-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replacement poc #1631
Replacement poc #1631
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Liujingfang1 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
please make this a plugin-only PR - a PR to integrate it can be made once the plugin is done. |
c4703ae
to
8dd469e
Compare
Restrict the change to plugin only by removing the adding this field to Kustomization type. |
Can you please explain in detail why you are not considering adding the functionality of sourcing external files for the value in the from field? |
@tkellen Yes, I can explain that. With the proposed |
I agree that the primitive of sourcing external flat-files exists: use a configMapGenerator in a kustomization. I also agree that the primitive of sharing those values widely exists: include the configMapGenerator-having kustomization in any other kustomization as a resource. If we move to a world where Vars are removed (I think they should be) can we please include a pure-yaml form for, at a minimum, prepending or appending literal values to values pulled from object references? The example I have been using is a org/cluster/env-wide secret prefix that a fleet of a few hundred microservices need to interpolate application-specific values to. |
Basically, to live with out Vars, I need some non-insanely verbose method of producing this: envs:
- name: APP_SECRET_PATH_PGPASSWORD
value: /org-project/rds/app-name/pgpassword
- name: APP_SECRET_PATH_KAFKA_PASSWORD
value: /org-project/kafka/app-name/password
... ...where If I can get some agreement from you @Liujingfang1 or @monopole (that we intend to support this), I will give some thought to possible config formats that could satisfy this need and follow up here tomorrow. |
non-insanely verbose is a goal. a form like this is possible
Everything here is an indirection. The value to inject (an int, a complex patch, whatever) comes from a value in a config map. Likewise the ns:GVK:name/path to multiple targets comes from some other value in some config map. Why use configmaps? As a mechanism to not repeat yourself, because those same config maps can be used in multiple places and up the overlay stack. The alternative is inlined patches, which we can already do, but there tends to be repetition. |
So, what I hear is that a ConfigMap is the recommended method of transporting variables through the kustomization stack. This doesn't seem so awful... after you chew on it for a minute. Hell, it's infinitely recursive (if you can stand the directory structure required to make the recursion happen anyway). As for your example, I'm having a hard time imagining constraints beyond pure masochism where I would choose to put my replacement targets in one file, my replacement values in another, and then bring them together by referencing them indirectly into yet another so I can indirectly replace values yet somewhere else. That said, I'm going to assume you mean it literally when you say "this form is possible" and you're just illustrating that the abstraction will be (or maybe already is, I haven't read the code yet) beautifully implemented. Still nowhere in your response do I see how the form we have today can produce a replacement in the form: referencedValueOneliteralOnereferencedValueTwoliteralTwo. Perhaps I'm just missing the obvious. Could you show me explicitly how you'd do this, or confirm that this isn't yet possible but should be? |
replacements:
- from: [someConfigmapNameSource:someKey,thingOne,someConfigmapNameSource:someOtherKey,thingTwo]
to:
- someConfigmapNameTarget:someKey1
- someConfigmapNameTarget:someKey2
- someConfigmapNameTarget:someKey3 ...could do what I've described above. |
...and if you like that, what do you think about this? replacements:
- from: someConfigmapNameSource:missingKey
whenFromEmpty: default-to-this-instead
to:
- someConfigmapNameTarget:someKey1
- someConfigmapNameTarget:someKey2
- someConfigmapNameTarget:someKey3 ...and this? replacements:
- from: [someConfigmapNameSource:rootFilePathKey,someConfigmapNameSource:fileName]
joinWith: /
to:
- someConfigmapNameTarget:someKey1
- someConfigmapNameTarget:someKey2
- someConfigmapNameTarget:someKey3 |
@tkellen With this replacement POC, you can put your kustomization.yaml as this
Then the env.txt file contains
You can have your script update /org-project/rds/app-name/pgpassword or /org-project/kafka/app-name/password. With the approach @monopole suggested, all the source and target will be inside a ConfigMap. The kustomization.yaml have a clean interface as this. |
Added more tests for reading data from configmap for replacement. |
