diff --git a/content/en/docs/components/orchestration/_index.md b/content/en/docs/components/orchestration/_index.md index 6246d1b..84b5f23 100644 --- a/content/en/docs/components/orchestration/_index.md +++ b/content/en/docs/components/orchestration/_index.md @@ -1,28 +1,246 @@ --- -title: "Orchestratiion" +title: "Orchestration" linkTitle: "Orchestration" weight: 10 description: > - Platform and infrastructure orchestration components. + Orchestration in the context of Platform Engineering - coordinating infrastructure, platform, and application delivery. --- -{{% alert title="Draft" color="warning" %}} -**Editorial Status**: This page is currently being developed. +## Overview -* **Jira Ticket**: [TICKET-6734](https://jira.telekom-mms.com/browse/IPCEICIS-6734) -* **Assignee**: Stephan -* **Status**: Draft -* **Last Updated**: YYYY-MM-DD -* **TODO**: - * [ ] Add detailed component description - * [ ] Include usage examples and code samples - * [ ] Add architecture diagrams - * [ ] Review and finalize content -{{% /alert %}} +Orchestration in the context of Platform Engineering refers to the coordinated automation and management of infrastructure, platform, and application components throughout their entire lifecycle. It is a fundamental concept that bridges the gap between declarative specifications (what should be deployed) and actual execution (how it is deployed). -The Orchestration manages platform and infrastructure provisioning, providing the foundation for the EDP deployment model. +## The Role of Orchestration in Platform Engineering + +Platform Engineering has emerged as a discipline to improve developer experience and reduce cognitive load on development teams ([CNCF Platforms White Paper](https://tag-app-delivery.cncf.io/whitepapers/platforms/)). Orchestration is the central mechanism that enables this vision: + +1. **Automation of Complex Workflows**: Orchestration coordinates multiple steps and dependencies automatically +2. **Consistency and Reproducibility**: Guaranteed, repeatable deployments across different environments +3. **Self-Service Capabilities**: Developers can independently orchestrate resources and deployments +4. **Governance and Compliance**: Centralized control over policies and best practices + +### What Does Orchestration Do? + +Orchestration systems perform the following tasks: + +- **Workflow Coordination**: Coordination of complex, multi-step deployment processes +- **Dependency Management**: Resolution and management of dependencies between components +- **State Management**: Continuous monitoring and reconciliation between desired and actual state +- **Resource Provisioning**: Automatic provisioning of infrastructure and services +- **Configuration Management**: Management of configurations across different environments +- **Health Monitoring**: Monitoring the health of deployed resources + +## Three Layers of Orchestration + +In modern Platform Engineering, we distinguish three fundamental layers of orchestration: + +### [Infrastructure Orchestration](infrastructure/) + +Infrastructure Orchestration deals with the lowest level - the physical and virtual infrastructure layer. This includes: + +- Provisioning of compute, network, and storage resources +- Cloud resource management (VMs, networking, storage) +- Infrastructure-as-Code deployment (Terraform, etc.) +- Bare metal and hypervisor management + +**Target Audience**: Infrastructure Engineers, Cloud Architects + +**Note**: Detailed documentation for Infrastructure Orchestration is maintained separately. + +More details: [Infrastructure Orchestration →](infrastructure/) + +### [Platform Orchestration](platform/) + +Platform Orchestration focuses on deploying and managing the platform itself - the services and tools that development teams use. This includes: + +- Installation and configuration of Kubernetes clusters +- Deployment of platform services (GitOps tools, Observability, Security) +- Management of platform components via Stacks +- Multi-cluster orchestration + +**Target Audience**: Platform