IBM Cloud Docs
Setting up Tekton continuous integration pipelines with DevSecOps

Setting up Tekton continuous integration pipelines with DevSecOps

Complete these steps to set up the Tekton continuous integration pipelines with compliance. Recommended configuration options guide you through the steps to create your toolchain.

Before you begin

Guided setup overview for the CI toolchain

View the following video tutorial to get an overview of the setup process:

The progress indicator in Figure 1 guides you through the toolchain configuration. If you need to return to a previous step, you can use the progress indicator to navigate to a previous step.

DevSecOps Continuous Integration toolchain welcome page
Figure 1. DevSecOps Continuous Integration toolchain welcome page

The configuration options for the current step are displayed in the main area of the page.

To advance to the next step, click Continue. You can advance to the next step only when the configuration for the current step is complete and valid. You can navigate to the previous step by clicking Back.

Some steps might have a Switch to advanced configuration toggle. These steps present you with the minimum recommended configuration. However, advanced users that need fine-grained control can click the Switch to advanced configuration toggle to see all options for the underlying integration.

DevSecOps advanced configuration toggle
Figure 2. DevSecOps advanced configuration toggle

After you successfully complete all of the steps, click Create to create the toolchain.

You can return to previous steps in the guided installer. The toolchain installer retains all of the configurations that you completed.

Start the CI toolchain setup

Start the CI toolchain configuration by using one of the following options:

  • Click the following Create toolchain button.

    Create toolchain

  • From the IBM Cloud console, click the Menu icon Menu icon and select DevOps. On the Toolchains page, click Create toolchain. On the Create a Toolchain page, click CI-Develop with DevSecOps practices.

Set up the CI toolchain name and region

Review the default information for the toolchain settings. The toolchain's name identifies it in IBM Cloud. Make sure that the toolchain's name is unique within your toolchains for the same region and resource group in IBM Cloud.

The toolchain region can differ from cluster and registry region.

DevSecOps CI toolchain name and region
Figure 3. DevSecOps CI toolchain name and region

Set up CI tool integrations

Multiple repositories must be configured during the guided setup, as described in the next sections.

For each repository, either clone the repository that's provided as a sample, or provide a URL to an existing IBM-hosted Git Repos and Issue Tracking repository that you own. The toolchain supports linking only to existing Git Repos and Issue Tracking repositories.

Application

The Application step that refers to the application source code repository is shown in the following image.

DevSecOps application repository
Figure 4. DevSecOps application repository

The recommended options are displayed by default, but you can click the Switch to advanced configuration toggle to see all of the configuration options available for the underlying Git integration. The default behavior of the toolchain is Use default sample application that clones the sample application as IBM-hosted Git Repos and Issue Tracking Repository.

Enter the name of the IBM-hosted Git Repos and Issue Tracking repository that was created by the toolchain as your application repository.

The region of the repository remains the same as the region of the toolchain.

If you want to link an existing Application Repository for the toolchain, select the Bring your own application option, and provide it as input to the Repository URL field. As noted earlier, the toolchain currently supports linking only to existing Git Repos and Issue Tracking repositories. If you want to know more about Bring your own application, see Bringing your own app to DevSecOps.

Git integration

To see the default method of authentication that is is used to access the Git provider, click Switch to advanced configuration. The default value of Auth Type is OAuth.

To use a personal access token in your Git integration, select Personal Access Token. You must also provide a personal access token value for the field Personal Access Token, which has appropriate permissions for the repository.

Inventory

Change management is tracked in this repository. CD pipeline creates a new branch that is named as the created CR number, and merges it to master after deployment is concluded.

DevSecOps inventory repository
Figure 5. DevSecOps inventory repository

The default behavior of the toolchain is to Create new inventory repository that creates a new Inventory Repository as IBM-hosted Git Repos and Issue Tracking Repository. If you want to link an existing Inventory Repository for the toolchain, you may choose Use existing inventory repository option and provide it as input to Repository URL field. As noted earlier, the toolchain currently supports linking only to existing Git Repos and Issue Tracking repositories.

  • New repository name: Name of the IBM-hosted Git Repos and Issue Tracking Repository that is created by the toolchain as your inventory repository. The region of the repository remains the same as that of the toolchain.

