Skip to content

Kubernetes controller to synchronise objects between namespaces

License

Unlicense and 2 other licenses found

Licenses found

Unlicense
UNLICENSE
Apache-2.0
LICENSE-APACHE
MIT
LICENSE-MIT
Notifications You must be signed in to change notification settings

rustrial/k8s-object-syncer

Artifact HUB

Object Syncer

Kubernetes Controller to synchronize (copy) objects between namespaces. Common use-cases for this controller are:

  • Copying a public ConfigMap to all namespaces, making sure it exists in all namespaces and is kept in-sync with the original (source) ConigMap.
  • Copying image-pull Secrets to all namespaces, making sure they exist in all namespaces and are kept in-sync with the original (source) Secret.

The Object Syncer controller supports all namespace scoped built-in Kubernetes API resources and CustomResourceDefinitions (CRD). Thus it can be used to sync arbitrary API objects and not just ConfigMap or Secret objects.

Background & Motivation for this project

As Kubernetes cluster operators, we often need to make sure that certain Kubernetes objects exists in some or all namespaces. And we do not know all namespaces up-front respectively namespaces might come and go over the course of time. Searching for an existing tool to solve this kind of problem, we tried Kyverno and Kubed. Unfortunatelly those two tools did not work for our use-cases and we eventually decided to implement a (new) controller to cover our needs.


How it works

Let's assume you have the follwoing ConfigMap and you need to make sure it exists in all namespaces and that all copies are kept in sync with the original (source) ConfigMap.

kind: ConfigMap
apiVersion: v1
metadata:
  name: my-test-config-map
  namespace: default
data:
  someKey: someValue

This can be achieved by deploying the following ObjectSync (custom resource) object:

kind: ObjectSync
apiVersion: sync.rustrial.org/v1alpha1
metadata:
  name: my-test-config-map-distributor
  namespace: default
spec:
  source: # Reference to the original (source) object
    group: ""
    kind: ConfigMap 
    name: my-test-config-map
    namespace: default # (optional) defaults to the namespace of the ObjectSync object.
  destinations: # List of destinations
  - namespace: "*" # empty string or wildcard "*" means "all namespaces"
    name: my-test-config-map # (optional) defaults to the name of the source object.

The Object Syncer controller will watch all ObjectSync objects and dynamically creates resource specific sub-controllers. In the above example, it will create a sub-controller for ConfigMap resources and will make sure the following invariants hold true:

  • While the source object exists and has no deletionTimestamp set:
    • Ensure it is replicated according to the destinations configuration of the ObjectSync object.
    • Ensure that changes to the source object are applied to all of its copies (the sync part). If there is any drift detected, then the affected copy is replaced with the original (source).
    • Ensure that deleted copies are re-created.
  • If the source object is deleted (or its deletionTimestamp is set), delete all synced copies.
  • If the corresponding ObjectSync objcect is deleted (or its deletionTimestamp is set), delete all synced copies.

If the last ObjectSync object referencing a specific resource (type) is deleted, then the corresponding resource specific sub-controller will be removed to prevent any resource-leaks and to reduce load on the Kubernetes API servers.

Examples

Sync a ConfigMap to all namespaces:

kind: ObjectSync
apiVersion: sync.rustrial.org/v1alpha1
metadata:
  name: my-test-config-map-distributor
  namespace: default
spec:
  source:
    group: ""
    kind: ConfigMap 
    name: my-test-config-map
  destinations:
  - namespace: "*"

Sync a Secret to all namespaces and rename it:

kind: ObjectSync
apiVersion: sync.rustrial.org/v1alpha1
metadata:
  name: my-test-secret-map-distributor
  namespace: default
spec:
  source:
    group: ""
    kind: Secret 
    name: image-pull-secrets
  destinations:
  - namespace: "*"
    name: global-image-pull-secrets

Sync a CronJob to some namespaces:

kind: ObjectSync
apiVersion: sync.rustrial.org/v1alpha1
metadata:
  name: my-test-cronjob-map-distributor
  namespace: default
spec:
  source:
    group: "batch"
    kind: CronJob 
    name: my-audit-scanner
  destinations:
  - namespace: "kube-system"
  - namespace: "linkerd"

Sync a FluxCD HelmRelease to all namespaces:

kind: ObjectSync
apiVersion: sync.rustrial.org/v1alpha1
metadata:
  name: my-test-hr-map-distributor
  namespace: default
spec:
  source:
    group: "helm.toolkit.fluxcd.io"
    kind: HelmRelease 
    name: my-namespace-agent
  destinations:
  - namespace: "*"

Security Considerations

As with all controllers that can read and create Kubernetes resources the RBAC configuration of the controller's associated ServiceAccount must be designed carefully to meet your cluster's security requirements.

The accompanying Helm Chart provides 4 parameters to configure those RBAC rules:

  • watchNamespaces: The set of namespaces the controller will be entitled to read, watch and write ObjectSync objects.
  • sourceNamespaces: The set of namespaces the controller will be entitled to read, watch all objects whose resource types are part of allowedResources.
  • targetNamespaces: The set of namespaces the controller will be entitled to write objects whose resource types are part of allowedResources.
  • allowedResources: The set of Kubernetes resources (apiGropus & resources) the controller will be entitled to sync (read/write).

Getting Started

Check the Helm Chart Readme for instructions on how to install this controller.


Resource Lifecycle & Garbage Collection

The controller uses finalizer pattern to make sure stale destination objects are removed whenever the corresponding source object or ObjectSync object is deleted.

Due do some limitations in the rust kube-rs Kubernetes library used by this controller, it has to add additional finalizers to all tracked source and destination objects to make sure it obtains all delete events.


Ownership

For each destination a sync strategy can be defined, which is either sever side apply for shared ownership or replace for exclusive ownership. By default the controller uses shared ownership (server side apply with the force flag) to manage sync destination objects, allowing other controllers and users to manage fields not set in the source object.

Set the strategy to replace if you want the controller to take exclusive ownership for a destination.

kind: ObjectSync
apiVersion: sync.rustrial.org/v1alpha1
metadata:
  name: my-test-config-map-distributor
  namespace: default
spec:
  source:
    group: ""
    kind: ConfigMap
    name: my-namespace
  destinations:
  - namespace: "*"
    strategy: "replace"

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be triple licensed as above, without any additional terms or conditions. See the WAIVER and CONTRIBUTING.md files for more information.

About

Kubernetes controller to synchronise objects between namespaces

Resources

License

Unlicense and 2 other licenses found

Licenses found

Unlicense
UNLICENSE
Apache-2.0
LICENSE-APACHE
MIT
LICENSE-MIT

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •