Otomi Projects
Otomi consists out of the following projects:
Project | open source |
---|---|
otomi-core | Yes |
otomi-tasks | Yes |
otomi-clients | Yes |
otomi-console | No |
otomi-api | No |
Otomi Core
Otomi Core contains all the integrated applications and is made available (per release) as a container image.
Otomi Core also contains the source code for Otomi CLI. Otomi CLI can be used for advanced initial configuration (bootstrapping), deployment, sync, push, template validation, and much more.
Integrated K8s applications
Otomi Core is the heart of Otomi and contains a suite of the following integrated Kubernetes applications:
- Istio: The service mesh framework with end-to-end transit encryption
- Keycloak: Identity and access management for modern applications and services
- Cert Manager - Bring your own wildcard certificate or request one from Let's Encrypt
- Nginx Ingress Controller: Ingress controller for Kubernetes
- External DNS: Synchronize exposed ingresses with DNS providers
- Drone: Continuous integration platform built on Docker
- Gitea: Self-hosted Git service
- Velero: Back up and restore your Kubernetes cluster resources and persistent volumes
- Argo CD: Declarative continuous deployment
- Knative: Deploy and manage serverless workloads
- Kaniko: Build container images from a Dockerfile
- Prometheus: Collecting container application metrics
- Grafana: Visualize metrics, logs, and traces from multiple sources
- Grafana Loki: Collecting container application logs
- Harbor: Container image registry with role-based access control, image scanning, and image signing
- HashiCorp Vault: Manage Secrets and Protect Sensitive Data
- OPA/Gatekeeper: Policy-based control for cloud-native environments
- Jaeger: End-to-end distributed tracing and monitor for complex distributed systems
- Kiali: Observe Istio service mesh relations and connections
- Minio: High performance Object Storage compatible with Amazon S3 cloud storage service
- Trivy: Kubernetes-native security toolkit
- Thanos: HA Prometheus setup with long term storage capabilities
- Falco: Cloud Native Runtime Security
- Opencost: Cost monitoring for Kubernetes
- Tekton Pipeline: K8s-style resources for declaring CI/CD pipelines
- Tekton Triggers: Trigger pipelines from event payloads
- Tekton dashboard: Web-based UI for Tekton Pipelines and Tekton Triggers
- Paketo build packs: Cloud Native Buildpack implementations for popular programming language ecosystems
- Cloudnative-pg: Open source operator designed to manage PostgreSQL workloads
- Grafana Tempo: High-scale distributed tracing backend
- OpenTelemetry: Instrument, generate, collect, and export telemetry data to help you analyze your software’s performance and behavior
- Sealed Secrets: Encrypt your Secret into a SealedSecret, which is safe to store - even inside a public repository.
- RabbitMQ: Kubernetes operator to deploy and manage RabbitMQ clusters.
Catagories
Otomi contains four catagories of integrated K8s applications:
- Core applications: applications that are activated by default
- Shared applications: applications that are shared between teams. Shared applications are user-, and role-aware or not (user is anonymous)
- Team applications: applications with a dedicated instance per team
- Optional applications: applications that are optional and can be activated by the platform admin
The following table shows all integrated applications:
Application | Core | Shared | Team | User/role-aware | Optional |
---|---|---|---|---|---|
Istio | X | ||||
Ingress NGINX Controller | X | ||||
Knative | X | ||||
KeyCloak | X | X | |||
Prometheus Server | X | X | |||
Prometheus kube state metrics | X | X | |||
Alertmanager | X | X | |||
Grafana/Loki | X | X | X | ||
Gatekeeper Operator | X | ||||
Hashicorp Vault | X | X | X | ||
Harbor | X | X | X | ||
Drone | X | X | |||
Gitea | X | X | |||
Httpbin | X | X | |||
Jeager | X | X | |||
Kiali | X | ||||
Velero | X | ||||
Minio | X | ||||
Opencost | X | ||||
Tekton Pipeline | X | X | X | X | |
Trivy Operator | X | ||||
Cloudnative-pg | X |
Advanced ingress architecture as its core
Otomi by default installs and configures an advanced ingress architecture. Ingress for a service can be configured using Otomi Services. The following figure shows the ingress and SSO architecture.
The ingress & SSO architecture overview explained:
- (optional) an external gateway is used for termination of external traffic (e.g. an Azure Application Gateway or an AWS Application Load Balancer).
- 2 Ingress NGINX controllers are deployed, one for public access and one for authenticated access.
- Authenticated (SSO) access is handled by an oauth2 proxy and KeyCloak. The user logs in using the Otomi custom KeyCloak login page.
- KeyCloak is configured with an external IDP (optional) or uses local accounts. After authentication, KeyCloak provides a normalized JWT token. The JWT token is used by integrated core applications (providing user and role information) and team services configured with SSO
- 4 Istio (ingress) gateways are provisioned:
- a public gateway for routing public (non authenticated traffic to a service)
- an authentication gateway to route authenticated traffic to a service
- a local gateway (for local cluster routing)
- a Knative gateway to route traffic to Knative services
- For each service a Istio virtual service is configured.
- One egress gateway is provisioned for all egress traffic (network policies allow all egress traffic).
Otomi Tasks
Otomi Tasks contains a set of Kubernetes jobs and teh Otomi Operator. The jobs and Operator ensure that the configuration of applications integrated in Otomi are always equal to the desired-state configuration (see Otomi Values). An example: If a team is created via Otomi Console (in combination with Otomi API), Otomi Tasks ensures that a project is created for the new team in Harbor, the access to the project in Harbor is configured, a robot account (that can be used to push images to the project registry) is created and that a pull secret is created in the namespace of the team.
Otomi Tasks is currently used to configure the following applications:
- KeyCloak
- Harbor
- Gitea
- Drone
- Otomi (copy-certs and wait-for)
Otomi Clients
A factory to build and publish openapi clients used in the redkubes/otomi-tasks repo.
Otomi Clients is currently used to generate openapi clients for the following applications:
- KeyCloak
- Harbor
- Gitea
Otomi API
Otomi API allows for a controlled change of all Otomi Values, based on a configuration scheme and is the brain of Otomi. Otomi API runs as a container on each cluster running.
Otomi API is not open source. When installing Otomi, a FREE Community Edition version is installed. Contact Red Kubes for details on support and pricing for a full featured version.
Otomi Console
Otomi Console is the User Interface of Otomi. Otomi Console communicates with Otomi API for reading and changing Otomi Values configuration. Otomi Console also offers (via the Otomi Apps option) shortcuts to the UI of the various integrated applications.
Otomi Console is not open source. When installing Otomi, a FREE Community Edition version is installed. Contact Red Kubes for details on support and pricing for a full featured version.