Major changes: - Organized Python v1 implementation into v1/ subdirectory - Created Rust workspace with 9 modular crates: - wifi-densepose-core: Core types, traits, errors - wifi-densepose-signal: CSI processing, phase sanitization, FFT - wifi-densepose-nn: Neural network inference (ONNX/Candle/tch) - wifi-densepose-api: Axum-based REST/WebSocket API - wifi-densepose-db: SQLx database layer - wifi-densepose-config: Configuration management - wifi-densepose-hardware: Hardware abstraction - wifi-densepose-wasm: WebAssembly bindings - wifi-densepose-cli: Command-line interface Documentation: - ADR-001: Workspace structure - ADR-002: Signal processing library selection - ADR-003: Neural network inference strategy - DDD domain model with bounded contexts Testing: - 69 tests passing across all crates - Signal processing: 45 tests - Neural networks: 21 tests - Core: 3 doc tests Performance targets: - 10x faster CSI processing (~0.5ms vs ~5ms) - 5x lower memory usage (~100MB vs ~500MB) - WASM support for browser deployment
12 KiB
WiFi-DensePose DevOps & Deployment Guide
This guide provides comprehensive instructions for deploying and managing the WiFi-DensePose application infrastructure using modern DevOps practices.
🏗️ Architecture Overview
The WiFi-DensePose deployment architecture includes:
- Container Orchestration: Kubernetes with auto-scaling capabilities
- Infrastructure as Code: Terraform for AWS resource provisioning
- CI/CD Pipelines: GitHub Actions and GitLab CI support
- Monitoring: Prometheus, Grafana, and comprehensive alerting
- Logging: Centralized log aggregation with Fluentd and Elasticsearch
- Security: Automated security scanning and compliance checks
📋 Prerequisites
Required Tools
Ensure the following tools are installed on your system:
# AWS CLI
curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
unzip awscliv2.zip
sudo ./aws/install
# kubectl
curl -LO "https://dl.k8s.io/release/$(curl -L -s https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl"
sudo install -o root -g root -m 0755 kubectl /usr/local/bin/kubectl
# Helm
curl https://raw.githubusercontent.com/helm/helm/main/scripts/get-helm-3 | bash
# Terraform
wget -O- https://apt.releases.hashicorp.com/gpg | sudo gpg --dearmor -o /usr/share/keyrings/hashicorp-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/hashicorp.list
sudo apt update && sudo apt install terraform
# Docker
curl -fsSL https://get.docker.com -o get-docker.sh
sudo sh get-docker.sh
AWS Configuration
Configure AWS credentials with appropriate permissions:
aws configure
# Enter your AWS Access Key ID, Secret Access Key, and default region
Required AWS permissions:
- EC2 (VPC, Subnets, Security Groups, Load Balancers)
- EKS (Cluster management)
- ECR (Container registry)
- IAM (Roles and policies)
- S3 (State storage and log backup)
- CloudWatch (Monitoring and logging)
🚀 Quick Start
1. Clone and Setup
git clone <repository-url>
cd wifi-densepose
2. Configure Environment
# Set environment variables
export ENVIRONMENT=production
export AWS_REGION=us-west-2
export PROJECT_NAME=wifi-densepose
3. Deploy Everything
# Deploy complete infrastructure and application
./deploy.sh all
4. Verify Deployment
# Check application status
kubectl get pods -n wifi-densepose
# Access Grafana dashboard
kubectl port-forward svc/grafana 3000:80 -n monitoring
# Open http://localhost:3000 (admin/admin)
# Access application
kubectl get ingress -n wifi-densepose
📁 Directory Structure
├── deploy.sh # Main deployment script
├── Dockerfile # Application container image
├── docker-compose.yml # Local development setup
├── docker-compose.prod.yml # Production deployment
├── .dockerignore # Docker build context optimization
