Skip to content

codewithmuh/react-aws-eks-github-actions

Repository files navigation

Hit the Star! ⭐

If you are planning to use this repo for reference, please hit the star. Thanks!

Deploy React Applications on AWS EKS using GitHub Actions and Terraform.

We plan to utilize GitHub Actions and Terraform to deploy our React project on AWS EKS.

readme (11)

Overview:

We will deploy React Application on aws Elastic Kubernetes(EKS). We will use Github actions for the ci/cd pipeline. We will use EC2 as the self-hosted runner for our GitHub Actions. We will integrate Sonarcube for code analysis and Trivt Image scan to scan our docker images. Also, we will integrate slack to get Build/deployment notifications.

Support

Buy Me A Coffee

Prerequisite

You should have basic Knowledge of AWS services, Docker, Kubernetes, and GitHub Actions.

Table of Content/Steps:

1. Create an AWS EC2 Instance and an IAM Role

2. Add a Self Hosted Runner To AWS EC2

3. Docker Installation and Running SonarQube Container

4. Integrate SonarQube with GitHub Actions

5. Installation of tools (Java JDK, Terraform, Trivy, Kubectl, Node.js, NPM, AWS CLI)

6. Provision AWS EKS With Terraform

7. Dockerhub and Trivy Image Scan Setup

8. Deploy Application(image) to AWS EKS

9. Integrate Slack Notifications

10. Running Final/Complete Github actions Workflow

11. Delete the infrastructure (To Avoid Extra Billing, if you are just using it for learning Purposes)

Step 01: Create an AWS EC2 Instance and an IAM Role

Create IAM Role

You have to Navigate to AWS Console.

Screenshot 2024-01-10 at 1 46 32 PM

Then Search/Enter IAM


Screenshot 2024-01-10 at 1 48 17 PM

Click Roles


Screenshot 2024-01-10 at 1 50 14 PM

Then Click Create role


Screenshot 2024-01-10 at 1 56 03 PM

Now Click AWS Service, And Then Click Choose a service or use case



Screenshot 2024-01-10 at 1 57 20 PM

Now Click EC2 and Click NEXT


Screenshot 2024-01-10 at 1 58 03 PM

Click the Search Fileds, Then Add permissions Policies


Screenshot 2024-01-10 at 2 16 39 PM

Add These Four Policies:

  1. EC2 full access
  2. AmazonS3FullAccess
  3. AmazonEKSClusterPolicy
  4. AdministratorAccess
Screenshot 2024-01-11 at 6 55 41 PM

Click NEXT and Then click the Role Name Field.

Type cicd-jenkins

Click Create role


Screenshot 2024-01-10 at 2 07 55 PM

Note We will use/attach this AIM Role during AWS EC2 instance Creation.

Create AWS EC2 Instance

To launch an AWS EC2 instance running Ubuntu 22.04 via the AWS Management Console, start by signing in to your AWS account and accessing the EC2 dashboard. Click on "Launch Instances" and proceed through the steps. In "Step 1," select "Ubuntu 22.04" as the AMI, and in "Step 2," opt for "t2.medium" as the instance type. Configure instance details, storage, tags, and security group settings according to your requirements. Additionally, attach the previously created IAM role in the advanced details. Review the settings, create or select a key pair for secure access, and then launch the instance. Once launched, utilize the associated key pair to connect via SSH for access, ensuring the security of your connection. (Look at image Below)



Screenshot 2024-01-10 at 5 40 06 PM Screenshot 2024-01-10 at 5 40 25 PM

Step 02: Add a Self Hosted Runner To AWS EC2

Now Go to GitHub Repository and click on Settings -> Actions -> Runners

Click on New self-hosted runner

Screenshot 2024-01-10 at 1 35 16 PM
Screenshot 2024-01-10 at 5 50 48 PM

Now select Linux and Architecture X64

Screenshot 2024-01-10 at 5 54 09 PM

Use the below commands to add a self-hosted runner

Note: In pic Commads are related to my account, Use your commands, it appears on your GitHub self-hosted runner Page.

Screenshot 2024-01-10 at 5 55 47 PM

Now SSH to your AWS instance to connect with your Instance.

And Past/Run these commands.

mkdir actions-runner && cd actions-runner
Screenshot 2024-01-10 at 6 02 16 PM

Command "mkdir actions-runner && cd actions-runner" serves to generate a fresh directory named "actions-runner" within the present working directory. Subsequently, it swiftly switches the current working directory to this newly created "actions-runner" directory. This approach streamlines file organization and facilitates executing successive actions within the newly formed directory without the need for separate navigation.

