Skip to content

Commit

Permalink
Merge pull request #279 from polycube-network/frisso-docs
Browse files Browse the repository at this point in the history
Improved docs
  • Loading branch information
acloudiator committed Mar 4, 2020
2 parents d65c5a4 + 37c1eed commit 9b03a6c
Show file tree
Hide file tree
Showing 34 changed files with 671 additions and 611 deletions.
6 changes: 6 additions & 0 deletions Documentation/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,12 @@ cd Documentation
pip install -r requirements.txt
```

### Edit it

Documentation is created in the ReSTructured text format.
A nice document listing important commands is the [Restructured Text (reST) and Sphinx CheatSheet](https://thomas-cokelaer.info/tutorials/sphinx/rest_syntax.html).


### Build it

```
Expand Down
9 changes: 0 additions & 9 deletions Documentation/components/index.rst

This file was deleted.

10 changes: 0 additions & 10 deletions Documentation/components/iptables/architecture.rst

This file was deleted.

23 changes: 19 additions & 4 deletions Documentation/components/iptables/pcn-iptables.rst
Original file line number Diff line number Diff line change
Expand Up @@ -61,8 +61,8 @@ Prerequisites
pcn-iptables comes as a component of polycube framework.
Refer to :doc:`polycube install guide<../../../installation>` for dependencies, kernel requirements and basic checkout and install guide.

Install Steps
^^^^^^^^^^^^^
Install
^^^^^^^

To compile and install ``pcn-iptables``, you should enable the ``ENABLE_PCN_IPTABLES`` flag in the polycube CMakeFile, which is set to ``OFF`` by default;
this allows to compile the customized version of ``iptables`` used to translate commands, and install in the system pcn-iptables-init pcn-iptables and pcn-iptables-clean utils.
Expand Down Expand Up @@ -160,14 +160,29 @@ Limitations
pcn-iptables components
-----------------------

``pcn-iptables`` is composed by three main components:

1. ``pcn-iptables`` service (``src/services/pcn-iptables``): a Polycube service, a special one since performs some extra work, but basically expose its API and CLI, according to Polycube standard.

iptables submodule
^^^^^^^^^^^^^^^^^^

A customized fork of iptables is included as submodule under :scm_web:`src/components/iptables/iptables <src/components/iptables>`.
We customized this version of iptables in order not to inject iptables command into netfilter, but convert them, after a validation step, into polycube syntax.
This modified version of iptables is in charge of validate commands, translate them from iptables to polycube syntax, then forward them to pcn-iptables service instead of pushing them into the kernel via netfilter.

scripts folder
^^^^^^^^^^^^^^

Scripts are used as a glue logic to make pcn-iptables run. Main purpose is initialize, cleanup and run pcn-iptables, pass pcn-iptables parameters through iptables (in charge of converting them), then pass converted commands to pcn-iptables service.
Scripts are installed under ``/usr/local/bin``.
Scripts are installed under ``/usr/local/bin``.

pcn-iptables components
-----------------------

``pcn-iptables`` is composed by three main components:

1. ``pcn-iptables`` service (``src/services/pcn-iptables``): a Polycube service that is especially tailored to work with the ``pcn-iptables`` executable; as usual, it exposes its API and CLI according to Polycube standard.

2. ``iptables*`` (``src/components/iptables/iptables``): a modified version of iptables, in charge of validate commands, translate them from iptables to polycube syntax, then forward them to pcn-iptables service instead of push them into the kernel via netfilter.

3. ``scripts`` (``src/components/iptables/scripts``): this is a folder containing some glue logic and scripts to initialize, cleanup and use ``pcn-iptables``. ``pcn-iptables`` itself is a script that forwards commands to ``iptables*`` (2), then forwards the translated command to ``pcn-iptables`` (1). Scripts are installed under ``/usr/local/bin``.
181 changes: 174 additions & 7 deletions Documentation/components/k8s/developers.rst
Original file line number Diff line number Diff line change
@@ -1,5 +1,177 @@
pcn-k8s Developers
==================
Information for developers
==========================

Controllers
-----------

Controllers are entities that are in charge of providing you with the resource that you need, as well as watch for events and notify when one has occurred.
In Polycube, five controllers are implemented:

- ``Kubernetes Network Policies``
- ``Polycube Network Policies``
- ``Services``
- ``Namespaces``
- ``Pods``

Not all of them provide the same functionalities and filtering criteria, but all work based on the same principle.


Usage
^^^^^

The usage is inspired by Kubernetes' API style.
To use the controllers, you simply need to import the ``pcn_controllers`` package and call the controller you'd like to use.
Take a look at the following examples.