Issues

Issues about incidents that are captured during the build and deployment process are tracked in the repository.

DevSecOps Issues repository
Figure 6. DevSecOps Issues repository

The default behavior of the toolchain is to Create new issues repository that creates a new repository as IBM-hosted Git Repos and Issue Tracking Repository. In case you want to link an existing Issues Repository for the toolchain, you can choose Use existing issues repository option and provide it as input to Repository URL field. As noted earlier, the toolchain currently supports linking only to existing Git Repos and Issue Tracking repositories.

  • New repository name: Name of the IBM-hosted Git Repos and Issue Tracking repo that is created by the toolchain as your inventory repository. The region of the repository remains the same as that of the toolchain.

Secrets

Several tools in this toolchain require secrets to access privileged resources. An IBM Cloud API key is an example of such a secret. All secrets must be stored securely in a secrets vault and then referenced as required by the toolchain.

The Secrets step specifies which secret vault integrations are added to your toolchain. Use the provided toggles to add or remove the vault integrations that you require. However, these can be configured in subsequent steps. Also, familiarize yourself with the concepts in the Protecting your sensitive data in Continuous Delivery documentation because this provides important information about preconfiguring your vault providers and integrations.

DevSecOps secrets options
Figure 7. DevSecOps secrets options

If you plan to use IBM Key Protect or HashiCorp Vault for managing your secrets, see the IBM Key Protect section of the CI setup guide.

IBM Key Protect

Use Key Protect to securely store and apply secrets like API keys, Image Signature, or HashiCorp Vault credentials that are part of your toolchain. You must create a Key Protect Service Instance before proceeding further. If you already created a Key Protect Service Instance as prerequisite, you can link the same in this step.

Key Protect
Figure 8. Key Protect

  • Name: Name of Key Protect instance created by the toolchain. This key protect instance can be accessed by this name during various stages of the toolchain setup.
  • Region: Region in which the Key Protect service is located.
  • Resource Group: Resource Group that the Key Protect service belongs.
  • Service name: Key Protect service name.

To comply with best practices for using HashiCorp Vault, this template includes a Key Protect tool integration to securely manage the HashiCorp Vault Role ID and Secret ID. By storing these HashiCorp Vault secrets in Key Protect as a prerequisite for users to create toolchains, you protect access to HashiCorp Vault, which is the default secrets repo for most consumers.

IBM Secrets Manager

Use Secrets Manager to securely store and apply secrets like API keys, Image Signature, or HashiCorp Vault credentials that are part of your toolchain. You must create a Secrets Manager Service Instance before you proceed further. If you created a Secrets Manager Service Instance as prerequisite, you can link the same in this step.

DevSecOps IBM Secrets Manager
Figure 9. DevSecOps IBM Secrets Manager

  • Name: Name of Secrets Manager instance created by the toolchain. This Secrets Manager instance can be accessed by this name during various stages of the toolchain setup.
  • Region: Region in which the Secrets Manager service is located.
  • Resource Group: Resource Group to which the Secrets Manager service belongs.
  • Service name: Secrets Manager service name.

HashiCorp Vault

Use HashiCorp Vault to securely store secrets that are needed by your toolchain. Examples of secrets are API keys, user passwords, or any other tokens that enable access to sensitive information. Your toolchain stores references to the HashiCorp Vault secrets, not the literal secret values, which enable advanced capabilities like secret rotation.

HashiCorp Vault
Figure 10. HashiCorp Vault

  • Name: A name for this tool integration. This name is displayed in the toolchain.
  • Server URL: The server URL for your HashiCorp Vault Instance. (for instance https://192.168.0.100:8200)
  • Integration URL: The URL that you want to navigate to when you click the HashiCorp Vault Integration tile.
  • Secrets Path: The mount path where your secrets are stored in your HashiCorp Vault Instance.
  • Authentication Method: The Authentication method for your HashiCorp Vault Instance.
  • Role ID: Your team's AppRole Role ID.
  • Secret ID: Your team's Secret ID.

Note: We advise you to use AppRole authentication method as this method can be used to read secret values.

Evidence Storage

All raw compliance evidence that belongs to the application is collected in this repository. Use this repository option for evaluation purposes only.

