pkg/controller/enterprisesearch/enterprisesearch_controller.go (284 lines of code) (raw):
// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
// or more contributor license agreements. Licensed under the Elastic License 2.0;
// you may not use this file except in compliance with the Elastic License 2.0.
package enterprisesearch
import (
"context"
"fmt"
"hash/fnv"
"reflect"
"sync/atomic"
"go.elastic.co/apm/v2"
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/types"
"k8s.io/client-go/tools/record"
"sigs.k8s.io/controller-runtime/pkg/controller"
"sigs.k8s.io/controller-runtime/pkg/handler"
"sigs.k8s.io/controller-runtime/pkg/manager"
"sigs.k8s.io/controller-runtime/pkg/reconcile"
"sigs.k8s.io/controller-runtime/pkg/source"
entv1 "github.com/elastic/cloud-on-k8s/v3/pkg/apis/enterprisesearch/v1"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/association"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common"
commonassociation "github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/association"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/certificates"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/defaults"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/driver"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/events"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/operator"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/reconciler"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/tracing"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/version"
"github.com/elastic/cloud-on-k8s/v3/pkg/controller/common/watches"
"github.com/elastic/cloud-on-k8s/v3/pkg/utils/k8s"
ulog "github.com/elastic/cloud-on-k8s/v3/pkg/utils/log"
)
const (
controllerName = "enterprisesearch-controller"
)
// Add creates a new EnterpriseSearch Controller and adds it to the Manager with default RBAC.
// The Manager will set fields on the Controller and Start it when the Manager is Started.
func Add(mgr manager.Manager, params operator.Parameters) error {
reconciler := newReconciler(mgr, params)
c, err := common.NewController(mgr, controllerName, reconciler, params)
if err != nil {
return err
}
return addWatches(mgr, c, reconciler)
}
// newReconciler returns a new reconcile.Reconciler
func newReconciler(mgr manager.Manager, params operator.Parameters) *ReconcileEnterpriseSearch {
client := mgr.GetClient()
return &ReconcileEnterpriseSearch{
Client: client,
recorder: mgr.GetEventRecorderFor(controllerName),
dynamicWatches: watches.NewDynamicWatches(),
Parameters: params,
}
}
func addWatches(mgr manager.Manager, c controller.Controller, r *ReconcileEnterpriseSearch) error {
// Watch for changes to EnterpriseSearch
err := c.Watch(source.Kind(mgr.GetCache(), &entv1.EnterpriseSearch{}, &handler.TypedEnqueueRequestForObject[*entv1.EnterpriseSearch]{}))
if err != nil {
return err
}
// Watch Deployments
if err := c.Watch(source.Kind(mgr.GetCache(), &appsv1.Deployment{}, handler.TypedEnqueueRequestForOwner[*appsv1.Deployment](
mgr.GetScheme(), mgr.GetRESTMapper(),
&entv1.EnterpriseSearch{}, handler.OnlyControllerOwner(),
))); err != nil {
return err
}
// Watch Pods, to ensure `status.version` and version upgrades are correctly reconciled on any change.
// Watching Deployments only may lead to missing some events.
if err := watches.WatchPods(mgr, c, EnterpriseSearchNameLabelName); err != nil {
return err
}
// Watch services
if err := c.Watch(source.Kind(mgr.GetCache(), &corev1.Service{}, handler.TypedEnqueueRequestForOwner[*corev1.Service](
mgr.GetScheme(), mgr.GetRESTMapper(),
&entv1.EnterpriseSearch{}, handler.OnlyControllerOwner(),
))); err != nil {
return err
}
// Watch owned and soft-owned secrets
if err := c.Watch(source.Kind(mgr.GetCache(), &corev1.Secret{}, handler.TypedEnqueueRequestForOwner[*corev1.Secret](
mgr.GetScheme(), mgr.GetRESTMapper(),
&entv1.EnterpriseSearch{}, handler.OnlyControllerOwner(),
))); err != nil {
return err
}
if err := watches.WatchSoftOwnedSecrets(mgr, c, entv1.Kind); err != nil {
return err
}
// Dynamically watch referenced secrets to connect to Elasticsearch
return c.Watch(source.Kind(mgr.GetCache(), &corev1.Secret{}, r.dynamicWatches.Secrets))
}
var _ reconcile.Reconciler = &ReconcileEnterpriseSearch{}
// ReconcileEnterpriseSearch reconciles an ApmServer object
type ReconcileEnterpriseSearch struct {
k8s.Client
recorder record.EventRecorder
dynamicWatches watches.DynamicWatches
operator.Parameters
// iteration is the number of times this controller has run its Reconcile method
iteration uint64
}
func (r *ReconcileEnterpriseSearch) K8sClient() k8s.Client {
return r.Client
}
func (r *ReconcileEnterpriseSearch) DynamicWatches() watches.DynamicWatches {
return r.dynamicWatches
}
func (r *ReconcileEnterpriseSearch) Recorder() record.EventRecorder {
return r.recorder
}
var _ driver.Interface = &ReconcileEnterpriseSearch{}
// Reconcile reads that state of the cluster for an EnterpriseSearch object and makes changes based on the state read
// and what is in the EnterpriseSearch.Spec.
