DEV Community

José Alberto Ruiz Casarrubios
José Alberto Ruiz Casarrubios

Posted on

KUBERNETES - CI/CD WITH TEKTON & ARGO CD

Kubernetes - CI/CD with Tekton & Argo CD

With this post I'm going to show how a modern and cloud native CI/CD could be implemented within a Kubernetes environment. I'll use two different tools:

  • Tekton: to implement CI stages
  • Argo CD: to implement CD stages (Gitops)

This post doesn't try to be a master class about Tekton or Argo CD. It is only intended to set an starting point to explore both tools using them directly in a cluster.

You can check and clone all the code associated to this article in my Github

¿Tekton?

Tekton is an Open Source framework to build CI/CD pipelines directly over a Kuberentes cluster. It was originally developed at Google and was known as Knative pipelines

Tekton defines a series of Kubernetes custom resources (CRDs) extending the Kubernetes API. Sorry, what that means? Ok, if we go to the Kubernetes official page, we can read the following definition:

Kubernetes objects are persistent entities in the Kubernetes system. Kubernetes uses these entities to represent the state of your cluster

So, examples of Kubernetes objects are: Pod, Service, Deployment, etc...Tekton builds its own objects to Kubernetes and deploys them into the cluster. If you feel curious about custom objects, here the official documentation is and you can also check the Tekton Github to see how these objects are. For instance, Pipeline or Task

¿Argo CD?

Argo CD is a delivery tool (CD) built for Kubernetes, based on GitOps movement. So, what that means? Basically that Argo CD works synchronizing "Kubernetes files" between a git repository and a Kubernetes cluster. That is, if there is a change in a YAML file, Argo CD will detect that there are changes and will try to apply those changes in the cluster.

Argo CD, like Tekton, also creates its own Kubernetes custom resources that are installed into the Kubernetes cluster.

Are they ready to be adopted?

At the moment in which this post is being written, both tools are very "young". For instance, if we check the last releases we can see:

  • Argo CD: 1.8.7
  • Tekton: 0.21.0

I also like to check ThoughtWorks Technology Radar...If we check them in the radar, will see:

So, we are facing two young platforms and that may imply that there are not many examples, documentation or even maturity failures, but it's true that both tools are called to be the standard cloud native CI/CD according to the principal cloud players.

For instance, Tekton:

And, talking about Argo CD:

¿CI/CD Cloud Native?

We're talking a lot about "cloud native" associated to Tekton y Argo CD but, what do we mean by that? As I said before, both Tekton and Argo CD are installed in the Kubernetes cluster and they are based on extending Kubernetes API. Let's see it in detail:

  • Scalability: both tools are installed in the cluster and because of that, they work creating pods to perform tasks. Pods are the way in which applications can scale horizontally...so, scalabilly are guaranteed

  • Portabillity: both tools are based on extending Kubernetes API, creating new Kubernetes objects. These objects can be installed in every Kubernetes cluster.

  • Reusability: the different elements within the CI/CD process use the Kubernetes objects defined by Tekton and Argo CD in the same way that you work with deployments o service objects. That means that stages, tasks or applications are YAML files that you can store in some repository and use in every cluster with Tekton and Argo CD installed. For instance, it's possible to use artifacts from Tekton catalog or even, it's possible to use the Openshift catalog or building a custom one.

What are we going to build?

We are going to build a simple CI/CD process, on Kubernetes, with these stages:

pipeline-stages

In this pipeline, we can see two different parts:

  • CI part, implemented by Tekton and ending with a stage in which a push to a repository is done.

    • Checkout: in this stage, source code repository is cloned
    • Build & Test: in this stage, we use Maven to build and execute test
    • Code Analisys: code is evaluated by Sonarqube
    • Publish: if everything is ok, artifact is published to Nexus
    • Build image: in this stage, we build the image and publish to local registry
    • Push to GitOps repo: this is the final CI stage, in which Kubernetes descriptors are cloned from the GitOps repository, they are modified in order to insert commit info and then, a push action is performed to upload changes to GitOps repository
  • CD part, implemented by Argo CD, in which Argo CD detects that the repository has changed and perform the sync action against the Kubernetes cluster.

Does it mean that we can not implement the whole process using Tekton? No, it doesn't. It's possible to implement the whole process using Tekton but in this case, I want to show the Gitops concept.

Hands-on!

Requirements

To execute this PoC it's you need to have:

  • A Kubernetes cluster. If you don't have one, you can create a K3D one using the script create-local-cluster.sh but, obviously, you need to have installed K3D
  • Docker
  • Kubectl

Repository structure

I've used a single repo to manage the different projects. The repository is structured in this way:

repo_org

Basically:

  • poc: this is the main folder. Here, you can find three scripts:
    • create-local-cluster.sh: this script creates a local Kubernetes cluster based on K3D.
    • delete-local-cluster.sh: this script removes the local cluster
    • setup-poc.sh: this script installs and configure everything neccessary in the cluster (Tekton, Argo CD, Nexus, Sonar, etc...)
  • resources: this the folder used to manage the two repositories (code and gitops):
    • sources-repo: source code of the service used in this poc to test the CI/CD process
    • gitops_repo: repository where Kubernetes files associated to the service to be deployed are

Ok, how can I execute it?

