How We Built Preview Environments on Kubernetes and AWS – InApps is an article under the topic Software Development Many of you are most interested in today !! Today, let’s InApps.net learn How We Built Preview Environments on Kubernetes and AWS – InApps in today’s post !

Read more about How We Built Preview Environments on Kubernetes and AWS – InApps at Wikipedia

You can find content about How We Built Preview Environments on Kubernetes and AWS – InApps from the Wikipedia website

 

Romaric Philogène

Romaric is CEO and co-founder of Qovery with more than 10 years of experience in site reliability engineering and software development.

 

For two years at Qovery, we built a Preview Environment system to help developers get a full replica of their production environment for every pull request. Meaning when you create a pull request for an application, Qovery duplicates all the other applications and databases.

Building our Preview Environment system was challenging because we needed to adequately support applications, databases, networks, secrets and many other services. This article will explain how some components work for our Preview Environment system.

Some people call preview environments “review apps” due to their background with Heroku. The main difference with the Qovery Preview Environment system is that all the applications and databases run inside an environment. Each environment is attached to a Kubernetes cluster. I will go into deeper detail below.

If you want to see in detail how Qovery Preview Environment works, check out our open source Qovery Engine.

Environment

On Qovery, every application and database belong to an environment. It is a logical entity that links all resources together. When turning on the Preview Environment feature, Qovery will duplicate an existing environment to create a new one.

A new environment will be created with all the resources for every pull request created. Then you can try out the new feature in a new isolated environment. There is no risk of breaking your original environment; that can be the production environment.

Read More:   Why Feature Management Is the Future of Software Delivery – InApps Technology 2022

Let’s dig into the details of each service created, from the simplest to the most complex.

Cloning an Application

On Qovery, an application is a container running in a Kubernetes pod. Cloning this application when a Preview Environment is created results in creating a new Kubernetes namespace and duplicating the Kubernetes deployment configuration by changing the namespace ID.

The simplest part is if you do not consider the network and the environment variables and secrets yet. Building a POC (proof of concept) supporting only containers is straightforward and can be done in a few days. This is what most of the preview environment systems out there provide. But things start to get more complicated for real-world use.

Cloning Environment Variables and Secrets

You might not want to use your production environment variables and secrets for a preview environment, right? That is why we built an inheritance and scope system to manage your environment variables and secrets across your different environments.

Inheritance

Let’s say you use the environment variable NODE_ENV=production. You might want to use the same environment variable with the value development. This is what you can do with Qovery, and it means you need to map the values depending on the environment dynamically.

Scope

Let’s say you have 20 environments and you want to set an environment variable for all your environments. With no scope feature in place, you will have to set it individually for each environment. That is why we associated a scope to every environment variable and secret. You set an environment variable with the “project” scope, and it will be available for all the environments.

Secret Encryption

A secret is similar to an environment variable, except you can’t reveal the value, meaning it is write-only. Behind the scene, Qovery encrypts and salts the value, and stores it in the Kubernetes secrets service.

Cloning the Network

Cloning the network results in cloning the configuration for the internal (Kubernetes services and ingresses) and external network (load balancers, gateway, etc.). The most complex is the external network because you have to consider generating a new external domain and TLS. We also let our users set their own domain and wildcard domain, which is additional work to make sure everything is working correctly.

Read More:   This AI Can Automatically Decipher Lost Ancient Languages – InApps 2022

Cloning Database

Qovery provides two types of databases, the managed one and the container one. AWS provides the managed databases, for instance, AWS RDS Postgres. It is great for production, and AWS guarantees backups and scaling with Postgres’s container mode providing a container instance with attached block storage (AWS EBS) for persistence.

It’s cheaper and faster to spin up but with no backups, which is excellent for development purposes. Depending on the database type chosen, we will clone the database and the appropriate network services. On RDS, we also need to consider creating a second VPC (virtual private cloud). This is where everything starts to become more complex.

Cloning a database also means seeding the Preview Environment database, or even clone the production database, which is not always possible for legal or technical reasons. One thing we had to consider at every stage is, “What happens if X operation goes wrong?” This is why we have built a transactional deployment engine. I would be happy to explain how it works in a future article.

Resources Isolation

Depending on their usage and how critical their business is, our users choose to use physical isolation combined with a logical one between their Preview Environments. It is a premium feature that requires a huge amount of development time from us. Physical isolation is safer than logical isolation, but it is also more complex and expensive to maintain. For instance, SaaS in the health care industry must comply with HIPAA security requirements. They need to provide physical isolation between their users, while a SaaS in the gaming industry can stick to the logical isolation model.

Logical Isolation

Kubernetes namespaces provide logical isolation in our context. Each environment has its own namespace. Deleting one namespace results in deleting all the Kubernetes resources of an environment. At Qovery, we do not consider Kubernetes namespaces, even with the appropriate RBAC rules, suitable for multitenant applications.

Read More:   Nestjs Typeorm Graphql Dataloader tutorial with Typescript

Physical Isolation

For physical isolation, Qovery provides different architectural choices.

From VPC to Kubernetes cluster and cloud account isolation, the Qovery platform uses a high level of abstraction to manage those architectures.

Testing

Building a Preview Environment system robust enough to be used by thousands of developers must be well tested and where we spend at least 50% of our development time. We have thousands of tests running to validate that we fit all the normal and edge cases, from unit tests and functional tests to end-to-end tests (E2E). It is a huge part of our development.

Conclusion

I explained how we built our Preview Environment system on Qovery with Kubernetes on AWS. Building a stable, secure and performant Preview Environment system is not easy and takes a huge amount of time, especially when managing stateful resources like databases and networks. However, the reward is massive for companies using the Preview Environment features.

For example, here is a company that releases more than 100 times faster than before with the Preview Environment feature in less than a week.

Any question? Feel free to contact us on Qovery or check out our Qovery Preview Environment page.

Feature image via Pixabay

Source: InApps.net

List of Keywords users find our article on Google:

aws operating system
aws ebs
aws environment
qovery
aws ebs stats
ebs isolation
aws environment variables
aws ベトナム
postgres rds
aws wikipedia
preview environment
logical recruitment partners
hire aws rds developer
aws environment meaning
aws rust
heroku config variables
aws databases
aws containers
aws core values
aws work culture
postgres rds stats
heroku clone database
rds postgres
aws zero client
kubernetes external secrets
ebs aws
heroku review apps
aws postgres
postgres aws
hire amazon rds developer
rust environment variables
aws rds
hire aws rds developers
multitenant database containers
aws meaning
aws database
aws rds instance types
aws system manager
aws entity
gateway cloning technology
amazon rds reviews
aws cheap database
pod group linkedin
aws developers near me
hire heroku developer
part time aws jobs
rbac postgres
heroku review
aws numbering system
scratch dig chart
postgres rds dashboard
aws ebs dashboard
aws ebs health
aws kubernetes
postgres rds health
aws rds health
Rate this post
As a Senior Tech Enthusiast, I bring a decade of experience to the realm of tech writing, blending deep industry knowledge with a passion for storytelling. With expertise in software development to emerging tech trends like AI and IoT—my articles not only inform but also inspire. My journey in tech writing has been marked by a commitment to accuracy, clarity, and engaging storytelling, making me a trusted voice in the tech community.

Let’s create the next big thing together!

Coming together is a beginning. Keeping together is progress. Working together is success.

Let’s talk

Get a custom Proposal

Please fill in your information and your need to get a suitable solution.

    You need to enter your email to download

      Success. Downloading...