@Liujingfang1 First, let me say how much I appreciate you taking the time to respond to my requests about management of environmental config. I really do appreciate it. I am not typing that to be ingratiating. Next, I need to ask you to read this closely because you've told me what you just told me at least three times and each time I have given a different reason for why what you are describing is not a viable option for my work. Before I explain why, let me also say that I do understand that what you describe is technically possible. I 100% hear you, know and have known for years that I can populate a file with fully specified environment variables and use them to configure a Kubernetes deployment. There are a number of reasons I am not doing this. Let me enumerate a few:
Having read all of this, can you please recognize my request and tell me if a) what I am requesting is possible with this feature already and b) if it is not, do you think my suggested additions would be an acceptable addition to make it possible? |
@tkellen Thank you for explaining your requests and reasons behind. I read through them. First let me clarify something. The ConfigMap I listed in the comment is not necessary to be used together with a Deployment or Then for the pattern /orgname-projectname/provider-name/app-name/serect-path, if you view it as 2 vars and kustomize replace those two vars, this is not supported in the replacement POC. We we design this new approach, we want to get rid of replacing a var in a fieldref. The targets are only scoped to be the whole fieldref. That's why I suggested to view the whole value of /orgname-projectname/provider-name/app-name/serect-path as one literal value that you can replace. Even with what you suggested, I don't think it's possible. |
Thanks @Liujingfang1! I understand that you're recommending I could encode the values I ultimately want to replace into my Deployments in an external file, reference that using configMapGenerator and finally use the so-created ConfigMap to pluck values from it and place them into my Deployment. While I feel this is fairly convoluted, I'm fully on board with the ideals of this project and I am happy to accept that complexity. I will pursue my "please let me source my replacement value from a file directly" conversation at some future date. All of that being said, I'm actually sort of excited about the syntax I proposed. You're right that what I posted above doesn't make sense now that I look at it more closely. Let me try again. replacements:
- from: ["/","environmentConfigMap:secretPrefix","kafka","appConfigMap:name","password"]
transform:
join: "/"
to: [0].value
value:
- name: APP_SECRET_PATH_KAFKA_PASSWORD
to:
target:
kind: Deployment
fieldrefs:
- spec.template.spec.containers[name=nginx].env ...I think this form could be really powerful (and confusing, but, I think that is a given for this sort of config management). By analogy it's like saying users of kustomize have to write an AST if they need template-like constructs. |
Just to state it explictly in case it isn't obvious, the above form transforms to this: replacements:
- from:
- name: APP_SECRET_PATH_KAFKA_PASSWORD:
value: /org-project/something-ingestor/kafka/password
to:
target:
kind: Deployment
fieldrefs:
- spec.template.spec.containers[name=nginx].env ...there are still some questions about how to get multiple values into the |
Seems like you're flat out re-inventing the world today @monopole, but would you mind weighing in on the proposed syntax above? |
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
4d59605
to
5cb4175
Compare
Added a test for the diamond shape base and overlays.
In this test, the replacement transformer is declared in overlay a and b, not in base. |
5cb4175
to
3e4354d
Compare
/lgtm lets get it in as an example so its easier to try, and modify per @tkellen 's suggestions |
Thanks for the callout @monopole, was feeling sheepish about my hyperbolic comment a few weeks back. Almost out of the woods here work wise and ready to re-engage on some ideas. Is there any venue to find out about what kyaml is beyond reading the code? I've been watching that roll in. |
kyaml basically wraps and enhances sigs.k8s.io/yaml. some documentation coming in #1794 |
@monopole @Liujingfang1 I'm gathering from this and monopole's "state of the vars" issue that the replacement transformer is targeted to move from a POC example plugin into a built-in plugin, correct? Are there any plans/timeline/critical path you can share -- is it just a matter of time, or is there more evaluation that needs to happen first (or are you just waiting for someone to pick the work up)? Thanks! |
picking this up |
That's great to hear, thank you @natasha41575. The airship project has been building additional features into our fork of the replacementtransformer; feel free to use this as a base or as inspiration! We'd love to adopt/contribute to a community supported transformer if there was feature parity. https://github.com/airshipit/airshipctl/tree/master/krm-functions/replacement-transformer |
@Liujingfang1 is there going to be any documentation changes with your PR? |
@whillas see #3492 to track the state of this |
Some examples:
substitute the image for container where
name=nginx
substitute the image for container with index 1.
substitute the whole containers.