Writing a Kubernetes Operator
As part of mirrord For Teams, we wanted to build a persistent component that would run in our userâs cluster and synchronize independent uses of mirrord. It quickly became apparent that we needed a component that was both:
- Kubernetes-native - meaning it leverages the Kubernetes APIs and ecosystem
- Cluster-synchronized - Manage and synchronize the use of our open-source project, mirrord, from the clusterâs point of view.
Some research pointed us in the direction of the Kubernetes Operator/Controller pattern. The operator pattern can be quite ambiguous, and we found the guides that currently exist for it to be quite dense and technical. In this post, I want to instead take a step-by-step approach and provide a quick start for newcomers looking to explore the operator pattern.
Why would you need to write an operator/controller?
On many occasions, the Deployment or StatefulSet at the core of your product will not be self-sufficient but need to access other resources in the cluster. For example, it might need to share a persistent volume across deployments, read a certificate from a Secret, or rely on a headless service for discovery logic. These can be achieved through manual configurations or using a Helm chart or Kustomize template, but then your component is poorly abstracted, so prone to misconfiguration by your users and harder to update.
Using a Kubernetes operator/controller can make it easier for your users to setup and configure your product on their cluster. Letâs illustrate this with an example: CockroachDB is a sharded database with a Postgres-compatible API. Unlike PostgreSQL, it has some safety features enabled by default like requiring SSL encrypted connections for writes, so to deploy CockroachDB you would theoretically need to create and maintain a certificate for each of its Deployments on your Kubernetes cluster. For this reason, they created cockroach-operator. Once installed, a new resource named CrdbCluster becomes available. Whenever the user wants to create a new CockroachDB cluster, they now only have to create a new CrdbCluster object, and the cockroach-operator takes care of the rest.
Operator vs. Controller
A controller is a software component that tracks Kubernetes objects and interacts with them. The objects themselves are managed by Kubernetes itself. For example, Admission Controllers watch new objects being created and enforce policies on them. The objects the controller manages can be existing objects. Note that the controller is a pattern. It doesnât dictate how the controller should run - it can be from a desktop, server, cluster, or anywhere else where it can interact with the Kubernetes API.
An operator is a controller that tracks new resources you can add by using CustomResourceDefinition. An operator can use the Kubernetes API to manage these resources; alternatively, a third component called APIService can be leveraged for handling requests to these resources to the Kubernetes API.
Possible languages and frameworks
The most common way to write Kubernetes-related software is with Golang, since most of the ecosystem uses it and youâd have many examples and resources on the topic. However, any language that can make HTTP requests can be used, since Kubernetes uses OpenAPI (and even has bindings for most mainstream languages).
Notable frameworks and libraries for working with Kubernetes:
API:
- client-go (Golang)
- kube-rs (Rust)
- kubernetes-client (Python)
Frameworks:
- Operator Framework (Golang)
- Kopf (Python)
For the example in this post, we will use Rust + kube-rs. Here are a few reasons why we chose Rust:
- Low footprint and great performance.
- Safety, especially when doing concurrent operations.
- kube-rs is great!
- Itâs the main language used by MetalBearâs team.
This is where the tutorial starts
In the sections that follow, weâll be creating an operator with an APIService. Weâll use Rust, but implementations in other languages can be extrapolated from it fairly easily. First, clone our example repository :
git clone https://github.com/metalbear-co/farm-operator.git
cd farm-operator
Note that the example directory is divided into three steps, each with its prebuilt image .
To start us off, we have some boilerplate for a basic HTTP server. This server will eventually be our operator that returns a Llama đŠ resource from its memory. It will also return the already existing Pod resource (retrieved from the Kubernetes clusterâs API), but with some modifications.
async fn get_api_resources() -> impl IntoResponse {
Json(APIResourceList {
group_version: "farm.example.com/v1alpha".to_string(),
resources: vec![],
})
}
#[tokio::main]
async fn main() -> anyhow::Result<()> {
let app = Router::new().route("/apis/farm.example.com/v1alpha", get(get_api_resources));
// We generate a self-signed certificate for example purposes in a proper service this should be
// loaded from secret and CA for said cert should be defined in APIService uner `caBundle`
let tls_cert = rcgen::generate_simple_self_signed(vec!["localhost".to_string()])?;
let tls_config = RustlsConfig::from_der(
vec![tls_cert.serialize_der()?],
tls_cert.serialize_private_key_der(),
)
.await?;
let addr = SocketAddr::from(([0, 0, 0, 0], 3000));
println!("listening on {addr}");
axum_server::bind_rustls(addr, tls_config)
.serve(app.into_make_service())
.await
.map_err(anyhow::Error::from)
}
For now, the operator is pretty empty and contains only the necessary code to be considered a valid Kubernetes APIService.
To deploy the sample, run the following command, which makes use of a prebuilt image of the farm operator at ghcr.io/metalbear-co/farm-operator
kubectl apply -f app.yaml
Once the farm-operator
is up, we can see it when we run
kubectl get apiservice
Now let’s dive into what is happening here.
...
---
apiVersion: apiregistration.k8s.io/v1
kind: APIService
metadata:
name: v1alpha.farm.example.com
spec:
group: farm.example.com
groupPriorityMinimum: 1000
insecureSkipTLSVerify: true
service:
name: farm-operator
namespace: default
port: 3000
version: v1alpha
versionPriority: 15
Our app.yaml
defines three resources: an APIService
which points to a Service
resource, which in turn points to a Deployment
. Because we want to create our Llama resources under the apiVersion: farm.example.com/v1alpha
, we defined our APIService
with:
spec:
âŠ
group: farm.example.com
âŠ
version: v1alpha
This means that when we create the APIService, Kubernetes will perform a lookup request to our operator at /apis/farm.example.com/v1alpha
and expect it to return an APIResourceList.
This way it knows which resource requests to route to the operator. The response from the farm-operator will look like this.
{
"apiVersion": "v1",
"kind": "APIResourceList",
"groupVersion": "farm.example.com/v1alpha",
"resources": [ ]
}
NOTE: groupVersion is very important because if misconfigured, it can make Kubernetes have unexpected behavior with its built-in resources and potentially cause crashes for the entire cluster.
Coding our Operator
- First, letâs talk about adding a new resource to be handled by the operator.
The first thing we do is create a LlamaSpec struct with a CustomResource derive we have available from kube-rs.
#[derive(CustomResource, Clone, Debug, Deserialize, Serialize, JsonSchema)]
#[kube(
group = "farm.example.com",
version = "v1alpha",
kind = "Llama",
namespaced
)]
pub struct LlamaSpec {
pub weight: f32,
pub height: f32,
}
- Next, we need to add an APIResource to our APIResourceList.
Because we defined a CustomResource with kind = âLlamaâ
, the type Llama is now available for us to use.
async fn get_api_resources() -> impl IntoResponse {
Json(APIResourceList {
group_version: "farm.example.com/v1alpha".to_string(),
resources: vec![APIResource {
group: Some(llama::Llama::group(&()).into()),
kind: llama::Llama::kind(&()).into(),
name: llama::Llama::plural(&()).into(),
namespaced: true,
verbs: vec!["list".to_string(), "get".to_string()],
..Default::default()
}],
})
}
NOTE: Weâll only implement the list and get verbs in this example, but other verbs can be implemented similarly.
- Now, we implement the methods that will eventually handle list and get calls to our Llama resource:
In this sample implementation, STATIC_LLAMAS holds a nested hashmap, where the keys are the namespace name and the Llamaâs name respectively.
So get_llama
will return the Llama by name and list_llamas will return a Kubernetes List object named LlamaList.
pub async fn list_llamas(Path(namespace): Path<String>) -> impl IntoResponse {
println!("Listing Llamas in {namespace}");
Json(serde_json::json!({
"apiVersion": "farm.example.com/v1alpha",
"kind": "LamaList",
"items": &STATIC_LLAMAS.get(&namespace).map(|lamas| lamas.values().collect::<Vec<_>>()).unwrap_or_default(),
"metadata": ListMeta::default()
}))
}
pub async fn get_llama(Path((namespace, name)): Path<(String, String)>) -> Response {
println!("Getting Llama {name} in {namespace}");
if let Some(lama) = STATIC_LLAMAS
.get(&namespace)
.and_then(|lamas| lamas.get(&name))
{
Json(lama).into_response()
} else {
StatusCode::NOT_FOUND.into_response()
}
}
- Next, we add a list of routes for our operator to handle.
Note that since we specified namespaced: true
in the APIResource, the routes need to reflect that:
let app = Router::new()
.route("/apis/farm.example.com/v1alpha", get(get_api_resources))
.route(
"/apis/farm.example.com/v1alpha/namespaces/:namespace/llamas",
get(llama::list_llamas),
)
.route(
"/apis/farm.example.com/v1alpha/namespaces/:namespace/llamas/:name",
get(llama::get_llama),
);
The routes added:
/apis/farm.example.com/v1alpha/namespaces/:namespace/llamas
should return a list of all llamas in the specified namespace/apis/farm.example.com/v1alpha/namespaces/:namespace/llamas/:name
a single llama with the specified name
Developing operators with mirrord
Building and pushing the Docker image for every little change we want to test is a bit tedious, which gives us a perfect opportunity to plug mirrord. mirrord lets you plug your local process into the cluster, so you could test your locally running operator within the actual Kubernetes cluster.
mirrord comes as a VS Code or IntelliJ extension, or as a CLI tool. Weâll use the CLI tool in this example.
