[Improvement] Define a general Helm chart configuration approach
Code of Conduct
- [X] I agree to follow this project's Code of Conduct
Search before asking
- [X] I have searched in the issues and found no similar issues.
What would you like to be improved?
There is no clear common approach at the moment on how to configure Kyuubi deployment if the Helm chart is used. I would like to discuss requirements, limitations and different options to choose one approach to follow and support it in the Kyuubi Helm chart configuration. The problem has been mentioned and discussed in multiple issues and PRs, so the idea is to collect all opinions in one place and make the decision.
Configuration system of the Apache Kyuubi The configuration system allows to configure values using the following options (ordered from low to high prio):
- [static] Kyuubi configuration files
- [static] Hadoop configuration files
- [static] Engine (Spark, Flink, Trino etc) configuration files
- [runtime] Environment variables
- [runtime] JDBC Connection URLs
- [runtime] SET Statements
Runtime options JDBC Connection URLs and SET Statements
Can be skipped in the discussion, because they used only when Kyuubi is up and running.
Runtime option Environment variables
Configured by {{ .Values.env }} and {{ .Values.envFrom }} value properties.
The Helm chart users can specify environment variables to provide necessary configuration values with low effort if needed. The properties also allow to use provided (existing) ConfigMaps and Secrets as the sources of environment variables, for instance:
env:
- name: ENV_VALUE
value: env-value
- name: ENV_FROM_CONFIGMAP_KEY
valueFrom:
configMapKeyRef:
name: env-configmap
key: env-key
envFrom:
- configMapRef:
name: all-env-configmap
Static options
Represented by configuration files which should be located in each Kyuubi container in specific paths.
In general case, the easiest way to provide files into Kubernetes pod (container) is to mount ConfigMap or Secret to a specific path.
Requirements Note: this section is subject to discuss.
- Ability to create
ConfigMapsunder the hood from value properties ofvalue.yamlfile.Secretsshould never be created and managed by Helm chart because of security consideration! - Ability to specify existing (created outside the chart)
ConfigMapsandSecretsby resource name as a reference. - Ability to provide multiple existing
ConfigMapsandSecretswith priority order. MultipleConfigMapsandSecretsmight have key duplicates, so the implementation should clearly resolve the collision by merging keys in priority order. - Ability to mix
ConfigMapsmanaged by the chart withConfigMapsandSecretsprovided by user with priority order. The issue with key duplicates should be clearly resolved.ConfigMapsmanaged by the chart should have the lowest prio. - The approach should work for Helm and GitOps tools like ArgoCD, Flux etc.
- Easy way to specify one or many configuration files as Helm values, i.e. properties in
value.yamlfile. Some configuration files might be huge and complex, so the idea is to prevent identation issues invalues.yamlfile. - Easy way to create
ConfigMapsandSecretsfrom one or many configuration files. Users might have a lot of xml, properties and other files, so the idea is to help users to createConfigMapandSecretresources in a simple way.
How should we improve?
Approach Note: this section is subject to discuss.
- Group configuration file properties in
values.yamlby system like Kyuubi, Hadoop, Spark, Trino etc.
kyuubiConfDir: /opt/kyuubi/conf
kyuubiConf:
...
sparkConfDir: /opt/spark/conf
sparkConf:
...
- Use
filesproperty to specify various files. Users can define files with any file name. Each entity withinfilesproperty used as a key/value pair in the correspondingConfigMap.
sparkConf:
files:
'spark-env.sh': |
#!/usr/bin/env bash
export SPARK_LOG_DIR=/opt/spark/logs
'spark-defaults.conf': |
spark.submit.deployMode=cluster
- Use
filesFromproperty to specify list of existingConfigMapsandSecretsto be mounted to the configuration path of Kyuubi container.
sparkConf:
filesFrom:
- configMap:
name: my-spark-confs
- secret:
name: my-sensetive-spark-confs
- secret:
name: my-sensetive-spark-confs-2
items:
- key: secretKey
path: filename.xml
The implementation idea is to use Projected Volumes with core/v1/SecretProjection and core/v1/ConfigMapProjection entities.
Also it will allow to merge ConfigMap created from files property with the entities from filesFrom property.
