Service Instance and Binding Registries

      +
      This page describes the functionality of registries in the Service Broker.

      Service Broker Registries

      A registry is a typed key/value store that exists per service instance and per service binding. Values are serialized as JSON strings to preserve type when stored in the registry.

      A registry is implemented with a Kubernetes Secret resource. Registries are stored in the same namespace as the Service Broker, therefore, if they contain sensitive data, you must ensure users do not have read access of Secret resources in this namespace.

      A registry is the only persistent storage the Service Broker uses. This persistence layer allows the Service Broker to tolerate service restarts during service provisioning.

      A registry provides a "scratch" area where configuration parameters can be stored and then referenced later by other configuration parameters. This allows configuration parameters to chain their inputs and outputs together.

      Scoping Rules

      Each service instance and service binding gets its own registry. This allows the Service Broker to quickly, and easily, determine whether a registry for a service instance or service binding exists—​more than that, it is used to determine whether a service instance or service binding exists.

      A service binding registry inherits all key/value pairs from a service instance. This allows for a service instance to create a password and initialize a service with it, and then to communicate it to a service binding to be communicated to the Service Broker client.

      Another example could involve a service instance generating a TLS CA certificate/key pair and a server certificate/key pair for the service instance. The service binding would in turn have access to the CA certificate and key in order to generate, and sign, a client certificate/key pair to be communicated to the Service Broker client.

      Values inherited by a service binding registry—​upon creation—​are not updated by a service instance update that modifies the underlying service instance registry.

      Scoping is one-way—​service instances cannot lookup, or gain access to, associated service binding registries.

      System Defined Registry Keys

      These registry keys are defined by the Service Broker and have special meanings as defined below. Read-only keys are always defined by the Service Broker and can be used in any circumstance.

      Read-Only

      Read-only keys are defined by the Service Broker and can not be set by configuration parameters.

      namespace

      When using the Kubernetes Service Catalog this will be set to the namespace a service instance was created in. If namespace is not supplied as an attribute of a service instance creation context, this will default to the namespace the Service Broker is running in.

      instance-id

      This is the unique ID of the service instance or the service instance a service binding belongs to.

      binding-id

      Service Binding Only This is the unique ID of a service binding.

      service-id

      This is the service ID—​defined in the service catalog—​that a service instance or service binding belongs to.

      plan-id

      This is the plan ID—​defined in the service catalog—​that a service instance or service binding belongs to.

      Read-Write

      Read-write keys are defined by configuration parameters and are used by the Service Broker to provide core functionality.

      dashboard-url

      When defined by the configuration, the dashboard URL will be returned by the Service Broker API when a service instance has been successfully provisioned. This must be a URL string e.g. https://my-service.acme.com.

      credentials

      When defined by the configuration, the credentials will be returned by the Service Broker API when a service binding has been successfully provisioned. This must be an object and may contain any value required by a client application to consume a service, for example:

      {
        "connection": "scheme://my-service.acme.com:1234/auth/v1",
        "username": "road-runner",
        "password": "meepMeep!"
      }

      Reserved

      Reserved keys are reserved for exclusive use by the Service Broker and cannot be read or written by configuration parameters.

      context

      Used to store a service instance or service binding request context. Use the namespace registry key to get access to this value.

      parameters

      Used to store a service instance or service binding request parameters. Use the parameter configuration parameter source type to access this value.

      operation

      Used to define the asynchronous operation type when provisioning.

      operation-id

      Used to define the asynchronous operation ID when provisioning.

      operation-status

      Used to define the asynchronous operation status when provisioning.

      User Defined Registry Keys

      Service Broker administrators can define and use registry keys during service instance and service binding provisioning. Registry keys are set by configuration parameters with the registry destination type. Key names may be any valid string that a Kubernetes Secret resource allows with the data and stringData attributes.

      Registry Based Garbage Collection

      Service instances and service bindings, as we have seen, are collections of templates that generate Kubernetes resources. Each service instance and service binding has its own registry, which is modeled on a Kubernetes Secret resource.

      When Kubernetes resources are created—​in response to a service instance and service binding creation request—​they are associated with the registry for that creation request. Specifically, if a service instance creation resulted in the generation of a Kubernetes Deployment resource, that Deployment would have its "owner" reference set to the service instance registry.

      This simplifies deprovisioning in that deletion of a service instance registry will cascade and delete any Kubernetes resources that were created by that service instance.

      Owner references to registries are appended to existing Kubernetes resources. Therefore, where singleton templates have been used to generate Kubernetes resources for multiple service instances or service bindings, the Kubernetes resources are only deleted when all associated service instance and service binding registries have also been deleted.

      reg gc
      Figure 1. Registry Ownership of Resources and Resource Sharing with Singletons

      Next Steps

      We have now covered all basic configuration topics. You should now be confident in reading and understanding Service Broker configuration files. You should also be able to create your own configurations to provision services upon request for your own services.

      The next section begins to look at more advanced topics.