README
ΒΆ
Halkyon Operator: get back to the halcyon days of local development in a modern kubernetes setting!
Table of Contents
- Introduction
- Key concepts
- Pre-requisites
- Installing the Halkyon Operator
- Compatibility matrix
- Support
Introduction
Deploying modern micro-services applications that comply with the 12-factor guidelines to Kubernetes is difficult, mainly due to the host of different and complex Kubernetes Resources involved. In such scenarios developer experience becomes very important.
This projects aims to tackle said complexity and vastly simplify the process of deploying micro-service applications to Kubernetes and get back to the halcyon days of local development! π
By providing several, easy-to-use Kubernetes Custom Resources (CRs) and an Operator to handle them, the Halkyon project provides the following features:
- Install micro-services (
componentsin Halkyon's parlance) utilizingruntimessuch as Spring Boot, Vert.x, Thorntail, Quarkus or Nodejs, serving as base building blocks for your application - Manage the relations between the different components using
linkCR allowing one micro-service for example to consume a REST endpoint provided by another - Deploy various infrastructure services like a database which are bound to a
componentvia thecapabilityCR.
The Halkyon Operator requires Kubernetes >= 1.13 or OpenShift >= 3.11.
Key concepts
An example of a simple, modern application, defined as a collection of micro-services is depicted hereafter

Such an application, though simple, will require several Kubernetes resources in order to be deployed on a Kubernetes cluster. Furthermore several development iterations are usually required to make the application production ready.
The entry point to the application is the fruit-client-sb application. It connects to a backend REST endpoint implemented
by the fruit-backend-sb application. This application, in turns, uses the services of a PostgreSQL database.
In Halkyon parlance, both fruit-client-sb and fruit-backend-sb are components of our application. The PostgreSQL database
is a capability used by the fruit-backend-sb component. Components and capabilities are "glued" together using links.
Halkyon links provides the components or capabilities they link together with the information the respective applications
need to materialize the connection within the remote cluster.
For example, we use a link between fruit-client-sb and fruit-backend-sb to provide fruit-client-sb with the cluster URL
of the fruit-backend-sb so that the client can access the backend endpoint. Similarly, we create a link between the
fruit-backend-sb component and the PostgreSQL database capability, thus providing the component with the database
connection information.
Information about components, links and capabilities are materialized by custom resources in Halkyon. We can create the
manifests for these custom resources which, once processed by the remote cluster, will be handled by the Halkyon operator to
create the appropriate Kubernetes/OpenShift resources for you, so you can focus on your application architecture as opposed to
wondering how it might translate to Kubernetes pods or deployments.
Remark: you can view the full description of the CRs and their API under the project https://github.com/halkyonio/api.
Component
A component represents a micro-service, i.e. part of an application to be deployed. The Component custom resource provides a
simpler to fathom abstraction over what's actually required at the Kubernetes level to deploy and optionally expose the
micro-service outside of the cluster. In fact, when a component is deployed to a Halkyon-enabled cluster, the Halkyon operator
will create these resources:
Deployment,Service,PersistentVolumeClaim,IngressorRouteon OpenShift if the component is exposed.
You can already see how Halkyon reduces the cognitive load on developers since there is no need to worry about the low-level
details by focusing on the salient aspects of your component: what runtime does it need to run, does it need to be exposed outside
of the cluster and on what port. Theses aspects are captured along with less important ones in the custom resource fields:
runtime (and version), exposeService and port. The runtime name will condition which container image will be used to
run the application. Of note, the java-based runtime will use a specific image which allows us to do builds from source as well
as run binaries. For more information about this image, please take a look at
https://github.com/halkyonio/container-images/blob/master/README.md#hal-maven-jdk8-image. If you want to expose your application,
you will need to set exposeService to true and specify which port needs to be exposed.
Of note, Halkyon offers two deployment modes, controlled by the deploymentMode field of the custom resource: dev
(for "development") and build, dev being the default mode if none is specified explicitly.
The dev mode sets the environment in such a way that the pod where your application is
deployed doesn't need to be restarted when the code changes. On the contrary, the pod contains an init container exposing a
server that can listen to commands so that your application executable can be restarted or re-compiled after updates without
needing to restart the whole pod or generate a new container image which allows for faster turn-around.
The build mode uses the Tekton Pipeline Operator in order to build of a new image for your application. How the image is built
is controlled by the buildConfig field of the component custom resource where you need to minimally specify the url of the
git repository to be used as basis for the code (url field). You can also specify the precise git reference to use (ref field)
or where to find the actual code to build within the repository using the contextPath and moduleDirName fields.
For more details on the fields of the Component custom resource, please refer to its API.
