Capi-2-Argo Cluster Operator (CACO) converts ClusterAPI Cluster credentials into ArgoCD Cluster definitions and keep them synchronized. It aims to act as an integration bridge and solve an automation gap for users that combine these tools to provision Kubernetes Clusters.
Probably to be here, you are already aware of ClusterAPI and ArgoCD. If not, lets say few words about these projects and what they want to offer:
-
ClusterAPI provides declarative APIs and tooling to simplify provisioning, upgrading, and operating multiple Kubernetes clusters. In simple words, users can define all aspects of their Kubernetes setup as CRDs and CAPI controller -which follows operator pattern- is responsible to reconcile on them and keep their desired state.
-
ArgoCD is a declarative, GitOps continuous delivery tool for Kubernetes. It automates the deployment of the desired application states in the specified target environments. In simple words, give a Git and a target Kubernetes Cluster and Argo will keep you package up, running and always in-sync with your source.
So, we have CAPI that enables us to define Clusters as native k8s objects and ArgoCD that can take these objects and deploy them. Let's demonstrate how a pipeline like this could look like:
- Git holds multiple Kubernetes Clusters definitions as CRDs
- Argo watches these resources from Git
- Argo deploys definitions on a Management Cluster
- CAPI reconciles on these definitions
- CAPI provisions these Clusters on Cloud Provider
- CAPI returns provisioned Cluster information as k8s Secrets
- ❌ Argo is not aware of remote Clusters plus cannot authenticate to provision additional resources
Ok, all good until here. But having bare naked k8s clusters is not something useful. Probably dozens of utils and addons are needed for a cluster to look handy (eg. CSI Drivers, Ingress Controllers, Monitoring, etc).
Argo can also take care of deploying these utils but eventually credentials will be essential to authenticate against target clusters. Of course, we can proceed with the following three manual steps to solve that:
- Read CAPI credentials
- Translate them to Argo types
- Create new Argo credentials
But how can we automate this? Capi2Argo Cluster Operator was created so it can take care of above actions.
CACO implements them in an automated loop that watches for changing events in secret resources and if conditions are met to be a CAPI compliant, it converts and deploy them as Argo compatible ones. What is actually does under the hood, is a god simple KRM transformation like this:
Before we got only CAPI Cluster Spec:
kind: Secret
apiVersion: v1
type: cluster.x-k8s.io/secret
metadata:
labels:
cluster.x-k8s.io/cluster-name: CAPICluster
name: CAPICluster-kubeconfig
data:
value: << CAPICluster KUBECONFIG based64-encoded >>
After we have also Argo Cluster Spec:
kind: Secret
apiVersion: v1
type: Opaque
metadata:
labels:
argocd.argoproj.io/secret-type: cluster
capi-to-argocd/owned: "true" # Capi2Argo Controller Ownership Label
name: ArgoCluster
namespace: argocd
stringData:
name: CAPICluster
server: CAPIClusterHost
config: |
{
"tlsClientConfig": {
"caData": "b64-ca-cert",
"keyData": "b64-token",
"certData": "b64-cert",
}
}
Above functionality use-case can be demonstrated by extending the Workflow mentioned above by automating following steps:
- CACO watches for CAPI cluster secrets
- CACO converts them to Argo Clusters
- CACO creates them as Argo Clusters
- Argo reads these new Clusters
- ✔️ Argo provisions resources to CAPI Workload Clusters
Capi-2-Argo Cluster Operator is able to take along labels from a Cluster
resource and place them on the Secret
resource that is created for the cluster. This is especially useful when using labels to instruct ArgoCD which clusters to sync with certain applications.
To enable this feature, add a label with this format to the Cluster
resource: take-along-label.capi-to-argocd.<label-key>: ""
.
The following example
apiVersion: cluster.x-k8s.io/v1beta1
kind: Cluster
metadata:
name: ArgoCluster
namespace: default
labels:
foo: bar
my.domain.com/env: stage
take-along-label.capi-to-argocd.foo: ""
take-along-label.capi-to-argocd.my.domain.com/env: ""
spec:
// ..
Results in the following Secret
resource:
kind: Secret
apiVersion: v1
type: Opaque
metadata:
name: ArgoCluster
namespace: argocd
labels:
argocd.argoproj.io/secret-type: cluster
capi-to-argocd/owned: "true"
foo: bar
my.domain.com/env: stage
taken-from-cluster-label.capi-to-argocd.foo: ""
taken-from-cluster-label.capi-to-argocd.my.domain.com/env: ""
stringData:
// ...
- Keeping your Production Pipelines DRY, everything as testable Code
- Avoid manual steps for credentials management through UI, cron scripts and orphaned YAML files
- Write end-2-end Infrastructure tests by bundling all the logic
- Enabler for creating trully dynamic environments when using ClusterAPI and ArgoCD
Helm
$ helm repo add capi2argo https://dntosas.github.io/capi2argo-cluster-operator/
$ helm repo update
$ helm upgrade -i capi2argo capi2argo/capi2argo-cluster-operator
Check additional values configuration in chart readme file.
Capi2Argo is builded upon the powerful Operator SDK.
Gradually -and depends on how free time allow us- will try adopting all best practices that are suggested on the community, find more in here.
make all
make ci
make run
make docker-build
TODO In the meantime, feel free to grab any of unimplemented bullets on the Roadmap section :).
- Core Functionality: Convert CAPI to Argo Clusters
- Unit Tests
- Integration Tests
- Helm Chart Deployment
- FAQ and Docs
- Adopt Operator Best Practices
- Garbage Collection
- Quickstart Deployment (Kind Cluster)
- Support for filtering Namespaces
- Support for multi-arch Docker images (amd64/arm64)