- Deploying an EKS cluster across 3 environments( dev, test, and prod ), with a Continuous Deployment pipeline triggered upon a commit to the repository that holds the pipeline configuration.
- Configuring GitOps tooling (ArgoCD addon) to support multi-team and multi-repositories configuration, in a way that restricts each application to be deployed only into the team namespace, by using ArgoCD projects
For GitOps, the blueprint bootstrap the ArgoCD addon and points to the EKS Blueprints Workload sample repository. The pattern uses the ECSDEMO applications as sample applications to demonstrate how to setup a GitOps configuration with multiple teams and multiple applications. The pattern include the following configurations in terms io:
- Application team - it defines 3 application teams that corresponds with the 3 sample applications used
- ArgoCD bootstrap - the pattern configure the ArgoCD addon to point to the workload repository of the EKS Blueprints samples
- ArgoCD projects - as part of the ArgoCD addon bootstrap, the pattern generate an ArgoCD project for each application team. The ArgoCD are used in order to restrict the deployment of an application to a specific target namespace
You can find the App of Apps configuration for this pattern in the workload repository under the folder multi-repo
.
-
Fork this repository to your GitHub organisation/user
-
Clone your forked repository
-
Install the AWS CDK Toolkit globally on your machine using
npm install -g aws-cdk
-
github-ssh-key
- must contain GitHub SSH private key as a JSON structure containing fieldssshPrivateKey
andurl
. This will be used by ArgoCD addon to authenticate against ay GitHub repository (private or public). The secret is expected to be defined in the region where the pipeline will be deployed to. For more information on SSH credentials setup see ArgoCD Secrets Support. -
github-token
secret must be stored in AWS Secrets Manager for the GitHub pipeline. For more information on how to set it up, please refer to the docs. The GitHub Personal Access Token should have these scopes:- repo - to read the repository
- admin:repo_hook - if you plan to use webhooks (enabled by default)
-
Create the relevant users that will be used by the different teams
aws iam create-user --user-name frontend-user aws iam create-user --user-name nodejs-user aws iam create-user --user-name crystal-user aws iam create-user --user-name platform-user
-
Install project dependencies by running
npm install
in the main folder of this cloned repository -
In case you haven't done this before, bootstrap your AWS Account for AWS CDK use using:
cdk bootstrap
-
Modify the code in your forked repo to point to your GitHub username/organisation. This is needed because the AWS CodePipeline that will be automatically created will be triggered upon commits that are made in your forked repo. Open the pattenrn file source code and look for the declared const of
gitOwner
. Change it to your GitHub username. -
OPTIONAL - As mentioned above, this pattern uses another repository for GitOps. This is the ArgoCD App of Apps configuration that resides in the aws-samples organisation. If you would like to modify the App of Apps configuration and customise it to your needs, then use the following instructions:
-
Fork the App of Apps workloads repo to your GitHub username
-
Modify the pattern code with the following changes:
-
Change the consts of
devArgoAddonConfig
,testArgoAddonConfig
, andprodArgoAddonConfig
to point to your GitHub username -
In the
createArgoAddonConfig
function, look for the[email protected]:aws-samples/eks-blueprints-workloads.git
code under thesourceRepos
configurations, and add another reference to your forked workload repository
-
-
Once all pre-requisites are set you are ready to deploy the pipeline. Run the following command from the root of this repository to deploy the pipeline stack:
make pattern pipeline-multienv-gitops deploy eks-blueprint-pipeline-stack
Now you can go to AWS CodePipeline console, and see how it was automatically created to deploy multiple Amazon EKS clusters to different environments.
-
In case your pipeline fails on the first run, it's because that the AWS CodeBuild step needs elevated permissions at build time. This is described in the official docs. To resolve this, locate
AccessDeniedException
in the CodeBuild build logs, and attach the following inline policy to it:{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "sts:AssumeRole", "secretsmanager:GetSecretValue", "secretsmanager:DescribeSecret", "cloudformation:*" ], "Resource": "*" } ] }
The above inconvenience has been fixed in the Blueprints framework as well as in the pattern, so please report such cases if you encounter them. This item is left here for reference in case customers modify the pattern to require additional permissions at build time.
- This pattern consumes multiple Elastic IP addresses, because 3 VPCs with 3 subnets are created by this pattern. Make sure your account limit for EIP are increased to support additional 9 EIPs (1 per Subnets)