Kubernetes - CI/CD with Tekton & Argo CD
With this post I’m going to show how a modern and cloud native CI/CD could be implemented within a Kubernetes environment. I’ll use two different tools:
- Tekton: to implement CI stages
- Argo CD: to implement CD stages (Gitops)
This post doesn’t try to be a master class about Tekton or Argo CD. It is only intended to set an starting point to explore both tools using them directly in a cluster.
You can check and clone all the code associated to this article in my Github
Tekton is an Open Source framework to build CI/CD pipelines directly over a Kuberentes cluster. It was originally developed at Google and was known as Knative pipelines
Tekton defines a series of Kubernetes custom resources (CRDs) extending the Kubernetes API. Sorry, what that means? Ok, if we go to the Kubernetes official page, we can read the following definition:
Kubernetes objects are persistent entities in the Kubernetes system. Kubernetes uses these entities to represent the state of your cluster
So, examples of Kubernetes objects are: Pod, Service, Deployment, etc…Tekton builds its own objects to Kubernetes and deploys them into the cluster. If you feel curious about custom objects, here the official documentation is and you can also check the Tekton Github to see how these objects are. For instance, Pipeline or Task
Argo CD is a delivery tool (CD) built for Kubernetes, based on GitOps movement. So, what that means? Basically that Argo CD works synchronizing “Kubernetes files” between a git repository and a Kubernetes cluster. That is, if there is a change in a YAML file, Argo CD will detect that there are changes and will try to apply those changes in the cluster.
Argo CD, like Tekton, also creates its own Kubernetes custom resources that are installed into the Kubernetes cluster.
Are they ready to be adopted?
At the moment in which this post is being written, both tools are very “young”. For instance, if we check the last releases we can see:
- Argo CD: 1.8.7
- Tekton: 0.21.0
I also like to check ThoughtWorks Technology Radar…If we check them in the radar, will see:
So, we are facing two young platforms and that may imply that there are not many examples, documentation or even maturity failures, but it’s true that both tools are called to be the standard cloud native CI/CD according to the principal cloud players.
For instance, Tekton:
- Google Cloud: https://cloud.google.com/tekton?hl=es
- Red Hat, Openshift Pipelines based on Tekton: (https://www.openshift.com/learn/topics/pipelines)
- IBM: https://www.ibm.com/cloud/blog/ibm-cloud-continuous-delivery-tekton-pipelines-tools-and-resources
- Tanzu: https://tanzu.vmware.com/developer/guides/ci-cd/tekton-what-is/
- Jenkins X: pipelines based on Tekton (https://jenkins-x.io/es/docs/concepts/jenkins-x-pipelines)
And, talking about Argo CD:
- Red Hat: https://developers.redhat.com/blog/2020/08/17/openshift-joins-the-argo-cd-community-kubecon-europe-2020/
- IBM: https://www.ibm.com/cloud/blog/simplify-and-automate-deployments-using-gitops-with-ibm-multicloud-manager-3-1-2
¿CI/CD Cloud Native?
We’re talking a lot about “cloud native” associated to Tekton y Argo CD but, what do we mean by that? As I said before, both Tekton and Argo CD are installed in the Kubernetes cluster and they are based on extending Kubernetes API. Let’s see it in detail:
Scalability: both tools are installed in the cluster and because of that, they work creating pods to perform tasks. Pods are the way in which applications can scale horizontally…so, scalabilly are guaranteed
Portabillity: both tools are based on extending Kubernetes API, creating new Kubernetes objects. These objects can be installed in every Kubernetes cluster.
Reusability: the different elements within the CI/CD process use the Kubernetes objects defined by Tekton and Argo CD in the same way that you work with deployments o service objects. That means that stages, tasks or applications are YAML files that you can store in some repository and use in every cluster with Tekton and Argo CD installed. For instance, it’s possible to use artifacts from Tekton catalog or even, it’s possible to use the Openshift catalog or building a custom one.
What are we going to build?
We are going to build a simple CI/CD process, on Kubernetes, with these stages:
In this pipeline, we can see two different parts:
- CI part, implemented by Tekton and ending with a stage in which a push to a repository is done.
- Checkout: in this stage, source code repository is cloned
- Build & Test: in this stage, we use Maven to build and execute test
- Code Analisys: code is evaluated by Sonarqube
- Publish: if everything is ok, artifact is published to Nexus
- Build image: in this stage, we build the image and publish to local registry
- Push to GitOps repo: this is the final CI stage, in which Kubernetes descriptors are cloned from the GitOps repository, they are modified in order to insert commit info and then, a push action is performed to upload changes to GitOps repository
- CD part, implemented by Argo CD, in which Argo CD detects that the repository has changed and perform the sync action against the Kubernetes cluster.
Does it mean that we can not implement the whole process using Tekton? No, it doesn’t. It’s possible to implement the whole process using Tekton but in this case, I want to show the Gitops concept.
To execute this PoC it’s you need to have:
- A Kubernetes cluster. If you don’t have one, you can create a K3D one using the script create-local-cluster.sh but, obviously, you need to have installed K3D
I’ve used a single repo to manage the different projects. The repository is structured in this way:
- poc: this is the main folder. Here, you can find three scripts:
- create-local-cluster.sh: this script creates a local Kubernetes cluster based on K3D.