├── .github/workflows/ # GitHub Actions CI/CD
│ ├── ci.yml # Continuous Integration
│ ├── cd.yml # Continuous Deployment
│ └── security-scan.yml # Security scanning
├── .gitlab-ci.yml # GitLab CI configuration
├── k8s/ # Kubernetes manifests
│ ├── namespace.yaml # Namespace definition
│ ├── deployment.yaml # Application deployment
│ ├── service.yaml # Service configuration
│ ├── ingress.yaml # Ingress rules
│ ├── configmap.yaml # Configuration management
│ ├── secrets.yaml # Secret management template
│ └── hpa.yaml # Horizontal Pod Autoscaler
├── terraform/ # Infrastructure as Code
│ ├── main.tf # Main infrastructure definition
│ ├── variables.tf # Configuration variables
│ └── outputs.tf # Output values
├── ansible/ # Server configuration
│ └── playbook.yml # Ansible playbook
├── monitoring/ # Monitoring configuration
│ ├── prometheus-config.yml # Prometheus configuration
│ ├── grafana-dashboard.json # Grafana dashboard
│ └── alerting-rules.yml # Alert rules
└── logging/ # Logging configuration
└── fluentd-config.yml # Fluentd configuration
🔧 Deployment Options
Individual Component Deployment
# Deploy only infrastructure
./deploy.sh infrastructure
# Deploy only Kubernetes resources
./deploy.sh kubernetes
# Deploy only monitoring stack
./deploy.sh monitoring
# Build and push Docker images
./deploy.sh images
# Run health checks
./deploy.sh health
# Setup CI/CD
./deploy.sh cicd
Environment-Specific Deployment
# Development environment
ENVIRONMENT=development ./deploy.sh all
# Staging environment
ENVIRONMENT=staging ./deploy.sh all
# Production environment
ENVIRONMENT=production ./deploy.sh all
🐳 Docker Configuration
Local Development
# Start local development environment
docker-compose up -d
# View logs
docker-compose logs -f
# Stop environment
docker-compose down
Production Build
# Build production image
docker build -f Dockerfile -t wifi-densepose:latest .
# Multi-stage build for optimization
docker build --target production -t wifi-densepose:prod .
☸️ Kubernetes Management
Common Operations
# View application logs
kubectl logs -f deployment/wifi-densepose -n wifi-densepose
# Scale application
kubectl scale deployment wifi-densepose --replicas=5 -n wifi-densepose
# Update application
kubectl set image deployment/wifi-densepose wifi-densepose=new-image:tag -n wifi-densepose
# Rollback deployment
kubectl rollout undo deployment/wifi-densepose -n wifi-densepose
# View resource usage
kubectl top pods -n wifi-densepose
kubectl top nodes
Configuration Management
# Update ConfigMap
kubectl create configmap wifi-densepose-config \
--from-file=config/ \
--dry-run=client -o yaml | kubectl apply -f -
# Update Secrets
kubectl create secret generic wifi-densepose-secrets \
--from-literal=database-password=secret \
--dry-run=client -o yaml | kubectl apply -f -
📊 Monitoring & Observability
Prometheus Metrics
Access Prometheus at: http://localhost:9090 (via port-forward)
Key metrics to monitor:
http_requests_total- HTTP request counthttp_request_duration_seconds- Request latencywifi_densepose_data_processed_total- Data processing metricswifi_densepose_model_inference_duration_seconds- ML model performance
Grafana Dashboards
Access Grafana at: http://localhost:3000 (admin/admin)
Pre-configured dashboards:
- Application Overview
- Infrastructure Metrics
- Database Performance
- Kubernetes Cluster Status
- Security Alerts
Log Analysis
# View application logs
kubectl logs -f -l app=wifi-densepose -n wifi-densepose
# Search logs in Elasticsearch
curl -X GET "elasticsearch:9200/wifi-densepose-*/_search" \
-H 'Content-Type: application/json' \
-d '{"query": {"match": {"level": "error"}}}'
🔒 Security Best Practices
Implemented Security Measures
-
Container Security
- Non-root user execution
