Architecture
kcp-operator is a kubebuilder/controller-runtime based collection of controllers that allow setting up complex kcp environments.
Resource Relationships
flowchart TD
FrontProxy -- ObjRef (n:1)--> RootShard
Shard --ObjRef (n:1)--> RootShard
RootShard --ObjRef (1:1, optional)--> CacheServer
Shard --ObjRef (n:1, optional)--> CacheServer
Kubeconfig --ObjRef (n:1)-->Shard
Kubeconfig --ObjRef (n:1)-->RootShard
Kubeconfig --ObjRef (n:1)-->FrontProxy
The above flow chart renders the following considerations:
- The
RootShard
is the nucleus of a kcp setup. Each object of this resource basically creates a new kcp setup. - A
RootShard
has an optional dependency on aCacheServer
, if the cache server embedded in the kcp binary is not used. - There can be no, one or multiple kcp-front-proxy deployments that all serve traffic into the same kcp setup (e.g. because you want to run front proxies in multiple regions). The
FrontProxy
object therefore has a object reference to aRootShard
. - There can be one or multiple additional shards added to a kcp setup. The
Shard
object therefore has an object reference to aRootShard
. Kubeconfigs
can be generated for either aShard
, aRootShard
or aFrontProxy
. The former two are more useful for components running alongside shards (e.g. additional controllers), while the latter is useful for external access to the kcp setup.
Cross-Namespace/Cluster References
Due to the potential "global" nature of a kcp setup it might be necessary to run kcp-operator on multiple clusters while attempting to form one single kcp setup with multiple shards and front proxies.
To make this possible, resources with object references (see above) could have a secondary way of reading necessary configuration (instead of a corev1.LocalObjectReference
). This could be a reference to a ConfigMap
or a Secret
(to be determined) which are automatically generated for various resource types. A sync process (outside of the kcp-operator) could then sync the ConfigMap
(or the Secret
, or a custom resource type) across namespaces or even clusters, where e.g. a Shard
object references a Secret
which was generated for a RootShard
on another cluster.
Certificate Management
The placeholders $rootshard
and $frontproxy
in the chart are used to denote the name of the corresponding operator resource.
graph TB
A([kcp-pki-bootstrap]):::issuer --> B(kcp-pki-ca):::ca
B --> C([$rootshard-ca]):::issuer
C --> D(kcp-etcd-client-ca):::ca
C --> E(kcp-etcd-peer-ca):::ca
C --> F($rootshard-front-proxy-client-ca):::ca
C --> G($rootshard-server-ca):::ca
C --> H($rootshard-requestheaer-client-ca):::ca
C --> I($rootshard-client-ca):::ca
C --> J(kcp-service-account-ca):::ca
D --> K([kcp-etcd-client-issuer]):::issuer
E --> L([kcp-etcd-peer-issuer]):::issuer
F --> M([$rootshard-front-proxy-client-ca]):::issuer
G --> N([$rootshard-server-ca]):::issuer
H --> O([$rootshard-requestheader-client-ca]):::issuer
I --> P([$rootshard-client-ca]):::issuer
J --> Q([kcp-service-account-issuer]):::issuer
K --- K1(kcp-etcd):::cert --> K2(kcp-etcd-client):::cert
L --> L1(kcp-etcd-peer):::cert
M --> M1($rootshard-$frontproxy-admin-kubeconfig):::cert
N --- N1(kcp):::cert --- N2($rootshard-$frontproxy-server):::cert --> N3(kcp-virtual-workspaces):::cert
O --- O1($rootshard-$frontproxy-requestheader):::cert --> O2("(kcp-front-proxy-vw-client)"):::cert
P --- P1($rootshard-$frontproxy-kubeconfig):::cert --> P2(kcp-internal-admin-kubeconfig):::cert
Q --> Q1(kcp-service-account):::cert
B --> R([$rootshard2-ca]):::issuer
R --> S(...):::ca
classDef issuer color:#77F
classDef ca color:#F77
classDef cert color:orange