Download the latest runner package

curl -o actions-runner-linux-x64-2.311.0.tar.gz -L https://github.com/actions/runner/releases/download/v2.311.0/actions-runner-linux-x64-2.311.0.tar.gz
Screenshot 2024-01-10 at 6 07 25 PM

Validate the hash.

echo "29fc8cf2dab4c195bb147384e7e2c94cfd4d4022c793b346a6175435265aa278  actions-runner-linux-x64-2.311.0.tar.gz" | shasum -a 256 -c
Screenshot 2024-01-10 at 6 10 55 PM

Now Extract the installer

tar xzf ./actions-runner-linux-x64-2.311.0.tar.gz

Create the runner and start the configuration experience

./config.sh --url https://github.com/codewithmuh/react-aws-eks-github-actions --token AMFXNTP3IVE6IAZSWO3ZEGDFT2QV6
Screenshot 2024-01-10 at 6 16 09 PM

If you have provide multiple labels use commas for each label.

The last step, run it!

./run.sh
Screenshot 2024-01-10 at 6 17 33 PM

Let's close Runner for now.

ctrl + c  # To close Run this Command.

Step 03: Docker Installation and Running SonarQube Container

Connect with your Instance using SSH or Putty.(The Method you are using). If already connected, ignore.

Run these commands

sudo apt-get update
sudo apt install docker.io -y
sudo usermod -aG docker ubuntu
newgrp docker
sudo chmod 777 /var/run/docker.sock

Now We will Pull SonarQube Docker Image and run the SonarQube Container.

Note Make sure to add a port in the security group of your instance.

docker run -d --name sonar -p 9000:9000 sonarqube:lts-community
Screenshot 2024-01-10 at 6 31 19 PM Screenshot 2024-01-10 at 6 32 50 PM

Now copy the IP address of Your EC2 instance

<EC2-PUBLIC-IP:9000>
Screenshot 2024-01-10 at 6 36 04 PM

Now Login with these creds.

login admin
password admin

Now Update your Sonarqube password.

Screenshot 2024-01-10 at 6 38 58 PM

This is the Sonarqube dashboard.

Screenshot 2024-01-10 at 6 40 16 PM

Step 04: Integrate SonarQube with GitHub Actions

Integrating SonarQube with GitHub Actions allows you to automatically analyze your code for quality and security as part of your continuous integration pipeline.We already have Sonarqube up and running

Now On Sonarqube Dashboard click on Manually

Screenshot 2024-01-10 at 6 42 53 PM

On the Next Page, You have to provide the name of your project and provide a branch name. The Click on SetUp Button.

Screenshot 2024-01-10 at 6 44 58 PM

On the Next Page, You have to click on "With GitHub Actions"

Screenshot 2024-01-10 at 6 47 12 PM

This will provide an overview of the project and provide some instructions to integrate.

Screenshot 2024-01-10 at 6 49 02 PM

Now Let's open your Giuthub Repository.

Now Click on Settings. (if you are using my repo, make sure you have forked it)

Screenshot 2024-01-10 at 7 34 09 PM

Click on Secrets and variables and then click on actions.

Screenshot 2024-01-10 at 7 40 03 PM

It will open a page, Clock on New Repository secret.

Screenshot 2024-01-10 at 7 41 05 PM

Now Go to your Sonarqube dashboard

Copy SONAR_TOKEN and click on Generate Token

Screenshot 2024-01-10 at 8 00 42 PM

Click on Generate

Screenshot 2024-01-10 at 8 02 41 PM

Let's copy the Token and add it to GitHub secrets

Screenshot 2024-01-10 at 8 03 34 PM

Now Go back to GitHub and Paste the copied name for the secret and token

Name: SONAR_TOKEN

Secret: Paste Your Token and click on Add secret

Screenshot 2024-01-10 at 8 05 26 PM

Now go back to the Sonarqube Dashboard

Copy the Name and Value

Screenshot 2024-01-10 at 8 06 09 PM

Go to GitHub now and paste-like this and click on add secret

Screenshot 2024-01-10 at 8 07 25 PM

Our Sonarqube secrets are added and you can see it.

Screenshot 2024-01-10 at 8 07 57 PM

Go to Sonarqube Dashboard and click on continue

Screenshot 2024-01-10 at 8 09 43 PM

Now create your Workflow for your Project. In my case, I am using React Js. That's why I am selecting Other.

