Generating Manifests and Metadata

This document describes how to manage packaging and shipping your Operator in the following stages:

  • Generate your first release - encapsulate the metadata needed to install your Operator with the Operator Lifecycle Manager and configure the permissions it needs from the generated SDK files.
  • Update your Operator - apply any updates to Operator manifests made during development.
  • Upgrade your Operator - carry over any customizations you have made and ensure a rolling update to the next version of your Operator.

Overview

Several operator-sdk subcommands manage operator-framework manifests and metadata, in particular ClusterServiceVersion’s (CSVs), for an Operator: generate bundle and generate kustomize manifests. See this CLI overview for details on each command.

Note: The packagemanifests format is deprecated and support will be removed in operator-sdk v2.0.0.

Kustomize files

operator-sdk generate kustomize manifests generates a CSV kustomize base config/manifests/bases/<project-name>.clusterserviceversion.yaml and a config/manifests/bases/kustomization.yaml by default. These files are required as kustomize build input in downstream commands.

By default, the command starts an interactive prompt if a CSV base in config/manifests/bases is not present to collect UI metadata. You can disable the interactive prompt by passing --kustomize=false.

  1. $ operator-sdk generate kustomize manifests
  2. INFO[0000] Generating CSV manifest version 0.1.0
  3. Display name for the operator (required):
  4. > memcached
  5. Comma-separated list of keywords for your operator (required):
  6. > app, operator
  7. ...

Once this base is written, you may modify any of the fields labeled user in the fields section below. These values will persist when generating a bundle, so make necessary metadata changes here and not the generated bundle.

For Go Operators only: the command parses CSV markers from Go API type definitions, located in ./api for single group projects and ./apis for multigroup projects, to populate certain CSV fields. You can set an alternative path to the API types root directory with --apis-dir. These markers are not available to Ansible or Helm project types.

ClusterServiceVersion manifests

CSV’s are manifests that define all aspects of an Operator, from what CustomResourceDefinitions (CRDs) it uses to metadata describing the Operator’s maintainers. They are typically versioned by semver, much like Operator projects themselves; this version is present in both their metadata.name and spec.version fields. The CSV generator called by generate <bundle|packagemanifests> requires certain input manifests to construct a CSV manifest; all inputs are read when either command is invoked, along with a CSV’s base, to idempotently regenerate a CSV.

The following resource kinds are typically included in a CSV, which are addressed by config/manifests/bases/kustomization.yaml:

  • Role: define Operator permissions within a namespace.
  • ClusterRole: define cluster-wide Operator permissions.
  • Deployment: define how the Operator’s operand is run in pods.
  • ValidatingWebhookConfiguration, MutatingWebhookConfiguration: configures webhooks for your manager to handle.
  • CustomResourceDefinition: definitions of custom objects your Operator reconciles.
  • Custom resource examples: examples of objects adhering to the spec of a particular CRD.

You can optionally specify an input ClusterServiceVersion manifest to the set of manifests passed to these generate subcommands instead of having them read from the base path. This is advantageous for those who would like to take full advantage of kustomize for their base. All fields unlabeled or labeled with marker below will be overwritten by these command, so make sure you do not kustomize build those fields!

Webhooks

A CSV allows you to define both admission and conversion webhooks at spec.webhookdefinitions. The generate <bundle|packagemanifests> commands, described below, will automatically add webhooks to your CSV if the following holds true:

  1. A webhook configuration must be associated with a Service by name and namespace, whether in a CRD or in a *WebhookConfiguration file,
  2. The associated Service must expose one spec.ports[*].targetPort that matches both containerPort and protocol of one element in the Operator Deployment‘s spec.template.spec.containers[*].ports.

By default, the manager’s Deployment is configured to mount a volume containing TLS cert data created by [cert-manager][cert-manager] into the manager’s container. OLM does not yet support cert-manager, so a JSON patch was added to remove this volume and mount such that OLM can itself create and manage certs for your Operator.

Note (for Go Operators only): If targeting OLM < v0.17.0, the manager’s default webhook server is not configured with the correct cert/key paths; the correct path is /apiserver.local.config/certificates/apiserver.{cert,key}. To cover this case, make the following changes to your main.go:

