Operator
The Cyphernetes Operator extends Kubernetes with dynamic, graph-based automation capabilities. It allows you to define custom resources that use Cyphernetes queries to monitor and manage your cluster.
Installation​
You can install the Cyphernetes Operator using kubectl:
# Install CRDs and operator
kubectl apply -f https://raw.githubusercontent.com/avitaltamir/cyphernetes/main/dist/install.yaml
Or using Helm:
helm pull oci://ghcr.io/avitaltamir/cyphernetes/cyphernetes-operator
tar -xvf cyphernetes-operator-*.tgz
cd cyphernetes-operator
helm upgrade --install cyphernetes-operator . --namespace cyphernetes-operator --create-namespace
DynamicOperator​
The Cyphernetes Operator watches the DynamicOperator CRD. This custom resource allows you to define Kubernetes automation using Cyphernetes queries. It watches specified resources and executes queries in response to resource events:
apiVersion: cyphernetes-operator.cyphernet.es/v1
kind: DynamicOperator
metadata:
name: pod-cleaner
namespace: default
spec:
resourceKind: pods
namespace: default
onUpdate: |
MATCH (p:Pod {name: "{{$.metadata.name}}"})
WHERE p.status.phase = "Failed"
DELETE p;
Note: Resources created by the operator using a CREATE statement will automatically get a finalizer.
The DynamicOperator spec supports the following fields:
resourceKind
(required): The Kubernetes resource kind to watchnamespace
: The namespace to watch (if empty, watches all namespaces)onCreate
: Query to execute when a resource is createdonUpdate
: Query to execute when a resource is updatedonDelete
: Query to execute when a resource is deleted
At least one of onCreate
, onUpdate
, or onDelete
must be specified.
Common Use Cases​
Automated Cleanup​
Clean up resources based on conditions:
apiVersion: cyphernetes-operator.cyphernet.es/v1
kind: DynamicOperator
metadata:
name: cleanup-operator
namespace: default
spec:
resourceKind: jobs
namespace: default
onUpdate: |
MATCH (j:Job {name: "{{$.metadata.name}}"})
WHERE j.status.completionTime != NULL
AND j.status.succeeded > 0
DELETE j;
Resource Validation​
Monitor and enforce cluster policies:
apiVersion: cyphernetes-operator.cyphernet.es/v1
kind: DynamicOperator
metadata:
name: resource-validator
namespace: default
spec:
resourceKind: pods
namespace: default
onCreate: |
MATCH (p:Pod {name: "{{$.metadata.name}}"})
WHERE NOT EXISTS(p.spec.containers[0].resources.limits)
DELETE p;
Service Health Monitoring​
Monitor service health across the cluster:
apiVersion: cyphernetes-operator.cyphernet.es/v1
kind: DynamicOperator
metadata:
name: service-health
namespace: default
spec:
resourceKind: services
namespace: default
onUpdate: |
MATCH (s:Service {name: "{{$.metadata.name}}"})
WHERE NOT (s)->(:core.Endpoints)
DELETE s;
Configuration​
RBAC Configuration​
The operator requires specific RBAC permissions to function:
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cyphernetes-operator-role
rules:
- apiGroups: ["*"]
resources: ["*"]
verbs: ["*"]
Monitoring​
Operator Metrics​
The operator exposes Prometheus metrics at /metrics
:
cyphernetes_operator_reconciliations_total
cyphernetes_operator_query_duration_seconds
cyphernetes_operator_errors_total
Health Checks​
Health and readiness probes are available at:
- Liveness:
/healthz
- Readiness:
/readyz
Best Practices​
- Use Namespaces: Scope operators to specific namespaces when possible
- Resource Limits: Set appropriate resource limits for the operator
- Monitor Logs: Keep track of operator logs for debugging
- Version Control: Maintain operator configurations in version control
Troubleshooting​
Common issues and solutions:
-
Permission Errors
- Verify RBAC configurations
- Check operator service account permissions
-
Query Timeouts
- Optimize complex queries
- Adjust timeout settings
-
Resource Constraints
- Monitor operator resource usage
- Adjust resource limits