You’re probably familiar with Kubernetes, but do you know what operators are, how they work, and how to build one? If you want to know more, you’ve come to the right place!
Kubernetes operators is a complicated subject but fortunately, since their creation in 2016, many tools have been developed to simplify the life of engineers.
Without further ado, let’s dive in and learn more about operators!
✨ The article was updated to use the latest version of kubebuilder (v4.2.0), released in August 2024!
tl;dr Kubernetes operators allow to incorporate custom logic into Kubernetes to automate a large number of tasks, beyond what the software can do natively. While one could build an operator from scratch, it’s highly recommended to use a framework like Kubebuilder or OperatorSDK, as shown in this article.
What is an operator?
Wait a minute, do you know what Kubernetes (or k8s) is? Just a quick reminder for everyone, it’s an “open source system to deploy, scale, and manage containerized applications anywhere” developed by Google Cloud.
Most people use Kubernetes by deploying their applications using native resources such as pods, deployments, services, etc. However, it is possible to extend the capabilities of the software to incorporate its logic to meet specific needs. That’s where the operator comes into place.
The main goal of an operator is to translate an engineer’s logic into code in order to automate certain tasks beyond what Kubernetes can do natively.
Engineers dealing with applications or services have a deep knowledge of how the system should behave, how it should be deployed, and how to react in case of a problem. The ability to encapsulate this technical knowledge in code and automate actions means less time is spent on repetitive tasks and more on important issues.
For example, one can imagine an operator deploying and maintaining tools such as MySQL, Elasticsearch, or Gitlab runners in Kubernetes. An operator could configure these tools, adjust the state of the system according to events and react to failures.
Sounds interesting, right? Let’s get our hands dirty.
Practical Work
You could either build an operator from scratch using the controller-runtime project developed by Kubernetes or you could use one of the most popular frameworks to accelerate your development cycle and reduce the complexity (Kubebuilder or OperatorSDK). I’d choose the Kubebuilder framework because it’s very easy to use, the documentation is good, and it’s a battle-tested product. In any case, the two projects are currently being aligned to merge into a single project.
1. Set up your environment
You’ll need some tools to develop your operator. Here are the requisites:
You’ll also need access to a Kubernetes v1.11.3+ cluster. I highly suggest using kind to set up your own local k8s cluster, it’s very easy to use!
We can then install kubebuilder.
$ curl -L -o kubebuilder \
kuhttps://go.kubebuilder.io/dl/latest/$(go env GOOS)/$(go env GOARCH) \
&& chmod +x kubebuilder \
&& mv kubebuilder /usr/local/bin/
If everything goes fine, you should see a similar output (the version might have changed depending on when you read this article).
$ kubebuilder version
Version: main.version{KubeBuilderVersion:"3.13.0", KubernetesVendor:"1.27.1", GitCommit:"c8a7cc58eeb56586c019cf8845dad37286d077ff", BuildDate:"2023-11-02T20:43:44Z", GoOs:"darwin", GoArch:"amd64"}
Awesome, now we can get started!
2. Create a simple operator
Let’s do a little exercise: we’ll build a simple foo operator which has no real use, except to demonstrate the capabilities of an operator.
Initialise a new project by running the following command. It will download the controller-runtime binary and scaffold a project that’s ready for us to customise.
$ kubebuilder init --domain my.domain --repo my.domain/tutorial
INFO Writing kustomize manifests for you to edit...
INFO Writing scaffold for you to edit...
INFO Get controller runtime:
$ go get sigs.k8s.io/controller-runtime@v0.16.3
...
INFO Update dependencies:
$ go mod tidy
Next: define a resource with:
$ kubebuilder create api
Here’s the structure of the project (as you can notice, it’s a Go project):
$ ls -la
total 120
drwxr-xr-x 17 leovct staff 544 Nov 3 08:49 .
drwxr-xr-x 10 leovct staff 320 Nov 3 08:49 ..
