accounts keys create key.json \

    The following is the output of the preceding command:

    created key [05e94ca2e7754b94a63049605ee8d2813d16ff37] of type [json] as [key.json] for []

    The key file is generated:

    $ ls -la key.json
    -rw------- 1 joe staff 2318 Jul 29 12:13 key.json
    Keep the key file safe, and do not share it with anyone because it can be used to gain access to your cloud resources. The key file can be deleted after it has been used to generate the Secret.
  2. Create cert-manager namespace

    $  kubectl create ns cert-manager
  3. Create a Secret from this file.

    $ kubectl create secret generic clouddns-dns01-solver-svc-acct --from-file=key.json --namespace=cert-manager

Installing cert-manager on Kubernetes

  1. To install cert-manager:

    $ kubectl label namespace cert-manager
    $ kubectl apply \
      -f \
  2. Create the che namespace if it does not exist already:

    $ kubectl create namespace che
    namespace/che created
  3. Create the certificate issuer. Replace your email address in the email field:

    $ cat <<EOF | kubectl apply -f -
    kind: ClusterIssuer
      name: che-certificate-issuer
        - dns01:
              project: eclipse-che-1
                key: key.json
                name: clouddns-dns01-solver-svc-acct
          name: letsencrypt
  4. Create the certificate. Edit the domain name:

    $ cat <<EOF | kubectl apply -f -
    kind: Certificate
     name: che-tls
     namespace: che
     secretName: che-tls
       name: che-certificate-issuer
       kind: ClusterIssuer
       - '*'
  5. Check that the issuerRef name is the same as the ClusterIssuer. A new DNS challenge is added to the DNS zone for Let’s Encrypt.

    dns challenge gcp
  6. The cert-manager logs contain information about the DNS challenge. To get the logs (here, cert-manager-8d478bb45-2924h is the name of the cert-manager Pod):

    $ kubectl logs -f -n cert-manager cert-manager-8d478bb45-2924h
    I0729 13:50:39.414729 1 dns.go:112] Checking DNS propagation for "" using name servers: []
    E0729 13:50:39.422521 1 sync.go:180] cert-manager/controller/challenges "msg"="propagation check failed" "error"="DNS record for \"\" not yet propagated" "dnsName"="" "resource_kind"="Challenge" "resource_name"="che-tls-3529929423-0" "resource_namespace"="che" "type"="dns-01"
    I0729 13:50:39.422598 1 controller.go:219] cert-manager/controller/challenges "level"=0 "msg"="finished processing work item" "key"="che/che-tls-3529929423-0"
    I0729 13:50:49.406767 1 controller.go:213] cert-manager/controller/challenges "level"=0 "msg"="syncing resource" "key"="che/che-tls-3529929423-0"
    I0729 13:50:49.409802 1 dns.go:112] Checking DNS propagation for "" using name servers: []
    E0729 13:50:49.420131 1 sync.go:180] cert-manager/controller/challenges "msg"="propagation check failed" "error"="DNS record for \"\" not yet propagated" "dnsName"="" "resource_kind"="Challenge" "resource_name"="che-tls-3529929423-0" "resource_namespace"="<che>" "type"="dns-01"
    I0729 13:50:49.420198 1 controller.go:219] cert-manager/controller/challenges "level"=0 "msg"="finished processing work item" "key"="che/che-tls-3529929423-0"
  7. Ensure that the certificate is ready:

    $ kubectl describe certificate/che-tls -n che
     Last Transition Time: 2019-07-29T13:50:35Z
     Message: Certificate issuance in progress. Temporary certificate issued.
     Reason: TemporaryCertificate
     Status: False
     Type: Ready
     Type Reason Age From Message
     ---- ------ ---- ---- -------
     Normal Generated 47s cert-manager Generated new private key
     Normal GenerateSelfSigned 47s cert-manager Generated temporary self signed certificate
     Normal OrderCreated 47s cert-manager Created Order resource "che-tls-3529929423"

    Wait for the Status to become OK, and ensure that the log contains the following entry:

    I0729 13:56:26.140886 1 conditions.go:143] Found status change for Certificate "che-tls" condition "Ready": "False" -> "True"; setting lastTransitionTime to 2019-07-29 13:56:26.140866531 +0000 UTC m=+4557.134131468
  8. Ensure that the status is up-to-date:

    $ kubectl describe certificate/che-tls -n <che>
     Last Transition Time: 2019-07-29T13:56:26Z
     Message: Certificate is up to date and has not expired
     Reason: Ready
     Status: True
     Type: Ready
     Not After: 2019-10-27T12:56:24Z

Installing Che on Google Cloud Platform using chectl


To install Che on Google Cloud Platform, run the following chectl command:

$ chectl server:start --installer=helm --platform=k8s --multiuser
  βœ” Verify Kubernetes API...OK
  βœ” πŸ‘€  Looking for an already existing Eclipse Che instance
    βœ” Verify if Eclipse Che is deployed into namespace "che" is not
  βœ” ✈️  Kubernetes preflight checklist
    βœ” Verify if kubectl is installed
    βœ” Verify remote kubernetes status...done.
    βœ” Check Kubernetes version: Found v1.15.12-gke.2.
    βœ” Verify domain is set...set to
    ↓ Check if cluster accessible [skipped]
Eclipse Che logs will be available in '/var/folders/tg/_5rxbhmj4xncz4szvpgswrmc0000gn/T/chectl-logs/1596035521904'
  βœ” Start following logs
    ↓ Start following Operator logs [skipped]
    βœ” Start following Eclipse Che logs...done
    βœ” Start following Postgres logs...done
    βœ” Start following Keycloak logs...done
    βœ” Start following Plugin registry logs...done
    βœ” Start following Devfile registry logs...done
  βœ” Start following events
    βœ” Start following namespace events...done
 β€Ί   Warning: Consider using the more reliable 'OLM' installer when deploying a stable release of Che (--installer=olm).
  βœ” πŸƒβ€  Running Helm to install Eclipse Che
    βœ” Verify if helm is installed
    βœ” Check Helm Version: Found v3.1.2+gd878d4d
    βœ” Create Namespace (che)...does already exist.
    βœ” Check Eclipse Che TLS certificate...TLS certificate secret found
    βœ” Check Cluster Role Binding...does not exists.
    βœ” Preparing Eclipse Che Helm Chart...done.
    βœ” Updating Helm Chart dependencies...done.
    βœ” Deploying Eclipse Che Helm Chart...done.
  βœ” βœ…  Post installation checklist
    βœ” PostgreSQL pod bootstrap
      βœ” scheduling...done.
      βœ” downloading images...done.
      βœ” starting...done.
    βœ” Devfile registry pod bootstrap
      βœ” scheduling...done.
      βœ” downloading images...done.
      βœ” starting...done.
    βœ” Plugin registry pod bootstrap
      βœ” scheduling...done.
      βœ” downloading images...done.
      βœ” starting...done.
    βœ” Eclipse Che pod bootstrap
      βœ” scheduling...done.
      βœ” downloading images...done.
      βœ” starting...done.
    βœ” Retrieving Eclipse Che server URL...
    βœ” Eclipse Che status check
  βœ” Show important messages
    βœ” Autogenerated Keycloak credentials are: "xxx:xxx"
Command server:start has completed successfully.
keycloak and che with valid wildcard certs
Figure 1. Keycloak and Che with valid wildcard certificates
che user dashboard gcp
Figure 2. Che user dashboard