To run our operator using mirrord, we can use this command:
cargo build -p farm-operator-2 && mirrord exec -t deploy/farm-operator --steal ./target/debug/farm-operator-2
The first part of the command builds the farm-operator-2
binary from the code in the step-2 directory
. The second part runs the resulting binary with mirrord, with the farm-operator
deployment as its target.
Our operator is now running locally, but stealing requests that are being sent to the farm-operator
deployment in the cluster!
Note that when you first run the operator with mirrord, it might take 1-2 minutes until Kubernetes queries it for its resource list. Commands like kubectl get llama
will return a NotFound error until that happens.
Using benefits of Operators
Implementing APIService lets us do is to provide access to existing resources but modify or enrich them before returning them to the user. All this without some complex synchronisation because you can rely on the Kubernetes as your source of truth and act accordingly. For example, we can implement a simple handler that lists Kubernetes Pods. Weâll name our new, enriched resource FarmPod, and add it to our APIResourceList
and our router.
#[derive(CustomResource, Clone, Debug, Deserialize, Serialize, JsonSchema)]
#[kube(
group = "farm.example.com",
version = "v1alpha",
kind = "FarmPod",
namespaced
)]
pub struct FarmPodSpec {
pub containers: usize,
}
pub async fn list_farmpods(Path(namespace): Path<String>) -> impl IntoResponse {
let client = Client::try_default().await.expect("Client Creation Error");
let pods = Api::<Pod>::namespaced(client, &namespace)
.list(&Default::default())
.await
.expect("Failed to fetch pods");
let items = pods
.items
.into_iter()
.map(|value| {
let name = value
.metadata
.name
.map(|name| format!("farm-{name}"))
.unwrap_or_default();
FarmPod::new(
&name,
FarmPodSpec {
containers: value
.spec
.map(|spec| spec.containers.len())
.unwrap_or_default(),
},
)
})
.collect::<Vec<_>>();
Json(serde_json::json!({
"apiVersion": "farm.example.com/v1alpha",
"kind": "FarmPodList",
"items": items,
"metadata": pods.metadata
}))
}
async fn get_api_resources() -> impl IntoResponse {
Json(APIResourceList {
group_version: "farm.example.com/v1alpha".to_string(),
resources: vec![
APIResource {
group: Some(llama::Llama::group(&()).into()),
kind: llama::Llama::kind(&()).into(),
name: llama::Llama::plural(&()).into(),
namespaced: true,
verbs: vec!["list".to_string(), "get".to_string()],
..Default::default()
},
APIResource {
group: Some(farmpod::FarmPod::group(&()).into()),
kind: farmpod::FarmPod::kind(&()).into(),
name: farmpod::FarmPod::plural(&()).into(),
namespaced: true,
verbs: vec!["list".to_string()],
..Default::default()
},
],
})
}
let app = Router::new()
.route("/apis/farm.example.com/v1alpha", get(get_api_resources))
.route(
"/apis/farm.example.com/v1alpha/namespaces/:namespace/llamas",
get(llama::list_llamas),
)
.route(
"/apis/farm.example.com/v1alpha/namespaces/:namespace/llamas/:name",
get(llama::get_llama),
)
.route(
"/apis/farm.example.com/v1alpha/namespaces/:namespace/farmpods",
get(farmpod::list_farmpods),
);
To test out the new FarmPod
we can run our server again with mirrord.
cargo build -p farm-operator-3 && mirrord exec -t deploy/farm-operator --steal ./target/debug/farm-operator-3
Now lets run
kubectl get farmpods
And we should get a list of our pods in the default namespace but with farm-
in front of their names.
Cleanup
To remove the example resources from Kubernetes, run:
kubectl delete -f app.yaml
Whatâs next?
With this example, we are just touching the tip of the iceberg of what is possible when you integrate yourself into the Kubernetes API. Besides, weâve overlooked some basic requirements, including:
- Support for OpenAPI v2 or v3 (via /openapi/v2 or /openapi/v3), which Kubernetes looks up for each new APIService
- Support for other verbs like âwatchâ, âcreateâ and âdeleteâ
The Kubernetes ecosystem can be overwhelming to start with, but hopefully, this guide has helped you grasp just a little bit more of it. If youâd like to discuss writing and building operators, talking about backend, Kubernetes, or mirrord, youâre more than welcome to join our Discord !