Engineering Teams, SRE Teams + +**In IPCEI-CIS**: Platform orchestration is realized using the CNOE stack concept with ArgoCD and Forgejo. + +More details: [Platform Orchestration →](platform/) + +### [Application Orchestration](application/) + +Application Orchestration concentrates on the deployment and lifecycle management of applications running on the platform. This includes: + +- Deployment of microservices and containerized applications +- CI/CD pipeline orchestration +- Configuration management and secrets handling +- Application health monitoring and auto-scaling + +**Target Audience**: Application Developers, DevOps Engineers + +**In IPCEI-CIS**: Application orchestration uses Forgejo pipelines for CI/CD and ArgoCD for GitOps-based deployment. + +More details: [Application Orchestration →](application/) + +## GitOps as Orchestration Paradigm + +A central approach in modern platform orchestration solutions is **GitOps**. GitOps uses Git repositories as the single source of truth for declarative infrastructure and applications: + +- **Declarative Approach**: The desired state is defined in Git +- **Automatic Synchronization**: Controllers monitor Git and reconcile the live state +- **Audit Trail**: All changes are traceable in Git history +- **Rollback Capability**: Easy rollback through Git revert + +### Continuous Reconciliation + +An important concept is **continuous reconciliation**: + +1. The orchestrator monitors both the source (Git) and the target (e.g., Kubernetes cluster) +2. Deviations trigger automatic corrective actions +3. Health checks validate that the desired state has been achieved +4. Drift detection warns of unexpected changes + +## Orchestration Tools in IPCEI-CIS + +Within the IPCEI-CIS platform, we utilize the [CNOE (Cloud Native Operational Excellence)](https://cnoe.io/) stack concept with the following orchestration components: + +### ArgoCD + +- **Continuous Delivery** for Kubernetes based on GitOps +- Synchronizes Kubernetes manifests from Git repositories +- Supports Helm Charts, Kustomize, Jsonnet, and plain YAML +- Multi-cluster deployment capabilities +- Application Sets for parameterized deployments + +**Role in IPCEI-CIS**: ArgoCD is the central component for GitOps-based deployment management. After the initial bootstrapping phase, ArgoCD takes over the technical coordination of all components. + +### Forgejo + +- **Git Repository Management** and source control +- **CI/CD Pipelines** via Forgejo Actions (GitHub Actions compatible) +- **Developer Portal Capabilities** (initially planned, project discontinued) +- Package registry and artifact management +- Integration with ArgoCD for GitOps workflows + +**Role in IPCEI-CIS**: Forgejo serves as the Git repository host and CI/CD engine. It was initially planned as a developer portal (similar to Backstage's role in other stacks) but this aspect was not fully realized before project completion. + +**Note on Backstage**: In typical CNOE implementations, Backstage serves as the developer portal providing golden paths through software templates. IPCEI-CIS initially planned to use Forgejo for this purpose but the project concluded before full implementation. + +### Terraform + +- **Infrastructure-as-Code** provisioning +- Multi-cloud resource management +- State management for infrastructure +- Integration with Forgejo pipelines for automated deployment + +**Role in IPCEI-CIS**: Terraform handles infrastructure provisioning at the infrastructure orchestration layer, integrated into automated workflows via Forgejo pipelines. + +### CNOE Stacks Concept + +- **Modular Platform Components** bundled as stacks +- Reusable, composable platform building blocks +- Version-controlled stack definitions +- GitOps-based stack deployment via ArgoCD + +**Role in IPCEI-CIS**: The stacks concept from CNOE provides the structural foundation for platform orchestration, enabling modular deployment and management of platform components. + +## The Orchestration Workflow + +A typical orchestration workflow in the IPCEI-CIS platform: + +```text +┌─────────────┐ ┌───────────┐ ┌───────────┐ ┌────────────┐ +│ Developer │────▶│ Forgejo │────▶│ Git │────▶│ ArgoCD │ +│ │ │ Pipelines│ │Repository │ │ │ +└─────────────┘ └───────────┘ └───────────┘ └─────┬──────┘ + │ + ▼ + ┌───────────────────────────────────────────────┐ + │ │ + │ Kubernetes Cluster(s) │ + │ │ + │ ┌──────────┐ ┌──────────┐ ┌──────────┐ │ + │ │ Apps │ │Services │ │Resources │ │ + │ └──────────┘ └──────────┘ └──────────┘ │ + │ │ + └───────────────────────────────────────────────┘ + ▲ + │ + ┌────┴─────┐ + │Terraform │ + │ │ + └──────────┘ +``` + +**Workflow Steps**: + +1. **Definition**: Developer defines application/infrastructure as code +2. **Commit**: Changes are committed to Forgejo Git repository +3. **CI Pipeline**: Forgejo Actions build, test, and package the application +4. **Sync**: ArgoCD detects changes and triggers deployment +5. **Provision**: Terraform orchestrates required cloud resources (if needed) +6. **Deploy**: Application is deployed to Kubernetes +7. **Monitor**: Continuous monitoring and health checks +8. **Reconcile**: Automatic correction on drift detection + +## Benefits of Coordinated Orchestration + +The integration of infrastructure, platform, and application orchestration provides crucial advantages: + +- **Reduced Complexity**: Developers don't need to know all infrastructure details +- **Faster Time-to-Market**: Automated workflows accelerate deployments +- **Consistency**: Standardized patterns across all teams +- **Governance**: Central policies are automatically enforced +- **Scalability**: Platform teams can support many application teams +- **Self-Service**: Developers can provision services independently +- **Audit and Compliance**: Complete traceability through Git history + +## Best Practices + +Successful orchestration follows proven principles ([Platform Engineering Principles](https://platformengineering.org/blog/what-is-platform-engineering)): + +1. **Platform as a Product**: Treat the platform as a product with focus on user experience +2. **Self-Service First**: Enable developers to use services autonomously +3. **Documentation**: Comprehensive documentation of golden paths +4. **Feedback Loops**: Continuous improvement through user feedback +5. **Thin Platform Layer**: Use managed services where possible instead of building everything +6. **Progressive Disclosure**: Offer different abstraction levels +7. **Focus on Common Problems**: Solve recurring problems centrally +8. **Treat Glue as Valuable**: Integration of different tools is valuable +9. **Clear Mission**: Define clear goals and responsibilities + +## Avoiding Anti-Patterns + +Common mistakes in platform orchestration ([How to fail at Platform Engineering](https://www.cncf.io/blog/2024/03/08/how-to-fail-at-platform-engineering/)): + +- **Product Misfit**: Building platform without involving developers +- **Overly Complex Design**: Too many features and unnecessary complexity +- **Swiss Knife Syndrome**: Trying to solve all problems with one tool +- **Insufficient Documentation**: Missing or outdated documentation +- **Siloed Development**: Platform and development teams working in isolation +- **Stagnant Platform**: Platform not continuously evolved ## Sub-Components -* **Infrastructure Provisioning**: Low-level infrastructure deployment (infra-deploy, infra-catalogue) -* **Platform Provisioning**: Platform-level component deployment via Stacks +The orchestration component includes the following sub-areas: + +- **[Infrastructure Orchestration](infrastructure/)**: Low-level infrastructure deployment and provisioning +- **[Platform Orchestration](platform/)**: Platform-level component deployment via Stacks +- **[Application Orchestration](application/)**: Application-level deployment and CI/CD +- **[Stacks](stacks/)**: Reusable component bundles and compositions + +## Further Resources + +### Fundamentals + +- [CNCF Platforms White Paper](https://tag-app-delivery.cncf.io/whitepapers/platforms/) - Comprehensive paper on Platform Engineering +- [Platform Engineering