-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Persistent customization strategy #61
Comments
+1 for greater ability to customize the resources that are created by the SpiceDB Operator. We recently decided against using the Operator and instead rolled our own manifests as there was no easy way to do the following:
|
Thanks @anthonyralston, I think we can start taking a closer look at addressing this soon. Just for reference, did you try out at any of the options that do work today? For example, you can add extra annotations to the pods by modifying the deployment after the operator creates it (they won't get overwritten!) or by using one of the webhook services mentioned above (kyverno / gatekeeper). I can make some guesses why those options might not work for you, but I'd love to hear specifically why they don't if you can spare the time. |
v1.2.0 is released which now includes a Everything on this thread is addressed with the exception of:
because you can't currently tell the operator to not mount a real kube secret. I made #155 to track the additional work needed to enable it. |
The operator creates kube resources on behalf of the users: deployments, services, serviceaccounts, rbac, etc, which may require some additional modification by the user:
All of these modifications are possible today by modifying operator-created resources after (or before!) they have been created. The operator uses Server Side Apply and will not touch fields it does not own. Users can query for which fields are owned by reading the fieldmanager metadata on a given resource.
But modifying the resources after creation makes git-ops workflows difficult, it would be nice if there was a way to persist such modifications in
SpiceDBCluster
or other native Kube resources.There are some native methods for persisting this type of change, but only for specific fields of specific resources:
PodPreset
(which are deprecated and no longer available)With the background out of the way, this leaves some general approaches we could take:
SpiceDBCluster
to cover any needs as they come up. This is the approach that most operators seem to take, but doing this for more than a couple of fields leads to huge schemas with dozens of options for customizing specific parts of downstream resources. I don't personally favor this approach - it seems at odds with the fieldmanager tracking that Kube introduced for SSA, and it brings things into the operator's scope that it doesn't actually have an opinion on (all such config is passed blindly to other resources).PodPreset
solution, where external config can modify the resource before it is persisted. There are a couple of competing projects with no clear (to me) leader: Kyverno and Gatekeeper both support "mutation" policies that can inject arbitrary data into a resource on creation. This approach can be used with the operator today, but we have no example policies for users to lean on, and it requires installing and running one of these projects as well.kustomization: <configMapName>
field with Kustomize manifests (that the operator parses and applies, similar to kubebuilder-declarative-pattern), or it might look more like a Kyverno/Gatekeeper API but with a smaller, spicedb-operator focused scope.The text was updated successfully, but these errors were encountered: