Skip to content

michaelfig/k8s-copier

Repository files navigation

K8S-Copier

NOTE: This project is probably not ready for production, but it does work for my purposes.

k8s-copier watches and updates specially-annotated Kubernetes resources with values from other resources. It can also update resources with data specified in the annotation (useful if another controller is regenerating a resource and an override needs to be applied).

There is a prebuilt Docker image.

Annotations

Annotations on a target resource (one whose singular or plural form is passed as a --target=RESOURCE to k8s-copier, with optional appended dot-separated VERSION and GROUP) can be one of the following:

Annotation Value Description
k8s-copier.fig.org/replace-DST-PATH RESOURCE:INSTANCE:SRC-PATH Replace DST-PATH on the current resource with the contents of SRC-PATH from INSTANCE (of kind RESOURCE)
k8s-copier.fig.org/replace-DST-PATH json:JSON-STRING Replace DST-PATH on the current resource with the stringified JSON data JSON-STRING

Strategic merge (relevant issue) and JSON Merge Patch (relevant issue) annotations are planned, but not yet implemented. Please add a thumbs-up or note explaining your use case to the relevant issue if the feature would be useful to you.

The DST-PATH and SRC-PATH are JSON paths, such as spec.template.data or spec.

Each INSTANCE to copy from can be either a NAME (for the current namespace), or NAMESPACE/NAME, such as my-secret, or ns/my-secret.

The RESOURCE is the singular or plural form of the resource to copy from, with an optional dot-separated VERSION and GROUP if necessary. If there is no VERSION, k8s-copier will try to discover the VERSION and GROUP, so RESOURCE can be something like secret or deployment or deployments.v1beta1.extensions.

Kubernetes Federation V2

The main use case for k8s-copier is to update Federation v2 Federated* resources with values from the host cluster.

IMPORTANT: To run any of the following examples, you will first need to label your master cluster (the one which is the synchronization source for the other clusters)! This prevents Federation and k8s-copier from flapping when trying to update the same resource.

# kubectl label federatedcluster mymaster cluster-master=true

This is assuming your master cluster, which has been added with kubefedctl join and is also running the Federation control plane, is named mymaster.

Cert-Manager integration

If you use cert-manager and you want to update a FederatedSecret with values from a Secret that is created by cert-manager, first make sure that k8s-copier has the --target=federatedsecret flag set and the cluster-master=true label has been applied as above.

Then, you can do something like this:

---
apiVersion: certmanager.k8s.io/v1alpha1
kind: Certificate
metadata:
  name: cloud-secret-master
  namespace: cloud
spec:
  acme:
    config:
    - dns01:
        provider: dns
      domains:
      - cloud.example.com
  dnsNames:
  - cloud.example.com
  issuerRef:
    kind: ClusterIssuer
    name: letsencrypt-prod
  secretName: cloud-secret-master
---
apiVersion: types.federation.k8s.io/v1alpha1
kind: FederatedSecret
metadata:
  name: cloud-secret
  namespace: cloud
  annotations:
    flux.weave.works/ignore: "true" # Needed to prevent flapping.
    # The k8s-copier specification.
    k8s-copier.fig.org/replace-spec.template.data: "secret:cloud-secret-master:data"
spec:
  placement:
    clusterSelector:
      matchExpressions:
      # Don't update the master cluster, as cert-manager does that.
      - key: cluster-master
        operator: DoesNotExist
  template:
    type: kubernetes.io/tls
    data: 

After these resources are added, cert-manager should pick up the Certificate and create the Secret named cloud-secret-master. Then, k8s-copier will detect the Secret, and add its data values to the FederatedSecret's spec.template.data path. Finally, Federation will propagate the FederatedSecret to Secrets in the other clusters.

Whenever the Secret changes (such as when a new Certificate is ordered by cert-manager), the FederatedSecret will also be updated, and Federation will propagate the Secret to the other clusters.

Flux integration

If you use Weave Flux you can use the following patterns for updating federated workloads with values from a Flux-managed workload.

Deployment

If you want to update a FederatedDeployment with values from a Deployment that is managed by Flux, first make sure that k8s-copier has the --target=federateddeployment flag set and the cluster-master=true label has been applied as above.