- Minimal base images
- Regular vulnerability scanning
- Resource limits and quotas
-
Kubernetes Security
- Network policies
- Pod security policies
- RBAC configuration
- Secret management
-
Infrastructure Security
- VPC with private subnets
- Security groups with minimal access
- IAM roles with least privilege
- Encrypted storage and transit
-
CI/CD Security
- Automated security scanning
- Dependency vulnerability checks
- Container image scanning
- Secret scanning
Security Scanning
# Run security scan
docker run --rm -v /var/run/docker.sock:/var/run/docker.sock \
aquasec/trivy image wifi-densepose:latest
# Kubernetes security scan
kubectl run --rm -i --tty kube-bench --image=aquasec/kube-bench:latest \
--restart=Never -- --version 1.20
🔄 CI/CD Pipelines
GitHub Actions
Workflows are triggered on:
- CI Pipeline (
ci.yml): Pull requests and pushes to main - CD Pipeline (
cd.yml): Tags and main branch pushes - Security Scan (
security-scan.yml): Daily scheduled runs
GitLab CI
Configure GitLab CI variables:
AWS_ACCESS_KEY_IDAWS_SECRET_ACCESS_KEYKUBE_CONFIGECR_REPOSITORY
🏗️ Infrastructure as Code
Terraform Configuration
# Initialize Terraform
cd terraform
terraform init
# Plan deployment
terraform plan -var="environment=production"
# Apply changes
terraform apply
# Destroy infrastructure
terraform destroy
Ansible Configuration
# Run Ansible playbook
ansible-playbook -i inventory ansible/playbook.yml
🚨 Troubleshooting
Common Issues
-
Pod Startup Issues
kubectl describe pod <pod-name> -n wifi-densepose kubectl logs <pod-name> -n wifi-densepose -
Service Discovery Issues
kubectl get endpoints -n wifi-densepose kubectl get services -n wifi-densepose -
Ingress Issues
kubectl describe ingress wifi-densepose-ingress -n wifi-densepose kubectl get events -n wifi-densepose -
Resource Issues
kubectl top pods -n wifi-densepose kubectl describe nodes
Health Checks
# Application health
curl http://<ingress-url>/health
# Database connectivity
kubectl exec -it <pod-name> -n wifi-densepose -- pg_isready
# Redis connectivity
kubectl exec -it <pod-name> -n wifi-densepose -- redis-cli ping
📈 Scaling & Performance
Horizontal Pod Autoscaler
# View HPA status
kubectl get hpa -n wifi-densepose
# Update HPA configuration
kubectl patch hpa wifi-densepose-hpa -n wifi-densepose -p '{"spec":{"maxReplicas":10}}'
Cluster Autoscaler
# View cluster autoscaler logs
kubectl logs -f deployment/cluster-autoscaler -n kube-system
Performance Tuning
-
Resource Requests/Limits
- CPU: Request 100m, Limit 500m
- Memory: Request 256Mi, Limit 512Mi
-
Database Optimization
- Connection pooling
- Query optimization
- Index management
-
Caching Strategy
- Redis for session storage
- Application-level caching
- CDN for static assets
🔄 Backup & Recovery
Database Backup
# Create database backup
kubectl exec -it postgres-pod -n wifi-densepose -- \
pg_dump -U postgres wifi_densepose > backup.sql
# Restore database
kubectl exec -i postgres-pod -n wifi-densepose -- \
psql -U postgres wifi_densepose < backup.sql
Configuration Backup
# Backup Kubernetes resources
kubectl get all -n wifi-densepose -o yaml > k8s-backup.yaml
# Backup ConfigMaps and Secrets
kubectl get configmaps,secrets -n wifi-densepose -o yaml > config-backup.yaml
📞 Support & Maintenance
Regular Maintenance Tasks
-
Weekly
- Review monitoring alerts
- Check resource utilization
- Update dependencies
-
Monthly
- Security patch updates
- Performance optimization
- Backup verification
-
Quarterly
- Disaster recovery testing
- Security audit
- Capacity planning
Contact Information
- DevOps Team: devops@wifi-densepose.com
- On-Call: +1-555-0123
- Documentation: https://docs.wifi-densepose.com
- Status Page: https://status.wifi-densepose.com