Screenshot 2024-01-10 at 8 09 43 PM

Now it Generates and workflow for my Project

Note: Make sure to use your files for this Section.

Go back to GitHub. click on Add file and then create a new file

Screenshot 2024-01-10 at 8 10 25 PM

Go back to the Sonarqube dashboard and copy the file name and content

Screenshot 2024-01-10 at 8 12 07 PM

Add in GitHub like this (Look at image)

Screenshot 2024-01-10 at 8 13 31 PM

Let's add our workflow

To do that click on Add file and then click on Create a new file

Screenshot 2024-01-10 at 8 10 25 PM

Here is the file name

.github/workflows/sonar.yml  #you can use any name I am using sonar.yml

Copy content and add it to the file

name: Sonar Code Review Workflow

on:
  push:
    branches:
      - main


jobs:
  build:
    name: Build
    runs-on: self-hosted
    steps:
      - uses: actions/checkout@v2
        with:
          fetch-depth: 0  # Shallow clones should be disabled for a better relevancy of analysis
      - uses: sonarsource/sonarqube-scan-action@master
        env:
          SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
          SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
      # If you wish to fail your job when the Quality Gate is red, uncomment the
      # following lines. This would typically be used to fail a deployment.
      # - uses: sonarsource/sonarqube-quality-gate-action@master
      #   timeout-minutes: 5
      #   env:
      #     SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
Screenshot 2024-01-10 at 8 16 17 PM

Click on commit changes

Screenshot 2024-01-10 at 8 16 59 PM

Now workflow is created.

Start again GitHub actions runner from the Ec2 instance Run These Commands

cd actions-runner
./run.sh

Click on Actions now

Now it's automatically started the workflow

Screenshot 2024-01-10 at 8 19 23 PM

Let's click on Build and see what are the steps involved

Screenshot 2024-01-10 at 8 20 55 PM

Click on Run Sonarsource and you can do this after the build completion

Screenshot 2024-01-10 at 8 22 19 PM

Build complete.

Go to the Sonarqube dashboard and click on projects and you can see the analysis

Screenshot 2024-01-10 at 8 23 26 PM

If you want to see the full report, click on issues.

Step 05: Installation of tools (Java JDK, Terraform, Trivy, Kubectl, Node.js, NPM, AWS CLI)

Use this script to automate the installation of these tools.

Create script on Your aws ec2.

vim  run.sh

Copy the Below given content

#!/bin/bash
sudo apt update -y
sudo touch /etc/apt/keyrings/adoptium.asc
sudo wget -O /etc/apt/keyrings/adoptium.asc https://packages.adoptium.net/artifactory/api/gpg/key/public
echo "deb [signed-by=/etc/apt/keyrings/adoptium.asc] https://packages.adoptium.net/artifactory/deb $(awk -F= '/^VERSION_CODENAME/{print$2}' /etc/os-release) main" | sudo tee /etc/apt/sources.list.d/adoptium.list
sudo apt update -y
sudo apt install temurin-17-jdk -y
/usr/bin/java --version

# Install Trivy
sudo apt-get install wget apt-transport-https gnupg lsb-release -y
wget -qO - https://aquasecurity.github.io/trivy-repo/deb/public.key | gpg --dearmor | sudo tee /usr/share/keyrings/trivy.gpg > /dev/null
echo "deb [signed-by=/usr/share/keyrings/trivy.gpg] https://aquasecurity.github.io/trivy-repo/deb $(lsb_release -sc) main" | sudo tee -a /etc/apt/sources.list.d/trivy.list
sudo apt-get update
sudo apt-get install trivy -y

# Install Terraform
sudo apt install wget -y
wget -O- https://apt.releases.hashicorp.com/gpg | sudo gpg --dearmor -o /usr/share/keyrings/hashicorp-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/hashicorp.list
sudo apt update && sudo apt install terraform

# Install AWS CLI 
curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
sudo apt-get install unzip -y
unzip awscliv2.zip
sudo ./aws/install

# Install kubectl
sudo apt update
sudo apt install curl -y
curl -LO https://dl.k8s.io/release/$(curl -L -s https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl
sudo install -o root -g root -m 0755 kubectl /usr/local/bin/kubectl
kubectl version --client


# Install Node.js 16 and npm
curl -fsSL https://deb.nodesource.com/gpgkey/nodesource.gpg.key | sudo gpg --dearmor -o /usr/share/keyrings/nodesource-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/nodesource-archive-keyring.gpg] https://deb.nodesource.com/node_16.x focal main" | sudo tee /etc/apt/sources.list.d/nodesource.list
sudo apt update
sudo apt install -y nodejs

Now Run this script:

chmod +x run.sh

./run.sh

Now Check if these tools are installed or not. By checking Their versions.

kubectl version
aws --version
java --version
trivy --version
terraform --version
node -v

Part 06: Provision AWS EKS With Terraform

Note: Before starting this part 06, Make sure Terraform and AWS CLI are installed and an aws account is configured on your system. You can see my article to get aws and terraform installation and configuration done.