Examples:
DeploymentMode: dev
apiVersion: halkyon.io/v1beta1
kind: Component
metadata:
name: spring-boot-demo
spec:
deploymentMode: dev
runtime: spring-boot
version: 2.1.16
exposeService: true
port: 8080
envs:
- name: SPRING_PROFILES_ACTIVE
value: openshift-catalog
DeploymentMode: build
apiVersion: "halkyon.io/v1beta1"
kind: "Component"
metadata:
labels:
app: "fruit-backend-sb"
name: "fruit-backend-sb"
spec:
deploymentMode: "build"
runtime: "spring-boot"
version: "2.1.6.RELEASE"
exposeService: true
buildConfig:
type: "s2i"
url: "https://github.com/halkyonio/operator.git"
ref: "master"
contextPath: "demo/"
moduleDirName: "fruit-backend-sb"
port: 8080
Link
As explained in the introduction, links explicit how components are tied together to create a composite
application. This is done by injecting information in the target component (as identified by the componentName field of the
link custom resource). Under the hood, the Halkyon operator modifies the Deployment associated with the target component
to either add environment variables or secret reference, depending on the type of link. This is controlled, as you might have
guessed π, using the type field of the link CR. This fields currently accepts two possible values: Secret or Env.
A Secret link will use the ref field value to look up a Kubernetes secret while an Env link will use the envs field.
This information will then be used to enrich the container associated with the Deployment according to its type (EnvFrom for
secret injection, Env for environment variable injection).
For more details on the fields of the Link custom resource, please refer to its API.
Examples:
Secret
apiVersion: "halkyon.io/v1beta1"
kind: "Link"
metadata:
name: "link-to-database"
spec:
componentName: "fruit-backend-sb"
type: "Secret"
ref: "postgres-db-config"
Envs
apiVersion: "halkyon.io/v1beta1"
kind: "Link"
metadata:
name: "link-to-fruit-backend"
spec:
componentName: "fruit-client-sb"
type: "Env"
ref: ""
envs:
- name: "ENDPOINT_BACKEND"
value: "http://fruit-backend-sb:8080/api/fruits"
Capability
A capability corresponds to a service that the micro-service will consume on the platform. The Halkyon operator then uses this
information to configure the service. Capabilities are identified by the combination of its category which represents the
general class of configurable services, further identified by a more specific type (which could be construed as a sub-category)
and a version for the category/type combination. The service is then configured using a list of name/value parameters.
We currently only support the database/PostgreSQL category/type combination but are planning to expand to other categories and
types. Halkyon uses the [KubeDB](https://kubedb.com) operator to handle the database category.
For more details on the fields of the Capability custom resource, please refer to its API.
Example:
PostgreSQL Database
apiVersion: "halkyon.io/v1beta1"
kind: "Capability"
metadata:
name: "postgres-db"
spec:
category: "database"
type: "postgres"
version: "10"
parameters:
- name: "DB_USER"
value: "admin"
- name: "DB_PASSWORD"
value: "admin"
- name: "DB_NAME"
value: "sample-db"
Pre-requisites
In order to use the Halkyon Operator and the CRs, the Tekton Pipelines and KubeDB Operators need to be installed on the cluster. We assume that you have installed a cluster with Kubernetes version equals to 1.13 or newer.
Local cluster using minikube
Install using Homebrew on macOS the following software:
brew cask install minikube
brew install kubernetes-cli
brew install kubernetes-helm
Next, create a Kubernetes cluster where ingress and dashboard addons are enabled
minikube config set cpus 4
minikube config set kubernetes-version v1.14.0
minikube config set memory 8000
minikube addons enable ingress
minikube addons enable dashboard
minikube addons enable registry
minikube start
Install Tekton Pipelines:
kubectl apply -f https://storage.googleapis.com/tekton-releases/pipeline/previous/v0.9.1/release.yaml
Install the KubeDB operator and the catalog of the databases using the following bash script as described within the kubedb doc:
kubectl create ns kubedb
curl -fsSL https://raw.githubusercontent.com/kubedb/cli/0.12.0/hack/deploy/kubedb.sh \
| bash -s -- --namespace=kubedb
Note: To remove it, use the following parameters kubedb.sh --namespace=kubedb --uninstall --purge
Installing the Halkyon Operator
Install the Halkyon operator within the operators namespace:
./scripts/halkyon.sh operators install yes
Wait until the Operator's pod is ready and running before continuing:
until kubectl get pods -n operators -l name=halkyon-operator | grep 1/1; do sleep 1; done
Control if the operator is running correctly:
pod_id=$(kubectl get pods -n operators -l name=halkyon-operator -o=name)
kubectl logs $pod_id -n operators
You can also use the operator bundle promoted on operatorhub.io.
