kOps has the notion of a 'state store'; a location where we store the configuration of your cluster. State is stored here not only when you first create a cluster, but also you can change the state and apply changes to a running cluster.
Eventually, kubernetes services will also pull from the state store, so that we don't need to marshal all our configuration through a channel like user-data. (This is currently done for secrets and SSL keys, for example, though we have to copy the data from the state store to a file where components like kubelet can read them).
The state store uses kOps's VFS implementation, so can in theory be stored anywhere. As of now the following state stores are supported:
- Amazon AWS S3 (
s3://
) - local filesystem (
file://
) (only for dry-run purposes, see note below) - Digital Ocean (
do://
) - MemFS (memfs://)
- Google Cloud (
gs://
) - Kubernetes (
k8s://
) - OpenStack Swift (
swift://
) - Scaleway (
scw://
)
The state store is just files; you can copy the files down and put them into git (or your preferred version control system).
One of the most important files in the state store is the top-level config file. This file stores the main configuration for your cluster (instance types, zones, etc)\
When you run kops create cluster
, we create a state store entry for you based on the command line options you specify.
For example, when you run with --node-size=m4.large
, we actually set a line in the configuration
that looks like NodeMachineType: m4.large
.
The configuration you specify on the command line is actually just a convenient short-cut to
manually editing the configuration. Options you specify on the command line are merged into the existing
configuration. If you want to configure advanced options, or prefer a text-based configuration, you
may prefer to just edit the config file with kops edit cluster
.
Because the configuration is merged, this is how you can just specify the changed arguments when
reconfiguring your cluster - for example just kops create cluster
after a dry-run.
There are a few ways to configure your state store. In priority order:
- command line argument
--state s3://yourstatestore
- environment variable
export KOPS_STATE_STORE=s3://yourstatestore
- config file
$HOME/.kops.yaml
- config file
$HOME/.kops/config
{{ kops_feature_table(kops_added_default='1.17') }}
The local filesystem state store (file://
) is not functional for running clusters. It is permitted so as to enable review workflows.
For example, in a review workflow, it can be desirable to check a set of untrusted changes before they are applied to real infrastructure. If submitted untrusted changes to configuration files are naively run by kops replace
, then kOps would overwrite the state store used by production infrastructure with changes which have not yet been approved. This is dangerous.
Instead, a review workflow may download the contents of the state bucket to a local directory (using aws s3 sync
or similar), set the state store to the local directory (e.g. --state file:///path/to/state/store
), and then run kops replace
and kops update
(but for a dry-run only - not kops update --yes
). This allows the review process to make changes to a local copy of the state bucket, and check those changes, without touching the production state bucket or production infrastructure.
Trying to use a local filesystem state store for real (i.e. kops update --yes
) clusters will not work since the Kubernetes nodes in the cluster need to be able to read from the same state bucket, and the local filesystem will not be mounted to all of the Kubernetes nodes. In theory, a cluster administrator could put the state store on a shared NFS volume that is mounted to the same directory on each of the nodes; however, that use case is not supported as of yet.
$HOME/.kops/config
might look like this:
kops_state_store: s3://yourstatestore
The state store for S3 can be either configured via AWS env variables or directly with custom S3 credentials via env variables. The default for the s3 store is using AWS credentials.
It is possible to set the ACLs for the bucket by setting the env variable KOPS_STATE_S3_ACL
.
Normally configured via AWS environment variables or AWS credentials file. The mechanism used to retrieve the credentials is derived from the AWS SDK as follows:
config = aws.NewConfig().WithRegion(region)
config = config.WithCredentialsChainVerboseErrors(true)
where region is fetched from AWS_REGION
or from ec2 metadata if we're running within EC2. It defaults to us-east-1
.
Your custom s3 state store can be configured by providing S3 environment variables:
S3_ENDPOINT
: your custom endpointS3_REGION
: the region to useS3_ACCESS_KEY_ID
: your access keyS3_SECRET_ACCESS_KEY
: your secret key
The state store can easily be moved to a different s3 bucket. The steps for a single cluster are as follows:
- Recursively copy all files from
${OLD_KOPS_STATE_STORE}/${CLUSTER_NAME}
to${NEW_KOPS_STATE_STORE}/${CLUSTER_NAME}
withaws s3 sync
or a similar tool. - Update the
KOPS_STATE_STORE
environment variable to use the new S3 bucket. - Either run
kops edit cluster ${CLUSTER_NAME}
or edit the cluster manifest yaml file. Update.spec.configBase
to reference the new s3 bucket. - Run
kops update cluster ${CLUSTER_NAME} --yes
to apply the changes to the cluster. Newly launched nodes will now retrieve their dependent files from the new S3 bucket. The files in the old bucket are now safe to be deleted.
Repeat for each cluster needing to be moved.
Many enterprises prefer to run many AWS accounts. In these setups, having a shared cross-account S3 bucket for state may make inventory and management easier. Consider the S3 bucket living in Account B and the kOps cluster living in Account A. In order to achieve this, you first need to let Account A access the s3 bucket. This is done by adding the following bucket policy on the S3 bucket:
{
"Id": "123",
"Version": "2012-10-17",
"Statement": [
{
"Sid": "123",
"Action": [
"s3:*"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::<state-store-bucket>",
"arn:aws:s3:::<state-store-bucket>/*"
],
"Principal": {
"AWS": [
"arn:aws:iam::<account-a>:root"
]
}
}
]
}
kOps will then use that bucket as if it was in the remote account, including creating appropriate IAM policies that limits nodes from doing bad things. Note that any user/role with full S3 access will be able to delete any cluster from the state store, but may not delete any instances or other things outside of S3.
DigitalOcean storage is configured as a flavor of a S3 store.
The swift store can be configured by providing your OpenStack credentials and configuration in environment variables:
OS_AUTH_URL
: the identity endpoint to authenticate againstOS_USERNAME
: the username to useOS_USERID
: the user IDOS_PASSWORD
: the password for the useraccountOS_TENANT_ID
: the tenant idOS_TENANT_NAME
: the tenant nameOS_PROJECT_ID
: the project idOS_PROJECT_NAME
: the project nameOS_DOMAIN_ID
: the domain IDOS_DOMAIN_NAME
: the domain nameOS_APPLICATION_CREDENTIAL_ID
: application credential IDOS_APPLICATION_CREDENTIAL_NAME
: application credential nameOS_APPLICATION_CREDENTIAL_SECRET
: application secret
The mechanism used to retrieve the credentials is derived from the gophercloud OpenStack SDK.
A credentials file with OPENSTACK_CREDENTIAL_FILE
or a config derived from your personal credentials living in $HOME/.openstack/config
can also be used to configure your store.
The state store config for google cloud will be derived by the google storage client SDK as follows:
scope := storage.DevstorageReadWriteScope
httpClient, err := google.DefaultClient(context.Background(), scope)
if err != nil {
return nil, fmt.Errorf("error building GCS HTTP client: %v", err)
}
gcsClient, err := storage.New(httpClient)
Scaleway storage is configured as a flavor of a S3 store. For more information on how to create a bucket with Scaleway, visit this page.