Admission Webhooks
Admission webhooks are HTTP callbacks that receive admission requests and do something with them. It is registered with Kubernetes, and will be called by Kubernetes to validate or mutate a resource before being stored. There are two types of admission webhooks.
1. Validating admission webhook
Validating webhooks can be used to perform validations that go beyond the capabilities of OpenAPI schema validation, such as ensuring a field is immutable after creation or higher level permissions checks based on the user that is making the request to the API server. It can reject the request, but it cannot modify the object that they are receiving in the request.
2. Mutating admission webhook
Mutating webhooks are most frequently used for defaulting, by adding default values for unset fields in the resource on creation. They can modify objects by creating a patch that will be sent back in the admission response.
For more background on Admission webhooks, refer to the Kubebuilder documentation or the . You can also refer to the Kubebuilder webhook walkthrough, which is similar in content to this guide.
As an example, let’s walk through the scaffolding of a validation webhook for the sample memcached operator.
The flag will scaffold the resources required for a mutating webhook, and the --programmatic-validation
flag will scaffold the resources required for a validating webhook. In this case we have scaffolded both.
After running the create webhook
command the file structure would be:
The scaffolded file has method signatures which need to be implemented for the validation webhook.
Following this, there are a few steps which need to be done in your operator project to enable webhooks. This will involve:
Generate webhook manifests and enable webhook deployment
Once your webhooks are implemented, all that’s left is to create the manifests required to register your webhooks with Kubernetes:
Run your operator and webhooks
There are two ways to test your operator project with webhooks.
Run locally
Technically, the webhooks can be run locally, but for it to work you need to generate certificates for the webhook server and store them at /tmp/k8s-webhook-server/serving-certs/tls.{crt,key}
. For more details about running webhook locally, refer here.
Run as a Deployment inside the cluster
Adding webhooks does not alter deploying your operator. For instructions on deploying your operator into a cluster, refer to the tutorial.