This repository demonstrates advanced DevSecOps CI/CD patterns using GitHub Actions and Kustomize:
- OIDC AWS Authentication: The workflow utilizes OpenID Connect (OIDC) to authenticate with AWS. This eliminates the necessity of storing long-lived, static IAM access keys in GitHub Secrets, significantly reducing the risk of credential compromise.
- Environment Isolation via Kustomize: By leveraging Kustomize overlays (
dev,staging,prod), the infrastructure configuration is strictly isolated. This guarantees separation of duties, allowing precise RBAC controls over who can deploy to each specific environment slice.
- End-to-End CI/CD Pipeline for Simple Node App Deployment on EKS using GitHub Actions
- Hit the Star! ⭐ - Author by DevCloud Ninjas
The repository is organized into several key directories:
├── app
│ ├── app.py
│ ├── calculator.js
│ ├── calculator.test.js
│ ├── Dockerfile
│ ├── Dockerfile-python
│ ├── index.js
│ └── package.json
├── kustomize
│ ├── base
│ │ ├── deploy.yaml
│ │ ├── ingress.yaml
│ │ ├── kustomization.yaml
│ │ └── svc.yaml
│ └── overlays
│ ├── dev
│ │ ├── deploy-dev.yaml
│ │ ├── ingress-dev.yaml
│ │ ├── kustomization.yaml
│ │ └── svc-dev.yaml
│ ├── prod
│ │ ├── deploy-prod.yaml
│ │ ├── ingress-prod.yaml
│ │ ├── kustomization.yaml
│ │ └── svc-prod.yaml
│ └── staging
│ ├── deploy-staging.yaml
│ ├── ingress-staging.yaml
│ ├── kustomization.yaml
│ └── svc-staging.yaml
├── README.md
├── terraform
│ ├── ingress-nginx.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── terraform.tf
│ └── variables.tf
└── VERSION
The build job performs several key tasks:
- Environment Setup: Node.js environment is set up and dependencies are installed.
- Run Tests: Executes unit tests for the application.
- Determine Version Increment: Checks the commit message to determine if the version needs to be incremented using Semantic Versioning scheme.
- Docker Build and Push: Builds a Docker image and pushes it to a registry.
The deployment job handles the following:
- Terraform Setup: Initializes Terraform and sets up the backend with different state files.
- Terraform Plan and Apply: Executes
terraform planandterraform applyto provision environment specific infrastructure. - Kubernetes Configuration: Configures
kubectlto interact with the Kubernetes cluster. - Ingress Controller Setup: Uses Helm to install the ingress controller.
- Application Deployment: Uses
kubectlto deploy theKustomizedapplication manifests.
- Dev Environment: Uses
t3.smallEC2 instances and deploys a single replica. - Staging Environment: Uses
t3.mediumEC2 instances and deploys three replicas. - Prod Environment: Uses
t3.largeEC2 instances and deploys three replicas.
DNS for all environments is automatically managed via Cloudflare and environment-specific subdomains are assigned and pointed to their respective LB hostname (using CNAME) ie., dev.afraz.dev, staging.afraz.dev and prod.afraz.dev.
Slack notifications are configured to send updates at the end of each job. This provides immediate feedback on the success or failure of the pipeline and also updates on the DNS changes if applicable.
The pipeline adheres to GitOps principles, where Git serves as the single source of truth. Any change to the application or infrastructure is expected to be made through a Git commit.
If you are planning to use this repo for learning, please hit the star. Thanks!