  1. import (
  2. ...
  3. ctrl "sigs.k8s.io/controller-runtime"
  4. "sigs.k8s.io/controller-runtime/pkg/webhook"
  5. )
  6. func main() {
  7. ...
  8. // Configure a webhook.Server with the correct path and file names.
  9. // If webhookServer is nil, which will be the case of OLM >= 0.17 is available,
  10. // the manager will create a server for you using Host, Port,
  11. // and the default CertDir, KeyName, and CertName.
  12. var webhookServer *webhook.Server
  13. const legacyOLMCertDir = "/apiserver.local.config/certificates"
  14. if info, err := os.Stat(legacyOLMCertDir); err == nil && info.IsDir() {
  15. webhookServer = &webhook.Server{
  16. Host: <some host>, // Set this only if normally set in ctrl.Options below.
  17. Port: <some port>, // Set this only if normally set in ctrl.Options below.
  18. CertDir: legacyOLMCertDir,
  19. CertName: "apiserver.crt",
  20. KeyName: "apiserver.key",
  21. }
  22. }
  23. mgr, err := ctrl.NewManager(ctrl.GetConfigOrDie(), ctrl.Options{
  24. Host: <some host>,
  25. Port: <some port>,
  26. WebhookServer: webhookServer, // Host/Port will not be used if webhookServer is nil.
  27. })
  28. // Now you can register webhooks.
  29. ...
  30. }

Note: The Service itself will still be placed into the manifests/ directory, in case other Operator resources require routing. Feel free to remove it otherwise.

Generate your first release

You’ve recently run operator-sdk init and created your APIs with operator-sdk create api. Now you’d like to package your Operator for deployment by OLM. Your Operator is at version v0.0.1; the Makefile variable VERSION should be set to 0.0.1. You’ve also built your operator image, example.com/memcached-operator:v0.0.1; if this image tag does not match yours, swap in the correct one in the docs below.

Bundle format

A bundle consists of manifests (CSV, CRDs, and other supported kinds) and metadata that define an Operator at a particular version, and an optional scorecard configuration file. You may have also heard of a bundle image. From the bundle docs:

An Operator Bundle is built as a scratch (non-runnable) container image that contains operator manifests and specific metadata in designated directories inside the image. Then, it can be pushed and pulled from an OCI-compliant container registry. Ultimately, an operator bundle will be used by Operator Registry and OLM to install an operator in OLM-enabled clusters.

At this stage in your Operator’s development, we only need to worry about generating bundle files; bundle images become important once you’re ready to publish your Operator.

SDK projects are scaffolded with a Makefile containing the bundle recipe by default, which wraps generate kustomize manifests, generate bundle, and other related commands.

By default make bundle will generate a CSV, copy CRDs and other supported kinds, generate metadata, and add your scorecard configuration in the bundle format:

  1. $ make bundle
  2. $ tree ./bundle
  3. ./bundle
  4. ├── manifests
  5. ├── cache.example.com_memcacheds.yaml
  6. ├── memcached-operator.clusterserviceversion.yaml
  7. ├── memcached-operator-controller-manager-metrics-monitor_monitoring.coreos.com_v1_servicemonitor.yaml
  8. ├── memcached-operator-controller-manager-metrics-service_v1_service.yaml
  9. ├── memcached-operator-metrics-reader_rbac.authorization.k8s.io_v1beta1_clusterrole.yaml
  10. └── memcached-operator-webhook-service_v1_service.yaml
  11. ├── metadata
  12. └── annotations.yaml
  13. └── tests
  14. └── scorecard
  15. └── config.yaml

Important: bundle generation is supposed to be idempotent, so any changes to CSV fields able to be persisted (marked (user) or (marker) below) must be made to the base set of manifests, typically found in config/.

Bundle metadata in bundle/metadata/annotations.yaml contains information about a particular Operator version available in a registry. OLM uses this information to install specific Operator versions and resolve dependencies. That file and bundle.Dockerfile contain the same annotations, the latter as LABELs, which do not need to be modified in most cases; if you do decide to modify them, both sets of annotations must be the same to ensure consistent Operator deployment.

Channels

Metadata for each bundle contains channel information as well:

Channels allow package authors to write different upgrade paths for different users (e.g. beta vs. stable).

Channels become important when publishing, but we should still be aware of them beforehand as they’re required values in our metadata. make bundle writes the channel alpha by default.

Validation

The bundle recipe includes a call to operator-sdk bundle validate, which runs a set of required object validators on your bundle that ensure both its format and content meet the bundle specification. These will always be run and cannot be disabled.

You may also have added CSV fields containing useful UI metadata for cluster console display, and want to ensure that metadata matches some hosted catalog’s submission requirements. The bundle validate command supports optional validators that can validate these bundle metadata. These validators are disabled by default, and can be selectively enabled with --select-optional <label-selector>. You can list all available optional validators by setting the --list-optional flag:

  1. $ operator-sdk bundle validate --list-optional
  2. NAME LABELS DESCRIPTION
  3. operatorhub name=operatorhub OperatorHub.io metadata validation.
  4. suite=operatorframework
  5. community name=community (stage: alpha) Community Operator bundle validation
  6. ...