Running a new version of the Halkyon operator on an already-setup cluster
Let's assume that you've already installed Halkyon on a cluster (i.e. kubedb and tekton operators are setup and the Halkyon resources are deployed on the cluster) but that you want to build a new version of the operator to, for example, test a bug fix.
The easiest way to do so is to scale down the deployment associated with the operator down to 0 replicas in your cluster. Of course, you need to make sure that no one else is relying on that operator running on the cluster! Assuming the above installation, you can do so by:
kubectl scale --replicas=0 -n operators $(kubectl get deployment -n operators -o name)
You can then compile and run the Halkyon operator locally. This assumes you have set up a Go programming environment, know your way around using Go:
go get halkyon.io/operator
cd $GOPATH/src/halkyon.io/operator
make
You will then want to run the operator locally so that the cluster can call it back when changes are detected to Halkyon resources. You will do so by running the operator watching the specific namespace where you want to test changes. Watching a specific namespace ensures that your locally running instance of the operator doesn't impact users in different namespaces (and also insures that you don't see changes made to resources in other namespaces that you might not be interested in):
WATCH_NAMESPACE=<the name of your namespace here>; go run ./cmd/manager/main.go
Enjoy the Halkyon Operator!
How to play with it
Deploy the operator as defined within the Operator Doc
First create a demo namespace:
kubectl create ns demo
Next, create a component yml file with the following information within your maven java project:
apiVersion: halkyon.io/v1beta1
kind: Component
metadata:
name: spring-boot
spec:
runtime: spring-boot
version: 2.1.6.RELEASE
deploymentMode: dev
port: 8080
Deploy it:
kubectl apply -n demo -f my-component.yml
Verify if the component has been deployed properly:
kubectl get components -n demo
NAME RUNTIME VERSION AGE MODE STATUS MESSAGE REVISION
spring-boot spring-boot 2.1.6.RELEASE 14s dev Pending pod is not ready for component 'spring-boot' in namespace 'demo'
Remark Don't worry about the initial status as downloading the needed images from an external docker registry could take time!
kubectl get components -n demo
NAME RUNTIME VERSION AGE MODE STATUS MESSAGE REVISION
spring-boot spring-boot 2.1.6.RELEASE 36m dev Ready Ready
The Halkyon operator will then use the content of the component custom resource to create the Kubernetes resources needed to
materialize your application on the cluster. You can see all these resources by executing the following command:
kubectl get pods,services,deployments,pvc -n demo
NAME READY STATUS RESTARTS AGE
pod/spring-boot-6d9475f4c-c9w2z 1/1 Running 0 4m18s
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/spring-boot ClusterIP 10.104.75.68 <none> 8080/TCP 4m18s
NAME READY UP-TO-DATE AVAILABLE AGE
deployment.extensions/spring-boot 1/1 1 1 4m18s
NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE
persistentvolumeclaim/m2-data-spring-boot Bound pvc-dab00dfe-a2f6-11e9-98d1-08002798bb5f 1Gi RWO standard 4m18s
Package your Java Application mvn package and push the uber java file.
kubectl cp target/my-component-1.0-SNAPSHOT.jar POD_NAME:/deployments/app.jar -n demo
Remark: You can get the pod name or pod id using this command : kubectl get pods -l component_cr=spring-boot -o name where
you pass as component_cr label, the component name. Remove the pod/ prefix from the name. E.g: pod/spring-boot-747995b4db-hqxhd -> spring-boot-747995b4db-hqxhd
Start your application within the pod
kubectl exec POD_NAME -n demo /var/lib/supervisord/bin/supervisord ctl start run
Important: We invite you to use our Hal companion tool as it will create and push the code source or binary without having to worry about the kubectl command syntax ;-)
Enrich your application with additional Component, Link them or deploy a Capability database using the supported CRs for your different microservices.
To simplify your life even more when developing Java applications, add Dekorate to your project to automatically generate the YAML resources for your favorite runtime !
You can now cleanup the project:
kubectl delete component --all -n demo
A Real demo
To play with a more real-world example and discover the different features currently supported, we have implemented the application
we took as an example in the Key Concepts section. You can find it in the demo directory.
So jump here to see in action how Halkyon enhances the Developer Experience on Kubernetes π
Cleanup the operator resources
To remove the operator from your favorite Kubernetes cluster, then execute the following command:
./scripts/halkyon.sh operators delete
Compatibility matrix
| Kubernetes >= 1.13 | OpenShift 3.x | OpenShift 4.x | KubeDB 0.12 | Tekton v0.9.x | |
|---|---|---|---|---|---|
| halkyon v0.1.x | β | β | β | β | β |
Support
If you need support, reach out to us via zulip.
If you run into issues or if you have questions, don't hesitate to raise an issue.
Follow us on twitter.