-rw------- 1 leovct staff 120 Nov 3 08:49 .dockerignore
-rw------- 1 leovct staff 384 Nov 3 08:49 .gitignore
-rw------- 1 leovct staff 692 Nov 3 08:49 .golangci.yml
-rw------- 1 leovct staff 1278 Nov 3 08:49 Dockerfile
-rw------- 1 leovct staff 7966 Nov 3 08:49 Makefile
-rw------- 1 leovct staff 508 Nov 3 08:49 PROJECT
-rw------- 1 leovct staff 2419 Nov 3 08:49 README.md
drwx------ 3 leovct staff 96 Nov 3 08:49 api
drwxr-xr-x 3 leovct staff 96 Nov 3 08:50 bin
drwx------ 3 leovct staff 96 Nov 3 08:49 cmd
drwx------ 8 leovct staff 256 Nov 3 08:49 config
-rw------- 1 leovct staff 3156 Nov 3 08:49 go.mod
-rw-r--r-- 1 leovct staff 20603 Nov 3 08:49 go.sum
drwx------ 3 leovct staff 96 Nov 3 08:49 hack
drwx------ 3 leovct staff 96 Nov 3 08:49 internal
Let’s go through the most important components of the operator:
Dockerfile
is the container file used to build the manager’s image.Makefile
contains handy helper commands.api/v1
contains the definition of theFoo
CRD.cmd/main.go
is the entry point of the project; it sets up and runs the manager.config/
contains the manifests to deploy the operator and CRDs in Kubernetes.internal/controller
contains the logic of theFoo
controller.
Wait, what’s this controller component?!
This is going to be a bit theoretical. Hang on!
An operator is made of two components, a custom resource definition (CRD) and a controller.
A CRD is a “Kubernetes custom type” or a blueprint of the resource, used to describe its specification and status. We can define instances of the CRD, called custom resources (or CR).
The controller (also called the control loop) continuously monitors the state of the cluster and, depending on events, makes changes. Its goal is to bring the current state of a resource towards its desired state, defined by the user in the specification of the custom resource.
In general, a controller is specific to a type of resource but it can perform CRUD (Create, Read, Update and Delete) operations on a set of different resources.
An example of a controller, presented in the Kubernetes documentation, is the thermostat. When we set the temperature, we tell the thermostat the desired state. The actual state is determined by the actual temperature of the room. The thermostat then reacts to bring the actual state closer to the desired state by turning the heat on or off.
What about the manager then? The goal of this component is to start all the various controllers and makes the set of control loops coexist. Let’s say you have two CRDs in your project. You’ll then have two controllers: one for each CRD. The manager will start these two controllers and make them coexist.
If you want more details on how operators work, you can leave questions in the comments or explore the list of resources provided at the end of the article. I will certainly do a detailed article on this concept in the future.
Now that we know how an operator works, we can start to create one using the Kubebuilder framework. We’ll start by creating a new API (group/version) and a new Kind (CRD). Press yes when asked to create a CRD and a controller.
$ kubebuilder create api --group tutorial --version v1 --kind Foo
INFO Create Resource [y/n]
y
INFO Create Controller [y/n]
y
INFO Writing kustomize manifests for you to edit...
INFO Writing scaffold for you to edit...
INFO api/v1/foo_types.go
INFO api/v1/groupversion_info.go
INFO internal/controller/suite_test.go
INFO internal/controller/foo_controller.go
INFO Update dependencies:
$ go mod tidy
INFO Running make:
$ make generate
...
Next: implement your new API and generate the manifests (e.g. CRDs,CRs) with:
$ make manifests
This is where the fun starts now! We’ll customise the CRD and the controller to meet our needs. You’ll notice that two new folders have been created:
api/v1
which contains our Foo CRD (seefoo_types.go
).internal/controllers
which contain the Foo controller (seefoo_controller.go
).