Now let's clone repo:

https://github.com/codewithmuh/react-aws-eks-github-actions.git
cd react-aws-eks-github-actions
cd terraform-eks

This will change your directory to terraform-eks files.

Now Change your s3 bucket in the backend file. (You can create S3 Bucket on AWS S3)

Now initialize the terraform.

terraform init
Screenshot 2024-01-10 at 9 51 07 PM

Now validate the configurations and syntax of all files.

terraform validate
Screenshot 2024-01-10 at 9 54 29 PM

Now Plan and apply your infrastructure.

terraform plan
terraform apply
Screenshot 2024-01-10 at 9 57 37 PM

It can take up to 10 Minutes to create your AWS EKS cluster.

You can check by going to aws EKS service.

Screenshot 2024-01-10 at 10 14 31 PM

Also, check your Node Grpup EC2 Instance, by going to EC2 Dashboard.

Screenshot 2024-01-10 at 10 15 25 PM

Part 07: Dockerhub and Trivy Image Scan Setup

Now you have to create a Personal Access token for your Dockerhub account.

Go to docker hub and click on your profile --> Account settings --> security --> New access token

Screenshot 2024-01-11 at 3 14 48 PM Screenshot 2024-01-11 at 3 16 47 PM

Copy This Token.

Screenshot 2024-01-11 at 3 17 22 PM

Add this Token to your Github actions Secret.

Screenshot 2024-01-11 at 3 19 28 PM

Also, add another secret of your dockerhub username.

Screenshot 2024-01-11 at 3 20 09 PM

Now create a new workflow with the name build.yaml . Make sure to replace the username and image name with yours.

name: Code Build Workflow

on:
    workflow_run:
      workflows: 
        - Sonar Code Review Workflow
      types:
        - completed
        
jobs:
  build:
    name: Build
    runs-on: self-hosted
    steps:
      - name: Checkout code
        uses: actions/checkout@v2

      - name: Docker build and push
        run: |
          docker build -t react-aws-eks-github-actions .
          docker tag react-aws-eks-github-actions codewithmuh/react-aws-eks-github-actions:latest
          docker login -u ${{ secrets.DOCKERHUB_USERNAME }} -p ${{ secrets.DOCKERHUB_TOKEN }}
          docker push codewithmuh/react-aws-eks-github-actions:latest
        env:
          DOCKER_CLI_ACI: 1
Screenshot 2024-01-11 at 3 34 04 PM

Now you can check image is pushed to your Dockerhub Account.

Screenshot 2024-01-11 at 3 34 29 PM

Now add another Workflow for the docker image scan, using the name 'trivy.yml'. Use the content below, but make sure to replace the image with your one.

name: Trivy Image Scan Workflow

on:
    workflow_run:
      workflows: 
        - Code Build Workflow
      types:
        - completed
  
jobs:
    build:
      name: Docker Image Scan
      runs-on: self-hosted
      steps:
        - name: Checkout Repository
          uses: actions/checkout@v2

        - name: Pull the Docker image
          run: docker pull codewithmuh/react-aws-eks-github-actions:latest

  
        - name: Trivy image scan
          run: trivy image codewithmuh/react-aws-eks-github-actions:latest

Here is the output of the build.

Screenshot 2024-01-11 at 4 51 28 PM
Now add these lines into build.yml steps, so we can test image on our aws ec2 instance.

   - name: Pull the Docker image On AWS EC2 For Testing
        run: docker pull sevenajay/tic-tac-toe:latest
      

      - name: Stop and remove existing container
        run: |
            docker stop react-aws-eks-github-actions || true
            docker rm react-aws-eks-github-actions || true
  
      - name: Run the container on AWS EC2 for testing
        run: docker run -d --name react-aws-eks-github-actions -p 3000:3000 codewithmuh/react-aws-eks-github-actions:latest
  

When Build is completed , visit the websiet in your browser.

