Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/garden-io/garden-aws-quickstart

Garden AWS Quickstart solution for production-like development clusters on AWS.
https://github.com/garden-io/garden-aws-quickstart

aws ci devex devops garden

Last synced: about 2 months ago
JSON representation

Garden AWS Quickstart solution for production-like development clusters on AWS.

Awesome Lists containing this project

README

        

# Garden Development Cluster Solution for AWS

## Features
- **Remote development:** Use an Amazon EKS cluster as a remote development environment for your engineering team, as well as for CI and QA environments.
- **Fast builds:** Save precious engineering time wasted waiting for container builds by using the [in-cluster-building](https://docs.garden.io/kubernetes-plugins/advanced/in-cluster-building) and [build caching](https://docs.garden.io/basics/how-garden-works#caching) features. Your container images will be stored in AWS ECR repositories.
- **Autoscaling:** Control the minimum and maximum number of nodes in the cluster, to support your Engineering team size and workload requirements
- **Access management:** Easily grant access to your development teams, so they can use remote production-like dev environments and see changes reflected instantly with [Garden sync mode](https://docs.garden.io/guides/code-synchronization). This will make the remote development environment feel like running your set of services locally.
- **Batteries included:** Also takes care of Load Balancing, Ingress controller, SSL certificates and Route53 supporting any number of development environments right away. The EKS cluster comes already with all necessary IAM permissions preconfigured that Garden needs to function.

## High-level architecture overview

![plot](./Architecture_diagram_dev_cluster.png)

## Quick start

After completing the following steps, you will have deployed your dev environment for the [Garden quick-start example](https://github.com/garden-io/quickstart-example) to your Garden Development Cluster on AWS.

### 1. DNS Setup

To make your development environments accessible for your engineering and QA teams you need to choose a domain name that we will use for the Quickstart cluster. You need to be the owner of that domain and be able to create DNS records.

When using `gardendev.example.com`, your development and QA environments would be reachable on any of the subdomains (`*.gardendev.example.com`) once you completed the quick start steps.

If this DNS name is not already hosted on AWS Route 53, you need to [create a hosted zone](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/CreatingHostedZone.html) for it first, and also complete step 8 of that guide to make AWS Route 53 DNS servers authoritative for the chosen DNS name.

### 2. Deploy the solution

Now you can deploy the solution using AWS CloudFormation.

Follow the link to the [Quick install](https://console.aws.amazon.com/cloudformation/home#/stacks/quickcreate?stackName=garden-dev-cluster&templateURL=https://garden-cfn-public-releases.s3.amazonaws.com/dev-cluster/0.5.0/garden-dev-cluster.template.yaml) template ([View Template Source](https://garden-cfn-public-releases.s3.amazonaws.com/dev-cluster/0.5.0/garden-dev-cluster.template.yaml)).

#### Parameters

Please refer to the [parameters reference](docs/reference/parameters.md) for a description of all parameters.

The following parameters will need to be configured to launch the quickstart guide. You can keep the default value for all other parameters.

##### `IAMEKSFullAccessPrincipals`
List of ARN principals, like IAM users or roles, that should be allowed to assume the role to get access to the EKS cluster. Mutually exclusive with the `IAMEKSFullAccessRole` parameter. You must either supply an `IAMEKSFullAccessRole` parameter, or `IAMEKSFullAccessPrincipals`, but not both.

Example: `arn:aws:iam::001122334455:user/anna,arn:aws:iam::001122334455:user/steffen,arn:aws:iam::001122334455:user/srihas`

##### `IAMEKSFullAccessRole`
The ARN of the IAM role that gets access to the EKS cluster. Everyone who can assume this role will have full access to the EKS cluster created in this stack. You are responsible for managing the trust policy of this role and allow users to assume it. Mutually exclusive with `IAMEKSFullAccessPrincipals` parameter. You must either supply an `IAMEKSFullAccessRole` parameter, or `IAMEKSFullAccessPrincipals`, but not both.

In case you are using AWS Single Sign On (also known as AWS Identity Center) you will want to specify the `AWSReservedSSO` role that your development teams can assume in `IAMEKSFullAccessRole`.

Example: `arn:aws:iam::001122334455:role/AWSReservedSSO_DeveloperAccess_xxxxxxxx`

##### `IngressRoute53HostedZoneId`
The ID of the Route53 hosted zone with the domain that can be used for ingress to the development environments

Use the drop down to choose the hosted zone ID that hosts the domain chosen in [step 1 (DNS Setup)](#1-dns-setup).

##### `IngressRoute53HostedZoneId`
The subdomain that can be used for ingress to the development environments. Needs to be a hosted domain in `Route53RecordTarget`, for example: `garden.mycompany.com`.

Enter the domain chosen in [step 1 (DNS Setup)](#1-dns-setup).

### 3. Deploy the quickstart-example
1. `git clone https://github.com/garden-io/quickstart-example.git`
2. `cd quickstart-example`
3. Update the Kubernetes provider configuration in `project.garden.yml`
4. `garden dev`
5. `> deploy --sync`

## Telemetry

When launching, updating or deleting the CloudFormation Stack we collect anonymized telemetry and send it to Segment.io. It helps us understand how our users use Garden and aids our decision process when prioritizing new features, bug fixing, etc.

We put great effort in making sure we only collect completely anonymized data by hashing sensitive information using SHA-512. See also the implementation at [`src/functions/tracking.ts`](src/functions/tracking.ts).