The default behavior of the toolchain is to Create new evidence locker repository that creates a new repository as IBM-hosted Git Repos and Issue Tracking Repository. If you ant to link an existing Evidence Locker for the toolchain, choose Use existing evidence locker repository option and provide it as input to Repository URL field. As noted earlier, the toolchain currently supports linking only to existing Git Repos and Issue Tracking repositories.

However, you must collect and store all the evidence in a Cloud Object Storage bucket that can be configured as described in the following image.

DevSecOps Evidence Storage
Figure 11. DevSecOps Evidence Storage

Cloud Object Storage Bucket

Cloud Object Storage bucket toggle
Figure 12. COS bucket toggle

Cloud Object Storage is used to store the evidence and artifacts that are generated by the DevSecOps Pipelines. If you want to use this feature, you must have a Cloud Object Storage instance and a Bucket. Read the recommendation for configuring a Bucket that can act as a Compliance Evidence Locker.

You can optionally set any kind of Cloud Object Storage bucket as a locker, even without a retention policy. The pipeline doesn't check or enforce settings at the moment. For help, see the Cloud Object Storage documentation.

You need to provide the following information for the Pipelines to reach the bucket:

  • Cloud Object Storage endpoint
  • Bucket name
  • Service API key

You can set up the Cloud Object Storage locker later, by providing the necessary cos-bucket-name and cos-endpoint. To remove the Cloud Object Storage bucket, use the Cloud Object Storage bucket toggle in the previous step.

To get the Cloud Object Storage Endpoint, refer to your Cloud Object Storage instance's page, and select the 'Endpoints' section in the menu. You need to copy the public endpoint that matches the bucket's region and resiliency.

DevSecOps Cloud Object Storage Endpoint menu
Figure 13. DevSecOps Cloud Object Storage Endpoint menu

If you decide not to use Cloud Object Storage as an evidence locker, you can also set the required values after the creation of the toolchain by setting the cos-bucket-name, cos-endpoint environment variables in the CI Pipeline.

Deploy

The default behavior of the toolchain is to Clone existing pipeline that creates a new repository as IBM-hosted Git Repos and Issue Tracking Repository. If you want to link an existing Pipeline Repository for the toolchain, choose Use existing repository and provide it as input to Repository URL field. As noted earlier, the toolchain currently supports linking only to existing Git Repos and Issue Tracking repositories.

  • App name:

The name of the application. - Default: hello-compliance-app

IBM Cloud API Key

The API key is used to interact with the ibmcloud CLI tool in several tasks. If you already created a cluster, an API to access the cluster and stored the key in a secure vault (any of Key Protect, Secrets Manager, or HashiCorp Vault), as prerequisite you can use the same in this step.

  • Option-1: An existing key can be imported from an existing Secret Provider instance that is created as prerequisites (Key Protect Instance, Secret Manager Instance, or HashiCorp Vault) by clicking the key icon (Recommended)
  • Option-2: An existing key can be copy and pasted (Not Recommended)
  • Option-3: A new key can be created from here by clicking New +. Generate a new api-key if you don’t have one or copy an existing key to the field. The newly generated API key can be saved to an existing Key Protect instance.

The newly generated API key can be saved to an existing Key Protect instance.

DevSecOps API key
Figure 14. DevSecOps API key

Click the Key Icon to use an existing key from your Secret Provider.

  • Provider: The Secret Provider that stores your API Key to access the cluster, as linked to your toolchain earlier. It can be a Key Protect Instance, Secret Manager Instance, or HashiCorp Vault Instance.
  • Resource Group: Resource Group that the Secrets Manager Provider belongs.
  • Secret name: Name or alias of the secret, such as the API Key.

Using the API key that is either created, retrieved from a vault, or manually entered the following fields load automatically if the API key has sufficient access. If the API key is valid, the Container registry region and namespace Cluster region, name, namespace, and Resource group is automatically populated. Change any of these fields to match your configuration if needed.

DevSecOps Deployment Target
Figure 15. DevSecOps Deployment Target

Inventory target and source branches

  • Inventory Source Environment: The environment from where you want to promote the application Default: master
  • Inventory Target Environment: The environment to where you want to deploy the application Default: prod
  • Target Region: The target region to where the application is deployed (Optional)
  • Emergency Label for change request PRs and issues: Label on Change Request to be used for Emergency deployment

Image signing

Any images that are built by this toolchain and recorded in the inventory must be signed before they can be deployed to production. The pipeline uses Skopeo as default tool to provide Image signing capability. You can use an existing GPG Key or create a new GPG Key Pair.

