The Google Summer of Code (GSOC) program 2017 has come to an end and we followed up with CNCF’s seven interns previously featured in this blog post to check in on how their summer project progressed.

Over the summer, Veermata Jijabai Technological Institute (Mumbai) student Nikhita Raghunath worked with Red Hat mentor Stefan Schimanski on “Improve ThirdPartyResources,” a project aims to work towards a number of known shortcomings to drive the ongoing effort toward a stable ThirdPartyResources release forward.

Nikhita Raghunath

Read on to learn the results of this project from Nikhita and Stefan.

Introduction

My Google Summer of Code project with CNCF was to improve “ThirdPartyResources” in Kubernetes. ThirdPartyResources were succeeded by the much more stable CustomResourceDefinitions in 1.7.

CustomResourceDefinitions provide a way to extend the Kubernetes API and define your own object kinds. Once a CustomResourceDefinition (CRD) has been created, you can create objects or instances of these kinds. These custom objects are called “CustomResources”. You can read more about CRDs here.

Combined with custom controllers, this gives you a powerful way to encode domain knowledge for specific applications (operators) into an extension of the Kubernetes API.

However, there is more work needed to make CustomResources really look like native resources and this is where my project comes in.

My project tackled two important problems:

  1. Validation for CustomResources – When adding objects for a custom type, create and update operations succeed as long as the contents were valid JSON. There was no way to prevent invalid objects to be stored on the server side. This is now solved by validation via JSON schema and will be present in 1.8.
  2. SubResources for CustomResources – CustomResources do not have a spec/status split, that is, they are free-form JSON. This also means that we do not provide subresources for them. As a part of GSoC, a design proposal has been created to add /status and /scale subresources for CustomResources. The proposal is still in discussion and will mostly be implemented for 1.9.

Before discussing further, I’d like to mention that none of this would have been possible without the help from my mentor, Dr. Stefan Schimanski. He has been a fantastic mentor and guide!

Now, let’s see each feature in detail separately.

Validation

If you would like to read in further detail, the design proposal and implementation PR are available.

What this means for you

Change in the API

A new field Validation is added to the spec of the CustomResourceDefinition (CRD). OpenAPI v3 schema is used for validation under CRD.Spec.Validation.OpenAPIV3Schema. The language is essentially JSON Schema. OpenAPI builds on that and we use that dialect to be able to reuse the specs for documentation. This way it will be possible to build clients for Java, Python and other languages in the future based on the OpenAPI spec.

OpenAPI provides a standardized declarative specification language. Different keywords are utilized to put constraints on the data. Thus it provides ways to make assertions about what a valid document must look like.

It is already used in Swagger/OpenAPI specs in Kubernetes so client side validation by adding this dynamically to the main OpenAPI spec might come in future versions.

// CustomResourceDefinitionSpec describes how a user wants their resource to
// appear.
type CustomResourceDefinitionSpec struct {
   // Group is the group this resource belongs in
   Group string
   // Version is the version this resource belongs in
   Version string
   // Names are the names used to describe this custom resource
   Names CustomResourceDefinitionNames
   // Scope indicates whether this resource is cluster or namespace scoped.
   // Default is namespaced
   Scope ResourceScope
   // Validation describes the validation methods for CustomResources
   Validation *CustomResourceValidation
}
// CustomResourceValidation is a list of validation methods for
// CustomResources.
type CustomResourceValidation struct {
   // OpenAPIV3Schema is the OpenAPI v3 schema to be validated against.
   OpenAPIV3Schema *JSONSchemaProps
}

How to use validation

Enable the feature gate

Please note that CustomResourceValidation is an alpha feature in an already beta API. So it is not on by default and exists behind a feature gate. To use this feature, you need to enable the feature gate. This can be achieved by passing the following flag (along with others) to kube-apiserver (Google Container Engine will also allow to create alpha clusters to play with this feature as soon as they support 1.8).

