Package Orchestration
Why
Customers who want to take advantage of the benefits of Configuration as Data can do so today using a kpt CLI and kpt function ecosystem, including functions catalog. Package authoring is possible using a variety of editors with YAML support. That said, a delightful UI experience of WYSIWYG package authoring which supports broader package lifecycle, including package authoring with guardrails, approval workflow, package deployment, and more, is not yet available.
Package Orchestration service is part of the implementation of the Configuration as Data approach, and enables building the delightful UI experience supporting the configuration lifecycle.
Core Concepts
This section briefly describes core concepts of package orchestration:
Package: Package is a collection of related configuration files containing configuration of KRM resources. Specifically, configuration packages are kpt packages.
Repository: Repositories store packages or functions. For example git or OCI. Functions may be associated with repositories to enforce constraints or invariants on packages (guardrails). ( more details)
Packages are sequentially versioned; multiple versions of the same package may exist in a repository. more details)
A package may have a link (URL) to an upstream package (a specific version) from which it was cloned. ( more details)
Package may be in one of several lifecycle stages:
- Draft - package is being created or edited. The package contents can be modified but package is not ready to be used (i.e. deployed)
- Proposed - author of the package proposed that the package be published
- Published - the changes to the package have been approved and the package is ready to be used. Published packages can be deployed or cloned
Function (specifically, KRM functions) can be applied to packages to mutate or validate resources within them. Functions can be applied to a package to create specific package mutation while editing a package draft, functions can be added to package’s Kptfile pipeline, or associated with a repository to be applied to all packages on changes. ( more details)
A repository can be designated as deployment repository. Published packages in a deployment repository are considered deployment-ready. ( more details)
Core Components of Configuration as Data Implementation
The Core implementation of Configuration as Data, CaD Core, is a set of components and APIs which collectively enable:
-
Registration of repositories (Git, OCI) containing kpt packages or functions, and discovery of packages and functions
-
Porcelain package lifecycle, including authoring, versioning, deletion, creation and mutations of a package draft, process of proposing the package draft, and publishing of the approved package.
-
Package lifecycle operations such as:
- assisted or automated rollout of package upgrade when a new version of the upstream package version becomes available
- rollback of a package to previous version
-
Deployment of packages from deployment repositories and observability of their deployment status.
-
Permission model that allows role-based access control
High-Level Architecture
At the high level, the Core CaD functionality comprises:
-
a generic (i.e. not task-specific) package orchestration service implementing
- package repository management
- package discovery, authoring and lifecycle management
-
kpt - a Git-native, schema-aware, extensible client-side tool for managing KRM packages
-
a GitOps-based deployment mechanism (for example Config Sync), which distributes and deploys configuration, and provides observability of the status of deployed resources
-
a task-specific UI supporting repository management, package discovery, authoring, and lifecycle
CaD Concepts Elaborated
Concepts briefly introduced above are elaborated in more detail in this section.
Repositories
kpt and Config Sync currently integrate with git repositories, and there is an existing design to add OCI support to kpt. Initially, the Package Orchestration service will prioritize integration with git, and support for additional repository types may be added in the future as required.
Requirements applicable to all repositories include: ability to store packages, their versions, and sufficient metadata associated with package to capture:
- package dependency relationships (upstream - downstream)
- package lifecycle state (draft, proposed, published)
- package purpose (base package)
- (optionally) even customer-defined attributes
At repository registration, customers must be able to specify details needed to store packages in appropriate locations in the repository. For example, registration of a Git repository must accept a branch and a directory.
Repositories may have associated guardrails - mutation and validation functions that ensure and enforce requirements of all packages in the repository, including gating promotion of a package to a published lifecycle stage.
Note
A user role with sufficient permissions can register a package or function repository, including repositories containing functions authored by the customer, or other providers. Since the functions in the registered repositories become discoverable, customers must be aware of the implications of registering function repositories and trust the contents thereof.Package Versioning
Packages are sequentially versioned. The important requirements are:
- ability to compare any 2 versions of a package to be either “newer than”, equal, or “older than” relationship
- ability to support automatic assignment of versions
- ability to support optimistic concurrency of package changes via version numbers
- simple model which easily supports automation
We plan to use a simple integer sequence to represent package versions.