Then you can add a Deployment to your Flux GitOps repository:

apiVersion: extensions/v1beta1
kind: Deployment
metadata:
  annotations:
    # These are not strictly necessary... you could also update images with fluxctl.
    flux.weave.works/automated: "true"
    flux.weave.works/tag.my-container: semver:~1.0
  name: cloud-deployment-master
  namespace: cloud
spec:
  template:
    spec:
      containers:
      - name: my-container
      # ... whatever you want.

After, manually apply the FederatedDeployment (it must not be managed by Flux, or k8s-copier and Flux will flap between updating it):

apiVersion: types.federation.k8s.io/v1alpha1
kind: FederatedDeployment
metadata:
  name: cloud-deployment
  namespace: cloud
  annotations:
    flux.weave.works/ignore: "true" # Needed to prevent flapping.
    # The k8s-copier specification.
    k8s-copier.fig.org/replace-spec.template.spec: "deployment:cloud-deployment-master:spec"
spec:
  placement:
    clusterSelector:
      matchExpressions:
      # Don't update the master cluster, as Flux does that.
      - key: cluster-master
        operator: DoesNotExist

After these resources are added, Flux should manage GitOps changes and update the Deployment named cloud-deployment-master. Then, k8s-copier will detect the Deployment changes, and add its spec values to the FederatedDeployment's spec.template.spec path. Finally, Federation will propagate the FederatedDeployment to cloud-deployment Deployments in the other clusters.

Whenever the cloud-deployment-master Deployment changes (such as when Flux detects image changes, or GitOps changes to the Deployment), the FederatedDeployment will also be updated, and Federation will propagate the Deployment to the other clusters.

HelmRelease

If you want to update a FederatedHelmRelease with values from a HelmRelease that is managed by Flux (which in turn generates an actual helm installation via the flux-helm-operator), first enable federation for HelmReleases:

$ kubefedctl enable helmrelease

Next, make sure that k8s-copier has the --target=federatedhelmrelease flag set and the cluster-master=true label has been applied as above.

Then you can add a HelmRelease to your Flux GitOps repository:

apiVersion: flux.weave.works/v1beta1
kind: HelmRelease
metadata:
  annotations:
    # These are not strictly necessary... you could also update images with fluxctl.
    flux.weave.works/automated: "true"
    flux.weave.works/tag.chart-image: semver:~1.0
  name: cloud-release-master
  namespace: cloud
spec:
  releaseName: cloud-release
  values:
    image:
      repository: example.com/cloud-image
      tag: 1.0.1
  # ... whatever you want.

After, manually apply the FederatedHelmRelease (it must not be managed by Flux, or k8s-copier and Flux will flap between updating it):

apiVersion: types.federation.k8s.io/v1alpha1
kind: FederatedHelmRelease
metadata:
  name: cloud-release
  namespace: cloud
  annotations:
    flux.weave.works/ignore: "true" # Needed to prevent flapping.
    # The k8s-copier specification.
    k8s-copier.fig.org/replace-spec.template.spec: "helmrelease:cloud-release:spec"
spec:
  placement:
    clusterSelector:
      matchExpressions:
      # Don't update the master cluster, as Flux does that.
      - key: cluster-master
        operator: DoesNotExist
  template:
    spec: # ... Your default spec for the helmrelease

After these resources are added, Flux should manage GitOps changes and update the HelmRelease named cloud-release. Then, k8s-copier will detect the HelmRelease changes, and add its spec values to the FederatedHelmRelease's spec.template.spec path. Finally, Federation will propagate the FederatedHelmRelease to HelmReleases in the other clusters.

Whenever the HelmRelease changes (such as when Flux detects image changes, or GitOps changes to the HelmRelease), the FederatedHelmRelease will also be updated, and Federation will propagate the HelmRelease to the other clusters.

Acknowledgments

Thanks to James Munnelly at Jetstack for starting me in the direction of creating an orthogonal controller, rather than patching cert-manager and Weave Flux.

Michael FIG [email protected], 2019-05-02