TGPSKI / gabi

Improving tenant quality of life for database access while following site reliability engineering best practices

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

gabi: go-auditable-db-interface

Improving tenant quality of life for database access while following site reliability engineering best practices

Note: gabi is under active development and is not suitable for production use.

Description

gabi is a service that provides an interface for tenants and SREs to run SQL queries on protected databases without exposing credentials, complete with audit capabilities to comply with certifications (i.e. SOC-2). Organizations that adopt SRE best practices are often found walking a tight line between developer happiness and full regulatory compliance. One common area of conflict is around database access. Developers are familiar with read and write access during their project work, but find production restrictions on databases to be frustrating and time consuming. gabi attempts to bridge the gap between SRE needs and developer needs by providing an auditable, secure, and available interface to query databases.

Best Practice vs Best Effort

“Best Practice” applications are applications that are fully onboarded according to SRE best practices, with the end result of SREs taking responsibility for service health (i.e. carrying the pager).

“Best Effort” applications are applications that run in SRE-defined runtime environments, but by choice or design do not follow all requirements mandated by the SRE team. These applications enjoy the benefits of SRE-led infrastructure, but the SRE team is not tasked with carrying the pager for these services.

This stratified support model is supported in gabi with RBAC restrictions. Instances of gabi can be set to read only mode with the intention of supporting “best practice” services through read-replica databases. Optionally, read/write mode can be enabled for primary databases, supporting “best effort” services.

GitOps

To the joy of many SREs, gabi is created with GitOps in mind. In addition to allowing HTTP requests to the service from a developer’s machine, a reconciliation server can manage interacting with the API and can execute queries as part of PR or MR hooks. This allows for a full GitOps workflow, and includes the added benefits of tracking each query through version controlled files.

Secret Management

The service consumes database access credentials through environment variables. There are a multitude of secret management techniques that can supply environment variables to Kubernetes pods, such as Vault, Kubernetes Secrets, ConfigMaps, and more. This approach implies that one instance of gabi is needed for each database, as each instance of gabi will only execute queries on the database defined at pod creation time.

Supported Databases

Currently, gabi supports MySQL and PostgreSQL. The database interface is written with sql.DB, so other database types will be easy to implement, and we welcome contributions from the community.

Runtime Environment

The service is written in golang and is intended to be run as a Kubernetes or OpenShift workload. In addition to a Kubernetes workload, the application can run in a standalone Docker container, or as a CLI app (not recommended).

Quickstart

TODO

$ source .env.dev
$ go run cmd/main.go

2021-07-08T20:53:30.065-0700	INFO	gabi/main.go:25	Starting gabi server version 0.0.1
2021-07-08T20:53:30.065-0700	INFO	cmd/cmd.go:27	Database environment variables populated.
2021-07-08T20:53:30.065-0700	INFO	cmd/cmd.go:34	Database connection handle established.
2021-07-08T20:53:30.065-0700	INFO	cmd/cmd.go:35	Using mysql database driver.
2021-07-08T20:53:30.065-0700	INFO	cmd/cmd.go:51	Router initialized.
2021-07-08T20:53:30.065-0700	INFO	cmd/cmd.go:54	HTTP server starting on port 8080.
::1 - - [08/Jul/2021:19:30:58 -0700] "GET / HTTP/1.1" 404 19
::1 - - [08/Jul/2021:19:31:03 -0700] "GET /query HTTP/1.1" 404 19
::1 - - [08/Jul/2021:19:31:06 -0700] "GET /healthcheck HTTP/1.1" 200 16

Detailed Operation

TODO

Environment Variables

DB_DRIVER Options

  • mysql
  • pgx
DB_DRIVER=mysql # pgx
DB_HOST=127.0.0.1
DB_PORT=32084
DB_USER=root
DB_PASS=tpate
DB_NAME=employees
DB_WRITE=false

About

Improving tenant quality of life for database access while following site reliability engineering best practices

License:Apache License 2.0


Languages

Language:Go 78.4%Language:Shell 12.5%Language:Makefile 5.3%Language:Dockerfile 3.7%