goTemp is a full stack Golang microservices sample application built using go-micro. The application is built as a series of services that provide:
- Authentication using JWT
- Creation and maintenance of :
- Users
- Customers
- Products
- Promotions
- Auditing of all changes to the application data
In its current incarnation (this is wip), this mono-repo uses the following stack as backend:
Golang
as its main implementation technologygo-Micro
as the micro service frameworkgRPC
for inter-service real time communicationNATS
for Pub/Sub event driven communicationmulticast DNS
for service registration and discoveryPostgreSql
for transactional data storageTimescaleDB
time series DB used for historical audit data storageArangoDB
is a multi-model database used for master data storageRedis
is used to cache data and reduce number of data requests to other servicesVault
for credentials management when running in Kubernetes
In terms of the web front end, the stack is as follows:
Javascript
as its main implementation technologySvelte
is used as the compilation engine (via rollup)Sapper
is the javascript frameworkSveltestrap
provides the css framework and is based on bootstrapFont Awesome
to display icons in the application
As far as observability, the application uses:
Prometheus
scrapes metrics from the microservices, databases and brokerGrafana
provides graphic visualization of application metrics
Finally, for orchestration, the stack is as follows:
Docker
for creating application imagesDocker-compose
to run the applicationMinikube
to run the application in Kubernetes
Below is a diagram that displays the overall setup of the application:
In a nutshell. the application functionality is as follows in the backend:
- The frontend connects to the different services through the API gateway
- For each service the frontend provides:
- Search page
- Detail page
- Additionally, the frontend provides:
- Landing page
- Login page
- Register page
- Each service performs the basic CRUD operations to their underlying databases
- All services authenticate via the user service
- All completed CUD operations are forwarded to the NATS broker which in turn forwards the message to the auditing service. This service saves the data into TimescaleDB.
- Each service has a client which can be used to test all basic CRUD functionality
go-Micro uses mdns
for service discovery when running locally. While this works really well, mdns
is not available by default in all operating systems.
As such, the easiest way to run a go-Micro based applications is using Docker or Kubernetes.
Before running the application the first time:
- Clone the repository
- cd into
gotemp/web/sapper
- Run the following command to generate the javascript dependencies.
npm install
To start the application:
- Ensure that Docker is installed and running. Then, run the following command from a terminal in the goTemp root folder:
make start
Depending on whether you have run the application before, docker may have to download all the dependent images (PostgreSql, TimescaleDB, Nodejs, etc). This may take a while depending on your internet connection speed. Once everything has been downloaded and started, you should see a message in the terminal indicating that the application is listening at localhost:3000. At that point, you can open your browser and navigate to:
http://localhost:3000
Additionally, observability tooling can be accessed at the addresses below
Prometheus: http://localhost:9090
Grafana: http://localhost:3001
To stop the application:
make stop
Ensure that Minikube is installed and running.
The application front end connects with the API gateway using via a K8s ingress resource. As such, the ingress addon must be enabled in Minikube. To enabled it, run:
minikube addons enable ingress
Check the ingress is working using the command below. The command's results should include an entry for the ingress.
kubectl get pods -n kube-system
Out of the box, the Kubernetes manifest will pull existing Bolbeck goTemp images from Docker Hub.
You are welcome to change the Kubernetes manifests in the ./cicd/K8s
folder to pull your own images.
To build your own images of each service and push them to docker hub run the command below for each of the services:
make hubpush SERVICE=<serivceName> FOLDER=<folderName>
where serviceName is the name of the service for which the image should be built folderName is the folder that contains the docker file used to build the service image
Example:
make hubpush SERVICE=usersrv FOLDER=./user
Note that for the web front end and for Timescale DB the command to be used is slightly different:
make hubpushcontext SERVICE=<serivceName> FOLDER=<folderName>
Once the ingress has been enabled, deploy the application to Minikube:
make startkub
If this is the first time running the application in Minikube, the ingress IP address should be configured. Once the application is deployed, check the address and host assigned to the ingress:
kubectl get ingress
Note that it takes a couple of minutes for K8s to assign the IP to the ingress. As such wait for that happens before moving ahead.
Grab the address & the host from the result of the command above, and add it to your /etc/hosts
file:
<ipAddress> gotemp.tst
Finally, access app:
minikube service web
To stop the application:
make stopkub
Note that if you stop the application, you can restart it by just running:
make startkub
minikube service web
Before running the app integrated with Vault, follow the steps in the ./vault/README.md
directory to set up and prepare Vault
Once the ingress has been enabled and Vault is ready to go, deploy the application to Minikube:
make vstartkub
If this is the first time running the application in Minikube, the ingress IP address should be configured. Once the application is deployed, check the address and host assigned to the ingress:
kubectl get ingress
Note that it takes a couple of minutes for K8s to assign the IP to the ingress. As such wait for that happens before moving ahead.
Grab the address & the host from the result of the command above, and add it to your /etc/hosts
file:
<ipAddress> gotemp.tst
Finally, access app:
minikube service web
To stop the application:
make vstopkub
Observability tools access while the application is running in K8s (with or without Vault):
- Prometheus:
minikube service prometheus
- Grafana:
minikube service grafana
The project is organized in a way that each folder represents either a service, a database or a shared library package. Currently, we have the following:
arangodb
: Volumes mounted to the ArangoDB container as well as data initialization scriptsaudit
: Audit service to collect and store historical audit informationcicd
: Holds files related to CI/CD and orchestrationcustomer
: Customer master data servicediagramforDocs
: Diagrams used in the readme documentsglobalErrors
: Generic errors shared packageglobalMonitoring
: Generic monitoring utilities shared packageglobalProtos
: Generic protobuf message definitions shared across packagesglobalUtils
: Generic utilities shared packagegrafana
: Grafana configuration and custom dashboard definitionsnats
: NATS dockerfile and configurationpostgres
: Volumes mounted to the PostgreSQL DB container as well as data initialization scriptsproduct
: Product master data servicepromotion
: Promotion service to track product discounts (this was the first service built)prometheus
: Prometheus configuration and exportersredis
: Volumes mounted on the redis container as well as config files (if any)timescaleDB
: Volumes mounted to the Timescale DB container as well as data initialization scriptsuser
: User and authentication serviceVault
: Scripts & policies needed to run the app in K8s with Vaultweb
: application web frontend
Additionally, we have the following files in the root directory as well:
.dockerignore
: Files to be ignored when building service images.gitignore
: Files to be ignored by gitdocker-compose
: File controls the building of the different services and their dependenciesdocker-compose-test
: Override compose file that can be used to test different services with their dependenciesgo.mod and go.sum
: Go modules controlmain.go
: Not used for services yetMakefile
: shortcuts to common actionsReadme.md
: Well... this file...
We use go-micro
as the main GO microservices framework. Using go-micro simplifies many of the tasks associated with building
micro services including (but not limited to):
- Service discovery
- gRPC for inter service communication
- Pluggable interfaces to popular software applications like NATS and Redis
- Built in async messaging (in our case used to set up pub/sub messages to NATS )
- Built-in data storage interface (in our case used to interact with Redis)
- API gateway:
- Request routing
- Load balancing
- Automatic conversion of frontend JSON payloads to backend gRPC messages
Each one of the services has a similar structure:
client
: Contains a client service that calls the server service to perform multiple operationsproto
: Proto buffer messages and services definitions. Empty if service does not handle real time inter-service communication.server
: Service that performs a number of actions like interacting with the DBDockerfile
: Build the image for the server serviceDockerfileCLI
: Build the image of the client servicedocker-compose.env
: Environment variables required to run the service when running the service with docker-composedocker-compose-cli.env
: Environment variables required to run the client when running the client with docker-compose
The different service's images can be built from the root of the repo using the docker build command. For example the user service can be built using:
docker build -t usersrv -f user/Dockerfile .
Note that there is no need to run this if you are using docker-compose as that will build the image automatically
The services are designed to run in containers, and the easiest way to run them is to bring them up using docker-compose: As an example we will run the user service with the commands below in a terminal:
docker-compose up usersrv
This will bring up the user service, the postgreSQL DB and NATS Then to run some data through the service, we can start the user client in a new terminal:
docker-compose up usercli
This will bring up run the client service which will attempt to create,update and delete a user. The results will be printed in the console. The server user service will update the DB as necessary and send the updated information to the broker (NATS) so that the audit service may eventually store it in the time series DB. The audit service can be started using:
docker-compose up auditsrv
The project initializes each of the DBs and seeds them with tables and data. Data changes made at run time are automatically persisted using mounted volumes when running via docker-compose. See the folders for each DB for details as well as the docker-compose file.
Our web front end is built with Svelte and Sapper which have some interesting benefits:
- Server-side initial rendering of our pages
- File based routing
- Smaller code base than other Javascript frameworks. Does more with less.
- Svelte translates the code to vanilla javascript. Thus, smaller application footprint than most frameworks
- Emphasis on component re-usability
The web application lives in the ./web
folder. Since Sapper
and Svelte
generate multiple files and folders, we will just discuss the relevant folders below:
sapper
: The main folder containing the web appsrc
: This is where the bulk of the application residescomponents
: Contains re-usableSvelte
componentsglobalUtils
: Shared javascript utilitiesroutes
: application routes to the different pagesclient.js
: This is a required file. It is used to startSapper
.server.js
: Used to configure the app with items like middleware and compressiontemplate.html
: Main page that contains our application. We added Bootstrap and Font Awesome CDN references in this page.
static
: Holds static items
Dockerfile
: Used to build the docker image for the web app
All of our main routes are pretty standard in terms of organization. We will use the customer route (./web/sapper/src/routes/customer
) as an example:
index.svelte
: Main customers search page that serves at localhost:3000/customer_searchGridSlot
: Component holds the template for the search grid to be display in hte search page (index.svelte)new.svelte
: Page to be displayed when user want to create a new customer. Displayed at localhost:3000/customer/new .[slug].svelte
: Page to view and modify existing customers. Displayed at localhost:3000/customer/[customerid]_detail.svelte
: Holds the gui and bulk of the logic for adding or editing customers. It is called by new.svelte and [slug].svelte .
There are three routes that do not share the structure above as they have very little functionality and thus are server by a single index.svelte component: root, register and login.
The application configuration in K8s can be seen in the diagram below. Note that the diagram shows just one of the different microservices and its associated database. The configuration for all other microservices, beyond the shared ingress and API Gateway, is similar to the one depicted in the diagram.
Notes:
- When running the application with Vault, the microservices secrets will be superseded by the secrets stored in Vault.
- The microservices, ArangoDB and NATS have Prometheus metric scrape endpoints built-in. On the other hand, Redis, PostgresDB and TimescaleDB use adapter containers to expose the data to Prometheus.
- To keep the diagram simple, the K8s services for the database, Vault, Prometheus and Grafana are not displayed in the diagram.
The K8s files live in the ./cicd/K8s
folder, and it is organized as follows:
clients
: These are the test clients for each of the services.dbsAndBroker
: Contains the manifests for all the databases and for the brokeringress
: Manifest to create the ingress resource that allows the frontend, and the back end to communicatemonitoring
: holds the manifests to deploy monitoring resources (Prometheus, Grafana)services
: Contains all the services and related entities manifest (deployment, service, etc...).vault
: Manifests to create the service accounts and patches to integrate the application with Vaultweb
: Manifest for the web front end and the API gateway
Note that within each of the folders, most related manifests are organized using a prefix. For example, all the front end related services start with the 'web' prefix.
Additional information can be found in the individual folders either in a readme.md
or a doc.go
file.
Additionally, the Makefile contains many command samples that can be used for development.