Configuration Templates
This page describes how configuration templates are used in the Service Broker.
In the previous section we looked at how configuration bindings map service instances and service bindings for a service plan to a set of resource templates. This section examines how templates are defined and are processed to result in Kubernetes resources that can be created.
Configuration Templates
Templates are conceptually very simple. They are a resource template—that provides scaffolding to build your resource with, with optional dynamic attributes—that allow the resource template to be customized.
The Service Broker operates on abstract templates rather than concrete Kubernetes resources because of namespace conflicts.
If, for example, your service instance created a Kubernetes Secret
called my-secret
, then only one service instance could ever be created in a single namespace.
Any subsequent attempts to create another service instance would create a Secret
with the same name and Kubernetes would reject it.
By allowing templating, the Service Broker allows resource names to be dynamically generated, and you can guaranteed resources will never conflict. This is best explained by example:
name: my-secret
template: (1)
apiVersion: v1
kind: Secret
metadata:
name: '{{ registry "instance-id" }}' (2)
stringData:
mySecretName: TopSecret!
Lets look in more detail at the configuration:
1 | The template attribute is just that, a template, it may not be able to be created by Kubernetes without more attributes being populated.
In this case we want to create a Secret , but cannot as the metadata.name is not explicitly specified. |
2 | The metadata.name attribute is an example of using dynamic attributes
Dynamic attributes are defined as strings—Go language templating operates on strings.
This particular template references a value from the registry—a simple key/value store. |
If, for example, our instance ID was camelot
, the resulting resource would be:
apiVersion: v1
kind: Secret
metadata:
name: camelot
stringData:
mySecretName: TopSecret!
This is now a valid Kubernetes resource and can be created by the Service Broker. The key observation to make is that service IDs are unique, therefore if another service instance rendered this template, it would result in a different name and can be created without conflict.
Optional Attributes
Consider a template with a dynamic attribute based on an optional parameter. That parameter may be supplied by a service instance creation request, or it may not:
template:
apiVersion: v1
kind: Secret
metadata:
name: my-secret
namespace: '{{ parameter "my-namespace" }}'
If the parameter did not exist, the resulting resource would look like:
apiVersion: v1
kind: Secret
metadata:
name: my-secret
namespace: null
There is a danger that—although the parameter itself was optional—the generated resource would not be valid with the additional null
attribute.
For this reason, if the Service Broker resolves a dynamic attribute to null
, then the corresponding attribute will be removed.
The resulting resource will now look like:
apiVersion: v1
kind: Secret
metadata:
name: my-secret
Resource Template Constraints
Resource templates must be specified and must be objects. They cannot be scalar values or arrays. Templates referenced by configuration bindings must generate a valid Kubernetes object.
As we will see in the next section, dynamic attributes can reference shared template snippets, that are themselves rendered as per the template processing rules. As a result there is no restriction that all templates must be Kubernetes resources.
Namespaces
One thing that we have not mentioned when creating Kubernetes resources is namespaces.
By default, if not specified in the template the Service Broker will derive the namespace from the request context.
The Kubernetes service catalog watches for ServiceInstance
resources being created and then calls the Service Broker API in order to create the service instance.
The namespace in which the ServiceInstance
resource was created is passed to the Service Broker API with a request context.
By using implicit namespace determination, the resources associated with a service plan will be created in the same namespace as the ServiceInstance
resource.
The namespace to use for provisioning is determined by the Service Broker using the following methods, in order of precedence:
-
Explicitly defined in the resource template.
-
Implicitly defined in the request context.
-
If not specified in the request context, use the namespace the Service Broker is running in.
Singletons
In our earlier example, we made the resource name dynamic in order to prevent Kubernetes namespace conflicts.
There are, however, times where you actually want to allow this behavior.
Take cluster wide resources such as the ClusterRole
, for example.
If your service instance wanted to create a ClusterRole
, and share it among all service instances, then we’d want to allow conflicts.
You can specify the template is a singleton in the configuration to enable this behavior. When enabled the errors when creating a resource are looked at more closely. If a conflict is reported by Kubernetes and the resource is marked as a singleton, then the error is ignored and normal processing continues. Any other error will cause the operation to fail.
Singletons can not be updated by service instance updates. The singleton configuration is considered fixed after creation. If singletons were allowed to be updated during service instance updates, then there is a risk of split-brain problems leading to undefined or unexpected behavior.
Processing Rules
Templates are—under the hood—JSON objects.
When the Service Broker decodes JSON objects these are stored as the Go language map
type.
Go language map
types, are based on hash tables, therefore iteration order is arbitrary.
It follows that processing of dynamic attributes is also in an arbitrary order.
If ordering of dynamic attribute processing matters, consider pre-computing values in the configuration binding.
Next Steps
We have seen how service instance and bindings are mapped to a set of configuration templates. Configuration templates map a resource template to final object by processing dynamic attributes in the configuration template. Next we will look at dynamic attributes, where they can source data from, and what processing can be performed on the source data.