![Go Reference](https://pkg.go.dev/badge/github.com/validator-labs/validator.svg)
validator (AKA Validation Controller) monitors ValidationResults created by one or more validator plugins and uploads them to a sink of your choosing, e.g., Slack or Spectro Cloud Palette.
Description
The validator repository is fairly minimal - all the heavy lifting is done by the validator plugins. Installation of validator and one or more plugins is accomplished via Helm.
Plugins:
Installation
Connected
For connected installations, two options are supported: the validator CLI, validatorctl
, and Helm. Using validatorctl is recommended, as it provides a text-based user interface (TUI) for configuring validator.
Validator CLI
- Download the latest release of validatorctl from https://github.com/validator-labs/validatorctl/releases
- Execute validatorctl
validatorctl install
Helm
Install Validator by pulling the latest Helm chart and installing it in your cluster. Use the following commands to install the latest version of the chart.
helm repo add validator https://validator-labs.github.io/validator
helm repo update
helm install validator validator/validator -n validator --create-namespace
Check out the Helm install guide for a step-by-step guide for installing and using Validator.
Air-gapped
For air-gapped installations, the recommended approach is to use Hauler. Hauls containing all validator artifacts (container images, Helm charts, and the validator CLI) are generated for multiple platforms (linux/amd64 and linux/arm64) during each validator release.
Prerequisites:
- A Linux-based air-gapped workstation with:
Once the prerequisites are met, the following steps document the air-gapped installation procedure:
- Download the Hauler Store (then somehow get it across the air-gap)
# Download the Haul for your chosen release and platform, e.g.:
curl -L https://github.com/validator-labs/validator/releases/download/v0.0.46/validator-haul-linux-amd64.tar.zst -o validator-haul-linux-amd64.tar.zst
- Load the Hauler Store (on the air-gapped workstation)
# Load the air-gapped content to your local hauler store.
hauler store load validator-haul-linux-amd64.tar.zst
- Extract validatorctl from the Hauler Store
# Extract the validator CLI binary, validatorctl, from the hauler store.
# It's always tagged as "latest" within the store, despite being versioned.
# This is a hauler defect. The version can be verified via `validatorctl version`.
hauler store extract -s store hauler/validatorctl:latest
chmod +x validatorctl && mv validatorctl /usr/local/bin
- Serve the Hauler Store
# Serve the content as a registry from the hauler store.
# (Defaults to <FQDN or IP>:5000).
nohup hauler store serve registry | tee -a hauler.log &
# Optionally tail the hauler registry logs
tail -f hauler.log
- Execute validatorctl
validatorctl install
Sinks
Validator can be configured to emit updates to various event sinks whenever a ValidationResult
is created or updated. See configuration details below for each supported sink.
Alertmanager
Integrate with the Alertmanager API to emit alerts to all supported Alertmanager receivers, including generic webhooks. The only required configuration is an Alertmanager endpoint. HTTP basic authentication and TLS are also supported. See values.yaml for configuration details.
Sample Output
![Screen Shot 2023-11-15 at 10 42 20 AM](https://github.com/validator-labs/validator/assets/1795270/ce958b8e-96d7-4f5e-8efc-80e2fc2b0b4d)
Setup
-
Install Alertmanager in your cluster (if it isn't installed already)
-
Configure Alertmanager alert content. Alerts can be formatted/customized via the following labels and annotations:
Labels
- alertname
- plugin
- validation_result
- expected_results
Annotations
- state
- validation_rule
- validation_type
- message
- status
- detail
- pipe-delimited array of detail messages, see sample config for parsing example
- failure (also pipe-delimited)
- last_validation_time
Example Alertmanager ConfigMap used to produce the sample output above:
apiVersion: v1
data:
alertmanager.yml: |
global:
slack_api_url: https://slack.com/api/chat.postMessage
receivers:
- name: default-receiver
slack_configs:
- channel: <channel-id>
text: |-
{{ range .Alerts.Firing -}}
*Validation Result: {{ .Labels.validation_result }}/{{ .Labels.expected_results }}*
{{ range $k, $v := .Annotations }}
{{- if $v }}*{{ $k | title }}*:
{{- if match "\\|" $v }}
- {{ reReplaceAll "\\|" "\n- " $v -}}
{{- else }}
{{- printf " %s" $v -}}
{{- end }}
{{- end }}
{{ end }}
{{ end }}
title: "{{ (index .Alerts 0).Labels.plugin }}: {{ (index .Alerts 0).Labels.alertname }}\n"
http_config:
authorization:
credentials: xoxb--<bot>-<token>
send_resolved: false
route:
group_interval: 10s
group_wait: 10s
receiver: default-receiver
repeat_interval: 1h
templates:
- /etc/alertmanager/*.tmpl
kind: ConfigMap
metadata:
name: alertmanager
namespace: alertmanager
-
Install validator and/or upgrade your validator Helm release, configuring values.sink
accordingly.
Slack
Sample Output
Setup
-
Go to https://api.slack.com/apps and click Create New App, then select From scratch. Pick an App Name and Slack Workspace, then click Create App.
-
Go to OAuth & Permissions
and copy the Bot User OAuth Token
under the OAuth Tokens for Your Workspace
section. Save it somewhere for later. Scroll down to Scopes
and click Add an OAuth Scope. Enable the chat:write
scope for your bot.
-
Find and/or create a channel in Slack and note its Channel ID (at the very bottom of the modal when you view channel details). Add the bot you just created to the channel via View channel details > Integrations > Apps > Add apps
.
-
Install validator and/or upgrade your validator Helm release, configuring values.sink
accordingly.
Development
You’ll need a Kubernetes cluster to run against. You can use kind to get a local cluster for testing, or run against a remote cluster.
Note: Your controller will automatically use the current context in your kubeconfig file (i.e. whatever cluster kubectl cluster-info
shows).
Running on the cluster
- Install Instances of Custom Resources:
kubectl apply -f config/samples/
- Build and push your image to the location specified by
IMG
:
make docker-build docker-push IMG=<some-registry>/validator:tag
- Deploy the controller to the cluster with the image specified by
IMG
:
make deploy IMG=<some-registry>/validator:tag
Uninstall CRDs
To delete the CRDs from the cluster:
make uninstall
Undeploy controller
UnDeploy the controller from the cluster:
make undeploy
Contributing
All contributions are welcome! Feel free to reach out on the Spectro Cloud community Slack.
Make sure pre-commit
is installed.
Install the pre-commit
scripts:
pre-commit install --hook-type commit-msg
pre-commit install --hook-type pre-commit
How it works
This project aims to follow the Kubernetes Operator pattern.
It uses Controllers,
which provide a reconcile function responsible for synchronizing resources until the desired state is reached on the cluster.
Test It Out
- Install the CRDs into the cluster:
make install
- Run your controller (this will run in the foreground, so switch to a new terminal if you want to leave it running):
make run
NOTE: You can also run this in one step by running: make install run
Modifying the API definitions
If you are editing the API definitions, generate the manifests such as CRs or CRDs using:
make manifests
NOTE: Run make --help
for more information on all potential make
targets
More information can be found via the Kubebuilder Documentation
License
Copyright 2023.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.