$ kube-apiserver –feature-gates CustomResourceValidation=true

Create a CustomResourceDefinition

Now that the setup is taken care of, let’s create a CRD:

apiVersion: apiextensions.k8s.io/v1beta1
kind: CustomResourceDefinition
metadata:
 name: apps.mygroup.example.com
spec:
 group: mygroup.example.com
 version: v1
 scope: Namespaced
 names:
   plural: apps
   singular: app
   kind: App
   listKind: AppList
 validation:
   openAPIV3Schema:
     properties:
       spec:
         properties:
           version:
           type: string
           enum:
              – “v1.0.0”
              – “v1.0.1”
        replicas:
           type: integer
           minimum: 1
           maximum: 10
        storage:
           properties:
               memory:
                 type: string
                 pattern: “^[0-9]+(Mi|Gi)”
        retention:
           type: string
           pattern: “^[0-9]+(h|d|m|y)”

The schema in the above CRD applies following validations for the instance:

  1. spec.version must be a string and must be either “v1.0.0” or “v1.0.1”.
  2. spec.replicas must be an integer and must have a minimum value of 1 and a maximum value of 10.
  3. spec.storage.memory must be a string and must be of the form described by the regular expression. Example: “500Mi”.
  4. spec.retention must be a string and must be of the form described by the regular expression. Example: “3d”.

Now that we are clear with how it is structured, it’s time to create the CustomResourceDefinition:

$ kubectl create -f crd.yaml
customresourcedefinition “apps.mygroup.example.com” created

Create a CustomResource

With the CustomResourceDefinition created we can create instances, called CustomResources:

This is an object of kind App which has:

apiVersion: mygroup.example.com/v1
kind: App
metadata:
 name: example-app
spec:
 version: “v1.0.2”
 replicas: 15
 storage:
memory: “500Mi”
 retention: “2d”

Create it using kubectl:

$ kubectl create -f app.yaml

Since it is invalid, we get an error. The last two lines show the fields where validation failed and the schema that these fields must satisfy.

The App “example-app” is invalid: []: Invalid value: map[string]interface
{}{“apiVersion”:”mygroup.example.com/v1″, “kind”:”App”,
“metadata”:map[string]interface
{}{“creationTimestamp”:”2017-08-31T20:52:54Z”,
“uid”:”5c674651-8e8e-11e7-86ad-f0761cb232d1″, “selfLink”:””,
“clusterName”:””, “name”:”example-app”, “namespace”:”default”,
“deletionTimestamp”:interface {}(nil),
“deletionGracePeriodSeconds”:(*int64)(nil)}, “spec”:map[string]interface
{}{“replicas”:15, “retention”:”2d”, “storage”:map[string]interface
{}{“memory”:”500Mi”}, “version”:”v1.0.2″}}: validation failure list:
spec.replicas in body should be less than or equal to 10
spec.version in body should be one of [v1.0.0 v1.0.1]
  1. Valid CustomResource

This is a valid object of kind App:

apiVersion: mygroup.example.com/v1
kind: App
metadata:
 name: example-app
spec:
 version: “v1.0.0”
 replicas: 3
 storage:
memory: “500Mi”
 retention: “2d

Create it using kubectl:

# create the example-app
$ kubectl create -f app.yaml
app “example-app” created
# verify that it was created successfully
$ kubectl get apps
NAME        AGE
example-app   5s

Note: If the schema is made stricter later, the existing CustomResources might no longer comply with the schema. This will make them unchangeable and essentially read-only.

To avoid this, it is the responsibility of the user to make sure that any changes made to the schema are such that the existing CustomResources remain validated.

How it works internally

Diagram shows process of creating a CRD

Let’s see what happens under the hood for validation when you create a CRD using $ kubectl create -f crd.yaml.

Diagram shows CustomResource instances validation

This was all about validation. Let’s shift focus to Subresources now.