1) Fork

The first step is to fork the repo https://github.com/jaruizes/tekton-argocd-poc because:

  • You have to modify some files to add a token
  • You need your own repo to perform Gitops operations

2) Add Github token

It's necessary to add a Github Personal Access Token to Tekton can perform git operations, like push to gitops repo. If you need help to create this token, you can follow these instructions: https://docs.github.com/en/github/authenticating-to-github/creating-a-personal-access-token

** The token needs to be allowed with "repo" grants.

Once the token is created, you have to copy it in these files (## INSERT TOKEN HERE:

  • poc/conf/argocd/git-repository.yaml
  apiVersion: v1
  kind: Secret
  metadata:
    annotations:
      managed-by: argocd.argoproj.io
    name: repo-gitops
    namespace: argocd
  type: Opaque
  stringData:
    username: tekton
    password: ## INSERT TOKEN HERE
Enter fullscreen mode Exit fullscreen mode
  • poc/conf/tekton/git-access/secret.yaml
  apiVersion: v1
  kind: Secret
  metadata:
    name: git-auth
    namespace: tekton-poc
    annotations:
      tekton.dev/git-0: https://github.com
  type: kubernetes.io/basic-auth
  stringData:
    username: tekton
    password: ## INSERT TOKEN HERE
Enter fullscreen mode Exit fullscreen mode

** In fact, for Argo CD, create secret with the token isn't necessary because the gitops repository in Github has public access but I think it's interesting to keep it in order to know what you need to do in case the repository be private.

3) Create Kubernetes cluster (optional)

This step is optional. If you already have a cluster, perfect, but if not, you can create a local one based on K3D, just executing the script poc/create-local-cluster.sh. This script creates the local cluster and configure the private image registry to manage Docker images.

4) Setup

This step is the most important because installs and configures everything necessary in the cluster:

  • Installs Tekton y Argo CD, including secrets to access to Git repo
  • Creates the volume and claim necessary to execute pipelines
  • Deploys Tekton dashboard
  • Deploys Sonarqube
  • Deploys Nexus and configure an standard instance
  • Creates the configmap associated to Maven settings.xml, ready to publish artifacts in Nexus (with user and password)
  • Installs Tekton tasks and pipelines
    • Git-clone (from Tekton Hub)
    • Maven (from Tekton Hub)
    • Buildah (from Tekton Hub)
    • Prepare Image (custom task: poc/conf/tekton/tasks/prepare-image-task.yaml)
    • Push to GitOps repo (custom task: poc/conf/tekton/tasks/push-to-gitops-repo.yaml)
  • Installs Argo CD application, configured to check changes in gitops repository (resources/gitops_repo)
  • Update Argo CD password

** Be patient. The process takes some minutes.

** This message isn't an error. It just waiting for to Nexus admin password created when the container starts. When the Nexus container starts, at some moment, it creates a file containing the default password.

Configuring settings.xml (MAVEN) to work with Nexus
cat: /nexus-data/admin.password: No such file or directory
command terminated with exit code 1

5) Explore and play

Once everything is installed, you can play with this project:

Tekton Part

Tekton dashboard could be exposed locally using this command:

kubectl proxy --port=8080
Enter fullscreen mode Exit fullscreen mode



Then, just open this url in the browser:

http://localhost:8080/api/v1/namespaces/tekton-pipelines/services/tekton-dashboard:http/proxy/#/namespaces/cicd/pipelineruns
Enter fullscreen mode Exit fullscreen mode

By that link you'll access to PipelineRuns options and you'll see a pipeline executing:

pipeline_running

If you want to check what Tasks are installed in the cluster, you can navigate to Tasks option:

installed_tasks

If you click in this pipelinerun you'll see the different executed stages:

pipelinerun-stages

Each stage is executed by a pod. For instance, you can execute:

 kubectl get pods -n cicd -l "tekton.dev/pipelineRun=products-ci-pipelinerun"
Enter fullscreen mode Exit fullscreen mode

to see how different pods are created to execute different stages:

pipelinerun-stages-pods

It's possible to access to Sonarqube to check quality issues, opening this url in the browser:

sonarqube

** In this pipeline, it doesn't check if quality gate is passed.

And It's also possible to access to Nexus to check how the artifact has been published:

nexus

As I said before, the last stage in CI part consist on performing a push action to GitOps repository. In this stage, content from GitOps repo is cloned, commit information is updated in cloned files (Kubernentes descriptors) and a push is done. The following picture shows an example of this changes:

commit changes

Argo CD Part

To access to Argo CD dashboard you need to perform a port-forward:

kubectl port-forward svc/argocd-server -n argocd 9080:443
Enter fullscreen mode Exit fullscreen mode



Then, just open this url in the browser:

https://localhost:9080/
Enter fullscreen mode Exit fullscreen mode

I've set the admin user with these credentials: admin / admin123

In this dashboard you should be the "product service" application that manages synchronization between Kubernetes cluster and GitOps repository

argocd_initial

This application is "healthy" but as the objects associated with Product Service (Pods, Services, Deployment,...etc) aren't still deployed to
the Kubernetes cluster, you'll find a "unknown" sync status.

Once the "pipelinerun" ends and changes are pushed to GitOps repository, Argo CD compares content deployed in the Kubernetes cluster (associated to Products Service) with content pushed to the GitOps repository and synchronize Kubernetes cluster against the repository:

argocd-products

Finally, the sync status become "Synced":

argocd_initial

6) Delete the local cluster (optional )

If you create a local cluster in step 3, there is an script to remove the local cluster. This script is poc/delete-local-cluster.sh





I hope you’ve liked this post. In next posts we'll cover Tekton triggers.

Top comments (3)

Collapse
 
_anshuman profile image
Anshuman Abhishek • Edited

One step is missing to add Sonarqube token in pipeline.

Collapse
 
shuknk8s profile image
shuknk8s

The last task in the pipeline run is throwing error
fatal: could not read Username for 'github.com': No such file or directory

Unable to figure out the cause, can you please guide

Collapse
 
jaruizes profile image
José Alberto Ruiz Casarrubios

Have you configured the Github token with the right grants?