Ensure that the key follows the appropriate encoding as required by the chosen tool to store secrets.

DevSecOps Image Signing
Figure 16. DevSecOps Image Signing

Click Key to use an existing key from your Secret Provider.

  • Provider: The Secret Provider, which stores your GPG Key. It can be a Key Protect Instance, Secret Manager Instance, or HashiCorp Vault Instance.
  • Resource Group: Resource Group that the Secrets Manager Provider belongs.
  • Secret name: Name or alias of the secret, that is, GPG Key.

DevOps Insights

IBM Cloud DevOps Insights is included in the created toolchain and after each compliance check evidence is published into it. You do not need to provide any configuration steps for DevOps Insights, the CI pipeline automatically uses the insights instance that is included in the toolchain. DevOps Insights aggregates code, test, build, and deployment data to provide visibility into the velocity and quality of all your teams and releases.

Optional tools

Slack

If you want to receive notifications about your PR/CI Pipeline events, you can configure the Slack Tool during the setup from the toolchain template, or you can add the Slack Tool later.

In order for a Slack channel to receive notifications from your tools, you need a Slack webhook URL. To get a webhook URL, see the Incoming Webhooks section of the Slack API website.

Slack Tool
Figure 17. Slack tool

Common DevOps Insights Toolchain

DevOps Insights can optionally be included in the created toolchain and after each compliance check evidence is published into it. The toolchain can use an existing DevOps Insights instance to publish the deployment records to insights. You can link DevOps Insights integration from another toolchain by providing the Integration ID.

DOI Toolchain ID
Figure 18. DOI Toolchain ID

You can copy the Toolchain ID from the URL of your toolchain. A toolchain's URL follows this pattern: https://cloud.ibm.com/devops/toolchains/<toolchain-ID-comes-here>?env_id=ibm:yp:us-south

For example, if the URL is: https://cloud.ibm.com/devops/toolchains/aaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee?env_id=ibm:yp:us-south then the toolchain's ID is: aaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee.

Note: Include the ID only, not the full URL.

You can also set a target environment for the DOI interactions. This parameter is optional. If you provide this parameter, it is used instead of the target environment from the inventory.

DevOps insights

Use this option to create a new instance of DevOps Insights to be used for the toolchain. No configuration is required and the toolchain creates a new instance of DevOps Insight if this option is selected. The CI pipeline automatically uses the insights instance that is included in the toolchain.

Delivery pipeline private worker

The Delivery Pipeline Private Worker tool integration connects with one or more private workers that can run Delivery Pipeline workloads in isolation.

SonarQube

Configure SonarQube as the static code analysis tool for the toolchain. SonarQube provides an overview of the overall health and quality of your source code and highlights issues that are found in new code. The static code analyzers detect tricky bugs, such as null-pointer dereferences, logic errors, and resource leaks for multiple programming languages.

With Default Configuration, a SonarQube scan runs in an isolated Docker in Docker container that is not persisted.

With Cluster Configuration, the pipeline provisions a new SonarQube instance in the Kubernetes cluster that is configured in the Deploy step. This instance is provisioned during the first pipeline run and remains available to all the subsequent pipeline runs.

If you want the toolchain to use an existing SonarQube Instance that you provisioned on another host, use the Custom Configuration option.

SonarQube tool
Figure 19. SonarQube tool

Create the CI toolchain

Create toolchain:

  • Click Create in the Summary step and wait for the toolchain to be created.

    You can configure the individual toolchain integrations after the pipeline is created.

DevSecOps Summary
Figure 20. DevSecOps Summary

Explore the CI toolchain

The created CI toolchain looks like this:

DevSecOps Continuous Integration Toolchain
Figure 21. DevSecOps Continuous Integration Toolchain

It contains two pipelines:

  • PR: triggers when a new PR is submitted in the app repository
  • CI: manually run or triggers when a PR is merged to master in the app repository

Run the PR-CI Pipeline

To start the PR pipeline, you should create a merge request in your application repository. To achieve this, do the following:

  1. On the CI toolchain page, click the application repository tile. By default, it gets created with a name compliance-app-<timestamp>.
  2. Create a branch from master.
  3. Update some code like in app or readme file and save changes.
  4. Submit merge request.
  5. Back on the CI toolchain page, click the pr-pipeline tile. The PR pipeline is initiated.