Definition](https://platformengineering.org/blog/what-is-platform-engineering) - What is Platform Engineering? +- [Team Topologies](https://teamtopologies.com/) - Organizational structures for modern teams + +### GitOps + +- [GitOps Principles](https://opengitops.dev/) - Official GitOps principles +- [ArgoCD Documentation](https://argo-cd.readthedocs.io/) - ArgoCD documentation + +### Tools + +- [CNOE.io](https://cnoe.io/) - Cloud Native Operational Excellence Framework +- [Forgejo](https://forgejo.org/) - Self-hosted Git service with CI/CD +- [Terraform](https://www.terraform.io/) - Infrastructure as Code tool diff --git a/content/en/docs/components/orchestration/application.md b/content/en/docs/components/orchestration/application.md index 976aeba..25d5333 100644 --- a/content/en/docs/components/orchestration/application.md +++ b/content/en/docs/components/orchestration/application.md @@ -3,126 +3,830 @@ title: "Application Orchestration" linkTitle: "Application Orchestration" weight: 30 description: > - Application-level component provisioning via Stacks + Application deployment via CI/CD pipelines and GitOps - Orchestrating application deployments --- -{{% alert title="Draft" color="warning" %}} -**Editorial Status**: This page is currently being developed. - -* **Jira Ticket**: [TICKET-XXX](https://your-jira/browse/TICKET-XXX) -* **Assignee**: [Name or Team] -* **Status**: Draft -* **Last Updated**: YYYY-MM-DD -* **TODO**: - * [ ] Add detailed component description - * [ ] Include usage examples and code samples - * [ ] Add architecture diagrams - * [ ] Review and finalize content -{{% /alert %}} - ## Overview -[Detailed description of the component - what it is, what it does, and why it exists] +Application Orchestration deals with the automation of application deployment and lifecycle management. It encompasses the entire workflow from source code to running application in production. + +In the context of IPCEI-CIS, Application Orchestration includes: + +- **CI/CD Pipelines**: Automated build, test, and deployment pipelines +- **GitOps Deployment**: Declarative application deployment via ArgoCD +- **Progressive Delivery**: Canary deployments, blue-green deployments +- **Application Configuration**: Environment-specific configuration management +- **Golden Paths**: Standardized deployment templates and workflows + +### Target Audience + +Application Orchestration is primarily for: + +- **Application Developers**: Teams developing and deploying applications +- **DevOps Teams**: Teams responsible for deployment automation +- **Product Teams**: Teams responsible for application lifecycle ## Key Features -* [Feature 1] -* [Feature 2] -* [Feature 3] +### Automated CI/CD Pipelines + +Forgejo Actions provides GitHub Actions-compatible CI/CD: + +- **Build Automation**: Automatic building of container images +- **Test Automation**: Automated unit, integration, and E2E tests +- **Security Scanning**: Vulnerability scanning of dependencies and images +- **Artifact Publishing**: Publishing to container registries +- **Deployment Triggering**: Automatic deployment after successful build + +### GitOps-based Deployment + +ArgoCD enables declarative application deployment: + +- **Declarative Configuration**: Applications defined as Kubernetes manifests +- **Automated Sync**: Automatic synchronization between Git and cluster +- **Rollback Capability**: Easy rollback to previous versions +- **Multi-Environment**: Consistent deployment across Dev/Test/Prod +- **Health Monitoring**: Continuous monitoring of application health + +### Progressive Delivery + +Support for advanced deployment strategies: + +- **Canary Deployments**: Gradual rollout to subset of users +- **Blue-Green Deployments**: Zero-downtime deployments with instant rollback +- **A/B Testing**: Traffic splitting for feature testing +- **Feature Flags**: Dynamic feature enablement without deployment + +### Configuration Management + +Flexible configuration for different environments: + +- **Environment Variables**: Configuration via environment variables +- **ConfigMaps**: Kubernetes-native configuration +- **Secrets Management**: Secure handling of sensitive data +- **External Secrets**: Integration with external secret stores (Vault, etc.) ## Purpose in EDP -[Explain the role this component plays in the Edge Developer Platform and how it contributes to the overall platform capabilities] +Application Orchestration is the core of developer experience in IPCEI-CIS Edge Developer Platform. + +### Developer Self-Service + +Developers can deploy applications independently: + +- **Self-Service Deployment**: No dependency on operations team +- **Standardized Workflows**: Clear, documented deployment processes +- **Fast Feedback**: Quick feedback through automated pipelines +- **Environment Parity**: Consistent behavior across all environments + +### Quality and Security + +Automated checks ensure quality and security: + +- **Automated Testing**: All changes are automatically tested +- **Security Scans**: Vulnerability scanning of dependencies and images +- **Policy Enforcement**: Automated policy checks (OPA, Kyverno) +- **Compliance**: Auditability of all deployments + +### Efficiency and Productivity + +Automation increases team efficiency: + +- **Faster Time-to-Market**: Faster deployment of new features +- **Reduced Manual Work**: Automation of repetitive tasks +- **Fewer Errors**: Fewer manual mistakes through automation +- **Better Collaboration**: Clear interfaces between Dev and Ops ## Repository -**Code**: [Link to source code repository] +**Forgejo**: [forgejo.org](https://forgejo.org/) -**Documentation**: [Link to component-specific documentation] +**Forgejo Actions**: [Forgejo Actions Documentation](https://forgejo.org/docs/latest/user/actions/) + +**ArgoCD**: [argoproj.github.io/cd](https://argoproj.github.io/cd/) ## Getting Started ### Prerequisites -* [Prerequisite 1] -* [Prerequisite 2] +- **Forgejo Account**: Access to Forgejo instance +- **Kubernetes Cluster**: Target cluster for deployments +- **ArgoCD Access**: Access to ArgoCD instance +- **Git**: For repository management -### Quick Start +### Quick Start: Application Deployment -[Step-by-step guide to get started with this component] +1. **Create Application Repository** -1. [Step 1] -2. [Step 2] -3. [Step 3] +```bash +# Create new repository in Forgejo +git init my-application +cd my-application -### Verification +# Add application code and Dockerfile +cat > Dockerfile < + +# 4. Check resource limits +kubectl top pod -n production + +# 5. Rollback via ArgoCD +argocd app rollback my-application +``` + +### Image Pull Errors + +**Problem**: Kubernetes cannot pull container image + +**Solution**: + +```bash +# 1. Verify image exists +docker pull registry.example.com/my-app:v1.2.3 + +# 2. Check image pull secret +kubectl get secret -n production regcred + +# 3. Create image pull secret if missing +kubectl create secret docker-registry regcred \ + --docker-server=registry.example.com \ + --docker-username=user \ + --docker-password=password \ + -n production + +# 4. Reference secret in deployment +kubectl patch deployment my-application -n production \ + -p '{"spec":{"template":{"spec":{"imagePullSecrets":[{"name":"regcred"}]}}}}' +``` + +## Best Practices + +### Golden Path Templates + +Provide standardized templates for common use cases: + +1. **Web Application Template**: Node.js, Python, Go web services +2. **API Service Template**: RESTful API with OpenAPI +3. **Batch Job Template**: Kubernetes CronJob configurations +4. **Microservice Template**: Service mesh integration + +Example repository template structure: + +```text +application-template/ +├── .forgejo/ +│ └── workflows/ +│ ├── build.yaml +│ ├── test.yaml +│ └── deploy.yaml +├── k8s/ +│ ├── base/ +│ └── overlays/ +├── src/ +│ └── ... +├── Dockerfile +├── README.md +└── .gitignore +``` + +### Deployment Checklist + +Before deploying to production: + +- ✅ All tests passing +- ✅ Security scans completed +- ✅ Resource limits defined +- ✅ Health checks configured +- ✅ Monitoring and alerts set up +- ✅ Backup strategy