-
Notifications
You must be signed in to change notification settings - Fork 2
User Guide
For a complete walk-through, check out my blog mini-series about Metatron!
To use Metatron, first decide what type of Metacontroller you'd like to create, mostly based on the type(s) of resource(s) you'll manage. Most of the time, what you want is a Custom Resource that has child resources, which means you'll want a Composite Controller.
Reading the Metacontroller user's guide will be pretty helpful but isn't strictly required.
You'll need to install Metacontroller into your cluster before proceeding. This guide doesn't provide a recommendation on how to do that, but it isn't very difficult.
As an example, let's suppose we want to simplify launching blogs for users. Each Blog resource should have its own application server (as a Deployment), a database (as a StatefulSet), a Kubernetes Service, and an Ingress. A Blog will probably have a name, an hostname (which we'll derive based on its name), and a username and password (as a Secret) to restrict who can author content.
This means we'll want a Blog custom resource and it'll need a few basic properties, like those listed above. It'll also need to specify a container image, and a number of replicas (so we can scale it up and down).
Here's how that CRD (let's call it blog-crd.yaml) might look:
apiVersion: apiextensions.k8s.io/v1
kind: CustomResourceDefinition
metadata:
name: blogs.therubyist.org
spec:
group: therubyist.org
names:
kind: Blog
plural: blogs
singular: blog
scope: Namespaced
versions:
- name: v1
served: true
storage: true
subresources:
status: {}
schema:
openAPIV3Schema:
type: object
properties:
spec:
type: object
properties:
image:
type: string
replicas:
type: integer
minimum: 1
storage:
type: object
properties:
app:
type: string
db:
type: stringThis means we'll be able to query our Kubernetes cluster for blogs. You might eventually want to expand the field list, or simplify it and defer to your controller for validating it. You'll also probably want to make metadata.name and spec.group use a real domain to avoid potential conflicts. This should be safe to kubectl apply as the CRD doesn't do much on its own.
Now, you'll need to define a CompositeController resource (let's call this blog-controller.yaml) that instructs Metacontroller where to send sync requests:
apiVersion: metacontroller.k8s.io/v1alpha1
kind: CompositeController
metadata:
name: blog-controller
spec:
generateSelector: true
parentResource:
apiVersion: therubyist.org/v1
resource: blogs
childResources:
- apiVersion: apps/v1
resource: deployments
updateStrategy:
method: InPlace
- apiVersion: apps/v1
resource: statefulsets
updateStrategy:
method: InPlace
- apiVersion: v1
resource: services
updateStrategy:
method: InPlace
- apiVersion: networking.k8s.io/v1
resource: ingresses
updateStrategy:
method: InPlace
- apiVersion: v1
resource: secrets
updateStrategy:
method: InPlace
hooks:
sync:
webhook:
service:
name: blog-controller
namespace: blog-controller
port: 9292
protocol: http
path: /blogs/syncBefore applying the above though, we'll need to actually create a service that can response to sync requests. That's where Metatron comes in!
As Metatron is a tool for creating Ruby projects, you'll need a few prerequistes. First, make a directory (and git repo) for your controller:
$ git init blog_controller && cd blog_controllerWe'll need a Gemfile to ensure we have installed both Metatron and a
rack compatible server:
# frozen_string_literal: true
source "https://rubygems.org"
gem "metatron"
gem "puma"We'll also need a config.ru file to instruct rack how to route requests:
# frozen_string_literal: true
# \ -s puma
require "base64"
require "metatron"
require_relative "./lib/blog_controller/composite_controller"
use Rack::ShowExceptions
use Rack::Deflater
mappings = {
# This one is built-in to Metatron and is useful for monitoring
"/ping" => Metatron::Controllers::Ping,
# We'll need to make this one
"/blogs" => BlogController::CompositeController
}
run Rack::URLMap.new(mappings)Finally, before we start hacking on some actual Metatron-related code, we'll need a Dockerfile to create an image that we can deploy to Kubernetes:
FROM ruby:3.3
RUN mkdir -p /app
COPY config.ru /app/
COPY Gemfile /app/
COPY Gemfile.lock /app/
COPY lib/ /app/lib/
RUN apt update && apt upgrade -y
RUN useradd appuser -d /app -M -c "App User"
RUN chown appuser /app/Gemfile.lock
USER appuser
WORKDIR /app
RUN bundle install
ENTRYPOINT ["bundle", "exec"]
CMD ["puma"]Phew, ok, with all that out of the way, we can get started with our development. We'll need to create a Metatron::CompositeController subclass with a sync method. We'll put this in lib/blog_controller/composite_controller.rb:
# frozen_string_literal: true
module BlogController
class CompositeController < Metatron::CompositeController
# This method needs to return a Hash which will be converted to JSON
# It should have the keys "status" (a Hash) and "children" (an Array)
def sync
# params is a convenient way to access the data provided by MetaController
parent = params["parent"]
existing_children = params["children"]
desired_children = []
# first, let's create the DB and its service
desired_children += construct_db_resources(parent, existing_children)
# now let's make the app and its parts
db_secret = desired_children.find { |r| r.kind == "Secret" && r.name.end_with?("db") }
