This repository captures the talk and demonstration presented at {x,y,z}
. The aim is to cover the current Kubernetes ecosystem, which enables an entirely Kubernetes based CI and CD solution to be implemented. We also discuss the benefits of this and why you should care.
A deeper dive into the workflows and core concepts can be found in the blog series as follows:
The below images depicts what could be described as the core "platform" or substrate that we would build our pipelining/delivery tooling on top of. With the key components being:
- Kubernetes - The core technology from which an ecosystem is built around to deliver peripheral capability, as well as providing a robust interface for building platform abstractions on.
- Ingress - Some kind of ingress capability. This could be a simple
Service
, andIngress
or more sophisticatedService Mesh
capability. - Observability - The tools to get visibility into the performance and success of application delivery
- Security - Components which control and validate the state of our cluster and services running inside.
In this repository we will capture a number of end-to-end "stacks" or grouping of Kubernetes based technologies, which when used together can deliver a production grade hosting and delivery platform.
A combination of tooling which enables and end-to-end continuos delivery pipeline. Termed "GStack", because this selection has mostly originated from the GoogleCloudPlatform or other teams within Google developing tooling in open source.
The Tekton Pipelines project provides Kubernetes-style resources for declaring CI/CD-style pipelines. Superseding Knative build, tekton provides more sophisticated capability and a focused community project independent of Knative.
Knative components build on top of Kubernetes, abstracting away the complex details and enabling developers to focus on what matters. Built by codifying the best practices shared by successful real-world implementations, Knative solves the "boring but difficult" parts of building, deploying, and managing cloud native services so you don't have to.
For the management of Kubernetes resources, kustomize provides a template-free mechanism for bundling and mutating resources based off environment and other contexts. Effectively providing a similar capability to templating tooling such as Helm, with less cognitive complexity or abstracted templating.
Kaniko enables the build of OCI compliant containers without using the Docker daemon. The Kaniko executor also runs in user-space, avoiding privileged escalation, normally required for a Docker daemon based build. As Kaniko is just a binary tool, we can run it within a Kubernetes cluster with ease.
Istio is a control-plane orcestration framework for Envoy, this forms what is commonly referred to as a "Service Mesh". Providing a mechanism for transparently enabled mTLS, service resiliency, observability, and enhanced authn/authz controls on a per-microservice basis.
GKE (Google Kubernetes Engine) provides our Kubernetes cluster for remote development and testing, as well as production deployments. One of the cool things demonstrated in this repository in a nice feature of effectively "pausing" and "resuming" your cluster, where during the paused state, you don't pay for the compute nodes!
Over time it would be great to extend the range of pipelines available to include other tooling to enable a robust feature comparison and understanding when evaluating trace-offs and technology choice best-fit for the given environment. Some extra features to add would be:
- ArgoCD based CI/CD pipelines, including canary releases and rollbacks
- More pathways for demonstrating the istio capabilities around observability, service resiliency and security
- More sophisticated full-stack applications including but not limited to:
- message queue integration (kafka, NATS)
- redis, mongoDB and other storage solutions
- additional protocols such as gRPC, Thrift et al.
- Add additional workflows as the feature sets are extended for Tekton, these include:
- pipeline conditionals
- extended git-triggering
- utilise comments for git-ops workflows
- implement container scanning and vulnerability reporting
- implement different image builders - buildKit, buildah et al. - comparing effectiveness
- implement binary authentication workflow for cluster admission validation
- implement Open Policy Agent based workflows, enforcing pipeline conformance and quality controls both for general use and specifically for kubernetes related admission
- support multi-cloud environments