Skip to content

brathina-spectro/gloo-mesh-aoa

 
 

Repository files navigation

gloo-mesh-demo-aoa

This repo provides a multitenant capable GitOps workflow structure that can be forked and used to demonstrate the deployment and configuration a multi-cluster mesh demo as code using the Argo CD app-of-apps pattern

Spin up three clusters named cluster1, cluster2, cluster3 (optional), and mgmt

Run:

./deploy-2clusters.sh           # deploys on mgmt, cluster1, cluster2
./deploy-3clusters.sh           # deploys on mgmt, cluster1, cluster2, cluster3

Resource Requirements:

  • This demo has been tested on 1x n2-standard-4 (gke), m5.xlarge (aws), or Standard_DS3_v2 (azure) instance for mgmt cluster
  • This demo has been tested on 2x n2-standard-4 (gke), m5.xlarge (aws), or Standard_DS3_v2 (azure) instances for cluster1 and cluster2 and cluster3

Note:

  • A temporary (5 day currently) license key is used here for demonstration purposes
  • By default, the script expects to deploy into three clusters named mgmt, cluster1, cluster2, and cluster3 (optional).
  • Context parameters can be changed from defaults by changing the variables in the deploy-2clusters.sh and deploy-3clusters.sh scripts. A check is done to ensure that the defined contexts exist before proceeding with the installation. Note that the character _ is an invalid value if you are replacing default contexts
  • Although you may change the contexts where apps are deployed as describe above, the Istio cluster names will remain stable references cluster1 and cluster2

App of Apps Explained

Platform owners control the deployment of applications into the cluster with the app-of-apps pattern. The app-of-apps pattern uses a generic Argo Application to sync all manifests in a particular Git directory, rather than directly point to a Kustomize, YAML, or Helm configuration.

By using the app-of-app pattern, a Platform Administrator can provide some self-service capabilities to end users by delivering a synced directory in Git (i.e. infra team controls infra repo/directory, app team to app repo/directory) while still controlling what is ultimately deployed to the cluster and exposed through standard Kubernetes RBAC and Policy. This way, with the right policy in place, Applications are not deployed unless successfully committed Git and pushed to the correctly scoped team repo/directory

platform-owners
├── cluster1
│   ├── cluster1-apps.yaml                  # syncs all apps pushed to environments/cluster1/apps/
│   ├── cluster1-cluster-config.yaml        # syncs all apps pushed to environments/cluster1/cluster-config/
│   ├── cluster1-infra.yaml                 # syncs all apps pushed to environments/cluster1/infra/
│   └── cluster1-mesh-config.yaml           # syncs all apps pushed to environments/cluster1/mesh-config/
├── cluster2
│   ├── cluster2-apps.yaml                  # syncs all apps pushed to environments/cluster2/apps/
│   ├── cluster2-cluster-config.yaml        # syncs all apps pushed to environments/cluster2/cluster-config/
│   ├── cluster2-infra.yaml                 # syncs all apps pushed to environments/cluster2/infra/
│   └── cluster2-mesh-config.yaml           # syncs all apps pushed to environments/cluster2/mesh-config/
└── mgmt
    ├── mgmt-apps.yaml                      # syncs all apps pushed to environments/mgmt/apps/
    ├── mgmt-cluster-config.yaml            # syncs all apps pushed to environments/mgmt/cluster-config/
    ├── mgmt-infra.yaml                     # syncs all apps pushed to environments/mgmt/infra/
    └── mgmt-mesh-config.yaml               # syncs all apps pushed to environments/mgmt/mesh-config/

Example environments tree containing 3 clusters described above:

environments
├── cluster1
│   ├── apps
│   │   ├── active
│   │   │   ├── 1.1.a-reviews-v1.yaml
│   │   │   └── bookinfo-loadgen-istio-ingressgateway.yaml
│   │   └── non-active
│   │       ├── bookinfo
│   │       │   └── app
│   │       │       ├── 0-no-reviews.yaml
│   │       │       ├── 1.1.b-reviews-v2.yaml
│   │       │       ├── 1.1.c-reviews-v3.yaml
│   │       │       ├── 1.2.a-reviews-v1-v2.yaml
│   │       │       └── 1.3.a-reviews-all.yaml
│   │       └── gloo-mesh
│   │           └── gm-enterprise-agent-cluster1.yaml
│   ├── cluster-config
│   │   ├── active
│   │   └── non-active
│   ├── infra
│   │   ├── active
│   │   │   ├── gloo-mesh-dataplane-addons.yaml
│   │   │   ├── gm-istio-workshop-cluster1-1-11-4.yaml
│   │   │   └── istio-operator-1-11-4.yaml
│   │   └── non-active
│   ├── mesh-config
│   │   ├── active
│   │   └── non-active
│   │       └── strict-mtls.yaml
│   └── overlay
│       └── custom-istio-deploy
│           └── kustomization.yaml
├── cluster2
│   ├── apps
│   │   ├── active
│   │   │   ├── 1.1.b-reviews-v2.yaml
│   │   │   └── bookinfo-loadgen-istio-ingressgateway.yaml
│   │   └── non-active
│   │       ├── bookinfo
│   │       │   └── app
│   │       │       ├── 0-no-reviews.yaml
│   │       │       ├── 1.1.a-reviews-v1.yaml
│   │       │       ├── 1.1.b-reviews-v2.yaml
│   │       │       ├── 1.1.c-reviews-v3.yaml
│   │       │       ├── 1.2.a-reviews-v1-v2.yaml
│   │       │       └── 1.3.a-reviews-all.yaml
│   │       └── gloo-mesh
│   │           └── gm-enterprise-agent-cluster2.yaml
│   ├── cluster-config
│   │   ├── active
│   │   └── non-active
│   ├── infra
│   │   ├── active
│   │   │   ├── gloo-mesh-dataplane-addons.yaml
│   │   │   ├── gm-istio-workshop-cluster2-1-11-4.yaml
│   │   │   └── istio-operator-1-11-4.yaml
│   │   └── non-active
│   └── mesh-config
│       ├── active
│       └── non-active
│           └── strict-mtls.yaml
├── cluster3
│   ├── apps
│   │   ├── active
│   │   │   ├── 1.1.c-reviews-v3.yaml
│   │   │   └── bookinfo-loadgen-istio-ingressgateway.yaml
│   │   └── non-active
│   │       ├── bookinfo
│   │       │   └── app
│   │       │       ├── 0-no-reviews.yaml
│   │       │       ├── 1.1.a-reviews-v1.yaml
│   │       │       ├── 1.1.b-reviews-v2.yaml
│   │       │       ├── 1.1.c-reviews-v3.yaml
│   │       │       ├── 1.2.a-reviews-v1-v2.yaml
│   │       │       └── 1.3.a-reviews-all.yaml
│   │       └── gloo-mesh
│   │           └── gm-enterprise-agent-cluster2.yaml
│   ├── cluster-config
│   │   ├── active
│   │   └── non-active
│   ├── infra
│   │   ├── active
│   │   │   ├── gloo-mesh-dataplane-addons.yaml
│   │   │   ├── gm-istio-workshop-cluster2-1-11-4.yaml
│   │   │   └── istio-operator-1-11-4.yaml
│   │   └── non-active
│   └── mesh-config
│       ├── active
│       └── non-active
│           └── strict-mtls.yaml
└── mgmt
    ├── apps
    │   ├── active
    │   └── non-active
    ├── cluster-config
    │   ├── active
    │   └── non-active
    ├── infra
    │   ├── active
    │   │   └── gloo-mesh-ee-helm.yaml
    │   └── non-active
    └── mesh-config
        ├── active
        │   ├── kubernetescluster-cluster1.yaml
        │   ├── kubernetescluster-cluster2.yaml
        │   └── kubernetescluster-cluster3.yaml
        └── non-active
            ├── accesspolicy
            │   ├── addons-accesspolicy-2clusters.yaml
            │   ├── addons-accesspolicy-3clusters.yaml
            │   ├── bookinfo-accesspolicy-2clusters.yaml
            │   └── bookinfo-accesspolicy-3clusters.yaml
            ├── routing
            │   ├── bookinfo-gmg-cluster1.yaml
            │   ├── bookinfo-gmg-cluster2.yaml
            │   └── bookinfo-gmg-cluster3.yaml
            └── virtualmesh
                ├── virtualmesh-2clusters.yaml
                └── virtualmesh-3clusters.yaml

forking this repo

Fork this repo and run the script below to your GitHub username if owning the control over pushing/pulling into the repo is desirable

cd tools/
./replace-github-username.sh <github_username>

Now you can push new manifests into the corresponding environments directories in your fork to sync them using Argo CD

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%