Package Relationships
Kpt packages support the concept of upstream. When a package is cloned from another, the new package (called downstream package) maintains an upstream link to the specific version of the package from which it was cloned. If a new version of the upstream package becomes available, the upstream link can be used to update the downstream package.
Deployment
The deployment mechanism is responsible for deploying configuration packages from a repository and affecting the live state. Because the configuration is stored in standard repositories (Git, and in the future OCI), the deployment component is pluggable. By default, Config Sync is the deployment mechanism used by CaD Core implementation but others can be used as well.
Here we highlight some key attributes of the deployment mechanism and its integration within the CaD Core:
- Published packages in a deployment repository are considered ready to be deployed
- Config Sync supports deploying individual packages and whole repositories. For Git specifically that translates to a requirement to be able to specify repository, branch/tag/ref, and directory when instructing Config Sync to deploy a package.
- Draft packages need to be identified in such a way that Config Sync can easily avoid deploying them.
- Config Sync needs to be able to pin to specific versions of deployable packages in order to orchestrate rollouts and rollbacks. This means it must be possible to GET a specific version of a package.
- Config Sync needs to be able to discover when new versions are available for deployment.
Functions
Functions, specifically KRM functions, are used in the CaD core to manipulate resources within packages.
- Similar to packages, functions are stored in repositories. Some repositories (such as OCI) are more suitable for storing functions than others (such as Git).
- Function discovery will be aided by metadata associated with the function by which the function can advertise which resources it acts on, whether the function is idempotent or not, whether it is a mutator or validator, etc.
- Function repositories can be registered and subsequently, user can discover functions from the registered repositories and use them as follows:
Function can be:
- applied imperatively to a package draft to perform specific mutation to the package’s resources or meta-resources
(
Kptfile
etc.) - registered in the package’s
Kptfile
function pipeline as a mutator or validator in order to be automatically run as part of package rendering - registered at the repository level as mutator or validator. Such function then applies to all packages in the repository and is evaluated whenever a change to a package in the repository occurs.
Package Orchestration - Porch
Having established the context of the CaD Core components and the overall architecture, the remainder of the document will focus on Porch - Package Orchestration service.
To reiterate the role of Package Orchestration service among the CaD Core components, it is:
- Repository Management
- Package Discovery
- Package Authoring and Lifecycle
In the following section we’ll expand more on each of these areas. The term client used in these sections can be either a person interacting with the UI such as a web application or a command-line tool, or an automated agent or process.
Repository Management
The repository management functionality of Package Orchestration service enables the client to:
- register, unregister, update registration of repositories, and discover registered repositories. Git repository integration will be available first, with OCI and possibly more delivered in the subsequent releases.
- manage repository-wide upstream/downstream relationships, i.e. designate default upstream repository from which packages will be cloned.
- annotate repository with metadata such as whether repository contains deployment ready packages or not; metadata can be application or customer specific
- define and enforce package invariants (guardrails) at the repository level, by registering mutator and/or validator functions with the repository; those registered functions will be applied to packages in the repository to enforce invariants
Package Discovery
The package discovery functionality of Package Orchestration service enables the client to:
- browse packages in a repository
- discover configuration packages in registered repositories and sort/filter based on the repository containing the package, package metadata, version, package lifecycle stage (draft, proposed, published)
- retrieve resources and metadata of an individual package, including latest version or any specific version or draft of a package, for the purpose of introspection of a single package or for comparison of contents of multiple versions of a package, or related packages
- enumerate upstream packages available for creating (cloning) a downstream package
- identify downstream packages that need to be upgraded after a change is made to an upstream package
- identify all deployment-ready packages in a deployment repository that are ready to be synced to a deployment target by Config Sync
- identify new versions of packages in a deployment repository that can be rolled out to a deployment target by Config Sync
- discover functions in registered repositories based on filtering criteria including containing repository, applicability of a function to a specific package or specific resource type(s), function metadata (mutator/validator), idempotency (function is idempotent/not), etc.
