5.1 KiB
stage | group | info |
---|---|---|
Configure | Configure | To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#designated-technical-writers |
Kubernetes Agent development (PREMIUM SELF)
This page contains developer-specific information about the GitLab Kubernetes Agent. End-user documentation about the GitLab Kubernetes Agent is also available.
The agent can help you perform tasks like these:
-
Integrate a cluster, located behind a firewall or NAT, with GitLab. To learn more, read issue #212810, Invert the model GitLab.com uses for Kubernetes integration by leveraging long lived reverse tunnels.
-
Access API endpoints in a cluster in real time. For an example use case, read issue #218220, Allow Prometheus in K8s cluster to be installed manually.
-
Enable real-time features by pushing information about events happening in a cluster. For example, you could build a cluster view dashboard to visualize changes in progress in a cluster. For more information about these efforts, read about the Real-Time Working Group.
-
Enable a cache of Kubernetes objects through informers, kept up-to-date with very low latency. This cache helps you:
- Reduce or eliminate information propagation latency by avoiding Kubernetes API calls and polling, and only fetching data from an up-to-date cache.
- Lower the load placed on the Kubernetes API by removing polling.
- Eliminate any rate-limiting errors by removing polling.
- Simplify backend code by replacing polling code with cache access. While it's another API call, no polling is needed. This example describes fetching cached data synchronously from the front end instead of fetching data from the Kubernetes API.
Architecture of the Kubernetes Agent
The GitLab Kubernetes Agent and the GitLab Kubernetes Agent Server use bidirectional streaming to allow the connection acceptor (the gRPC server, GitLab Kubernetes Agent Server) to act as a client. The connection acceptor sends requests as gRPC replies. The client-server relationship is inverted because the connection must be initiated from inside the Kubernetes cluster to bypass any firewall or NAT the cluster may be located behind. To learn more about this inversion, read issue #212810.
This diagram describes how GitLab (GitLab RoR
), the GitLab Kubernetes Agent (agentk
), and the GitLab Kubernetes Agent Server (kas
) work together.
graph TB
agentk -- gRPC bidirectional streaming --> kas
subgraph "GitLab"
kas[kas]
GitLabRoR[GitLab RoR] -- gRPC --> kas
kas -- gRPC --> Gitaly[Gitaly]
kas -- REST API --> GitLabRoR
end
subgraph "Kubernetes cluster"
agentk[agentk]
end
GitLab RoR
is the main GitLab application. It uses gRPC to talk tokas
.agentk
is the GitLab Kubernetes Agent. It keeps a connection established to akas
instance, waiting for requests to process. It may also actively send information about things happening in the cluster.kas
is the GitLab Kubernetes Agent Server, and is responsible for:- Accepting requests from
agentk
. - Authentication of requests from
agentk
by queryingGitLab RoR
. - Fetching agent's configuration from a corresponding Git repository by querying Gitaly.
- Matching incoming requests from
GitLab RoR
with existing connections from the rightagentk
, forwarding requests to it and forwarding responses back. - (Optional) Sending notifications through ActionCable for events received from
agentk
. - Polling manifest repositories for GitOps support by communicating with Gitaly.
- Accepting requests from
To learn more about how the repository is structured, see GitLab Kubernetes Agent repository overview.
Guiding principles
GitLab prefers to add logic into kas
rather than agentk
. agentk
should be kept
streamlined and small to minimize the need for upgrades. On GitLab.com, kas
is
managed by GitLab, so upgrades and features can be added without requiring you
to upgrade agentk
in your clusters.
agentk
can't be viewed as a dumb reverse proxy because features are planned to be built
on top of the cache with informers.