Skip to main content

Reference Implementation

This example creates a local version of the CNOE reference implementation.

Prerequisites

Ensure you have the following tools installed on your computer.

Required

  • idpbuilder: version 0.3.0 or later
  • kubectl: version 1.27 or later
  • Your computer should have at least 6 GB RAM allocated to Docker. If you are on Docker Desktop, see this guide.

Optional

  • AWS credentials: Access Key and secret Key. If you want to create AWS resources in one of examples below.

Installation

NOTE:

  • If you'd like to run this in your web browser through Codespaces, please follow the instructions here to install instead.

  • This example assumes that you run the reference implementation with the default port configguration of 8443 for the idpBuilder. If you happen to configure a different host or port for the idpBuilder, the manifests in the reference example need to be updated and be configured with the new host and port. you can use the replace.sh to change the port as desired prior to applying the manifest as instructed in the command above.

Run the following command from the root of this repository.

idpbuilder create --use-path-routing \
--package-dir https://github.com/cnoe-io/stacks//ref-implementation

This will take ~6 minutes for everything to come up. To track the progress, you can go to the ArgoCD UI.

What was installed?

  1. Argo Workflows to enable workflow orchestrations.
  2. Backstage as the UI for software catalog and templating. Source is available here.
  3. Crossplane, AWS providers, and basic compositions for deploying cloud related resources (needs your credentials for this to work)
  4. External Secrets to generate secrets and coordinate secrets between applications.
  5. Keycloak as the identity provider for applications.
  6. Spark Operator to demonstrate an example Spark workload through Backstage.

If you don't want to install a package above, you can remove the ArgoCD Application file corresponding to the package you want to remove. For example, if you want to remove Spark Operator, you can delete this file.

# remove spark operator from this installation.
rm examples/ref-implementation/spark-operator.yaml

The only package that cannot be removed this way is Keycloak because other packages rely on it.

Accessing UIs

Using it

For this example, we will walk through a few demonstrations. Once applications are ready, go to the backstage URL.

Click on the Sign-In button, you will be asked to log into the Keycloak instance. There are two users set up in this configuration, and their password can be retrieved with the following command:

idpbuilder get secrets

Use the username user1 and the password value given by USER_PASSWORD field to login to the backstage instance. user1 is an admin user who has access to everything in the cluster, while user2 is a regular user with limited access. Both users use the same password retrieved above.

If you want to create a new user or change existing users:

  1. Go to the Keycloak UI. Login with the username cnoe-admin. Password is the KEYCLOAK_ADMIN_PASSWORD field from the command above.
  2. Select cnoe from the realms drop down menu.
  3. Select users tab.

Basic Deployment

Let's start by deploying a simple application to the cluster through Backstage.

Click on the Create... button on the left, then select the Create a Basic Deployment template.

img.png

In the next screen, type demo for the name field, then click Review, then Create. Once steps run, click the Open In Catalog button to go to the entity page.

img.png

In the demo entity page, you will notice a ArgoCD overview card associated with this entity. You can click on the ArgoCD Application name to see more details.

img.png

What just happened?

  1. Backstage created a git repository, then pushed templated contents to it.
  2. Backstage created an ArgoCD Application and pointed it to the git repository.
  3. Backstage registered the application as a component in Backstage.
  4. ArgoCD deployed the manifests stored in the repo to the cluster.
  5. Backstage retrieved application health from ArgoCD API, then displayed it.

image.png

Argo Workflows and Spark Operator

In this example, we will deploy a simple Apache Spark job through Argo Workflows.

Click on the Create... button on the left, then select the Basic Argo Workflow with a Spark Job template.

img.png

Type demo2 for the name field, then click create. You will notice that the Backstage templating steps are very similar to the basic example above. Click on the Open In Catalog button to go to the entity page.

img.png

Deployment processes are the same as the first example. Instead of deploying a pod, we deployed a workflow to create a Spark job.

In the entity page, there is a card for Argo Workflows, and it should say running or succeeded. You can click the name in the card to go to the Argo Workflows UI to view more details about this workflow run. When prompted to log in, click the login button under single sign on. Argo Workflows is configured to use SSO with Keycloak allowing you to login with the same credentials as Backstage login.

Note that Argo Workflows are not usually deployed this way. This is just an example to show you how you can integrate workflows, backstage, and spark.

Back in the entity page, you can view more details about Spark jobs by navigating to the Spark tab.

Application with cloud resources.

Similar to the above, we can deploy an application with cloud resources using Backstage templates. In this example, we will create an application with a S3 Bucket.

Choose a template named App with S3 bucket, type demo3 as the name, then choose a region to create this bucket in.

Once you click the create button, you will have a very similar setup as the basic example. The only difference is we now have a resource for a S3 Bucket which is managed by Crossplane.

Note that Bucket is not created because Crossplane doesn't have necessary credentials to do so. If you'd like it to actually create a bucket, update the credentials secret file, then run idpbuilder create --package-dir examples/ref-implementation.

In this example, we used Crossplane to provision resources, but you can use other cloud resource management tools such as Terraform instead. Regardless of your tool choice, concepts are the same. We use Backstage as the templating mechanism and UI for users, then use Kubernetes API with GitOps to deploy resources.

Notes

  • In these examples, we have used the pattern of creating a new repository for every app, then having ArgoCD deploy it. This is done for convenience and demonstration purposes only. There are alternative actions that you can use. For example, you can create a PR to an existing repository, create a repository but not deploy them yet, etc.

  • If Backstage's pipelining and templating mechanisms is too simple, you can use more advanced workflow engines like Tekton or Argo Workflows. You can invoke them in Backstage templates, then track progress similar to how it was described above.