🚀🚀🚀 BREAKING: Introducing the new Flamingo CLI! 🚀🚀🚀
Flamingo is the Flux Subsystem for Argo (FSA). Flamingo's container image can be used as a drop-in extension for the equivalent ArgoCD version to visualize, and manage Flux workloads, alongside ArgoCD. You can also ensure that upstream CVEs in Argo CD are quickly backported to Flamingo, maintaining a secure and stable environment.
This opensource project is sponsored by Weaveworks, and they provide commercial support for its users via Weave GitOps Assured Accelerator.
Flamingo is a tool that combines Flux and Argo CD to provide the best of both worlds for implementing GitOps on Kubernetes clusters. With Flamingo, you can:
-
Automate the deployment of your applications to Kubernetes clusters and benefit from the improved collaboration and deployment speed and reliability that GitOps offers.
-
Enjoy a seamless and integrated experience for managing deployments, with the automation capabilities of Flux embedded inside the user-friendly interface of Argo CD.
-
Take advantage of additional features and capabilities that are not available in either Flux or Argo CD individually, such the robust Helm support from Flux, Flux OCI Repository, Weave GitOps Terraform Controller for Infrastructure as Code, Weave Policy Engine, or Argo CD ApplicationSet for Flux-managed resources.
Try Flamingo today and see how it can improve your GitOps workflow on Kubernetes.
This provides a brief overview of the benefits of using Flamingo and why it could be a useful tool for implementing GitOps on Kubernetes clusters. Of course, you may want to tailor this to your specific use case and requirements, but this should give you a good starting point.
Loopback Reconciliation is a feature of Flamingo that helps to synchronize applications deployed using the GitOps approach. It is activated when the "FluxSubsystem" feature is enabled in the ArgoCD user interface (UI).
Here's how Loopback Reconciliation works:
-
An ArgoCD application manifest is created and deployed to a cluster, either in Kustomization or Helm mode.
-
Flamingo converts the ArgoCD application manifest into the equivalent Flux object, either a Kustomization object or a HelmRelease object with a Source, depending on the mode used in the ArgoCD manifest. If Flux objects already exist for the application, Flamingo will use them as references instead of creating new ones.
-
Flamingo synchronizes or reconciles the state of the ArgoCD application with its Flux counterparts by using the state of the Flux objects as the desired state. To do this, the Loopback Reconciliation mechanism bypasses the native reconciliation process in ArgoCD and relies on Flux reconciliation instead. It then uses the result from the Flux objects to report back to ArgoCD.
Loopback Reconciliation helps to ensure the reliability and consistency of GitOps-based deployments by keeping the state of applications in sync with their desired state defined in the Flux objects. The technique gets its name because it involves "looping back" to the desired state defined in the Flux objects as references to reconcile the state of the application.
This guide will provide a step-by-step process for setting up a GitOps environment using Flux and ArgoCD, via Flamingo. By the end of this guide, you will have Flamingo running locally on your KIND cluster. You will create a podinfo
application with a Flux Kustomization, and generate a Flamingo app from this Flux object.
Install CLIs
Example install in macOS or Linux via homebrew
# install KIND cli
brew install kind
# install Flux CLI
brew install fluxcd/tap/flux
# install Flamingo CLI
# with Homebrew
brew install flux-subsystem-argo/tap/flamingo
# or with cURL
curl -sL https://raw.githubusercontent.com/flux-subsystem-argo/flamingo/main/install/flamingo.sh | sudo bash
Create a fresh KIND cluster
kind create cluster
Install Flux
flux install
Install Flamingo
flamingo install
# or with a specific version
flamingo install --version=v2.8.4
Create a Flux Kustomization
cat << EOF | kubectl apply -f -
---
apiVersion: v1
kind: Namespace
metadata:
name: podinfo-kustomize
---
apiVersion: source.toolkit.fluxcd.io/v1beta2
kind: OCIRepository
metadata:
name: podinfo
namespace: podinfo-kustomize
spec:
interval: 10m
url: oci://ghcr.io/stefanprodan/manifests/podinfo
ref:
tag: latest
---
apiVersion: kustomize.toolkit.fluxcd.io/v1
kind: Kustomization
metadata:
name: podinfo
namespace: podinfo-kustomize
spec:
interval: 10m
targetNamespace: podinfo-kustomize
prune: true
sourceRef:
kind: OCIRepository
name: podinfo
path: ./
EOF
Generate a Flamingo application to visualize the podinfo
objects.
flamingo generate-app \
--app-name=podinfo-ks \
-n podinfo-kustomize ks/podinfo
Create a Flux HelmRelease
cat << EOF | kubectl apply -f -
---
apiVersion: v1
kind: Namespace
metadata:
name: podinfo-helm
---
apiVersion: source.toolkit.fluxcd.io/v1beta2
kind: HelmRepository
metadata:
name: podinfo
namespace: podinfo-helm
spec:
interval: 10m
type: oci
url: oci://ghcr.io/stefanprodan/charts
---
apiVersion: helm.toolkit.fluxcd.io/v2beta1
kind: HelmRelease
metadata:
name: podinfo
namespace: podinfo-helm
spec:
interval: 10m
targetNamespace: podinfo-helm
chart:
spec:
chart: podinfo
version: '*'
sourceRef:
kind: HelmRepository
name: podinfo
verify:
provider: cosign # keyless
EOF
flamingo generate-app \
--app-name=podinfo-hr \
-n podinfo-helm hr/podinfo
Like a normal Argo CD instance, please firstly obtain the initial password by running the following command to login.
The default username is admin
.
flamingo show-init-password
After that you can port forward and open your browser to http://localhost:8080
kubectl -n argocd port-forward svc/argocd-server 8080:443