Package Authoring
The package authoring and lifecycle functionality of the package Orchestration service enables the client to:
-
Create a package draft via one of the following means:
- an empty draft ‘from scratch’ (equivalent to kpt pkg init)
- clone of an upstream package (equivalent to kpt pkg get) from either a registered upstream repository or from another accessible, unregistered, repository
- edit an existing package (similar to the CLI command(s) kpt fn source or kpt pkg pull)
- roll back / restore a package to any of its previous versions ( kpt pkg pull of a previous version)
-
Apply changes to a package draft. In general, mutations include adding/modifying/deleting any part of the package’s contents. Some specific examples include:
- add/change/delete package metadata (i.e. some properties in the
Kptfile
) - add/change/delete resources in the package
- add function mutators/validators to the package’s pipeline
- invoke a function imperatively on the package draft to perform a desired mutation
- add/change/delete sub-package
- retrieve the contents of the package for arbitrary client-side mutations (equivalent to kpt fn source)
- update/replace the package contents with new contents, for example results of a client-side mutations by a UI (equivalent to kpt fn sink)
- add/change/delete package metadata (i.e. some properties in the
-
Rebase a package onto another upstream base package ( detail) or onto a newer version of the same package (to aid with conflict resolution during the process of publishing a draft package)
-
Get feedback during package authoring, and assistance in recovery from:
- merge conflicts, invalid package changes, guardrail violations
- compliance of the drafted package with repository-wide invariants and guardrails
-
Propose for a draft package be published.
-
Apply an arbitrary decision criteria, and by a manual or automated action, approve (or reject) proposal of a draft package to be published.
-
Perform bulk operations such as:
- Assisted/automated update (upgrade, rollback) of groups of packages matching specific criteria (i.e. base package has new version or specific base package version has a vulnerability and should be rolled back)
- Proposed change validation (pre-validating change that adds a validator function to a base package or a repository)
-
Delete an existing package.
Authoring & Latency
An important goal of the Package Orchestration service is to support building of task-specific UIs. In order to deliver low latency user experience acceptable to UI interactions, the innermost authoring loop (depicted below) will require:
- high performance access to the package store (load/save package) w/ caching
- low latency execution of mutations and transformations on the package contents
- low latency KRM function evaluation and package rendering (evaluation of package’s function pipelines)
Authoring & Access Control
A client can assign actors (persons, service accounts) to roles that determine which operations they are allowed to perform in order to satisfy requirements of the basic roles. For example, only permitted roles can:
- manipulate repository registration, enforcement of repository-wide invariants and guardrails
- create a draft of a package and propose the draft be published
- approve (or reject) the proposal to publish a draft package
- clone a package from a specific upstream repository
- perform bulk operations such as rollout upgrade of downstream packages, including rollouts across multiple downstream repositories
- etc.
Porch Architecture
The Package Orchestration service, Porch is designed to be hosted in a Kubernetes cluster.
The overall architecture is shown below, and includes also existing components (k8s apiserver and Config Sync).
In addition to satisfying requirements highlighted above, the focus of the architecture was to:
- establish clear components and interfaces
- support a low-latency package authoring experience required by the UIs
The Porch components are:
Porch Server
The Porch server is implemented as Kubernetes extension API server. The benefits of using Kubernetes extension API server are:
- well-defined and familiar API style
- availability of generated clients
- integration with existing Kubernetes ecosystem and tools such as
kubectl
CLI, RBAC - avoids requirement to open another network port to access a separate endpoint running inside k8s cluster (this is a distinct advantage over gRPC which we considered as an alternative approach)
Resources implemented by Porch include:
PackageRevision
- represents the metadata of the configuration package revision stored in a package repository.PackageRevisionResources
- represents the contents of the package revisionFunction
- represents a KRM function discovered in a registered function repository.
