Documentation
Introduction
Installation
- In the AWS EC2 console, navigate to Images then Image Catalog
- In the AWS Marketplace AMIs tab, search for smoothglue, select it, then click Launch instance with AMI
Launching from the Marketplace
Note:
The Basic tier does not have additional costs beyond the charges associated with the Amazon EC2 instance.
Provide Instance Details
- Follow the wizard to launch your instance, paying attention to the instance size selected
- We recommend deploying SmoothGlue Run Basic into a private subnet and exposing it later via load balancing if public access is required.
- Ensure the security groups allow access from the IPs/subnets you will be accessing from
- Click Launch instance and monitor the instance rollout via the console.
Note:
Post AWS initialization, SmoothGlue Run Basic will be available from your browser in approximately 15 minutes, depending on the instance size selected.
Getting Started
- To access the web console, direct your browser to the IP address of the private IP address issued by EC2 for this instance (e.g. https://10.123.45.67)
Note:
SmoothGlue Run Basic generates and uses self-signed TLS certificates by default so you will need to accept any browser warnings that appear
Single Sign-On
- The default username is
admin
and default password is thepassword
- Upon first login, you will be required to change your password. This account will give you access via SSO to the entire platform from here on.
- Then proceed to Sign in.
Platform Administration
Organizations
Users
-
Platform AdminThe Platform Admin role is designed to enable system admins, IT help desk representatives, or other roles depending on the company structure to perform user management tasks from a single place
-
Organization AdminThe Organization Admin role is designed for individuals in positions such as project managers, engineering managers, technical leaders, or other roles responsible for administering software development teams.
-
Organization PrivilegedThe Organization Privileged role is available to empower users with additional permissions beyond that of Organization Member. This functionality depends on the particular modules installed.
-
Organization MemberThe Organization Member role is designed for application developers and any software development team member who needs access to tools on the SmoothGlue platform.
Tools
-
Handles alerts sent by client applications such as the Prometheus server. It takes care of deduplicating, grouping, and routing them to the correct receiver integration such as email, PagerDuty, or OpsGenie. It also takes care of silencing and inhibition of alerts.
-
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It can allow you to deliver resources and applications to your cluster as part of a CI/CD workflow.
-
Grafana open source is open source visualization and analytics software. It allows you to query, visualize, alert on, and explore your metrics, logs, and traces no matter where they are stored. It provides you with tools to turn your time-series database (TSDB) data into insightful graphs and visualizations.
-
KeyCloak is an open source tool that provides identity and access management services. It allows for user federation, strong authentication, user management, fine-grained authorization, and more.
-
An add-on for Istio provides a console that allows you to configure, visualize, validate and troubleshoot the service mesh.
-
Full Lifecycle Container Security Platform delivers the only cloud-native security with uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.
-
Prometheus collects and stores its metrics as time series data, i.e. metrics information is stored with the timestamp at which it was recorded, alongside optional key-value pairs called labels.
-
Authservice is an extension for Istio that added OpenID Connect (OIDC) authorization flows into the service mesh.
-
Istio is an open source service mesh that layers transparently onto existing distributed applications. Istio’s powerful features provide a uniform and more efficient way to secure, connect, and monitor services. Istio is the path to load balancing, service-to-service authentication, and monitoring – with few or no service code changes.
-
Kyverno is a policy-as-code engine designed for Kubernetes.
-
Cert-manager creates TLS certificates for workloads in your Kubernetes or OpenShift cluster and renews the certificates before they expire.
-
+ Promtail
Grafana Loki is a set of open source components that can be composed into a fully featured logging stack.Promtail is an agent which ships the contents of local logs to a private Grafana Loki instance.
Grafana Dashboards
Developer Workflow
Dashboard
Tools
Projects
Let's get started!
- A window will pop up saying "New Project."
- Select Quick Set Up and click Next
- On the following window, type in a name for your project
- Click Next and Set Up Project on the following window.
- Your project should now be launched and visible on the page.
Sample Application
- Within your new project click on the arrow to the right, then select the Deployments Tab.
- Click the Add Deployment button to start the wizard
- Click on Deploy an Application and select Example Application, then click Next
- Enter the name for your application and click Submit
- Refresh your page and you will see ArgoCD spin up and deploy the example application.
Note:
Other fields are not configurable at this time.
-
-
-
-
You can select the application and on the right hand side view details of the sync status.
-
Clicking the arrow on the right will take you to the ArgoCD view with even more details.
-
-
After SmoothGlue Run has deployed your application, you’ll see a new "Virtual Services" set of tiles. Clicking the tile for your application will take you to the UI for the deployed example application.
Your own applications
- A Kubernetes Namespace to hold your deployed resources
- An ArgoCD Project which holds your application.
- An ArgoCD Kustomize Application which performs the GitOps deployment of the application. To deploy your own, you’ll need manifests in a publicly accessible Git repository. Follow the ArgoCD documentation to configure it to connect to your manifests.
- An Istio VirtualService to route traffic to your application via the existing ingress
To get access to the Kubernetes control plane in order to deploy your application, you can SSH into your instance (ssh rocky@10.123.45.67
), and execute kubectl
commands directly.
Feel free to poke around and copy the manifests deployed by SmoothGlue to set up your own, or reach out to support@smoothglue.com and we’d love to hear your use case as we expand the UX to offer more customization and deployment scenarios.