Your Privacy

This site uses cookies to enhance your browsing experience and deliver personalized content. By continuing to use this site, you consent to our use of cookies.
COOKIE POLICY

Skip to main content

Keeping Infrastructure out of the Way of Application Goals

Keeping Infrastructure out of the Way of Application Goals
Back to insights

Every new application starts with an idea.  Whether creating a new site, the next big social media platform or just trying to make a process workflow easier, the idea is the driving force where teams want to spend most of their time perfecting the user experience. However, once a project moves out of the proof of concept phase, there is a lot of development that needs to be done which only indirectly helps make an idea a reality.  There is a laundry list of needs a web application has that are important for getting an application to production.  This list could include user management, HTTPS, deployment strategy and project organization.  A development team can spend a lot of time working on these features, which takes away time that could be spent working on the core application functionality.   Teams at UDig have been looking for ways to minimize this initial project infrastructure workload.  Utilizing some awesome microservices we have managed to create a tech stack that allows developers to spend less time configuring and more time developing.

The base of this stack utilizes Docker to containerize the application.  Creating images for different parts of the application allows the infrastructure to be standardized making it easier to manage.  The “it runs fine on my machine” risks are minimized when moving from development to production environments.  When each part of the application runs in its own container, different parts of the application will not have compatibility issues as they would running on the same machine.  Developers can start to think of the different parts of the application as their own units with their own concerns.  When architecture becomes pluggable, developers can handoff work to trusted third party dependencies. 

Most web applications manage users.  A development team could fill multiple sprints with all the work needed to create a custom solution building out this feature.  There are roles, admin views, authentication schemes, UI screens and more.  It is important to have confidence in sensitive feature like user security.  RedHat’s Keycloak Identity Management System offloads this work and provides an advanced user management system out of the box.  This system supports all major authentication schemes like SSO, Social Logins, 2 Factor and OAuth 2.0.  For single system setups, Keycloak provides different settings for regulating user fields such as enforcing user password requirements.  Part of what makes Keycloak so functional out of the box is most of the user UI screens are provided such as the login, user details and admin views.  The development team can customize these screens and rebrand them so they match the look and feel of the rest of the application.  On the client side, Keycloak provides libraries for different frameworks like React to perform the authorization flow.  You can configure the endpoints and then allow the client to complete the work. 

When it comes to assigning roles to users, there are a few ways to create and assign them to users.  A role is a defined permission. Roles can be a composite of other defined rolesThese can be assigned directly to users.  Additionally, there is a concept of groups. A group is a bucket of users with assigned roles.  A “Student” group would have different roles then a “Teacher” group.  Groups can also be organized hieratically, so that groups inherit roles from its parent group.  

Keycloak Groups

While Keycloak runs independently from the application, it provides a Rest API to allow the application to look up and update users. There is also a need to keep track of the configuration of the whole system.  It is possible to export the complete configuration so it can be tracked in version control and reconstituted.  In Docker, you can use the script below to extract the roles, users and auth config into a json file: 

docker exec -it irc-api_keycloak_1 opt/jboss/keycloak/bin/standalone.sh \

-Djboss.socket.binding.port-offset=100 \ 

-Dkeycloak.migration.action=export \     

-Dkeycloak.migration.provider=singleFile \     

-Dkeycloak.migration.realmName=<name-of-realm-here> \     

-Dkeycloak.migration.usersExportStrategy=REALM_FILE \     

-Dkeycloak.migration.file=/tmp/lms-export/KeycloakConfig.json 

This is great for keeping the application consistent on developers’ computers.  This JSON file can be imported by the Keycloak container on startup.  The production config (without user secrets) can be version controlled to prevent any catastrophic issues, and in the development environment, configurations with test users can be used for testing. 

With user security taken care of, there is still concern for the website’s security.  What parts of the application are public facing, and how is communication secured?  Traefik is an edge router that handles these problems with minimal configuration.  With Traefik there are settings for the application like entry points and HTTPS, but once that is complete, it will inspect the project’s infrastructure and map out the rest of the configuration for you.  While UDig has used this with Docker, Traefik has support for many providers such as Kubernetes, Redis and Marathon.  For Docker, labels are added to a container, which are discovered by Traefik which handles the rest. 

labels:   

  - "traefik.http.routers.api.rule=Host(`api.localhost`)"   

  - "traefik.http.routers.api.entrypoints=web" 

Traefik config can specify middleware, load balancers, and rules for more fine-tuned traffic scenarios.  A common need for a web application is certificates for HTTPS traffic.  Traefik provides settings to use certificates a team already has assigned.  If the team does not already have certificates, Traefik can use an ACME provider like Let’s Encrypt to generate certificates automatically.  A bonus of this approach is Traefik will automatically renew the certificates before they expire so there is less risk of them lapsing. 

Developers should be confident in their application infrastructure.  It is important to have a solid base so the team can focus on business goals. The approach highlighted here lets a team use triedandtrue techniques for successful application development which saves valuable time While we have had good results with this approach, utilizing containers also allows an application to be flexible and swap out services if needs change in the future.  Development can utilize existing software to solve common application problems and focus on what matters for a project’s success. 

Digging In

  • Development & Modernization

    Docker Brings Scale at Cost

    Our UDig Software Engineering team has always been a cloud–first engineering group, but while inventorying our internal application and cloud usage we were disappointed at our spend and over-usage of EC2 instances with AWS. Through research and experience we knew if we could containerize our applications with Docker, we’d then be able to consolidate and maximize our servers‘ output. Before we […]

  • Development & Modernization

    Is Lift-and-Shift a Valid Option for Cloud Migration?

    There are a few valid cases for doing a “lift and shift” cloud migration, but it should always be challenged, especially when it is used as a stepping stone in your long-term strategy. Legitimate time, technology, or capacity constraints within existing data centers are valid reasons to begin with a “lift and shift” migration. If there is true necessity for an organization to meet a certain deadline […]

  • Development & Modernization

    Minimize your Cloud Debt

    Technical debt is a real liability. If you have spent any time working at a company that relies on technology, you have most likely felt the impacts of technical debt. It comes in many forms and is difficult to identify in many cases, but one thing is for certain – it has compounding costs. As […]

  • Development & Modernization

    Architectural Simplicity

    With all of the cool modern frameworks, database options and other technologies available to us it’s easier than ever for software solutions to become overly complex. Sometimes this is a reflection of the complicated problems we are solving. However, in many cases it is the result of poor planning or adding functionality without enough consideration […]

  • Development & Modernization

    Understanding Serverless Computing

    Most consumers think of cloud computing simply as off-site storage space. But there’s been a rising trend in the last few years to host and run code in the cloud. As the features have matured, it’s become simple to use serverless computing services for applications. Advantages The primary advantage to serverless computing is simplicity. The […]