- delete-local-cluster.sh: this script removes the local cluster
- setup-poc.sh: this script installs and configure everything neccessary in the cluster (Tekton, Argo CD, Nexus, Sonar, etc…)
- resources: this the folder used to manage the two repositories (code and gitops):
- sources-repo: source code of the service used in this poc to test the CI/CD process
- gitops_repo: repository where Kubernetes files associated to the service to be deployed are
Ok, how can I execute it?
The first step is to fork the repo https://github.com/jaruizes/tekton-argocd-poc because:
- You have to modify some files to add a token
- You need your own repo to perform Gitops operations
2) Add Github token
It’s necessary to add a Github Personal Access Token to Tekton can perform git operations, like push to gitops repo. If you need help to create this token, you can follow these instructions: https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token
** The token needs to be allowed with “repo” grants.
Once the token is created, you have to copy it in these files (## INSERT TOKEN HERE:
apiVersion: v1 kind: Secret metadata: annotations: managed-by: argocd.argoproj.io name: repo-gitops namespace: argocd type: Opaque stringData: username: tekton password: ## INSERT TOKEN HERE
apiVersion: v1 kind: Secret metadata: name: git-auth namespace: tekton-poc annotations: tekton.dev/git-0: https://github.com type: kubernetes.io/basic-auth stringData: username: tekton password: ## INSERT TOKEN HERE
** In fact, for Argo CD, create secret with the token isn’t necessary because the gitops repository in Github has public access but I think it’s interesting to keep it in order to know what you need to do in case the repository be private.
3) Create Kubernetes cluster (optional)
This step is optional. If you already have a cluster, perfect, but if not, you can create a local one based on K3D, just executing the script poc/create-local-cluster.sh. This script creates the local cluster and configure the private image registry to manage Docker images.
This step is the most important because installs and configures everything necessary in the cluster:
- Installs Tekton y Argo CD, including secrets to access to Git repo
- Creates the volume and claim necessary to execute pipelines
- Deploys Tekton dashboard
- Deploys Sonarqube
- Deploys Nexus and configure an standard instance
- Creates the configmap associated to Maven settings.xml, ready to publish artifacts in Nexus (with user and password)
- Installs Tekton tasks and pipelines
- Git-clone (from Tekton Hub)
- Maven (from Tekton Hub)
- Buildah (from Tekton Hub)
- Prepare Image (custom task: poc/conf/tekton/tasks/prepare-image-task.yaml)
- Push to GitOps repo (custom task: poc/conf/tekton/tasks/push-to-gitops-repo.yaml)
- Installs Argo CD application, configured to check changes in gitops repository (resources/gitops_repo)
- Update Argo CD password
** Be patient. The process takes some minutes.
** This message isn’t an error. It just waiting for to Nexus admin password created when the container starts. When the Nexus container starts, at some moment, it creates a file containing the default password.
Configuring settings.xml (MAVEN) to work with Nexus cat: /nexus-data/admin.password: No such file or directory command terminated with exit code 1
5) Explore and play
Once everything is installed, you can play with this project:
Tekton dashboard could be exposed locally using this command:
kubectl proxy --port=8080
Then, just open this url in the browser:
By that link you’ll access to PipelineRuns options and you’ll see a pipeline executing:
If you want to check what Tasks are installed in the cluster, you can navigate to Tasks option:
If you click in this pipelinerun you’ll see the different executed stages:
Each stage is executed by a pod. For instance, you can execute:
kubectl get pods -n cicd -l "tekton.dev/pipelineRun=products-ci-pipelinerun"
to see how different pods are created to execute different stages:
It’s possible to access to Sonarqube to check quality issues, opening this url in the browser:
** In this pipeline, it doesn’t check if quality gate is passed.
And It’s also possible to access to Nexus to check how the artifact has been published:
As I said before, the last stage in CI part consist on performing a push action to GitOps repository. In this stage, content from GitOps repo is cloned, commit information is updated in cloned files (Kubernentes descriptors) and a push is done. The following picture shows an example of this changes:
Argo CD Part
To access to Argo CD dashboard you need to perform a port-forward:
kubectl port-forward svc/argocd-server -n argocd 9080:443
Then, just open this url in the browser:
I’ve set the admin user with these credentials: admin / admin123
In this dashboard you should be the “product service” application that manages synchronization between Kubernetes cluster and GitOps repository
This application is “healthy” but as the objects associated with Product Service (Pods, Services, Deployment,…etc) aren’t still deployed to the Kubernetes cluster, you’ll find a “unknown” sync status.
Once the “pipelinerun” ends and changes are pushed to GitOps repository, Argo CD compares content deployed in the Kubernetes cluster (associated to Products Service) with content pushed to the GitOps repository and synchronize Kubernetes cluster against the repository:
Finally, the sync status become “Synced”:
6) Delete the local cluster (optional )
If you create a local cluster in step 3, there is an script to remove the local cluster. This script is poc/delete-local-cluster.sh
I hope you’ve liked this post. In next posts we’ll cover Tekton triggers.