.. code-block:: go
package main
import (
// importing controllers
pcn_controllers "github.com/polycube-network/polycube/src/components/k8s/pcn_k8s/controllers"
)
func main() {
// Namespaces
namespaces, err := pcn_controllers.Namespaces().List(...)
// Pods
unsubscriptor, err := pcn_controllers.Namespaces().Subscribe(...)
// etc...
}
Queries
^^^^^^^

All controllers can retrieve resources from the Kubernetes cache, based on some criteria.
To define criteria, you must define the query: the definition is in package ``pcn_types``:

.. code-block:: go
// ObjectQuery is a struct that specifies how the object should be found
type ObjectQuery struct {
By string
Name string
Labels map[string]string
}
Take a look at the following examples:

.. code-block:: go
// I want resources that are named "my-service"
serviceQuery := pcn_types.ObjectQuery {
By: "name",
Name: "my-service",
}
// I want all pods that have labels "app: my-app", and "role: database"
podQuery := pcn_types.ObjectQuery {
By: "labels",
Labels: map[string]string {
"app": "my-app",
"role": "database",
}
Although you can create these by hand, a convenient function exists to do this and it is specifically made for use with the controllers:

.. code-block:: go
import (
"github.com/polycube-network/polycube/src/components/k8s/utils"
)
// ...
// Build a "by: name" query
serviceQuery := utils.BuildQuery("my-service", nil)
// Build a "by: labels" query
podQuery := utils.BuildQuery("my-service", map[string]string {
"app": "my-app",
"role": "database",
})
// Build a query to get all resources, regardless of name and labels
allResources := utils.BuildQuery("", nil)
This function returns a **pointer** to the actual query structure because that's what controllers need. When wanting to get all resources, the function returns nil, so you may even just use a nil value without calling the BuildQuery function.


List resources
^^^^^^^^^^^^^^

To list resources, you need to first create the queries, and then call the **List** function of the controller.
Not all controllers support both name and label criteria: i.e. the Pod Controller only supports labels.

.. code-block:: go
// I want all services that apply to pods with labels "app: my-app" and "role: db"
// and are on a namespace called "production"
// So, first create the queries for both the service and namespace.
serviceQuery := utils.BuildQuery(nil, map[string]string {
"app": "my-app",
"role": "db",
})
nsQuery := utils.BuildQuery("production", nil)
// Then, get them. Note: there might be more than one service which applies to those pods.
servicesList, err := pcn_controllers.Services().List(serviceQuery, nsQuery)
if err != nil {
return
}
for _, service := range servicesList {
// Do something with this service...
}
So, usually, the first argument is criteria about the resource, while the second is reserved for criteria about the namespace where you want to find such resources.

To give additional information:

- The ``Kubernetes Network Policies`` and ``Polycube Network Policies`` controllers only support querying the policy by name
- The ``Pod`` controller only supports querying by labels
- The ``Pod`` controller also supports a third argument for the node where you want this pod to be located.
- The ``Services`` controller supports both name and labels, but when using labels it searches for them in the **spec.selector** field, not those under its metadata.
- The ``Namespaces`` controller work with namespaces, which cannot belong to other resources and only want one argument.

Note that, according to the criteria, it may take you a long time to get the results. Whenever possible, or when you expect a query to return lots of resources, adopt an async pattern or use multiple goroutines.


Watch for events
^^^^^^^^^^^^^^^^

To watch for events, you need to use a controller's ``Subscribe`` function by passing to it the event type you want to monitor, the resource criteria, and the function to be executed when that event is detected.

.. code-block:: go
func firstfunc() {
// I want to "myfunc" to be notified whenever a new pod is born.
// Pod controller has the most complex subscribe function, as it also asks you for the phase of the pod.
unsub, err := pcn_controllers.Pods().Subscribe(pcn_types.New, nil, nil, &pcn_types.ObjectQuery{Name: "node-name"}, pcn_types.PodRunning, myfunc)
// ...
// I am not interested in that event anymore
unsub()
}
func myfunc(currentState, previousState *core_v1.Pod) {
// Do something with it...
}
As the above example shows, the ``Subscribe`` function returns a pointer to a function that you need to call when you're not interested in that event anymore.

The function to execute must always have two arguments: the current state of the object and its previous state. There are three event types: ``New``, ``Update``, ``Delete``.

Just some heads up:

- When monitoring ``New`` events, only the current state of the object is present, the previous is obviously always ``nil``.
- When monitoring ``Delete`` events, the object does not exist anymore, so the current state is always ``nil``.

All the ``Subscribe`` functions share a similar structure to the ``List`` function in the same controller, to make sure about their usage, check their definitions in the ``pcn_controllers`` package


Creating the Docker Images
--------------------------
Expand All @@ -12,8 +184,3 @@ Docker 18.06 is needed to build the images, and the daemon has to be started wit
export DOCKER_BUILDKIT=1 # flag needed to enable the --mount option
docker build --build-arg DEFAULT_MODE=pcn-k8s -t name:tag .
docker push name:tag


Networking policy controller
----------------------------
Refer to :doc:`Controller development <polycube_controllers>`.
11 changes: 11 additions & 0 deletions Documentation/components/k8s/index.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
pcn-k8s: a network provider for kubernetes
==========================================

.. toctree::
:maxdepth: 3
:caption: Contents:

pcn-kubernetes
kubernetes-network-policies
polycube-network-policies
developers

0 comments on commit 9b03a6c

Please sign in to comment.