func (r *ReconcileEnterpriseSearch) Reconcile(ctx context.Context, request reconcile.Request) (reconcile.Result, error) {
ctx = common.NewReconciliationContext(ctx, &r.iteration, r.Tracer, controllerName, "ent_name", request)
defer common.LogReconciliationRun(ulog.FromContext(ctx))()
defer tracing.EndContextTransaction(ctx)
var ent entv1.EnterpriseSearch
if err := r.Client.Get(ctx, request.NamespacedName, &ent); err != nil {
if apierrors.IsNotFound(err) {
return reconcile.Result{}, r.onDelete(ctx,
types.NamespacedName{
Namespace: request.Namespace,
Name: request.Name,
})
}
return reconcile.Result{}, tracing.CaptureError(ctx, err)
}
if common.IsUnmanaged(ctx, &ent) {
ulog.FromContext(ctx).Info("Object is currently not managed by this controller. Skipping reconciliation", "namespace", ent.Namespace, "ent_name", ent.Name)
return reconcile.Result{}, nil
}
results, status := r.doReconcile(ctx, ent)
if err := r.updateStatus(ctx, ent, status); err != nil {
if apierrors.IsConflict(err) {
return results.WithResult(reconcile.Result{Requeue: true}).Aggregate()
}
results.WithError(err)
}
return results.Aggregate()
}
func (r *ReconcileEnterpriseSearch) onDelete(ctx context.Context, obj types.NamespacedName) error {
// Clean up watches
r.dynamicWatches.Secrets.RemoveHandlerForKey(common.ConfigRefWatchName(obj))
// Clean up watches set on custom http tls certificates
r.dynamicWatches.Secrets.RemoveHandlerForKey(certificates.CertificateWatchKey(entv1.Namer, obj.Name))
return reconciler.GarbageCollectSoftOwnedSecrets(ctx, r.Client, obj, entv1.Kind)
}
func (r *ReconcileEnterpriseSearch) doReconcile(ctx context.Context, ent entv1.EnterpriseSearch) (*reconciler.Results, entv1.EnterpriseSearchStatus) {
results := reconciler.NewResult(ctx)
status := newStatus(ent)
isEsAssocConfigured, err := association.IsConfiguredIfSet(ctx, &ent, r.recorder)
if err != nil {
return results.WithError(err), status
}
if !isEsAssocConfigured {
return results, status
}
// Run validation in case the webhook is disabled
if err := r.validate(ctx, &ent); err != nil {
return results.WithError(err), status
}
svc, err := common.ReconcileService(ctx, r.Client, NewService(ent), &ent)
if err != nil {
return results.WithError(err), status
}
_, results = certificates.Reconciler{
K8sClient: r.K8sClient(),
DynamicWatches: r.DynamicWatches(),
Owner: &ent,
TLSOptions: ent.Spec.HTTP.TLS,
Namer: entv1.Namer,
Labels: ent.GetIdentityLabels(),
Services: []corev1.Service{*svc},
GlobalCA: r.GlobalCA,
CACertRotation: r.CACertRotation,
CertRotation: r.CertRotation,
GarbageCollectSecrets: true,
}.ReconcileCAAndHTTPCerts(ctx)
if results.HasError() {
_, err := results.Aggregate()
k8s.MaybeEmitErrorEvent(r.recorder, err, &ent, events.EventReconciliationError, "Certificate reconciliation error: %v", err)
return results, status
}
entVersion, err := version.Parse(ent.Spec.Version)
if err != nil {
return results.WithError(err), status
}
assocAllowed, err := association.AllowVersion(entVersion, ent.Associated(), ulog.FromContext(ctx), r.recorder)
if err != nil {
return results.WithError(err), status
}
if !assocAllowed {
return results, status // will eventually retry once updated
}
configSecret, err := ReconcileConfig(ctx, r, ent, r.IPFamily)
if err != nil {
return results.WithError(err), status
}
// toggle read-only mode for Enterprise Search version upgrades
upgrade := VersionUpgrade{k8sClient: r.K8sClient(), recorder: r.Recorder(), ent: ent, dialer: r.Dialer}
if err := upgrade.Handle(ctx); err != nil {
return results.WithError(fmt.Errorf("version upgrade: %w", err)), status
}
// build a hash of various inputs to rotate Pods on any change
configHash, err := buildConfigHash(r.K8sClient(), ent, configSecret)
if err != nil {
return results.WithError(fmt.Errorf("build config hash: %w", err)), status
}
deploy, err := r.reconcileDeployment(ctx, ent, configHash)
if err != nil {
return results.WithError(fmt.Errorf("reconcile deployment: %w", err)), status
}
status, err = r.generateStatus(ctx, ent, deploy, svc.Name)
if err != nil {
return results.WithError(fmt.Errorf("updating status: %w", err)), status
}
return results, status
}
// newStatus will generate a new status, ensuring status.ObservedGeneration
// follows the generation of the Enterprise Search object.
