kbrew is a CLI tool for Kubernetes which makes installing any complex stack easy in one step
(And yes we are definitely inspired by Homebrew from MacOS)
Let's take the example of installing Kafka on a Kubernetes cluster. If you are a developer trying this on a non-prod environment, you want a quick and simple way to set it up. But a typical process looks like this:
With kbrew, all of this happens with a "one step":
kbrew install kafka-operator
Similarly when you install a Rook Ceph cluster - it makes it a one step easy
:
Any engineering is not without tradeoffs and we are not claiming that this is a silver bullet. Please refer to the Goals and FAQ sections for details.
Created by gh-md-toc
One step
Easy for usersWe are basically optimizing for one step
install easy for developers. You end up installing applications in dev/tinkering environments multiple times and it should not be this hard. Also, you should not have to write glue code
or shell scripts to make it work!
One step
would not be true to its promise if you had to configure
things such as StorageClass or verify the version of Kubernetes etc. It should work and be fully functional to use right after installation.
While we are making it easy for users to install any application in one step, we are pushing the complexity to the recipe. This means the recipe authors have to understand and write recipes that just work!
A kbrew recipe is a YAML file that declares the installation process of a Kubernetes app. It allows to brew Helm charts or vanilla Kubernetes manifests with scripts, also managing dependencies with other recipes.
Recipes can be grouped in a structured directory called Registry
. kbrew uses the kbrew-registry by default.
The process of how kbrew manages the installation of an app according to the recipe specification is depicted below. As can be seen, kbrew takes care of the order of pre/post actions.
Similarly, while removing an app, kbrew takes care of the order of removal of the dependent apps and the cleanup steps specified via pre/post_cleanup
in the recipe.
A bare-bones structure of a recipe is a composition of pre-install steps, install and post-install steps. Each step could have another application being installed or a further set of steps.
apiVersion: v1
kind: kbrew
app:
repository:
url: https://raw.githubusercontent.com/repo/manifest.yaml
type: raw
args:
Deployment.nginx.spec.replicas: 4
namespace: default
version: v0.17.0
pre_install:
- apps:
- OtherApp
- steps:
- echo "installing app"
post_install:
- steps:
- echo "done installing"
pre_cleanup:
- steps
- echo "deleting prerequisite"
post_cleanup:
- steps:
- echo "app deleted"
app
is the declaration of how a Kubernetes application - a Helm chart or a YAML manifest - will get installed.
repository
: defines the source of the appurl
: location of a Helm chart or a Kubernetes YAML manifesttype
: can be helm
or raw
For example for the Kafka recipe, we will use the Helm chart from Banzaicloud and point to the Helm repo where the chart is available.
app:
repository:
name: banzaicloud-stable
url: https://kubernetes-charts.banzaicloud.com
type: helm
kbrew allows you to modify the app via arguments that can modify the Helm chart values or manifest field values. kbrew supports passing arguments to recipes as Go templates.
All the functions from the Sprig library and the lookup & include functions from Helm are supported.
Helm app: Arguments to a helm app can be the key-value pairs offered by the chart in its values.yaml file.
Raw app: These arguments patch the manifest of a raw app and can be specified in the format: <Kind>.<Name>.<FieldPath>: <value>
. For example, to change spec.replicas
of a Deployment
named nginx
, specify Deployment.nginx.spec.replicas
For example for Nginx Ingress recipe we configure an annotation if the application is being installed in AWS EKS or Digital Ocean.
app:
args:
# annotation for EKS
controller.service.annotations."service\.beta\.kubernetes\.io/aws-load-balancer-type": '{{ $providerID := (index (lookup "v1" "Node" "" "").items 0).spec.providerID }}{{ if hasPrefix "aws" $providerID }}nlb{{end}}'
# annotations for Digital Ocean
controller.service.annotations."service\.beta\.kubernetes\.io/do-loadbalancer-enable-proxy-protocol": '{{ $providerID := (index (lookup "v1" "Node" "" "").items 0).spec.providerID }}{{ if hasPrefix "digitalocean" $providerID }}true{{end}}'
namespace
: Kubernetes namespace where the app should be installed. If not specified, default
is used for installation.Pre and post-install sections allow the recipe author to do steps needed before or after the installation of the core application. This could be for example:
StorageClass
.Let's look at some examples. In the RookCeph recipe, we install the operator as a dependency application:
pre_install:
- apps:
- rook-ceph-operator
In the Minio recipe, we check the version of Kubernetes so that only compatible versions of Kubernetes are used for rest of the install
pre_install:
- steps:
- |
# Prerequisites
# https://github.com/minio/operator#prerequisites
minK8sVersion="v1.19.0"
expected=$(echo $minK8sVersion | sed 's/v//g' | sed 's/\.//g')
k8sVersion=$(kubectl version --short=true --output json | jq -r ".serverVersion.gitVersion" | sed 's/-.*//g' | sed 's/v//g' | sed 's/\.//g')
if [ $expected -gt $k8sVersion ]
then
echo "The cluster does not meet requirements."
echo "Kubernetes version v1.19.0 or later required."
exit 1
fi
Or for example, in case of Minio, the StorageClass
should have the value of volumeBindingMode
as WaitForFirstConsumer
- and is one of the prerequisites for the installation:
pre_install:
- steps:
- |
# Prerequisites - The StorageClass must have volumeBindingMode: WaitForFirstConsumer
# https://github.com/minio/operator#prerequisites
scList=$(kubectl get storageclass -o jsonpath='{.items[?(@.volumeBindingMode=="WaitForFirstConsumer")].metadata.name}')
if [ -z "$scList" ]
then
echo "The cluster does not meet requirements."
echo "Atleast 1 StorageClass should have WaitForFirstConsumer volumeBindingMode."
exit 1
fi
The pre_cleanup
and post_cleanup
are very similar to the pre_install
and post_install
steps but are used in the uninstall lifecycle.
kbrew uses Helm charts and operators both under the hood. kbrew acts as a glue code
that makes combination of installing a Helm chart, creating a manifest CR etc. into a single command that also tries to make some decisions such as StorageClass configuration etc. It is great for developers who wants to just get something running fast and fully working!
At this point, kbrew is not meant to install applications in production. It makes installing applications easy for developers and anyone tinkering and installing frequently
The recipes are maintained in kbrew registry, and if a recipe does not exist then please raise an issue and you can contribute to the registry.
The analytics is anonymized and used in aggregate to determine the failure/success rate of recipes and to improve user experience.
Please check analytics for details.
The team at InfraCloud is supporting kbrew's development with love! But we love contributions from the community.