Subresources

As a part of Google Summer of Code, I also submitted a design proposal along with my mentor, Dr. Stefan Schimanski, to add /status and /scale subresources for CustomResources. This proposal was fun to write and taught me a lot about the existing API semantics! Moreover, it spawned a number of discussions on what the existing API semantics in Kubernetes actually are. If you are interested in contributing to Kubernetes, the design proposal might prove useful to you too.

API Semantics

Just like validation, a new field is introduced in the spec of CustomResourceDefinition – called SubResources. SubResources can be of two types – Status and Scale (in Kubernetes there are some more special purpose subresources, but for CRDs we concentrate on these two).

The custom resource instance is free-form JSON (possibly validated though with CRD validation), so we need to know the JSON paths to spec and status. These JSON paths are mentioned in the SubResources field in the CRD. Hence, we get a spec/status split for CustomResources.

Now subresources can make use of this structure. Let’s take a look at each subresource separately.

Status

Firstly, some background about how Kubernetes works: The API makes a distinction between the specification of the desired state of an object (the nested object field called “spec”) and the status of the object at the current time (the nested object field called “status”).  A controller tries to bring the current state to the desired state.

In this case, a custom controller can use the status field to inform about the current status of whatever is being managed by it. The controller can write to the status endpoint, updating the .status path in the CustomResource. After this, the whole object is validated again to ensure .status does not contain incorrect values.

One main reason to have the spec/status split  is that one can restrict access to the spec and the status independently. E.g. a user should only be able to modify the spec, while the controller should only be able to write the status.

Scale

There are two common ways to use the scale subresource:

  1. A custom controller (like an autoscaler) can write to the /scale endpoint
  2. Using kubectl scale

In such a setup, CustomResources can be used to control other resources (like pods). These resources can now be scaled as per the the number of desired replicas mentioned in the spec.replicas JSON path.

As an example, imagine that a CustomResource describes a certain kind of pods, like a ReplicaSet does in Kubernetes itself. Let’s say the CustomResource describes the nodes of a distributed database (like Cassandra). If the amount of data or the load of a website goes up, a custom controller can scale the DB.

After the resources are scaled, a custom controller counts the number of replicas at the current state and writes to the /status endpoint updating status.replicas. This status replica field is replicated to the /scale subresource as well.

It is extremely powerful to have subresources because custom controllers can make use of this to manage resources more efficiently and with much ease.

Experience with GSoC

As I’ve said, I feel really lucky to be working with my mentor, Dr. Stefan Schimanski. He’s been an incredible support throughout the program, and has made it a GREAT experience. I’m really thankful for him for being so detailed and thorough in his answers, and for being so consistently responsive and helpful with any of my questions or concerns. He always gave me useful pointers if I was stuck and provided positive affirmations whenever I overcame a challenge. Not only this, he also helped me to integrate with the community better. I can’t imagine a better mentor!

I have been working with the API Machinery side of things and while having an awesome mentor is awesome, working with an awesome team is double awesome! A big thanks to the whole API Machinery SIG, especially Dr. Stefan SchimanskiDavid Eads and Anthony Yeh for the numerous code reviews and help with the design proposal.

During GSoC, I also attended GopherCon Denver where I met Konrad Djimeli, another GSoC student from CNCF. We spoke about all the exciting, overwhelming and bewildering moments that we experienced throughout the program. It was nice meeting someone going through a similar journey!

Implementing validation taught me a *lot* about the tooling around the Kubernetes API – generators, marshalling, fuzzers, protobuf serialization, etc. It took a good amount of learning and effort to implement validation and it felt amazing to see it finally being merged!

Wow! CustomResource validation merged in @kubernetesio. That’s huge! Kudos to our awesome @gsoc student @TheNikhita https://t.co/emeA3hgRCL

— Stefan Schimanski (@the1stein) August 30, 2017

Google Summer of Code is an exceptional opportunity for both students and mentors.

All in all, I had great fun and will continue contributing even more. This is just the beginning! 🙂

Thanks to Dr. Stefan Schimanski for reviewing drafts of this post.