Skip to content

xjnoel/mobile-deposit-api-devoxx2017

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Devoxx 2017 example application

This application is a very simple SpringBoot app.

During the Devoxx lab, you will learn how to use Jenkins Pipeline to build it, build a Docker image of the app, push it to a Docker registry, and finally deploy to a Kubernetes cluster.

First of all, we need to setup various credentials and secrets in order to access GitHub, Azure and the Kubernetes cluster.

GitHub Personal Access Token

If you use Jenkins and GitHub (and this is the case in this lab), you will need to use a GitHub Personal Access Token to override the anonymous rate limits of the GitHub API.

Here is how to create a GitHub Personal Access Token:

  • Login on GitHub with your credentials
  • Go to your Settings
  • Access the Personal access tokens page
  • Click on Generate new token
  • Input your password if required
  • Give a name to the token and check the following scopes:
    • repo:status
    • repo_deployment
    • public_repo
    • read:org
    • write:repo_hook
    • read:repo_hook

  • Then hit the Generate token button
  • Keep the page opened

Let's input this token in Jenkins as a Credential.

  • Login on Jenkins with your provided login/password
  • Go on your Master and inside your personal Folder
  • Click on the Credentials link on the left menu
  • Click on the Folder link which appeared
  • Click on the Global credentials (unrestricted) link
  • Click on the Add Credentials link
    • Kind: 'Username with password'
    • Username: input your GitHub username
    • Password: copy/paste the access token which was previously created
    • Description: input something useful such as 'Github token'

  • Hit the OK button

With this token, you will not face any GitHub API rate limitation.

Docker Registry credentials

You will deploy your Docker image to a private Docker Registry. Of course this registry is secured by a login and password. Let's create another Jenkins Credential to host this sensible information

  • Go on your Master and inside your personal Folder
  • Click on the Credentials link on the left menu
  • Click on the Folder link which appeared
  • Click on the Global credentials (unrestricted) link
  • Click on the Add Credentials link
    • Kind: 'Username with password'
    • Username: input your Docker registry login
    • Password: enter your Docker registry password
    • id: input 'test-registry'. This ID will be used in the Jenkins Pipeline to identify the Credential.

  • Hit the OK button

Kubernetes Secret key

You will deploy your application to a Kubernetes cluster. In order to do this, you will use the kubectl command line, which is secured by a Secret key. Let's input this Secret key into Jenkins as a Credential.

  • Go on your Master and inside your personal Folder
  • Click on the Credentials link on the left menu
  • Click on the Folder link which appeared
  • Click on the Global credentials (unrestricted) link
  • Click on the Add Credentials link
    • Kind: 'Secret file'
    • File: select the secret key file located on your laptop
    • ID: input 'kuby'. This ID will be used in the Jenkins Pipeline to identify the secret.

  • Hit the OK button

Environment variables

Hard-coded values in a Pipeline is a bad practice. We are going to setup some specific values as Environment Variables to keep a generic Jenkins Pipeline. CloudBees Jenkins Enterprise enables you to setup environment variables on a folder. Its visibility will be limited to this folder and subfolders. So each of the attendees can setup their own env. variables on their folder, without impacting each other.

  • Go on your Master and inside your personal Folder
  • Click on the Configure link on the left menu
  • Scroll down to 'Environment Variables' text area and input the following variables (1 variable per line, just like a Property file):
DOCKER_REGISTRY=xxxxxxxxxxxx
k8s_username=xxxxxxxxxxxx
k8s_password=xxxxxxxxxxxx
k8s_tenant=xxxxxxxxxxxx
k8s_name=xxxxxxxxxxxx
k8s_resourceGroup=xxxxxxxxxxxx

  • Hit the Save button

Pipeline job

Let's create the job for our application. It's going to be a Jenkins Pipeline, and the source code will be a fork of this repository in GitHub. We will even use a Multibranch Pipeline job: Jenkins will scan all the branches and Pull Requests of the repository and create 1 Pipeline per branch / PR found.

  • Fork this repository with your personal GitHub account.
  • Go on your Master and inside your personal Folder
  • Click on the New Item link in the left menu
  • Give a name to your job
  • Click on Multibranch
  • Click on the *OK button
  • Scroll down to the Branch Sources part
  • Click on Add source and select GitHub
  • In the field Owner, input your GitHub username
  • In the Scan credentials dropdown list, select the credential you previously created, which contains your GitHub access token
  • In the Repository dropdown list, select the repository mobile-deposit-api-devoxx2017
  • Hit the Save button

Jenkins is now going to scan the branches/ PR in the repository and look for Jenkinsfile files. When a Jenkinsfile is found, a Pipeline is created. Jenkins should have detected the master branch and should have started building the job.

Jenkinsfile

File has comments. The Pipeline is quite simple:

  • Get an agent

  • Checkout source code

  • Get the latest Git commit to tag the Docker image

  • Build the application from a Docker container. The Docker image will have JDK8 and Maven 3.3

  • Archive the JUnit test results

  • Stash files which will be needed later

  • Build the Docker image of the application

  • Push this image to our private Docker registry (hosted on Azure, via ACR)

  • Use Azure CLI 2.0 to connect to Azure

  • Use Azure CLI 2.0 to get Kubernetes credentials

  • Create a deployment.yml for Kubernetes, which will deploy the new version of the application and expose it on Internet

  • Execute the deployment via the Kubernetes commandline kubectl

Checking if the Docker image has been pushed to ACR

  1. Browse [https://portal.azure.com]
  2. Authenticate with your Microsoft Azure Credentials
  3. Browse the resource group where you have created the cluster
  4. Find the resource of type Container Registry and click on the Repositories menu entry on the left

You should see 1 or multiple tags for the Docker images you have pushed.

Checking if the Application is working

In order to expose your application to the world, you need to ask Kubernetes to provision a public IP on Azure. This is done via kubectl expose ... but it takes some time. You can do a regular check using the following command to see when a public IP has been assigned:

kubectl get svc

Here is an example of the output with a public IP assigned:

root@05f3498bf643:~# kubectl get svc
NAME                 CLUSTER-IP    EXTERNAL-IP    PORT(S)    AGE
kubernetes           10.0.0.1      <none>         443/TCP    17h
mobile-deposit-api   10.0.129.65   52.232.40.27   8080/TCP   6m

To access your application, just use the following URL and use the external IP given by the previous command:

http://xxxxxxxxxxx:8080/account/deposit

The result should be JSON containing the details of a bank account and the version of the component.

About

mobile-deposit-api used during Devoxx 2017 lab

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Java 100.0%