defined +- ✅ Rollback plan documented +- ✅ Team notified about deployment + +### Configuration Management + +- Use ConfigMaps for non-sensitive configuration +- Use Secrets for sensitive data +- Use External Secrets Operator for vault integration +- Never commit secrets to Git +- Use environment-specific overlays (Kustomize) +- Document all configuration options ## Status -**Maturity**: [Production / Beta / Experimental] +**Maturity**: Production + +**Stability**: Stable + +**Support**: Internal Platform Team ## Additional Resources -* [Link to external documentation] -* [Link to community resources] -* [Link to related components] +### Forgejo -## Documentation Notes +- [Forgejo Documentation](https://forgejo.org/docs/latest/) +- [Forgejo Actions Guide](https://forgejo.org/docs/latest/user/actions/) +- [Forgejo API Reference](https://forgejo.org/docs/latest/api/) -[Instructions for team members filling in this documentation - remove this section once complete] +### ArgoCD + +- [ArgoCD Documentation](https://argo-cd.readthedocs.io/) +- [ArgoCD Best Practices](https://argo-cd.readthedocs.io/en/stable/user-guide/best_practices/) +- [ArgoCD Sync Waves](https://argo-cd.readthedocs.io/en/stable/user-guide/sync-waves/) + +### GitOps + +- [GitOps Principles](https://opengitops.dev/) +- [GitOps Patterns](https://www.gitops.tech/) +- [Kubernetes Deployment Strategies](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy) + +### CI/CD + +- [GitHub Actions Documentation](https://docs.github.com/en/actions) (Forgejo Actions compatible) +- [Docker Best Practices](https://docs.docker.com/develop/dev-best-practices/) +- [Container Security Best Practices](https://kubernetes.io/docs/concepts/security/pod-security-standards/) diff --git a/content/en/docs/components/orchestration/platform.md b/content/en/docs/components/orchestration/platform.md index baa528f..38e7a2d 100644 --- a/content/en/docs/components/orchestration/platform.md +++ b/content/en/docs/components/orchestration/platform.md @@ -3,126 +3,507 @@ title: "Platform Orchestration" linkTitle: "Platform Orchestration" weight: 20 description: > - Platform-level component provisioning via Stacks + Platform-level component provisioning via Stacks - Orchestrating the platform infrastructure itself --- -{{% alert title="Draft" color="warning" %}} -**Editorial Status**: This page is currently being developed. - -* **Jira Ticket**: [TICKET-XXX](https://your-jira/browse/TICKET-XXX) -* **Assignee**: [Name or Team] -* **Status**: Draft -* **Last Updated**: YYYY-MM-DD -* **TODO**: - * [ ] Add detailed component description - * [ ] Include usage examples and code samples - * [ ] Add architecture diagrams - * [ ] Review and finalize content -{{% /alert %}} - ## Overview -[Detailed description of the component - what it is, what it does, and why it exists] +Platform Orchestration refers to the automation and management of the platform infrastructure itself. This includes the provisioning, configuration, and lifecycle management of all components that make up the Internal Developer Platform (IDP). + +In the context of IPCEI-CIS, Platform Orchestration means: + +- **Platform Bootstrap**: Initial setup of Kubernetes clusters and core services +- **Platform Services Management**: Deployment and management of ArgoCD, Forgejo, Keycloak, etc. +- **Infrastructure-as-Code**: Declarative management using Terraform and GitOps +- **Multi-Cluster Orchestration**: Coordination across different Kubernetes clusters +- **Platform Stacks**: Reusable bundles of platform components (CNOE concept) + +### Target Audience + +Platform Orchestration is primarily aimed at: + +- **Platform Engineering Teams**: Teams that build and operate the IDP +- **Infrastructure Architects**: Those responsible for the platform architecture +- **SRE Teams**: Teams responsible for reliability and operations ## Key Features -* [Feature 1] -* [Feature 2] -* [Feature 3] +### Declarative Platform Definition + +The entire platform is defined declaratively as code: + +- **GitOps-First**: Everything is versioned in