Skip to content

Run managed services in Workload Cluster

  • Status: proposed. This ADR did not reach consensus, with strong arguments on both sides. However, due to needing a decision in a timely manner, this ADR is actually followed. Therefore, this ADR serves both for visibility and to document a fait accompli.
  • Deciders: Cristian
  • Date: 2021-04-29

Context and Problem Statement

To truly offer our users an option to run containerized workloads in EU jurisdiction, they also need additional managed services, like databases, message queues, caches, etc.

Where should these run?

Decision Drivers

  • Some of these services are chatty and need low latency.
  • Some of these services might assume trusted clients over a trusted network.
  • We want to make it easy to run these services with regulatory compliance in mind, e.g., we should be able to reuse Compliant Kubernetes features around monitoring, logging, access control and network segregation.
  • We want to make it difficult for Compliant Kubernetes users to negatively affect managed services.
  • We want to keep support for multiple Workload Cluster, i.e., application multi-tenancy.
  • Many Infrastructure Providers do not support Service Type LoadBalancer, which complicates exposing non-HTTP services outside a Kubernetes cluster.
  • Management Cluster might not exist in a future packaging of Compliant Kubernetes.

Considered Options

  • Run managed services in Workload Cluster
  • Run managed services in Management Cluster
  • Run managed services in yet another cluster

Decision Outcome

Chosen option: "run managed services in Workload Cluster".

Positive Consequences

  • Latency is minimized: The application consuming the managed service is close to the managed service, without needing to go through intermediate software components, such as a TCP Ingress controller.
  • NetworkPolicies can be reused for communication segregation.
  • OpenID and RBAC in the Workload Cluster can be reused for user access control.
  • Kubernetes audit log can be re-used for auditing user access managed services. Such access is required, e.g., for manual database migrations and "rare" operations like GDPR data correction requests.
  • Ease of exposition: No need for Service Type LoadBalancer, which is not supported on all Infrastructure Providers.

Negative Consequences

  • Blurs separation of responsibilities between user and administrator.
  • The managed service is easier impacted by user misusage, e.g., bringing a Node into OOM.
  • Workload Cluster can no longer be deployed with “free for all” security. Platform Administrators need to push and fight back against loose access control.