This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Documentation versions

Welcome to the docs for etcd-operator! The following doc versions are available:

1 - v0.4 docs

These docs cover everything from setting up and running an etcd operator to setting up and manage etcd clusters.

1.1 - Overview

Here’s where your user finds out if your project is for them.

TODO

1.2 - Getting Started

Get etcd with etcd-operator up and running in less than 5 minutes!

Follow these instructions to install, run, and test etcd with etcd-operator in a Kubernetes cluster.

Pre-requisites:

  • kubectl
  • Kubernetes cluster and kubectl configured to use it
    • If you don’t have a Kubernetes cluster, you can use kind to create a local one
  • cert-manager installed in the cluster
  1. Install etcd-operator:

    kubectl apply -f https://github.com/aenix-io/etcd-operator/releases/latest/download/etcd-operator.yaml
    
  2. Check the operator is running:

    kubectl get pods -n etcd-operator-system -l control-plane=controller-manager
    
  3. Create a simple etcd cluster:

    kubectl apply -f https://github.com/aenix-io/etcd-operator/raw/main/examples/manifests/etcdcluster-simple.yaml
    

    Caution: by default emptyDir storage is used. It means such cluster configuration is not intended for long-term storage.

  4. Check the etcd cluster is running:

    kubectl get pods -l app.kubernetes.io/managed-by=etcd-operator
    

1.3 - Examples

See etcd-operator in action!

You can find examples for deploying etcd clusters in various configuration in the GitHub repository under examples/manifests directory.

This directory provides various manifests that can help you understand how to set up etcd clusters using the etcd-operator.

1.4 - Reference

Low level reference docs for your project.

1.4.1 - API Reference

Autogenerated API Reference for the CRD

Packages

etcd.aenix.io/v1alpha1

Package v1alpha1 contains API Schema definitions for the etcd.aenix.io v1alpha1 API group

Resource Types

EmbeddedMetadataResource

Appears in:

FieldDescriptionDefaultValidation
metadata EmbeddedObjectMetadataRefer to Kubernetes API documentation for fields of metadata.

EmbeddedObjectMetadata

EmbeddedObjectMetadata contains a subset of the fields included in k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta Only fields which are relevant to embedded resources are included.

Appears in:

FieldDescriptionDefaultValidation
name stringName must be unique within a namespace. Is required when creating resources, although
some resources may allow a client to request the generation of an appropriate name
automatically. Name is primarily intended for creation idempotence and configuration
definition.
Cannot be updated.
More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
labels object (keys:string, values:string)Labels Map of string keys and values that can be used to organize and categorize
(scope and select) objects. May match selectors of replication controllers
and services.
More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
annotations object (keys:string, values:string)Annotations is an unstructured key value map stored with a resource that may be
set by external tools to store and retrieve arbitrary metadata. They are not
queryable and should be preserved when modifying objects.
More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations

EmbeddedPersistentVolumeClaim

EmbeddedPersistentVolumeClaim is an embedded version of k8s.io/api/core/v1.PersistentVolumeClaim. It contains TypeMeta and a reduced ObjectMeta.

Appears in:

FieldDescriptionDefaultValidation
metadata EmbeddedObjectMetadataRefer to Kubernetes API documentation for fields of metadata.
spec PersistentVolumeClaimSpecSpec defines the desired characteristics of a volume requested by a pod author.
More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistentvolumeclaims

EmbeddedPodDisruptionBudget

EmbeddedPodDisruptionBudget describes PDB resource for etcd cluster members

Appears in:

FieldDescriptionDefaultValidation
metadata EmbeddedObjectMetadataRefer to Kubernetes API documentation for fields of metadata.
spec PodDisruptionBudgetSpecSpec defines the desired characteristics of a PDB.
More info: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/#pod-disruption-budgets

EmbeddedService

Appears in:

FieldDescriptionDefaultValidation
metadata EmbeddedObjectMetadataRefer to Kubernetes API documentation for fields of metadata.
spec ServiceSpecSpec defines the behavior of the service.

EtcdCluster

EtcdCluster is the Schema for the etcdclusters API

FieldDescriptionDefaultValidation
apiVersion stringetcd.aenix.io/v1alpha1
kind stringEtcdCluster
metadata ObjectMetaRefer to Kubernetes API documentation for fields of metadata.
spec EtcdClusterSpec

EtcdClusterSpec

EtcdClusterSpec defines the desired state of EtcdCluster

Appears in:

FieldDescriptionDefaultValidation
replicas integerReplicas is the count of etcd instances in cluster.3Minimum: 0
options object (keys:string, values:string)Options are the extra arguments to pass to the etcd container.
podTemplate PodTemplatePodTemplate defines the desired state of PodSpec for etcd members. If not specified, default values will be used.
serviceTemplate EmbeddedServiceService defines the desired state of Service for etcd members. If not specified, default values will be used.
headlessServiceTemplate EmbeddedMetadataResourceHeadlessService defines the desired state of HeadlessService for etcd members. If not specified, default values will be used.
podDisruptionBudgetTemplate EmbeddedPodDisruptionBudgetPodDisruptionBudgetTemplate describes PDB resource to create for etcd cluster members. Nil to disable.
storage StorageSpec
security SecuritySpecSecurity describes security settings of etcd (authentication, certificates, rbac)

PodDisruptionBudgetSpec

Appears in:

FieldDescriptionDefaultValidation
minAvailable IntOrStringMinAvailable describes minimum ready replicas. If both are empty, controller will implicitly
calculate MaxUnavailable based on number of replicas
Mutually exclusive with MaxUnavailable.
maxUnavailable IntOrStringMinAvailable describes maximum not ready replicas. If both are empty, controller will implicitly
calculate MaxUnavailable based on number of replicas
Mutually exclusive with MinAvailable

PodTemplate

PodTemplate allows overrides, such as sidecars, init containers, changes to the security context, etc to the pod template generated by the operator.