3. Customize the CRD and the controller
Here’s our lovely Foo CRD customised (see api/v1/foo_types.go
). As I said previously, this CRD has no purpose. It simply shows how you can use operators to perform simple tasks in Kubernetes.
The Foo CRD has a name
field in its specification which refers to the name of the friend Foo is looking for. If Foo finds a friend (a pod with the same name as his friend), its happy
status will be set to true
.
Now, let’s implement the logic of the controller. Nothing very complicated here. We fetch the Foo resource that triggered the reconciliation request to get the name of Foo’s friend. Then, we list all the pods that have the same name as Foo’s friend. If we find one (or more), we update Foo’s happy
status to true
, else we set it to false
.
Note that the controller also reacts to Pod events (see mapPodsReqToFooReq
). Indeed, if a new pod is created, we want the Foo resource to be able to update its status accordingly. This method will be triggered each time a Pod event happens (creation, update, or deletion). It then triggers a reconciliation loop of the Foo controller only if the name of the Pod
is a “friend” of one of the Foo custom resources deployed in the cluster.
A picture is worth more than 1000 words so here is an overview of how the operator works.
And now, here is the implementation of the controller.
We’re done editing the API definitions and the controller so we can run the following command to update the operator manifests. If you pay attention, you’ll see that some manifest files have been updated.
$ make manifests
/Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/controller-gen rbac:roleName=manager-role crd webhook paths="./..." output:crd:artifacts:config=config/crd/bases
4. Run the controller
I’m using a local Kubernetes cluster set up with kind, and I advise you to do the same. It’s very easy to use.
First, we install the CRDs into the cluster.
$ make install
test -s /Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/controller-gen && /Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/controller-gen --version | grep -q v0.13.0 || \
GOBIN=/Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin go install sigs.k8s.io/controller-tools/cmd/controller-gen@v0.13.0
...
/Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/controller-gen rbac:roleName=manager-role crd webhook paths="./..." output:crd:artifacts:config=config/crd/bases
/Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/kustomize build config/crd | kubectl apply -f -
customresourcedefinition.apiextensions.k8s.io/foos.tutorial.my.domain created
You can see that the Foo CRD has been created.
$ kubectl get crds
NAME CREATED AT
foos.tutorial.my.domain 2023-11-03T08:14:04Z
Then we run the controller in the terminal. Keep in mind that we can also deploy it as deployment in the Kubernetes cluster.
$ make run
test -s /Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/controller-gen && /Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/controller-gen --version | grep -q v0.13.0 || \
GOBIN=/Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin go install sigs.k8s.io/controller-tools/cmd/controller-gen@v0.13.0
/Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/controller-gen rbac:roleName=manager-role crd webhook paths="./..." output:crd:artifacts:config=config/crd/bases
/Users/leovct/Documents/projects/kubernetes-operator-tutorial/operator-v1/bin/controller-gen object:headerFile="hack/boilerplate.go.txt" paths="./..."
go fmt ./...
go vet ./...
go run ./cmd/main.go
2023-11-03T09:15:42+01:00 INFO setup starting manager
2023-11-03T09:15:42+01:00 INFO starting server {"kind": "health probe", "addr": "[::]:8081"}
2023-11-03T09:15:42+01:00 INFO controller-runtime.metrics Starting metrics server
2023-11-03T09:15:42+01:00 INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false}
2023-11-03T09:15:42+01:00 INFO Starting EventSource {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "source": "kind source: *v1.Foo"}
2023-11-03T09:15:42+01:00 INFO Starting EventSource {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "source": "kind source: *v1.Pod"}
2023-11-03T09:15:42+01:00 INFO Starting Controller {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo"}
2023-11-03T09:15:42+01:00 INFO Starting workers {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "worker count": 1}
As you can see, the manager started and then the Foo controller started. The controller is now running and listening to events!
5. Test the controller
To test that everything works properly, we’ll create two Foo custom resources and some pods just to see how the controller behaves. You can modify config/samples/tutorial_v1_foo.yaml
.
First, create the Foo custom resources manifests in config/samples and run the following command to create the resources in your local Kubernetes cluster.
$ kubectl apply -k config/samples
foo.tutorial.my.domain/foo-1 created
foo.tutorial.my.domain/foo-2 created
You should see that the controller triggered two reconciliation loops for each Foo custom resource creation event. You may wonder why two loops were triggered for each custom resource and not one, this is a more technical topic, I invite you to read this thread.
2023-11-03T09:16:40+01:00 INFO reconciling foo custom resource {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-sample","namespace":"default"}, "namespace": "default", "name": "foo-sample", "reconcileID": "c98a2469-159f-4c3f-b9bb-aa02b6dd5bf9"}
2023-11-03T09:16:40+01:00 INFO foo's happy status updated {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-sample","namespace":"default"}, "namespace": "default", "name": "foo-sample", "reconcileID": "c98a2469-159f-4c3f-b9bb-aa02b6dd5bf9", "status": false}
2023-11-03T09:16:40+01:00 INFO foo custom resource reconciled {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-sample","namespace":"default"}, "namespace": "default", "name": "foo-sample", "reconcileID": "c98a2469-159f-4c3f-b9bb-aa02b6dd5bf9"}
2023-11-03T09:16:40+01:00 INFO reconciling foo custom resource {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-sample","namespace":"default"}, "namespace": "default", "name": "foo-sample", "reconcileID": "d747fc5a-3465-4c56-843f-0f4d87d2e3f0"}
2023-11-03T09:16:40+01:00 INFO foo's happy status updated {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-sample","namespace":"default"}, "namespace": "default", "name": "foo-sample", "reconcileID": "d747fc5a-3465-4c56-843f-0f4d87d2e3f0", "status": false}
2023-11-03T09:16:40+01:00 INFO foo custom resource reconciled {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-sample","namespace":"default"}, "namespace": "default", "name": "foo-sample", "reconcileID": "d747fc5a-3465-4c56-843f-0f4d87d2e3f0"}
If you check the status of the Foo custom resources, you can see that their status is empty. That’s exactly what we expect so everything’s good so far!
$ kubectl describe foos
Name: foo-01
Namespace: default
Labels: app.kubernetes.io/created-by=operator-v1
app.kubernetes.io/instance=foo-sample
app.kubernetes.io/managed-by=kustomize
app.kubernetes.io/name=foo
app.kubernetes.io/part-of=operator-v1
Annotations: <none>
API Version: tutorial.my.domain/v1
Kind: Foo
Metadata:
Creation Timestamp: 2023-11-03T08:18:01Z
Generation: 1
Resource Version: 808
UID: fbda3c29-83d4-4e03-92e0-78f33f900b25
Spec:
Name: jack
Status:
Events: <none>
Name: foo-02
Namespace: default
Labels: app.kubernetes.io/created-by=operator-v1
app.kubernetes.io/instance=foo-sample
app.kubernetes.io/managed-by=kustomize
app.kubernetes.io/name=foo
app.kubernetes.io/part-of=operator-v1
Annotations: <none>
API Version: tutorial.my.domain/v1
Kind: Foo
Metadata:
Creation Timestamp: 2023-11-03T08:18:01Z
Generation: 1
Resource Version: 810
UID: ca34e5dc-f2d9-4caf-9239-bbd190bc9c9d
Spec:
Name: joe
Status:
Events: <none>
Now, let’s spice things up! We’ll deploy a pod named jack
to see how the system reacts.
Once done, you should see that the controller reacts to the pod creation event. It then updates the status of the first Foo custom resource as expected. You can verify by yourself by describing the Foo custom resources.