func newStatus(ent entv1.EnterpriseSearch) entv1.EnterpriseSearchStatus {
status := ent.Status
status.ObservedGeneration = ent.Generation
return status
}
func (r *ReconcileEnterpriseSearch) validate(ctx context.Context, ent *entv1.EnterpriseSearch) error {
span, vctx := apm.StartSpan(ctx, "validate", tracing.SpanTypeApp)
defer span.End()
if _, err := ent.ValidateCreate(); err != nil {
ulog.FromContext(ctx).Error(err, "Validation failed")
k8s.MaybeEmitErrorEvent(r.recorder, err, ent, events.EventReasonValidation, err.Error())
return tracing.CaptureError(vctx, err)
}
return nil
}
func (r *ReconcileEnterpriseSearch) generateStatus(ctx context.Context, ent entv1.EnterpriseSearch, deploy appsv1.Deployment, svcName string) (entv1.EnterpriseSearchStatus, error) {
status := entv1.EnterpriseSearchStatus{
Association: ent.Status.Association,
ExternalService: svcName,
ObservedGeneration: ent.Generation,
}
pods, err := k8s.PodsMatchingLabels(r.K8sClient(), ent.Namespace, map[string]string{EnterpriseSearchNameLabelName: ent.Name})
if err != nil {
return status, err
}
status.DeploymentStatus, err = common.DeploymentStatus(ctx, ent.Status.DeploymentStatus, deploy, pods, VersionLabelName)
return status, err
}
func (r *ReconcileEnterpriseSearch) updateStatus(ctx context.Context, ent entv1.EnterpriseSearch, status entv1.EnterpriseSearchStatus) error {
if reflect.DeepEqual(status, ent.Status) {
return nil // nothing to do
}
if status.IsDegraded(ent.Status.DeploymentStatus) {
r.recorder.Event(&ent, corev1.EventTypeWarning, events.EventReasonUnhealthy, "Enterprise Search health degraded")
}
ulog.FromContext(ctx).V(1).Info("Updating status",
"iteration", atomic.LoadUint64(&r.iteration),
"namespace", ent.Namespace,
"ent_name", ent.Name,
"status", status,
)
ent.Status = status
return common.UpdateStatus(ctx, r.Client, &ent)
}
func NewService(ent entv1.EnterpriseSearch) *corev1.Service {
svc := corev1.Service{
ObjectMeta: ent.Spec.HTTP.Service.ObjectMeta,
Spec: ent.Spec.HTTP.Service.Spec,
}
svc.ObjectMeta.Namespace = ent.Namespace
svc.ObjectMeta.Name = HTTPServiceName(ent.Name)
labels := ent.GetIdentityLabels()
ports := []corev1.ServicePort{
{
Name: ent.Spec.HTTP.Protocol(),
Protocol: corev1.ProtocolTCP,
Port: HTTPPort,
},
}
return defaults.SetServiceDefaults(&svc, labels, labels, ports)
}
func buildConfigHash(c k8s.Client, ent entv1.EnterpriseSearch, configSecret corev1.Secret) (string, error) {
// build a hash of various settings to rotate the Pod on any change
configHash := fnv.New32a()
// - in the Enterprise Search configuration file content
_, _ = configHash.Write(configSecret.Data[ConfigFilename])
// - in the readiness probe script content
_, _ = configHash.Write(configSecret.Data[ReadinessProbeFilename])
// - in the Enterprise Search TLS certificates
if ent.Spec.HTTP.TLS.Enabled() {
var tlsCertSecret corev1.Secret
tlsSecretKey := types.NamespacedName{Namespace: ent.Namespace, Name: certificates.InternalCertsSecretName(entv1.Namer, ent.Name)}
if err := c.Get(context.Background(), tlsSecretKey, &tlsCertSecret); err != nil {
return "", err
}
if certPem, ok := tlsCertSecret.Data[certificates.CertFileName]; ok {
_, _ = configHash.Write(certPem)
}
}
// - in the associated Elasticsearch TLS certificates
if err := commonassociation.WriteAssocsToConfigHash(c, ent.GetAssociations(), configHash); err != nil {
return "", err
}
return fmt.Sprint(configHash.Sum32()), nil
}