Git and traceable +- **Reproducibility**: The platform can be rebuilt at any time +- **Environment Parity**: Consistency between Dev, Test, and Production +- **Auditability**: Complete history of all changes + +### Self-Bootstrapping + +The platform can bootstrap itself: + +1. **Initial Bootstrap**: Minimal tool (like `idpbuilder`) starts the platform +2. **Self-Management**: After bootstrap, ArgoCD takes over management +3. **Continuous Reconciliation**: Platform is continuously reconciled with Git state +4. **Self-Healing**: Automatic recovery on deviations + +### Stack-based Composition + +Platform components are organized as reusable stacks (CNOE concept): + +- **Modularity**: Components can be updated individually +- **Reusability**: Stacks can be used across different environments +- **Composability**: Compose complex platforms from simple building blocks +- **Versioning**: Stacks can be versioned and tested + +**In IPCEI-CIS**: The stacks concept from CNOE is the core organizational principle for platform components. + +### Multi-Cluster Support + +Platform Orchestration supports different cluster topologies: + +- **Control Plane + Worker Clusters**: Centralized control, distributed workloads +- **Hub-and-Spoke**: One management cluster manages multiple target clusters +- **Federation**: Coordination across multiple independent clusters ## Purpose in EDP -[Explain the role this component plays in the Edge Developer Platform and how it contributes to the overall platform capabilities] +Platform Orchestration is the foundation of the IPCEI-CIS Edge Developer Platform. It enables: + +### Foundation for Developer Self-Service + +Platform Orchestration ensures all services are available that developers need for self-service: + +- **GitOps Engine** (ArgoCD) for continuous deployment +- **Source Control** (Forgejo) for code and configuration management +- **Identity Management** (Keycloak) for authentication and authorization +- **Observability** (Grafana, Prometheus) for monitoring and logging +- **CI/CD** (Forgejo Actions/Pipelines) for automated build and test + +### Consistency Across Environments + +Through declarative definition, consistency is guaranteed: + +- Development, test, and production environments are identically configured +- No "configuration drift" between environments +- Predictable behavior across all stages + +### Platform as Code + +The platform itself is treated like software: + +- **Version Control**: All changes are versioned in Git +- **Code Review**: Platform changes go through review processes +- **Testing**: Platform configurations can be tested +- **Rollback**: Easy rollback on problems + +### Reduced Operational Overhead + +Automation reduces manual effort: + +- No manual installation steps +- Automatic updates and patching +- Self-healing on failures +- Standardized deployment processes ## Repository -**Code**: [Link to source code repository] +**CNOE Reference Implementation**: [cnoe-io/stacks](https://github.com/cnoe-io/stacks) -**Documentation**: [Link to component-specific documentation] +**CNOE idpbuilder**: [cnoe-io/idpbuilder](https://github.com/cnoe-io/idpbuilder) + +**Documentation**: [CNOE.io Documentation](https://cnoe.io/docs/) ## Getting Started ### Prerequisites -* [Prerequisite 1] -* [Prerequisite 2] +- **Docker**: For local Kubernetes clusters (Kind) +- **kubectl**: Kubernetes CLI tool +- **Git**: For repository management +- **idpbuilder**: CNOE bootstrap tool ### Quick Start -[Step-by-step guide to get started with this component] +Platform Orchestration with CNOE Reference Implementation: -1. [Step 1] -2. [Step 2] -3. [Step 3] +```bash +# 1. Install idpbuilder +curl -fsSL https://cnoe.io/install.sh | bash + +# 2. Bootstrap platform +idpbuilder create \ + --use-path-routing \ + --package-dir https://github.com/cnoe-io/stacks//ref-implementation + +# 3. Wait for platform ready (ca. 10 minutes) +kubectl get applications -A +``` ### Verification -[How to verify the component is working correctly] +Verify the platform is running correctly: + +```bash +# Get platform secrets (credentials) +idpbuilder get secrets + +# Check all ArgoCD applications +kubectl get applications -n argocd + +# Expected: All applications "Synced" and "Healthy" +``` + +Access URLs (with path-routing): + +- **ArgoCD**: `https://cnoe.localtest.me:8443/argocd` +- **Forgejo**: `https://cnoe.localtest.me:8443/gitea` +- **Keycloak**: `https://cnoe.localtest.me:8443/keycloak` ## Usage Examples -### [Use Case 1] +### Use Case 1: Platform Bootstrap -[Example with code/commands showing common use case] +Initial bootstrapping of a new platform instance: ```bash -# Example commands +idpbuilder create \ + --use-path-routing \ + --package-dir https://github.com/cnoe-io/stacks//ref-implementation \ + --log-level debug + +# Workflow: +# 1. Creates Kind cluster +# 2. Installs ingress-nginx +# 3. Clones and installs ArgoCD +# 4. Installs Forgejo +# 5. Waits for core services +# 6. Creates technical users +# 7. Configures Git repositories +# 8. Installs remaining stacks via ArgoCD ``` -### [Use Case 2] +After approximately 10 minutes, the platform is fully deployed. -[Another common scenario] +### Use Case 2: Adding New Platform Components + +Add new platform components via ArgoCD: + +```bash +# Create ArgoCD Application for new component +cat < + +# 2. View sync status +argocd app sync --dry-run + +# 3. Force sync +argocd app sync --force + +# 4. Check for errors in ArgoCD logs +kubectl logs -n argocd deployment/argocd-application-controller +``` + +### Git Repository Connection Issues + +**Problem**: ArgoCD cannot access Git repository + +**Solution**: + +```bash +# 1. Verify repository configuration +argocd repo list + +# 2. Test connection +argocd repo get https://your-git-repo + +# 3. Check credentials +kubectl get secret -n argocd + +# 4. Re-add repository with correct credentials +argocd repo add https://your-git-repo \ + --username \ + --password +``` + +## Platform Orchestration Best Practices + +Based on experience and [CNCF Guidelines](https://tag-app-delivery.cncf.io/whitepapers/platforms/): + +1. **Start Simple**: Begin with the CNOE reference stack, extend gradually +2. **Automate Everything**: Manual platform changes are anti-pattern +3. **Monitor Continuously**: Use observability tools for platform health +4. **Document Well**: Platform documentation is essential for adoption +5. **Version Everything**: All platform components should be versioned +6. **Test Changes**: Platform updates should be tested in non-prod +7. **Plan for Disaster**: Backup and disaster recovery strategies are important +8. **Use Stacks**: Organize platform components as reusable stacks ## Status -**Maturity**: [Production / Beta / Experimental] +**Maturity**: Production (for CNOE Reference Implementation) + +**Stability**: Stable + +**Support**: Community Support via CNOE Community ## Additional Resources -* [Link to external documentation] -* [Link to community resources] -* [Link to related components] +### CNOE Resources -## Documentation Notes +- [CNOE Official Website](https://cnoe.io/) +- [CNOE GitHub Organization](https://github.com/cnoe-io) +- [CNOE Reference Implementation](https://github.com/cnoe-io/stacks) +- [CNOE Community Slack](https://cloud-native.slack.com/archives/C05TN9WFN5S) -[Instructions for team members filling in this documentation - remove this section once complete] +### Platform Engineering + +- [CNCF Platforms White Paper](https://tag-app-delivery.cncf.io/whitepapers/platforms/) +- [Platform Engineering Maturity Model](https://tag-app-delivery.cncf.io/whitepapers/platform-eng-maturity-model/) +- [Team Topologies](https://teamtopologies.com/) - Organizational patterns + +### GitOps + +- [GitOps Working Group](https://opengitops.dev/) +- [ArgoCD Best Practices](https://argo-cd.readthedocs.io/en/stable/user-guide/best_practices/) +- [GitOps Principles](https://opengitops.dev/) + +### CNOE Stacks + +- [Understanding CNOE Stacks](https://cnoe.io/docs/reference-implementation/stacks/) +- [Creating Custom Stacks](https://cnoe.io/docs/reference-implementation/customization/)