The GCP deployment starts at the shared environment bootstrap layer. The items below must already be in place before you apply it.Documentation Index
Fetch the complete documentation index at: https://docs.aperium.apps.hillspire.com/llms.txt
Use this file to discover all available pages before exploring further.
GCP and identity
- A GCP project for the shared apps environment.
- A Terraform Cloud / HCP Terraform organization and workspaces.
- Credentials that can run Terraform against GCP.
- Authority to delegate the parent DNS zone to the managed subdomain returned by Terraform.
Source control and ArgoCD
- A Git repository that holds your extracted deployment layout.
- A GitHub App that ArgoCD can use for repository access. You will need:
github_app_idgithub_app_installation_idgithub_app_private_key(loaded as a sensitive Terraform variable in the shared env workspace)
First values to replace
Before applying the deployment as a live repo, change these values:Repo URL placeholder
Replace the placeholder
https://github.com/YOUR_ORG/YOUR_REPO.git everywhere it appears. ArgoCD app manifests and bootstrap Terraform files already point at this placeholder.Terraform variables
Start from
envs/aperium-apps-prod/tf/vars.auto.tfvars.example and apps/aperium/envs/prod/tf/vars.auto.tfvars.example. Compare with vars.reference.tfvars in each directory for the extracted reference values.GCP, TFC, and DNS placeholders
Throughout values files, replace at minimum:
YOUR_GCP_PROJECT_IDYOUR_GCP_REGIONYOUR_GCP_ZONEYOUR_DOMAINYOUR_CLUSTER_SECRET_STORE_NAMEYOUR_TFC_ORGYOUR_SHARED_ENV_WORKSPACEYOUR_APP_WORKSPACEYOUR_PREFECT_CLOUDSQL_INSTANCE
Secret payloads
Load the payloads described in Secrets. Terraform creates the Secret Manager containers; in most cases you still need to populate the values yourself.
Prefect prerequisite checklist
Before syncing theprefect application, verify that all of the following are true:
YOUR_PREFECT_CLOUDSQL_INSTANCEis set and reachable from the cluster.- The Prefect runtime GSA exists, for example
prefect@YOUR_GCP_PROJECT_ID.iam.gserviceaccount.com. prefect-admin-credentialsexists in the external secret store and produces a Kubernetes secret that containsauth-string.prefect-server.yamlandprefect-worker-aperium.yamlvalues have been templated for your environment.- You have a bootstrap path to create the
aperium-poolwork pool after the Prefect server is healthy.
Conventions to remember
vars.reference.tfvarsfiles are reference snapshots. They are not auto-loaded.vars.auto.tfvars.examplefiles are the starting point for real usage.- The local ArgoCD app manifests are wired to your extracted deployment repo, not back to any upstream source repo.
- Many live prod-specific values have been replaced with placeholders, but the deployment structure is preserved.