The corresponding Merge Request in your application repository is in "Pending" state until all the stages of PR Pipeline finish successfully.

After the PR Pipeline run is successful, you can click it to explore numerous steps completed.

DevSecOps PR Pipeline Successful
Figure 22. DevSecOps PR Pipeline Successful

  1. Navigate back to the merge request.
  2. Merge the request so that your changes are copied to the master branch of your application repository: the CI pipeline is automatically triggered.

Simplified flow of tasks in the pipeline: (Utility tasks are omitted. For example, status-check update on GitHub, credential fetching, and so on).

DevSecOps PR Tasks
Figure 23. DevSecOps PR Tasks

In the DevSecOps world, shift left is a practice that prevents and finds issues like defects, security vulnerabilities. Shift left also performs compliance checks early in the software delivery process.

  • Checks that can be run on the code/repository and do not need the built image should be run as early as possible to prevent noncompliant code from being merged to master branch of repository. Evidence is not collected from the PR pipeline. The pipeline's goal is to shift compliance checks, as far left as possible.
  • All checks are done every pipeline run, even if a previous check fails, the pipeline progresses to the next one. To evaluate if you have any failures in your run, you need to check the final step of your pipeline, which has a pipeline evaluator.
  • If you are trying to merge an emergency fix, and want to bypass compliance checks, add a label to your merge request to indicate this. The same label must be provided when running the CD pipeline.

Run PR Pipeline

  • To start the PR pipeline, create a pull request in your application repository.

  • The corresponding Merge Request in your application repository is in "Pending" state until all the stages of PR Pipeline finishes successfully.

Run CI Pipeline

There are two ways to start a CI pipeline:

  • Automatically: after a successful PR pipeline, by approving and merging the PR to the master branch.
  • Manually: to trigger the CI pipeline manually, select the Delivery Pipeline card and click Run Pipeline and select Manual Trigger.

In this document, the CI Pipeline was triggered after you merged your code changes to the master branch of your application repository.

  1. On the CI toolchain page, click the ci-pipeline tile.
  2. Observe: a pipeline-run is running. Wait for the pipeline-run to complete.

After the CI Pipeline run is successful, you can click it to explore the completed steps.

DevSecOps CI Pipeline Successful
Figure 24. DevSecOps CI Pipeline Successful

Simplified flow of tasks in the pipeline: (Again, utility tasks are omitted. For example, status-check update on GitHub, credential fetching, and so on) Green colored tasks are outputting evidence.

DevSecOps CI Tasks
25. Figure DevSecOps CI Tasks

Evidence is collected from all compliance checks in the CI pipeline, to the evidence-locker repository that was provided during toolchain setup. Evidence from CI is stored under raw/ci/<pipeline-run-id>/*.json.

Evidence is also published to the DevOps Insights instance inside the toolchain. You can navigate to it by clicking the DevOps Insights tool card in the toolchain. You can review the collected evidence on the Quality Dashboard page.

DevSecOps CI Evidence
Figure 26. Figure DevSecOps CI Evidence

To evaluate if you have any failures in your pipeline run, you need to check the final step of your pipeline, which has a pipeline evaluator.

Viewing the running application

After a successful CI pipeline run, the sample application is deployed on your Kubernetes cluster, and is running in the dev namespace.

The app url can be found at the end of the log of the run stage step of deploy-dev task of the CI Pipeline run. Use that url to verify that the app is running.

DevSecOps CI sample app
Figure 27. DevSecOps CI sample app

Configure Pipeline

You can add a commit-id text property (click Add property and select Text property), if you trigger the pipeline manually. If no commit-id is supplied, the Pipeline takes the latest commit ID from the master branch of your app.

For example:

commit-id
Figure 28. commit-id

Add the trigger parameters (click Run Pipeline ), select Manual Trigger and click Run.

CI Trigger
Figure 29. CI Trigger