April 7th, 2021
Deploy Custom Actions to Rasa X Using Gitlab DevOps Platform
Vincent Warmerdam
Update: A lot of things have changed since this post was written. Rasa X, the freemium companion tool to Rasa Open Source, is no longer supported or maintained, and we are currently focused on the development of the Rasa Enterprise platform. To learn more about this, you can check out this blog post
Virtual assistants do more than just carry on conversations. They can send emails, make updates to a calendar, or call an API endpoint. Essentially, they can do actions that add significant value and convenience to the user experience.
In assistants built with Rasa, this type of functionality is executed by custom code called custom actions. As with any code you run in production, you'll need to think about how you want to deploy updates to custom actions. In this blog post, we'll show you how to set up GitLab to deploy custom action Docker containers to your Kubernetes cluster. If we follow good DevOps practices we can greatly speed up the development and quality of our virtual assistants.
Deployment high-level overview
The typical workflow for deploying a new version of custom actions is outlined below.
Every change to your custom actions code will require a new container image to be built and pulled by Rasa X. Gitlab CI/CD can save you from doing a lot of manual work and automate steps like the ones described in the workflow above. Let's see how to do it.
Every change to your custom actions code will require a new container image to be built and pulled by Rasa X. Gitlab CI/CD can save you from doing a lot of manual work and automate steps like the ones described in the workflow above. Let's see how to do it.
Using Rasa with Gitlab DevOps Platform
Let's create a pipeline that will automate manual steps.
If you are a Gitlab user you are probably familiar with .gitlab-ci.yml file and its CI/CD capabilities. Every time you commit a change to your customs actions code you want Gitlab to run a script that will build and update your docker containers.
Let's breakdown the CI/CD pipeline by describing the gitlab-ci.yml file so you can use it and customize it to your needs.
Variables
We make use of environment variables created in Gitlab at the moment of running the Jobs to define our actions Docker image.
variables:
ACTIONS_CONTAINER_IMAGE: $CI_REGISTRY_IMAGE/$CI_COMMIT_REF_SLUG
TAG: $CI_COMMIT_SHA
K8S_SECRET: secret-gitlab-registry
The snippet above does the following:
- It defines the name of the Docker Image for custom actions using environment variables $CI_REGISTRY_IMAGE/$CI_COMMIT_REF_SLUG. This will make the name of the Docker image different for every commit
- It creates a secret used to pull the Rasa Action Image from the Gitlab Private Registry to the Google Kubernetes Cluster.
Stages
We have two main stages in our pipeline, build and deploy:
stages:
- build
- deploy
Every time there is a new commit with changes to our custom actions code, or when we decide to run the CI/CD Pipeline it will:
- Build: Here, we automate the building of the Docker image using the variables defined above, and the Dockerfile. We also tag the image and push it to the GitLab container registry.
- Deploy: Here we log-in to Kubernetes Engine on Google Cloud and deploy the newly created Actions image to Rasa X.
Let's see it in more detail:
Build:
build-actions-image:
image: docker:19.03.1
services:
- docker:dind
stage: build
script:
- docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
- docker build -t $ACTIONS_CONTAINER_IMAGE:$TAG -f Dockerfile .
- docker push $ACTIONS_CONTAINER_IMAGE:$TAG
The job build-actions-image executed on the build stage takes advantage of the CI/CD variables that are part of the environment where the pipelines run. It automates the usage of Docker commands to build the Actions image by reading its corresponding Dockerfile. The output of this stage is a new Custom Actions image per every commit with code changes.
Deploy:
deploy-custom-action-x:
stage: deploy
image: crileroro/gcloud-kubectl-helm
variables:
GCP_PROJECT: gke-project-302411
GCP_REGION: europe-west1
CLUSTER_NAME: gke-python-demo
NAMESPACE_RASA: rasa-environment
before_script:
- gcloud auth activate-service-account --key-file $SERVICE_ACCOUNT_GCP
- gcloud config set project $GCP_PROJECT
- gcloud config set compute/region $GCP_REGION
- gcloud container clusters get-credentials $CLUSTER_NAME
script:
- kubectl create ns $NAMESPACE_RASA --dry-run=client -o yaml | kubectl apply -f -
- kubectl create secret docker-registry $K8S_SECRET
--docker-server=$CI_REGISTRY
--docker-username=$CI_DEPLOY_USER
--docker-password=$CI_DEPLOY_PASSWORD
--namespace $NAMESPACE_RASA
-o yaml --dry-run=client | kubectl apply -f -
- helm repo add rasa-x https://rasahq.github.io/rasa-x-helm
- helm upgrade -i --reuse-values
--namespace $NAMESPACE_RASA
--set app.name=$ACTIONS_CONTAINER_IMAGE
--set app.tag=$TAG
--set images.imagePullSecrets[0].name=$K8S_SECRET rasa-x rasa-x/rasa-x
Notice the variables in before_script, these ones are needed to authenticate to GCP where we have our Kubernetes cluster. This step is optional and could be skipped in cases where you have Gitlab pre-integrated with your Kubernetes cluster running on Google Cloud.
The main and most interesting part of the script is:
script:
- kubectl create ns $NAMESPACE_RASA --dry-run=client -o yaml | kubectl apply -f -
- kubectl create secret docker-registry $K8S_SECRET
--docker-server=$CI_REGISTRY
--docker-username=$CI_DEPLOY_USER
--docker-password=$CI_DEPLOY_PASSWORD
--namespace $NAMESPACE_RASA
-o yaml --dry-run=client | kubectl apply -f -
- helm repo add rasa-x https://rasahq.github.io/rasa-x-helm
- helm upgrade -i --reuse-values
--namespace $NAMESPACE_RASA
--set app.name=$ACTIONS_CONTAINER_IMAGE
--set app.tag=$TAG
--set images.imagePullSecrets[0].name=$K8S_SECRET rasa-x rasa-x/rasa-x
We start by creating the namespace for our custom actions code, and if it already exists, then we proceed to apply Kubernetes commands using kubectl and helm.
- helm repo add rasa-x https://rasahq.github.io/rasa-x-helm
- helm upgrade -i --reuse-values
--namespace $NAMESPACE_RASA
--set app.name=$ACTIONS_CONTAINER_IMAGE
--set app.tag=$TAG
--set images.imagePullSecrets[0].name=$K8S_SECRET rasa-x rasa-x/rasa-x
The snippet above adds a rasa-x Helm chart and upgrades or changes the values corresponding to the new Custom Action Image by assigning to it the $ACTIONS_CONTAINER_IMAGE created in the build stage.
Note that the pipeline described above focuses only on creating and deploying the ACTIONS_CONTAINER_IMAGE. It could be extended by adding more stages, for example, code quality, security testing, and unit testing among others.
Summary
Using the GitLab DevOps Platform together with Rasa X can make it easier for stakeholders to deliver a virtual assistant by automating potentially time-consuming, error-prone steps. In this case, we've shown how you can build Rasa custom action servers and deploy them to Kubernetes.
Pushing new custom action containers to Kubernetes only scratches the surface of what you can automate with GitLab. You could also add steps for code quality, security audits and unit tests. The main goal is to automate the manual parts of deployment so that you can focus on what is important. In the case of Rasa X, that means that more time can be spent learning from your users and making a better assistant in the process.
Happy coding!