So now-a-days we hear yet another fancy term ... Gitops.
In simple terms Git is used as a single source of truth for applications and infrastructure. So the team can focus on Application development rather than Operational Tasks (Ops).
GitOps provides features like
- CI/CD Automation pipelines
- Entire Audit History - Version Control, History, Peer Review and Rollback.
- Git serves as Single Source of Truth
- Webhooks to trigger pipelines
- PR driven approach
So now as part of GitOps where the entire Industry is moving towards, we'll have to update the YAML manifests for Kubernetes and then go ahead with the deployment to specific environment - Dev , Stage , Preprod , Production as the situation demands.
Any changes to the Manifest files will raise questions about its success/failure. With human intervention, the process cannot be error-free. And the important question here would be "Can a process be put in place to avoid pushing the changes to next level ?"
And the answer to the above question would be "Yes!".
There is a way to validate the YAML manifest files before applying them in any region post modification.
What's special about Datree tool
- Datree provides possibilities to avoid passing any Kubernetes Misconfigurations from reaching Production with its automated policy checks in the CI pipeline.
- Its Open-Source CLI tool that enables us to write Manifest files that meet project standards or follow best practices.
- CLI runs the policy check on your system, your files and their contents are not transferred to their backend. To their backend, which is used to show your policy check history on your dashboard, the tool only sends metadata.
- It has an offline mode as well. That means Datree also does not need to be connected to the cluster.
Installation and general usage
Just run the following command:
curl https://get.datree.io | /bin/bash
- Verification post installation To verify the installation process has been successful, run the below command:
datree test ~/.datree/k8s-demo.yaml
When Datree usually starts its check , it goes through 3 main stages:
- YAML validation;
- checking Kubernetes charts;
- checking Kubernetes policies.
The output will be similar to:
$ datree test ~/.datree/k8s-demo.yaml
>> File: .datree/k8s-demo.yaml
[V] YAML validation
[V] Kubernetes schema validation
[X] Policy check
β Ensure each container image has a pinned (tag) version [1 occurrence]
- metadata.name: rss-site (kind: Deployment)
π‘ Incorrect value for key `image` - specify an image version to avoid unpleasant "version surprises" in the future
β Ensure each container has a configured liveness probe [1 occurrence]
- metadata.name: rss-site (kind: Deployment)
π‘ Missing property object `livenessProbe` - add a properly configured livenessProbe to catch possible deadlocks
β Ensure each container has a configured memory limit [1 occurrence]
- metadata.name: rss-site (kind: Deployment)
π‘ Missing property object `limits.memory` - value should be within the accepted boundaries recommended by the organization
β Ensure workload has valid label values [1 occurrence]
- metadata.name: rss-site (kind: Deployment)
π‘ Incorrect value for key(s) under `labels` - the vales syntax is not valid so the Kubernetes engine will not accept it
(Summary)
- Passing YAML validation: 1/1
- Passing Kubernetes (1.20.0) schema validation: 1/1
- Passing policy check: 0/1
+-----------------------------------+-----------------------+
| Enabled rules in policy "Default" | 21 |
| Configs tested against policy | 1 |
| Total rules evaluated | 21 |
| Total rules skipped | 0 |
| Total rules failed | 4 |
| Total rules passed | 17 |
| See all rules in policy | https://app.datree.io |
+-----------------------------------+-----------------------+
The detailed information that is made available helps know about the violations in the manifest. This also proves to be helpful while fixing the violations.
Each Datree policy check is performed using the default policy, which includes 50+ built-in rules.
CI Intgration
Datree helps in the Left Shift movement. The sooner the errors are identified in the CICD cycle its better for the application life cycle.
To integrate Datree into CI/CD, you can follow the example below. You need to follow these steps:
- Get your account token (you can find it in the dashboard's Settings).
- Set DATREE_TOKEN as secret/environment variable
- Add Datree to your CI flow via token as shown (i.e., for GitHub).
GitHub Repo with Sample Application
Below is an example of Datree Integration with GitHub Actions
# Controls when the workflow will run
on:
# Triggers the workflow on push or pull request events but only for the main branch
push:
branches: [ feature* ]
# pull_request:
# branches: [ main ]
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
env:
DATREE_TOKEN: ${{ secrets.DATREE_TOKEN }}
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
jobs:
# This workflow contains a single job called "build"
build:
# The type of runner that the job will run on
runs-on: ubuntu-latest
# Steps represent a sequence of tasks that will be executed as part of the job
steps:
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it
- uses: actions/checkout@v2
- name: Install Datree
run: curl https://get.datree.io | /bin/bash
- name: Test k8s file
run: datree test deployment/deployment.yaml --no-record --ignore-missing-schemas
continue-on-error: false
Top comments (0)