Creating a deployable architecture
After going through the steps to plan and design your architecture and decide what type of component to create, you can start creating the automated code that brings the architecture to life. This topic guides you through creating a deployable architecture that is made of modules.
To create a deployable architecture, you must define the required files, create a release in GitHub, and then onboard it to a private catalog so that you can share it with others inside or outside of your organization.
You can choose to build your own deployable architecture with Terraform following these instructions, or you can choose to download the code from an existing architecture to modify it to fit your needs and create a new deployable architecture with your changes. If you are looking to create a deployable architecture stack, which is made up of a group of deployable architectures, see Stacking deployable architectures.
Learn about the structure of a deployable architecture
A deployable architecture, which this documentation describes, is made up of 1 or more modules. A deployable architecture is composed of the following in the source repo:
- Terraform code
- Your source repo includes Terraform files. These files declare the desired infrastructure (end-state) and rely on Terraform providers that perform the actual API requests to create, update, and delete the infrastructure. Some of the most common providers used are IBM Cloud® Terraform provider and Helm/Kubernetes/Rest API provider.
- Scripts (optional)
- Used as a stop gap for functions that might not exist (Bash/Python) or for ad hoc operational tasks (Ansible). For more information, see Creating scripts for deployable architectures.
- Automated tests
- Validation tests that are used to deploy, verify, and destroy infrastructure. For an example, see the
tests
directory in the sample-deployable-architectures sample repo. - Documentation
- An architecture diagram and readme file need to be included in your source repo.
- Catalog manifest file
- Defines how the deployable architecture is exposed in the IBM Cloud catalog. In addition to the general catalog details like the name, description, and features, it includes the variation definitions that point to the underlying Terraform configuration, compliance claims that are verified during onboarding to the catalog by using IBM Cloud® Security and Compliance Center, and necessary IAM permissions for running the deployable architecture. For more information, see Locally editing the catalog manifest.
- Variations
- A deployable architecture can include variations of capability or complexity. For example, you might create a quick start variation with basic capabilities for a simple, low-cost deployment, and then you might have a standard variation with
a more complex architecture that would be used in production. Each of these variations is itself a deployable architecture, which is onboarded and configured to appear together in a catalog. These variations are sourced in the same repo
in different working directories and are defined in your
ibm_catalog.json
file. For more information, see Creating a variation.
Specifying dependencies
There are two install_type
options that you can specify when creating your deployable architecture. One specifies that dependent deployable architectures that must be deployed first, and one specifies that it can be deployed without
any prerequisites.
fullstack
- It is a full end-to-end solution that is always deployed as-is. The
fullstack
value is set in theibm_catalog.json
manifest file forinstall_type
to specify that the deployable architecture does not have any dependencies (prerequisites). extension
- A deployable architecture that depends on another deployable architecture being deployed first. The prerequisite deployable architecture is the base on which the extension deployable architecture is built. This dependency, or prerequisite,
must be met to deploy the extension. The
extension
value is set in theibm_catalog.json
manifest file for theinstall_type
, and thedependencies
array must be completed to specify the dependent deployable architecture in the manifest file.
For more information and setting these values, see Locally editing the catalog manifest.
Creating a deployable architecture
You can expect to complete the following high-level tasks while creating your deployable architecture:
- Create your source repo and add your code.
- Create your
ibm_catalog.json
manifest file to prepare for creating a tile in the catalog. - Create a release.
- Onboard your code to a create a catalog tile in a private catalog by reviewing and validating it.
- Choose where you want to share or publish your deployable architecture.
The following instructions for creating a deployable architecture use a public sample repo to teach by example.
Creating your source repo
By using the requirements that are defined by your organization, create a GitHub repository that you can use to hold the source code for your deployable architecture. For help with creating a repository, see the GitHub documentation. If you already have a repository that you want to use, you can skip this step. You can choose to use another organization to host your source code, such as GitLab, but for purposes of this documentation, GitHub is used.
Creating the required Terraform files
Review the following sections to understand which base Terraform files are required in your GitHub source repo to create the .tgz
file that is required as part of onboarding your deployable architecture to a private catalog.
main.tf
The main.tf
file is where you place the code that provisions the resources that you want to create. You can call a module from terraform-ibm-modules
or an external module or a provider resource directly.
See examples:
outputs.tf
The outputs.tf
file contains output values that you can include in your deployable architecture.
See examples:
provider.tf
The provider.tf file contains the provider configuration such as the provider name, API key, and region that the code expects.
See examples:
README.md
The readme file contains background and usage information about the deployable architecture, including a requirements, modules, resources, required access, inputs, and outputs sections.
If you're source repo is in the terraform-ibm-modules
org, most of the readme file is generated. So you don’t manually add the information like the inputs and outputs. Variable names and descriptions are generated into the readme
file from the variables.tf file.
See examples:
variables.tf
The variables.tf
file includes the required and optional variables for the deployable architecture.
See examples:
version.tf
The version.tf
file stores information about the Terraform version and provider version that is needed to run the deployable architecture.
Any required Terraform providers for the deployable architecture should be locked into an exact version instead of using a range to ensure consistent results with the deployable architecture.
See examples:
Creating a catalog manifest file
The catalog manifest is a file in the root of your repository that is called the ibm_catalog.json
. This file defines the required metadata for creating a tile in a catalog, for example the name, description, features, variation
definitions that point to the underlying Terraform configuration, compliance claims that will be verified during onboarding by using Security and Compliance Center, and necessary IAM permissions for deploying the architecture. It also defines
the configurations that you want to be selected by default when a user attempts to deploy your architecture from the catalog. For more information, see mapping catalog details to the manifest file.
Check out the example from the sample repo that shows a fullstack and extension type variation.
You can create your catalog manifest file by using two different methods:
-
You can create this file from scratch by using the template.
-
You can start the onboarding process with the following basic sample in your source repo, and then download the manifest file after you make changes during onboarding in the console to add the updated file to your source repo.
The following is a basic manifest file that you can add to your repository and edit to help to get you started with this option.
{ "products": [ { "flavors": [ { "architecture": {}, "compliance": {}, "install_type": "fullstack" } ], "label": "catalog-create-sample-da-0.0.1", "name": "catalog-create-sample-da-0.0.1", "offering_icon_url": "url", "product_kind": "solution", "provider_name": "Community", "short_description": "A simple deployable architecture.", "tags": [ "dev_ops" ], "version": "0.0.1" } ] }
Next steps: Onboard your deployable architecture to a private catalog
With a Git release created that includes the required files in your source repo, you can onboard a version of your deployable architecture and all included variations. Onboarding is the process of creating a catalog tile in a private catalog by reviewing the catalog details and validating a test deployment and the compliance claims in IBM Cloud. For the step-by-step process, see Onboarding deployable architectures.