Show HN: GitOps Template for Kubernetes
86 points| pmig | 1 year ago |github.com
Nowadays, it is best practice to use Git as a revision control system for your Kubernetes configurations. Update automation workflows like Renovate or Dependabot can create pull requests for new versions of Docker images and Helm charts, but ensuring these new package versions work is still a manual task. By using the central (or a private) Glasskube repository (https://github.com/glasskube/packages) together with our Renovate integration (https://docs.renovatebot.com/modules/manager/glasskube/), you can ensure that new package versions will run through our Minikube-based CI workflows before they get published—similar to how the Homebrew core tap works. We’ve just introduced readiness checks for manifest-based deployments and utilize the flux-helm-controller to wait for a Helm release to succeed.
Dependencies are resolved by our package controller. These dependencies can either be cluster-scoped (installed in the recommended namespace, e.g., operators wird CRDs) or namespace-scoped components of a package (e.g., a database or Redis cache). In such cases, we will prefix resources with the dependent package name to ensure multiple packages can use the same dependencies without naming conflicts (we use Kustomize on a virtual filesystem for this).
Glasskube packages can currently be Helm charts (from an OCI or Helm repository) or manifests, which are mostly built using Kustomize’s overlay approach.
Since neither the overlay approach (using Kustomize) nor Helm’s limited templating functionality will help us and other Kubernetes users scale to more complex packages, we are considering creating a more programmatic approach to package creation, similar to Timoni. Currently, KCL is our frontrunner (https://github.com/glasskube/glasskube/discussions/1018), as it already integrates well with the Kubernetes ecosystem.
We would appreciate if you give our GitOps template a try. It also works work existing Kubernetes clusters if just want to use GitOps for some applications. Just make sure that the argocd and glasskube-system namespaces are not yet in use. See: https://github.com/glasskube/gitops-template/
[+] [-] vanillax|1 year ago|reply
I assume this statement is for running this? glasskube bootstrap git --url <your-repo> --username <org-or-username> --token <your-token>
I think I'd like to understand what the argo cd / git ops template is and how its different than argocd autopilot. Maybe some pictures of how argo is deploying apps. Etc.
[+] [-] linkdd|1 year ago|reply
The `glasskube install` command does a bunch of stuff that ends up as resources in your Kubernetes cluster, that are then interpreted by the Glasskube operator.
The "Gitops template" make use of ArgoCD and Git to do what `glasskube install` would have done.
[+] [-] pmig|1 year ago|reply
Our template already includes update automations with the renovate integration and easier integration of third party applications.
[+] [-] pmig|1 year ago|reply
Our bootstrap git sub command is similar to argo cd autopliot. I give it a try right now to be able to better state differences and follow up on this question.
[+] [-] raffraffraff|1 year ago|reply
See, there's a bunch of stuff that I deploy using terraform (VPC, DNS, EKS) and a bunch of stuff that I deploy with FluxCD. But in between, there's some awkward stuff like the monitoring stack that requires cloudy things and Kube things, and they're tightly coupled.
Right now I end up going with terraform and the awful helm provider. Many of these helm charts have sub-charts, nested values etc, but thankfully the monitoring stack doesn't change that much. It's still not ideal but it works as a one-shot deployment that sets up buckets, policies, IAM roles for service accounts, more policies for the roles, and finally the helm charts with values from the outputs of those clouds resources.
[+] [-] pmig|1 year ago|reply
I recommend giving Glasskube a try with Minikube locally and join our Discord to interact with the community.
[+] [-] momothereal|1 year ago|reply
[+] [-] slederer|1 year ago|reply
a.) in Kubernetes setups that operate the same software stack, with the ongoing updates and regular releases.
b.) in Kubernetes setups that frequently install new software/diverse software
[+] [-] pmig|1 year ago|reply
If your setup become more complex and changes often (b) a I would recommend breaking it up into smaller pieces.
For both scenarios it makes sense to use git to keep track of revision and previous states of your Kubernetes cluster and incorporate review processes with pull requests.
[+] [-] cianuro_|1 year ago|reply
[+] [-] pmig|1 year ago|reply
[+] [-] linkdd|1 year ago|reply
Sure, you could make your own .deb, your own repository, and manage dependencies yourself. But do you really want to?
[+] [-] esafak|1 year ago|reply
[+] [-] throwawaynorway|1 year ago|reply
How does it compare with OpenShifts operator hub?
[+] [-] vanillax|1 year ago|reply
[+] [-] iwwr|1 year ago|reply
[+] [-] pmig|1 year ago|reply
We have abstracted all packages as custom resources and have a controller that reconciles these resources to (1) enable drift detection. Additionally, we use admission controllers (2) to validate dependencies and package configurations before they are applied to the cluster, while also working with custom resources to store and update the status of installed packages.
[+] [-] rajishx|1 year ago|reply
is glasskube a reboot of jenkins-x ?
[+] [-] pmig|1 year ago|reply
[+] [-] novolunt|1 year ago|reply
[deleted]