Note that each configuration package revision is represented by a pair of resources which each present a different view (or representation of the same underlying package revision.
Repository registration is supported by a Repository
custom resource.
Porch server itself comprises several key components, including:
- The Porch aggregated apiserver which implements the integration into the main Kubernetes apiserver, and directly
serves API requests for the
PackageRevision
,PackageRevisionResources
andFunction
resources. - Package orchestration engine which implements the package lifecycle operations, and package mutation workflows
- CaD Library which implements specific package manipulation algorithms such as package rendering (evaluation of
package’s function pipeline), initialization of a new package, etc. The CaD Library is shared with
kpt
where it likewise provides the core package manipulation algorithms. - Package cache which enables both local caching, as well as abstract manipulation of packages and their contents irrespectively of the underlying storage mechanism (Git, or OCI)
- Repository adapters for Git and OCI which implement the specific logic of interacting with those types of package repositories.
- Function runtime which implements support for evaluating kpt functions and multi-tier cache of functions to support low latency function evaluation
Function Runner
Function runner is a separate service responsible for evaluating kpt functions. Function runner exposes a gRPC endpoint which enables evaluating a kpt function on the provided configuration package.
The gRPC technology was chosen for the function runner service because the requirements that informed choice of KRM API for the Package Orchestration service do not apply. The function runner is an internal microservice, an implementation detail not exposed to external callers. This makes gRPC perfectly suitable.
The function runner also maintains cache of functions to support low latency function evaluation.
CaD Library
The kpt CLI already implements foundational package manipulation algorithms in order to provide the command line user experience, including:
- kpt pkg init - create an empty, valid, KRM package
- kpt pkg get - create a downstream package by cloning an upstream package; set up the upstream reference of the downstream package
- kpt pkg update - update the downstream package with changes from new version of upstream, 3-way merge
- kpt fn eval - evaluate a kpt function on a package
- kpt fn render - render the package by executing the function pipeline of the package and its nested packages
-
kpt fn source and
kpt fn sink -
read package from local disk as a
ResourceList
and write package represented asResourcesList
into local disk
The same set of primitives form the foundational building blocks of the package orchestration service. Further, the package orchestration service combines these primitives into higher-level operations (for example, package orchestrator renders packages automatically on changes, future versions will support bulk operations such as upgrade of multiple packages, etc).
The implementation of the package manipulation primitives in kpt was refactored (with initial refactoring completed, and more to be performed as needed) in order to:
- create a reusable CaD library, usable by both kpt CLI and Package Orchestration service
- create abstractions for dependencies which differ between CLI and Porch, most notable are dependency on Docker for function evaluation, and dependency on the local file system for package rendering.
Over time, the CaD Library will provide the package manipulation primitives:
-
create a valid empty package (init)
-
update package upstream pointers (get)
-
perform 3-way merge (update)
-
render - core package rendering algorithm using a pluggable function evaluator to support:
- function evaluation via Docker (used by kpt CLI)
- function evaluation via an RPC to a service or appropriate function sandbox
- high-performance evaluation of trusted, built-in, functions without sandbox
-
heal configuration (restore comments after lossy transformation)
and both kpt CLI and Porch will consume the library. This approach will allow leveraging the investment already made into the high quality package manipulation primitives, and enable functional parity between KPT CLI and Package Orchestration service.
User Guide
Find the Porch User Guide in a dedicated document.
Open Issues/Questions
Deployment Rollouts & Orchestration
Not Yet Resolved
Cross-cluster rollouts and orchestration of deployment activity. For example, package deployed by Config Sync in cluster A, and only on success, the same (or a different) package deployed by Config Sync in cluster B.
Alternatives Considered
gRPC API
We considered the use of gRPC for the Porch API. The primary advantages of implementing Porch as an extension Kubernetes apiserver are:
- customers won’t have to open another port to their Kubernetes cluster and can reuse their existing infrastructure
- customers can likewise reuse existing, familiar, Kubernetes tooling ecosystem