Skip to main content

Operator

The Cyphernetes Operator extends Kubernetes with dynamic, graph-based automation capabilities. It allows you to define custom resources that use Cyphernetes queries to monitor and manage your cluster.

Installation​

You can install the Cyphernetes Operator using kubectl:

# Install CRDs and operator
kubectl apply -f https://raw.githubusercontent.com/avitaltamir/cyphernetes/main/dist/install.yaml

Or using Helm:

helm pull oci://ghcr.io/avitaltamir/cyphernetes/cyphernetes-operator
tar -xvf cyphernetes-operator-*.tgz
cd cyphernetes-operator
helm upgrade --install cyphernetes-operator . --namespace cyphernetes-operator --create-namespace

DynamicOperator​

The Cyphernetes Operator watches the DynamicOperator CRD. This custom resource allows you to define Kubernetes automation using Cyphernetes queries. It watches specified resources and executes queries in response to resource events:

apiVersion: cyphernetes-operator.cyphernet.es/v1
kind: DynamicOperator
metadata:
name: pod-cleaner
namespace: default
spec:
resourceKind: pods
namespace: default
onUpdate: |
MATCH (p:Pod {name: "{{$.metadata.name}}"})
WHERE p.status.phase = "Failed"
DELETE p;

Note: Resources created by the operator using a CREATE statement will automatically get a finalizer.

The DynamicOperator spec supports the following fields:

  • resourceKind (required): The Kubernetes resource kind to watch
  • namespace: The namespace to watch (if empty, watches all namespaces)
  • onCreate: Query to execute when a resource is created
  • onUpdate: Query to execute when a resource is updated
  • onDelete: Query to execute when a resource is deleted

At least one of onCreate, onUpdate, or onDelete must be specified.

Common Use Cases​

Automated Cleanup​

Clean up resources based on conditions:

apiVersion: cyphernetes-operator.cyphernet.es/v1
kind: DynamicOperator
metadata:
name: cleanup-operator
namespace: default
spec:
resourceKind: jobs
namespace: default
onUpdate: |
MATCH (j:Job {name: "{{$.metadata.name}}"})
WHERE j.status.completionTime != NULL
AND j.status.succeeded > 0
DELETE j;

Resource Validation​

Monitor and enforce cluster policies:

apiVersion: cyphernetes-operator.cyphernet.es/v1
kind: DynamicOperator
metadata:
name: resource-validator
namespace: default
spec:
resourceKind: pods
namespace: default
onCreate: |
MATCH (p:Pod {name: "{{$.metadata.name}}"})
WHERE NOT EXISTS(p.spec.containers[0].resources.limits)
DELETE p;

Service Health Monitoring​

Monitor service health across the cluster:

apiVersion: cyphernetes-operator.cyphernet.es/v1
kind: DynamicOperator
metadata:
name: service-health
namespace: default
spec:
resourceKind: services
namespace: default
onUpdate: |
MATCH (s:Service {name: "{{$.metadata.name}}"})
WHERE NOT (s)->(:core.Endpoints)
DELETE s;

Configuration​

RBAC Configuration​

The operator requires specific RBAC permissions to function:

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cyphernetes-operator-role
rules:
- apiGroups: ["*"]
resources: ["*"]
verbs: ["*"]

Monitoring​

Operator Metrics​

The operator exposes Prometheus metrics at /metrics:

  • cyphernetes_operator_reconciliations_total
  • cyphernetes_operator_query_duration_seconds
  • cyphernetes_operator_errors_total

Health Checks​

Health and readiness probes are available at:

  • Liveness: /healthz
  • Readiness: /readyz

Best Practices​

  1. Use Namespaces: Scope operators to specific namespaces when possible
  2. Resource Limits: Set appropriate resource limits for the operator
  3. Monitor Logs: Keep track of operator logs for debugging
  4. Version Control: Maintain operator configurations in version control

Troubleshooting​

Common issues and solutions:

  1. Permission Errors

    • Verify RBAC configurations
    • Check operator service account permissions
  2. Query Timeouts

    • Optimize complex queries
    • Adjust timeout settings
  3. Resource Constraints

    • Monitor operator resource usage
    • Adjust resource limits