desired_children += construct_app_resources(parent, db_secret)
# We might eventually want a mechanism to build status based on the world:
# status = compare_children(params["children"], desired_children)
status = {}
{ status:, children: desired_children }
end
def construct_app_resources(parent, db_secret)
resources = []
app_db_secret = construct_app_secret(parent["metadata"], db_secret)
resources << app_db_secret
app_deployment = construct_app_deployment(
parent["metadata"], parent["spec"], app_db_secret
)
resources << app_deployment
app_service = construct_service(parent["metadata"], app_deployment)
resources << app_service
resources << construct_ingress(parent["metadata"], app_service)
resources
end
def construct_db_resources(parent, existing_children)
resources = []
db_secret = construct_db_secret(parent["metadata"], existing_children["Secret.v1"])
resources << db_secret
db_stateful_set = construct_db_stateful_set(db_secret)
resources << db_stateful_set
db_service = construct_service(
parent["metadata"], db_stateful_set, name: "db", port: 3306
)
resources << db_service
resources
end
def construct_db_stateful_set(secret)
stateful_set = Metatron::Templates::StatefulSet.new("db")
container = Metatron::Templates::Container.new("db")
container.image = "mysql:8.0"
container.envfrom << secret.name
stateful_set.containers << container
stateful_set.additional_pod_labels = { "app.kubernetes.io/component": "db" }
stateful_set
end
def construct_app_deployment(meta, spec, auth_secret)
deployment = Metatron::Templates::Deployment.new(meta["name"], replicas: spec["replicas"])
container = Metatron::Templates::Container.new("app")
container.image = spec["image"]
container.envfrom << auth_secret.name
container.ports << { name: "web", containerPort: 3000 }
deployment.containers << container
deployment.additional_pod_labels = { "app.kubernetes.io/component": "app" }
deployment
end
def construct_ingress(meta, service)
ingress = Metatron::Templates::Ingress.new(meta["name"])
ingress.add_rule(
"#{meta["name"]}.blogs.therubyist.org": { service.name => service.ports.first[:name] }
)
ingress.add_tls("#{meta["name"]}.blogs.therubyist.org")
ingress
end
def construct_service(meta, resource, name: meta["name"], port: "3000")
service = Metatron::Templates::Service.new(name, port)
service.additional_selector_labels = resource.additional_pod_labels
service
end
def construct_app_secret(meta, db_secret)
# We'll want to use the password we specified for the DB user
user_pass = db_secret.data["MYSQL_PASSWORD"]
Metatron::Templates::Secret.new(
"#{meta["name"]}app",
{
"DATABASE_URL" => "mysql2://#{meta["name"]}:#{user_pass}@db:3306/#{meta["name"]}"
}
)
end
def construct_db_secret(meta, existing_secrets)
name = "#{meta["name"]}db"
existing = (existing_secrets || {})[name]
data = if existing
{
"MYSQL_ROOT_PASSWORD" => Base64.decode64(existing.dig("data", "MYSQL_ROOT_PASSWORD")),
"MYSQL_DATABASE" => Base64.decode64(existing.dig("data", "MYSQL_DATABASE")),
"MYSQL_USER" => Base64.decode64(existing.dig("data", "MYSQL_USER")),
"MYSQL_PASSWORD" => Base64.decode64(existing.dig("data", "MYSQL_PASSWORD"))
}
else
{
"MYSQL_ROOT_PASSWORD" => SecureRandom.urlsafe_base64(12),
"MYSQL_DATABASE" => meta["name"],
"MYSQL_USER" => meta["name"],
"MYSQL_PASSWORD" => SecureRandom.urlsafe_base64(8)
}
end
Metatron::Templates::Secret.new(name, data)
end
end
endThat might seem like a lot of code, but it does a lot of heavy lifting for you in creating Kubernetes resources. Try creating all the above Kubernetes resources by hand and you'll see what Metatron is doing for you. It is pretty likely you'll want to adjust a lot of the above code, but it should be a decent starting point.
To use it, you'll need to create your Gemfile.lock file then work on your Docker image:
$ bundle install
$ docker build -t "blogcontroller:latest" .You can test your controller locally by running the image:
$ docker run -it --rm -p 9292:9292 "blogcontroller:latest"Try POSTing a request via curl and inspecting the JSON response to see what your controller is doing for you:
$ curl \
-H "Content-Type: application/json" \
--data '{"parent": {"metadata": {"name": "foo"}, "spec": {"replicas": 1, "image": "nginx:latest"}}}' \
http://localhost:9292/blogs/syncOnce we've confirmed this works, we'll need to publish our image somewhere and run it. Make sure you update the Service details in blog-controller.yaml to reflect its actual location.
After your Metatron controller is up and running in your Kubernetes cluster, you'll need to actually kubectl apply your blog-controller.yaml file we created way above. Once that is deployed, you can create new Blog resources that look something like this (let's call it test-blog.yaml):
apiVersion: therubyist.org/v1
kind: Blog
metadata:
name: test
spec:
image: myapp:tag
replicas: 2
storage:
app: 15Gi
db: 5GiNote that myapp:tag should point to some image that is ready to run a blog. This is just an example and, much like the other resources we've created in this guide, it will almost certainly not work as-is. The DATABASE_URL secret we create in our Metatron controller should work well for a Ruby on Rails app though.
Let's make a new namespace for this blog and launch it:
$ kubectl create namespace blog-test
$ kubectl -n blog-test apply -f test-blog.yamlYou should be able to inspect the pods, services, etc. in the blog-test namespace and see your resources running!