Note: Make sure port 3000 is added on your Ec2.

"Your_EC2_IP:3000"
Screenshot 2024-01-11 at 5 27 04 PM

If it's not working, Try to pull an image on your system and check for errors. Fix them then build the GitHub actions again.

Part 08: Deploy Application(image) to AWS EKS

Now create our final deploy.yml file to deploy on aws eks.

And Paste this content there. (Do not commit yet, commit it after part 09)

Note. Make sure to repalce cluster name and region nname with your one.

name: Deploy To EKS

on:
    workflow_run:
      workflows: 
        - Code Build Workflow
      types:
        - completed
  
jobs:
    build:
      name: Docker Image Scan
      runs-on: self-hosted
      steps:
        - name: Checkout Repository
          uses: actions/checkout@v2

        - name: Pull the Docker image
          run: docker pull codewithmuh/react-aws-eks-github-actions:latest

  
        - name: Update kubeconfig
          run: aws eks --region us-west-1 update-kubeconfig --name EKS_cluster_codewithmuh
  
        - name: Deploy to EKS
          run: kubectl apply -f deployment-service.yml

This will updates the kubeconfig to configure kubectl to work with an Amazon EKS cluster in the region with the name of your cluster, Also deploys Kubernetes resources defined in the deployment-service.yml file to the Amazon EKS cluster using kubectl apply.

Part 09: Integrate Slack Notifications

No Go to Your Slack and create a new channel for notifications.

Now Click on your slack account name --> settings & Administration --> Manage Apps

Screenshot 2024-01-11 at 5 47 08 PM

t will open a new tab, select build now

Screenshot 2024-01-11 at 5 48 09 PM

Now Click on Create an app

Screenshot 2024-01-11 at 5 48 35 PM

Select from scratch

Screenshot 2024-01-11 at 5 49 04 PM

Provide a name for the app and select workspace and create

Screenshot 2024-01-11 at 5 49 54 PM

Select Incoming webhooks

Screenshot 2024-01-11 at 5 50 30 PM

Now Set incoming webhooks to on

Screenshot 2024-01-11 at 5 51 03 PM

Click on Add New webhook to workspace

Screenshot 2024-01-11 at 5 51 38 PM

Select Your channel that created for notifications and allow

Screenshot 2024-01-11 at 5 52 12 PM

It will generate a webhook URL copy it

Screenshot 2024-01-11 at 5 53 14 PM

Now come back to GitHub and click on settings

Go to secrets --> actions --> new repository secret and add

Screenshot 2024-01-11 at 5 56 01 PM

Add the below code to the deploy.yml workflow and commit and the workflow will start.

      - name: Send a Slack Notification
        if: always()
        uses: act10ns/slack@v1
        with:
          status: ${{ job.status }}
          steps: ${{ toJson(steps) }}
          channel: '#git'
        env:
          SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }}

This step sends a Slack notification. It uses the act10ns/slack action and is configured to run "always," which means it runs regardless of the job status. It sends the notification to the specified Slack channel using the webhook URL stored in secrets.

If you get this error, Try to configure aws cli on the ec2 instance to resolve this matter.

Screenshot 2024-01-11 at 8 57 56 PM

Now our build is completed.

Screenshot 2024-01-11 at 9 17 57 PM

And here is the Slack notification.

Screenshot 2024-01-11 at 9 14 47 PM

Let’s go to the Ec2 ssh connection

Rn this command.

kubectl get all

Open the port in the security group for the Node group instance.

After that copy the external IP and paste it into the browser Screenshot 2024-01-11 at 9 23 10 PM

Here is the Output: The website is Live.

Screenshot 2024-01-11 at 9 23 35 PM

Part 10: Delete the infrastructure (To Avoid Extra Billing, if you are just using it for learning Purposes)

To destroy, Follow these Steps:

  1. comment this line run: kubectl apply -f deployment-service.yml in deploy.yaml, adn add this line run: kubectl delete -f deployment-service.yml . You can say it replacement between lines. It will delete the container and delete the Kubernetes deployment.

  2. Stop the self-hosted runner.

  3. To delete the Eks cluster

cd /home/ubuntu
cd Project_root_folder
cd terraform-eks
terraform destroy --auto-approve

Then Delete ths dockerhub token. Once cluster is destroyed, delete the ec2 instance and iam role.

Acknowledgements

Special thanks to codewithmuh for creating this incredible Devops Project and simplifying the CI/CD process.