Kubernator is the a pluggable framework for K8S provisioning
Project description
Kubernator
Kubernator™ (Ktor™) is an integrated solution for the Kubernetes state management. It operates on directories, processing their content via a collection of plugins, generating Kubernetes resources in the process, validating them, transforming them and then applying against the Kubernetes cluster.
Notices
Beta Software
While fully functional in the current state and used in production, this software is in BETA. A lot of things are expected to change rapidly, including main APIs, initialization procedures and some core features. Documentation at this stage is basically non-existent.
License
The product is licensed under the Apache License, Version 2.0. Please see LICENSE for further details.
Warranties and Liability
Kubernator and its plugins are provided on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing Kubernator and assume any risks associated with doing so.
Trademarks
"Kubernator" and "Ktor" are trademarks or registered trademarks of Express Systems USA, Inc and Karellen, Inc. All other trademarks are property of their respective owners.
Problem Statement
Solution
Using Kubernator with Docker
A simple example is as follows:
$ docker run --mount type=bind,source="$(pwd)",target=/root,readonly -t ghcr.io/karellen/kubernator:latest
Using Kubernator on MacOS
$ brew install python3.11
$ pip3.11 install 'kubernator~=1.0.9'
$ kubernator --version
Please note, that some plugins (e.g. awscli
, eks
) may require additional volume mounts or environmental
variables to be passed for credentials and other external configuration.
Mode of Operation
Kubernator is a command line utility. Upon startup and processing of the command line arguments and initializing logging, Kubernator initializes plugins. Current plugins include:
- Kubernator App
- Terraform
- kOps
- Kubernetes
- Helm
- Template
The order of initialization matters as it's the order the plugin handlers are executed!
The entire application operates in the following stages by invoking each plugin's stage handler in sequence:
- Plugin Init Stage
- Pre-start script (if specified)
- Plugin Start Stage
- For each directory in the pipeline:
- Plugin Before Directory Stage
- If
.kubernator.py
is present in the directory:- Plugin Before Script Stage
.kubernator.py
script- Plugin After Script Stage
- Plugin After Directory Stage
- Plugin End Stage
Each plugin individually plays a specific role and performs a specific function which will be described in a later section.
State/Context
There is a global state that is carried through as the application is running. It is a hierarchy of objects (context
)
that follows the parent-child relationship as the application traverses the directory structure. For example, given the
directory structure /a/b
, /a/c
, and /a/c/d
any value of the context set or modified in context scoped to
directory /a
is visible in directories /a/b
, /a/c
and /a/c/d
, while the same modified or set in /a/b
is only
visible there, while one in /a/c
is visible in /a/c
and in /a/c/d
but not /a
or /a/b
.
Additionally, there is a context.globals
which is the top-most context that is available in all stages that are not
associated with the directory structure.
Note, that in cases where the directory structure traversal moves to remote directories (that are actualized by local temporary directories), such remote directory structure enters the context hierarchy as a child of the directory in which remote was registered.
Also note, that context carries not just data by references to essential functions.
In pre-start and .kubernator.py
scripts the context is fully available as a global variable ktor
.
Plugins
Kubernator App Plugin
The role of the Kubernator App Plugin is to traverse the directory structure, expose essential functions through context and to run Kubernator scripts.
In the After Directory Stage Kubernator app scans the directories immediately available in the current, sorts them in
the alphabetic order, excludes those matching any of the patterns in context.app.excludes
and then queues up the
remaining directories in the order the match the patterns in context.app.includes
.
Thus, for a directory content /a/foo
, /a/bal
, /a/bar
, /a/baz
, excludes f*
, and includes baz
and *
, the
resulting queue of directories to traverse will be /a/baz
, /a/bal
, /a/bar
.
Notice, that user can further interfere with processing order of the directory queue by asking Kubernator to walk arbitrary paths, both local and remote.
Context
ktor.app.args
Namespace containing command line argument values
ktor.app.walk_local(*paths: Union[Path, str, bytes])
Immediately schedules the paths to be traversed after the current directory by adding them to the queue Relative path is relative to the current directory
ktor.app.walk_remote(repo, *path_prefixes: Union[Path, str, bytes])
Immediately schedules the path prefixes under the remote repo URL to be traversed after the current directory by adding them to the queue. Only Git URLs are currently supported. All absolute path prefixes are relativized based on the repository.
ktor.app.repository_credentials_provider(func: Callable)
Sets a repository credentials provider function
func
that sets/overwrites credentials for URLs being specified bywalk_remote
. The callablefunc
accepts a single argument containing a parsed URL in a form of tuple. Thefunc
is expected to return a tuple of three elements representing URL schema, username and password. If the value should not be changed it should be None. To convert fromgit://repo.com/hello
to HTTPS authentication one should write a function returning("https", "username", "password")
. The best utility is achieved by logic that allows running the plan both in CI and local environments using different authentication mechanics in different environments.
Terraform
This is exclusively designed to pull the configuration options out of Terraform and to allow scripts and plugins to utilize that data.
Context
ktor.tf
A dictionary containing the values from Terraform output
Kops
Context
Kubernetes
Context
Helm
Context
Templates
Context
Examples
Adding Remote Directory
ktor.app.repository_credentials_provider(lambda r: ("ssh", "git", None))
ktor.app.walk_remote("git://repo.example.com/org/project?ref=dev", "/project")
Adding Local Directory
ktor.app.walk_local("/home/username/local-dir")
Using Transformers
def remove_replicas(resources, r: "K8SResource"):
if (r.group == "apps" and r.kind in ("StatefulSet", "Deployment")
and "replicas" in r.manifest["spec"]):
logger.warning("Resource %s in %s contains `replica` specification that will be removed. Use HPA!!!",
r, r.source)
del r.manifest["spec"]["replicas"]
ktor.k8s.add_transformer(remove_replicas)
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file kubernator-1.0.15.dev20240427211819.tar.gz
.
File metadata
- Download URL: kubernator-1.0.15.dev20240427211819.tar.gz
- Upload date:
- Size: 55.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.11.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 358696f1726f671421f91c5372c446b82f7a50a38b2ab9af6bee346bb7325b40 |
|
MD5 | e958e4981931557a00380e3b20b34866 |
|
BLAKE2b-256 | 1be63cdd2d348222315a3a1144f6d765d91861a655a3cfc9e514f62ee366b39a |
File details
Details for the file kubernator-1.0.15.dev20240427211819-py3-none-any.whl
.
File metadata
- Download URL: kubernator-1.0.15.dev20240427211819-py3-none-any.whl
- Upload date:
- Size: 69.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.11.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 35aea04cef44a3ca1f7b1363928417c9eac687647adf8c8020090f3fdb35eb2d |
|
MD5 | ce7de860f9f89a04d8d00ceb072e2078 |
|
BLAKE2b-256 | 8bb08b28275c794d57906b0e8163c81136b3421d4611fbc585a6d1a04035c21a |