For example, you want to turn on the operatorhub validator shown above so you can publish the 0.0.1 operator you recently created on OperatorHub.io. To do so, you can modify your Makefile’s bundle recipe to validate any further changes you make to bundle UI metadata related to OperatorHub requirements:

  1. bundle: ...
  2. ...
  3. operator-sdk bundle validate ./bundle --select-optional name=operatorhub

Also, see that you can test the bundle against the suite of test to ensure it against all criteria:

  1. operator-sdk bundle validate ./bundle --select-optional suite=operatorframework

Note: The OperatorHub.io validator in the operatorframework optional suite allows you to validate that your manifests can work with a Kubernetes cluster of a particular version using the k8s-version optional key value:

  1. operator-sdk bundle validate ./bundle --select-optional suite=operatorframework --optional-values=k8s-version=1.22

Documentation on optional validators:

Note: (stage: alpha) The Community validator allows you to validate your bundle.Dockerfile configuration against its specific criteria using the image-path optional key value:

  1. operator-sdk bundle validate ./bundle --select-optional name=community --optional-values=image-path=bundle.Dockerfile

Package manifests format

A [package manifests][package-manifests] format consists of on-disk manifests (CSV, CRDs and other supported kinds) and metadata that define an Operator at all versions of that Operator. Each version is contained in its own directory, with a parent package manifest YAML file containing channel-to-version mappings, much like a bundle’s metadata.

If your Operator is already formatted as a package manifests and you do not wish to migrate to the bundle format yet, you should add the following to your Makefile to make development easier:

For Go-based Operator projects

  1. # Options for "packagemanifests".
  2. ifneq ($(origin FROM_VERSION), undefined)
  3. PKG_FROM_VERSION := --from-version=$(FROM_VERSION)
  4. endif
  5. ifneq ($(origin CHANNEL), undefined)
  6. PKG_CHANNELS := --channel=$(CHANNEL)
  7. endif
  8. ifeq ($(IS_CHANNEL_DEFAULT), 1)
  9. PKG_IS_DEFAULT_CHANNEL := --default-channel
  10. endif
  11. PKG_MAN_OPTS ?= $(PKG_FROM_VERSION) $(PKG_CHANNELS) $(PKG_IS_DEFAULT_CHANNEL)
  12. # Generate package manifests.
  13. packagemanifests: kustomize manifests
  14. operator-sdk generate kustomize manifests -q
  15. cd config/manager && $(KUSTOMIZE) edit set image controller=$(IMG)
  16. $(KUSTOMIZE) build config/manifests | operator-sdk generate packagemanifests -q --version $(VERSION) $(PKG_MAN_OPTS)

For Helm/Ansible-based Operator projects

  1. # Options for "packagemanifests".
  2. ifneq ($(origin FROM_VERSION), undefined)
  3. PKG_FROM_VERSION := --from-version=$(FROM_VERSION)
  4. endif
  5. ifneq ($(origin CHANNEL), undefined)
  6. PKG_CHANNELS := --channel=$(CHANNEL)
  7. endif
  8. ifeq ($(IS_CHANNEL_DEFAULT), 1)
  9. PKG_IS_DEFAULT_CHANNEL := --default-channel
  10. endif
  11. PKG_MAN_OPTS ?= $(PKG_FROM_VERSION) $(PKG_CHANNELS) $(PKG_IS_DEFAULT_CHANNEL)
  12. # Generate package manifests.
  13. packagemanifests: kustomize
  14. operator-sdk generate kustomize manifests -q
  15. cd config/manager && $(KUSTOMIZE) edit set image controller=$(IMG)
  16. $(KUSTOMIZE) build config/manifests | operator-sdk generate packagemanifests -q --version $(VERSION) $(PKG_MAN_OPTS)

By default make packagemanifests will generate a CSV, a package manifest file, and copy CRDs in the package manifests format:

  1. $ make packagemanifests IMG=example.com/memcached-operator:v0.0.1
  2. $ tree ./packagemanifests
  3. ./packagemanifests
  4. ├── 0.0.1
  5. ├── cache.my.domain_memcacheds.yaml
  6. └── memcached-operator.clusterserviceversion.yaml
  7. └── memcached-operator.package.yaml

Update your Operator

Let’s say you added a new API App with group app and version v1alpha1 to your Operator project, and added a port to your manager Deployment in config/manager/manager.yaml.

If using a bundle format, the current version of your CSV can be updated by running:

  1. $ make bundle IMG=example.com/memcached-operator:v0.0.1

If using a package manifests format, run:

  1. $ make packagemanifests IMG=example.com/memcached-operator:v0.0.1

Running the command for either format will append your new CRD to spec.customresourcedefinitions.owned, replace the old data at spec.install.spec.deployments with your updated Deployment, and update your existing CSV manifest. The SDK will not overwrite user-defined fields like spec.maintainers.