- Move
xxxConfDirproperty toxxxConfproperty.
sparkConf:
dir: /opt/spark/conf
- Configuration example for Spark
sparkConf:
dir: /opt/spark/conf
files:
'spark-env.sh': |
#!/usr/bin/env bash
export SPARK_LOG_DIR=/opt/spark/logs
'spark-defaults.conf': |
spark.submit.deployMode=cluster
filesFrom:
- configMap:
name: my-spark-confs
- secret:
name: my-sensetive-spark-confs
- secret:
name: my-sensetive-spark-confs-2
items:
- key: secretKey
path: filename.xml
- Provide documentation with examples on how to set file content as a property when installing the chart, see Helm docs.
helm install kyuubi charts/kyuubi --set-file kyuubiConf.log4j2=kyuubi/conf/log4j2.xml.template
- Provide documentation with examples on how to create
ConfigMapfrom file or directory, see Kubernetes docs .
kubectl create configmap my-spark-configs --from-file=prod/spark-configs/
Are you willing to submit PR?
- [X] Yes. I would be willing to submit a PR with guidance from the Kyuubi community to improve.
- [ ] No. I cannot submit a PR at this time.
@pan3793 @zwangsheng @chgl Could you please have a look at it? I would like to implement it (see point 5 with conf example), but it would be great to have your feedback and comments before.
Looks good to me!
maybe just one minor detail: make sure all changed configs contribute to the checksum annotation for the statefulset so kyuubi is automatically restarted: https://github.com/apache/kyuubi/blob/master/charts/kyuubi/templates/kyuubi-statefulset.yaml#L41
@chgl I'm afraid it is impossible to calculate and keep updated checksum for entities in sparkConf.from list, i.e. for provided ConfigMaps and Secrets. We probably can use lookup function to find checksum value during chart release or update, but users can change those ConfigMaps and Secrets in between. Do you know any good (ideally standard) solution to solve the problem?
@dnskr , you're right of course! I hadn't considered the from secrets/configmaps. In that case I believe https://github.com/stakater/Reloader is still the best way to go (would require making the annotations for the StatefulSet https://github.com/apache/kyuubi/blob/master/charts/kyuubi/templates/kyuubi-statefulset.yaml#L40 configurable, though).
quick question, is restarting kyuubi when spark default config updated a must? I believe spark config can be updated in runtime, once the configmap is updated, upcoming sessions will be affected
quick question, is restarting kyuubi when spark default config updated a must? I believe spark config can be updated in runtime, once the configmap is updated, upcoming sessions will be affected
@sudohainguyen Very good question. In the current implementation there is no Kyuubi auto restart on Spark config changes, but I assume it might be needed to stop running Spark immediately on some config changes.
yeah I think it depends on how users expect it it would be perfect if we can make it as a configurable option
Created draft implementation https://github.com/apache/kyuubi/pull/6521
Suggested approach and the draft implementation has an unsolved problem described below.
Some properties affect both helm chart and the application. For instance, .Values.server.rest.port is used in Kubernetes resource definitions (Pod and Service ports) and as kyuubi.frontend.rest.bind.port value in kyuubi-defaults.conf file. So, kyuubi.frontend.rest.bind.port value should be in sync with .Values.server.rest.port property if the chart user provides custom (overrides default) kyuubi-defaults.conf file.
Ideally, it would be great to move such properties outside the default kyuubi-defaults.conf file and keep the file empty by default. I.e. the solution is to set kyuubi.frontend.rest.bind.port in another way, for example using hardcoded environment variable or cli argument, but as far as I know, Kyuubi does not provide such capabilities at the momement.
I mean we cannot set kyuubi.frontend.rest.bind.port as KYUUBI_FRONTEND_REST_BIND_PORT env variable or cli argument --conf kyuubi.frontend.rest.bind.port= 10099 similar to Spark.
Any ideas?
@dnskr Thanks for continuously working on this area. Carry my idea from the Slack channel - overriding configurations via --conf is preferred over env vars.
@dnskr Thanks for continuously working on this area. Carry my idea from the Slack channel - overriding configurations via
--confis preferred over env vars.
@pan3793 I created improvement proposal based on your suggestion: Provide Kyuubi configuration properties with cli options. I'll try to implement it, but also I'll be glad if someone takes the opportunity to implement it because I'm not sure I have enough context at the moment.