2023-11-03T09:26:25+01:00 INFO pod linked to a foo custom resource issued an event {"name": "jack"}
2023-11-03T09:26:25+01:00 INFO pod linked to a foo custom resource issued an event {"name": "jack"}
2023-11-03T09:26:25+01:00 INFO reconciling foo custom resource {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-01","namespace":"default"}, "namespace": "default", "name": "foo-01", "reconcileID": "ec16b29b-4bae-4909-8392-8966c3e10ad4"}
2023-11-03T09:26:25+01:00 INFO pod linked to a foo custom resource found {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-01","namespace":"default"}, "namespace": "default", "name": "foo-01", "reconcileID": "ec16b29b-4bae-4909-8392-8966c3e10ad4", "name": "jack"}
2023-11-03T09:26:25+01:00 INFO foo's happy status updated {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-01","namespace":"default"}, "namespace": "default", "name": "foo-01", "reconcileID": "ec16b29b-4bae-4909-8392-8966c3e10ad4", "status": true}
2023-11-03T09:26:25+01:00 INFO foo custom resource reconciled {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-01","namespace":"default"}, "namespace": "default", "name": "foo-01", "reconcileID": "ec16b29b-4bae-4909-8392-8966c3e10ad4"}
Let’s update the specification of the second Foo custom resource and change the value of its name field from joe
to jack
. The controller should catch the update event and trigger a reconciliation loop.
2023-11-03T09:27:18+01:00 INFO pod linked to a foo custom resource issued an event {"name": "joe"}
2023-11-03T09:27:18+01:00 INFO pod linked to a foo custom resource issued an event {"name": "joe"}
2023-11-03T09:27:18+01:00 INFO reconciling foo custom resource {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-02","namespace":"default"}, "namespace": "default", "name": "foo-02", "reconcileID": "d7e94353-94ae-4883-b5de-1d50c966448f"}
2023-11-03T09:27:18+01:00 INFO pod linked to a foo custom resource found {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-02","namespace":"default"}, "namespace": "default", "name": "foo-02", "reconcileID": "d7e94353-94ae-4883-b5de-1d50c966448f", "name": "joe"}
2023-11-03T09:27:18+01:00 INFO foo's happy status updated {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-02","namespace":"default"}, "namespace": "default", "name": "foo-02", "reconcileID": "d7e94353-94ae-4883-b5de-1d50c966448f", "status": true}
2023-11-03T09:27:18+01:00 INFO foo custom resource reconciled {"controller": "foo", "controllerGroup": "tutorial.my.domain", "controllerKind": "Foo", "Foo": {"name":"foo-02","namespace":"default"}, "namespace": "default", "name": "foo-02", "reconcileID": "d7e94353-94ae-4883-b5de-1d50c966448f"}
Yeah, it worked! Enough tests for today; I think you got it! If you delete the pod named jack
, the custom resources’ happy
status will be set back to false
.
We can confirm that the operator works as expected! It would be better to write unit and e2e tests but that’s not the purpose of this article, i’ll cover this topic in another article.
You can be proud of yourself. You have designed, deployed, and tested your very first operator! Congratulations!!
Here’s the link to the GitHub repository if you need to browse the code.
To go further
We’ve seen how to create a very basic Kubernetes operator and it’s far from being perfect. There are many ways to improve it. Here’s a list of topics you can explore if you want.
- Optimise event filtering (sometimes, events are submitted twice…)
- Refine RBAC permissions
- Improve the logging system
- Issue Kubernetes events when resources are updated by the operator
- Add custom fields when getting Foo custom resources (display the
happy
status maybe?) - Write unit tests and e2e tests
Here’s a list of resources you can use to dig deeper into the subject.
- https://youtu.be/i9V4oCa5f9I
- https://book.kubebuilder.io/
- https://cloudark.medium.com/kubernetes-custom-controllers-b6c7d0668fdf
- https://medium.com/swlh/kubernetes-operator-for-beginners-what-why-how-21b23f0cb9b1
- https://medium.com/swlh/advanced-kubernetes-operators-development-988edad5f58a
- https://operatorhub.io/
Have fun! :)
NB: A first version of this article was published on Medium in Better Programming, you can find it here. This article is an improved version with a little more content, including the diagram of the Foo operator’s functioning.