Upgrade your Operator

Let’s say you’re upgrading your Operator to version v0.0.2, you’ve already updated the VERSION variable in your Makefile to 0.0.2, and built a new operator image example.com/memcached-operator:v0.0.2. You also want to add a new channel beta, and use it as the default channel.

First, update spec.replaces in your base CSV manifest to the current CSV name. In this case, the change would look like:

  1. spec:
  2. ...
  3. replaces: memcached-operator.v0.0.1

Next, upgrade your bundle. If using a bundle format, a new version of your CSV can be created by running:

  1. $ make bundle CHANNELS=beta DEFAULT_CHANNEL=beta IMG=example.com/memcached-operator:v0.0.2

If using a package manifests format, run:

  1. $ make packagemanifests FROM_VERSION=0.0.1 CHANNEL=beta IS_CHANNEL_DEFAULT=1 IMG=example.com/memcached-operator:v0.0.2

Running the command for either format will persist user-defined fields, and updates spec.version and metadata.name.

For packagemanifests only The command will also populate spec.replaces with the old CSV version’s name.

CSV fields

Below are two lists of fields: the first is a list of all fields the SDK and OLM expect in a CSV, and the second are optional.

For Go Operators only: Several fields require user input (labeled user) or a CSV marker (labeled marker). This list may change as the SDK becomes better at generating CSV’s. These markers are not available to Ansible or Helm project types.

Required:

  • metadata.name _(user*)_: a *unique* name for this CSV of the format <project-name>.vX.Y.Z, ex. app-operator.v0.0.1.
  • spec.displayName (user) : a name to display for the Operator in Operator Hub.
  • spec.version _(user*)_: semantic version of the Operator, ex. 0.0.1.
  • spec.installModes (user): what mode of installation namespacing OLM should use. Currently all but MultiNamespace are supported by SDK Operators.
  • spec.customresourcedefinitions: any CRDs the Operator uses. Certain fields in elements of owned will be filled by the SDK.
    • owned: all CRDs the Operator deploys itself from it’s bundle.
      • name: CRD’s metadata.name.
      • kind: CRD’s spec.names.kind.
      • version: CRD’s spec.version.
      • description (marker) : description of the CRD.
      • displayName (marker) : display name of the CRD.
      • resources (marker) : any Kubernetes resources used by the CRD, ex. Pod‘s and ConfigMap‘s.
      • specDescriptors (marker) : UI hints for inputs and outputs of the Operator’s spec.
      • statusDescriptors (marker) : UI hints for inputs and outputs of the Operator’s status.
      • actionDescriptors (user) : UI hints for an Operator’s in-cluster actions.
    • required (user) : all CRDs the Operator expects to be present in-cluster, if any. All required element fields must be populated manually.

Optional:

  • spec.description (user) : a thorough description of the Operator’s functionality.
  • spec.keywords (user) : a list of keywords describing the Operator.
  • spec.maintainers (user) : a list of human or organizational entities maintaining the Operator, with a name and email.
  • spec.provider (user) : the Operator provider, with a name; usually an organization.
  • spec.labels (user) : a list of key:value pairs to be used by Operator internals.
  • metadata.annotations.alm-examples: CR examples, in JSON string literal format, for your CRD’s. Ideally one per CRD.
  • metadata.annotations.capabilities: level of Operator capability. See the Operator maturity model for a list of valid values.
  • spec.replaces (user): the name of the CSV being replaced by this CSV.
  • spec.links (user) : a list of URL’s to websites, documentation, etc. pertaining to the Operator or application being managed, each with a name and url.
  • spec.selector (user) : selectors by which the Operator can pair resources in a cluster.
  • spec.icon (user) : a base64-encoded icon unique to the Operator, set in a base64data field with a mediatype.
  • spec.maturity (user): the Operator’s maturity, ex. alpha.
  • spec.minKubeVersion (user): the minimal Kubernetes version supported by the Operator, ex. 1.16.0.
  • spec.webhookdefinitions: any webhooks the Operator uses.
  • spec.relatedImages (user): a list of image tags containing SHA digests mapped to in-CSV names that your Operator might require to perform their functions.
    • To get the correct tag for an image available in some remote registry, run docker inspect --format='{{range $i, $d := .RepoDigests}}{{$d}}{{"\n"}}{{end}}' and choose the tag for the desired registry.
  • spec.skips (user): the names of one or more CSVs that should be skipped in a catalog’s upgrade graph.

* metadata.name and spec.version will only be automatically updated from the base CSV when you set --version when running generate <bundle|packagemanifests>.

Last modified July 22, 2021: docs/olm-integration/generation.md: fix example Go code to get webhooks working with OLM < 0.17 (#4945) (925f8428)