Go to file
Ian bc14e01e9d
Build with kube 1.24 (#1)
* Build with kubernetes 1.24 libraries

* Try to resolve circle build error

* Fix build warnings

* Update test parser to use modern command install method

* Attempt to pass helm chart testing

* Correct testing kube version

* Update go version used by the drone ci

* Remove beta versions from templetes
2023-03-01 11:51:58 -05:00
.circleci Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
.dependabot add dependabot config 2020-04-19 20:45:47 +02:00
.pipeline GCP cloud build integration and chart lint and install test 2018-11-23 12:54:57 +00:00
.scripts Revert unnecessary sh --> bash change 2020-09-08 23:05:48 -05:00
.test ci: fix ct timeout 2021-01-05 13:33:11 +01:00
approvals reverted file permissions from 755 to 644 2020-06-08 07:22:56 -07:00
bot ran through gofmt; removed uneccessary comments; cleaned prometheus test 2020-06-12 16:14:11 -07:00
chart/keel Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
cmd/keel Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
constants Adding constant to define restricted namespace env var 2021-05-17 17:12:20 +02:00
deployment Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
extension Accept AWS ECR token for any AWS account ECR, might resolve #441 2020-12-30 15:39:16 +01:00
internal Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
pkg Support Github Container Registry 2021-02-25 18:21:43 +09:00
provider Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
registry ran through gofmt; removed uneccessary comments; cleaned prometheus test 2020-06-12 16:14:11 -07:00
secrets Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
static added readme 2019-05-29 23:06:16 +01:00
tests Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
trigger Merge pull request #577 from nbendafi-yseop/feature/floating_tag 2021-02-22 12:54:09 +00:00
types reverted file permissions from 755 to 644 2020-06-08 07:22:56 -07:00
ui Updated copyright year 2020-10-18 13:04:53 -06:00
util Merge pull request #507 from nnt1054/feature/helm3_provider 2020-07-14 10:32:06 +01:00
version updated repo 2017-11-01 18:25:28 +00:00
.drone.yml Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
.gitignore Add SemVer pre-release handling 2020-04-19 01:36:21 +02:00
Dockerfile Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
Dockerfile.aarch64 Dockerfiles for arm 2018-10-14 14:00:55 +01:00
Dockerfile.armhf makefile for arm 2020-03-02 23:44:15 +00:00
Dockerfile.debian move to go 1.14.2 2020-04-19 20:07:49 +02:00
Dockerfile.local vendor updated 2017-08-04 22:15:11 +01:00
LICENSE license, readme 2017-06-11 23:44:13 +01:00
Makefile Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
go.mod Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
go.sum Build with kube 1.24 (#1) 2023-03-01 11:51:58 -05:00
readme.md reverted file permissions from 755 to 644 2020-06-08 07:22:56 -07:00

readme.md

CircleCI Go Report Docker Pulls Drone Status Boss Bounty Badge

Keel - automated Kubernetes deployments for the rest of us

Keel is a tool for automating Kubernetes deployment updates. Keel is stateless, robust and lightweight.

Keel provides several key features:

  • Kubernetes and Helm providers - Keel has direct integrations with Kubernetes and Helm.

  • No CLI/API - tired of f***ctl for everything? Keel doesn't have one. Gets job done through labels, annotations, charts.

  • Semver policies - specify update policy for each deployment/Helm release individually.

  • Automatic Google Container Registry configuration - Keel automatically sets up topic and subscriptions for your deployment images by periodically scanning your environment.

  • Native, DockerHub, Quay and Azure container registry webhooks support - once webhook is received impacted deployments will be identified and updated.

  • Polling - when webhooks and pubsub aren't available - Keel can still be useful by checking Docker Registry for new tags (if current tag is semver) or same tag SHA digest change (ie: latest).

  • Notifications - out of the box Keel has Slack, Hipchat, Mattermost and standard webhook notifications, more info here

Support

Support Keel's development by:

Warp speed quick start

To achieve warp speed, we will be using sunstone.dev service and Minikube.

Start Minikube:

minikube start

Install customized Keel (feel free to change credentials, namespace and version tag) straight from your kubectl.

# To override default latest semver tag, add &tag=x.x.x query argument to the URL below
kubectl apply -f https://sunstone.dev/keel?namespace=default&username=admin&password=admin&tag=latest
# and get Keel IP:
minikube service --namespace default keel --url
http://192.168.99.100:3199

We are overriding default latest semver tag with latest since it has the new UI. If you want to use latest semver, just remove the &tag=latest part from the URL.

Creating remotely accessible Keel instance

Keel can work together with webhook relay tunnels. To deploy Keel with Webhook Relay sidecar you will need to get a token, then pre-create a tunnel and:

kubectl apply -f https://sunstone.dev/keel?namespace=default&username=admin&password=admin&relay_key=TOKEN_KEY&relay_secret=TOKEN_SECRET&relay_tunnel=TUNNEL_NAME&tag=latest

Now, you can access Keel remotely.

Helm quick start

Prerequisites:

You need to add this Chart repo to Helm:

helm repo add keel https://charts.keel.sh 
helm repo update

Install through Helm (with Helm provider enabled by default):

helm upgrade --install keel --namespace=kube-system keel/keel

If you work mostly with regular Kubernetes manifests, you can install Keel without Helm provider support:

helm upgrade --install keel --namespace=keel keel/keel --set helmProvider.enabled="false" 

To install for Helm v3, set helmProvider.version="v3" (default is "v2"):

helm install keel keel/keel --set helmProvider.version="v3" 

That's it, see Configuration section now.

Quick Start

A step-by-step guide to install Keel on your Kubernetes cluster is viewable on the Keel website:

https://keel.sh/examples/#example-1-push-to-deploy

Configuration

Once Keel is deployed, you only need to specify update policy on your deployment file or Helm chart:

apiVersion: extensions/v1beta1
kind: Deployment
metadata: 
  name: wd
  namespace: default
  labels: 
    name: "wd"
  annotations:
    keel.sh/policy: minor # <-- policy name according to https://semver.org/
    keel.sh/trigger: poll # <-- actively query registry, otherwise defaults to webhooks
spec:
  template:
    metadata:
      name: wd
      labels:
        app: wd        
    spec:
      containers:                    
        - image: karolisr/webhook-demo:0.0.8
          imagePullPolicy: Always            
          name: wd
          command: ["/bin/webhook-demo"]
          ports:
            - containerPort: 8090

No additional configuration is required. Enabling continuous delivery for your workloads has never been this easy!

Documentation

Documentation is viewable on the Keel Website:

https://keel.sh/docs/#introduction

Contributing

Before starting to work on some big or medium features - raise an issue here so we can coordinate our efforts.

We use pull requests, so:

  1. Fork this repository
  2. Create a branch on your local copy with a sensible name
  3. Push to your fork and open a pull request

Developing Keel

If you wish to work on Keel itself, you will need Go 1.12+ installed. Make sure you put Keel into correct Gopath and go build (dependency management is done through dep).

To test Keel while developing:

  1. Launch a Kubernetes cluster like Minikube or Docker for Mac with Kubernetes.
  2. Change config to use it: kubectl config use-context docker-for-desktop
  3. Build Keel from cmd/keel directory.
  4. Start Keel with: keel --no-incluster. This will use Kubeconfig from your home.

Running unit tests

Get a test parser (makes output nice):

go get github.com/mfridman/tparse

To run unit tests:

make test

Running e2e tests

Prerequisites:

  • configured kubectl + kubeconfig
  • a running cluster (test suite will create testing namespaces and delete them after tests)
  • Go environment (will compile Keel before running)

Once prerequisites are ready:

make e2e