Appears in:

FieldDescriptionDefaultValidation
metadata EmbeddedObjectMetadataRefer to Kubernetes API documentation for fields of metadata.
spec PodSpecSpec follows the structure of a regular Pod spec. Overrides defined here will be strategically merged with the default pod spec, generated by the operator.

SecuritySpec

SecuritySpec defines security settings for etcd.

Appears in:

FieldDescriptionDefaultValidation
tls TLSSpecSection for user-managed tls certificates
enableAuth booleanSection to enable etcd auth

StorageSpec

StorageSpec defines the configured storage for a etcd members. If neither emptyDir nor volumeClaimTemplate is specified, then by default an EmptyDir will be used.

Appears in:

FieldDescriptionDefaultValidation
emptyDir EmptyDirVolumeSourceEmptyDirVolumeSource to be used by the StatefulSets. If specified, used in place of any volumeClaimTemplate. More
info: https://kubernetes.io/docs/concepts/storage/volumes/#emptydir
volumeClaimTemplate EmbeddedPersistentVolumeClaimA PVC spec to be used by the StatefulSets.

TLSSpec

TLSSpec defines user-managed certificates names.

Appears in:

FieldDescriptionDefaultValidation
peerTrustedCASecret stringTrusted CA certificate secret to secure peer-to-peer communication between etcd nodes. It is expected to have ca.crt field in the secret.
This secret must be created in the namespace with etcdCluster CR.
peerSecret stringCertificate secret to secure peer-to-peer communication between etcd nodes. It is expected to have tls.crt and tls.key fields in the secret.
This secret must be created in the namespace with etcdCluster CR.
serverTrustedCASecret stringTrusted CA for etcd server certificates for client-server communication. Is necessary to set trust between operator and etcd.
It is expected to have ca.crt field in the secret. If it is not specified, then insecure communication will be used.
This secret must be created in the namespace with etcdCluster CR.
serverSecret stringServer certificate secret to secure client-server communication. Is provided to the client who connects to etcd by client port (2379 by default).
It is expected to have tls.crt and tls.key fields in the secret.
This secret must be created in the namespace with etcdCluster CR.
clientTrustedCASecret stringTrusted CA for client certificates that are provided by client to etcd. It is expected to have ca.crt field in the secret.
This secret must be created in the namespace with etcdCluster CR.
clientSecret stringClient certificate for etcd-operator to do maintenance. It is expected to have tls.crt and tls.key fields in the secret.
This secret must be created in the namespace with etcdCluster CR.

1.5 - Contribution Guidelines

How to contribute to the project

etcd operator guide for developers.

How to start contributing

First of all, etcd operator uses kubebuilder. See official docs to learn more.

Easy way

Using this way, you don’t be able to debug the controller locally. After every change you will have to redeploy changes.

Pre-requisites

  • Any docker-like container tool, “docker” by default. For more information search for: CONTAINER_TOOL in Makefile.
  • kubectl

Steps

  1. Create and prepare kind cluster:

    make kind-prepare
    
  2. Build image and load it into kind cluster:

    make kind-load
    
  3. Deploy CRDs, etcd-operator, RBAC, webhook certs into kind cluster:

    make deploy
    
  4. To deploy your code changes, load a new image and redeploy etcd-operator:

    make kind-load && make redeploy
    
  5. To clean up after all, delete kind cluster:

    make kind-delete
    

Advanced way

Using VSCode you can connect your IDE to a pod in kubernetes cluster and use go run cmd/main.go from the pod. It will allow you to debug easily and faster integrate code changes to you develop environment.

General steps

  1. Install VSCode Kubernetes extension.
  2. Install VSCode Dev Containers extension.
  3. Create pvc to store operator code, go modules and your files.
  4. Build Dockerfile to create image for your develop environment (git, golang , etc…). Take base image that you love most.
  5. Patch operator deployment to
    • Attach PVC from step 3.
    • Change operator image to your image.
    • Change command and args to endless sleep loop.
    • Change rolling update strategy to recreate if you use RWO storage class.
    • Change security context RunAsNonRoot to false.
    • Increase requests and limits.
    • Remove readiness and liveness probes.
  6. Attach VSCode to a running container through Kubernetes extension.
  7. Install necessary extensions to the container. They will be preserved after container restart if you attached pvc to home directory.
  8. Run go run cmd/main.go.

Release procedure

Every PR should have a label to show what kind of changes does it bring. For example, PRs with docs changes should have documentation label. This labels will be used by the release-drafter workflow to prepare the release draft.

Cutting off a release

When all tasks for the release are merged to main branch, maintainer should

  • create new minor or major version in site if it’s not a patch release and merge this PR to main branch
  • check that tag has not been already created. If it has been, delete it
  • publish the release using draft, created by release-drafter
  • you are amazing :)