VMware Tanzu Sources for Knative are designed to facilitate event-driven architectures and streamline the development of event sources for Knative. At its core, Tanzu Sources for Knative aims to simplify the connection between event producers and the Knative Eventing ecosystem.
The Tanzu Sources are the successor of the VMware Event Router which originally got used by the VMware Event Broker Appliance project as the core logic to forward CloudEvents, e.g. from vSphere, to configurable event processors.
The VMware Tanzu Sources are also using the CloudEvents
standard to normalize events from the supported event providers
.
This open-source project is officially maintained by VMware and used by the
VMware Event Broker Appliance as the core logic to source non-CloudEvent
conformant event-payloads from e.g. vSphere (VSphereSource
) or
Horizon (HorizonSource
) and to ultimately forward these
CloudEvent conformant to a configurable Knative
Sink (addressable destination).
sources
, making them a native part
of the Kubernetes API.source
type, there is a corresponding controller
responsible for managing the lifecycle of that source
and ensuring the
delivery of events.Sources
Knative abstracts event receivers (Sinks) in a very flexible way via
addressable Destinations
. The VMware Tanzu Sources for Knative technically
supports all Knative Destinations
. However, Knative Broker
or Knative
Services
are likely the ones you will be using.
Note: We have not done any testing for Knative
Channels
, since request response style interactions are out of scope for the Tanzu Sources.
Provider
Delivery Guaranteescheckpoint:
true
checkpoint:
true
The Source
controller will periodically checkpoint its progress in the vCenter
event stream (“history”) by using a Kubernetes ConfigMap
as storage backend.
The name of the ConfigMap
is <name_of_source>-configmap
(see example below).
By default, checkpoints will be created every 10 seconds
. The minimum
checkpoint frequency is 1s
but be aware of potential load on the Kubernetes
API this might cause.
Checkpointing is useful to guarantee at-least-once event delivery semantics, e.g. to guard against lost events due to controller downtime (maintenance, crash, etc.).
To influence the checkpointing logic, read up on the corresponding section on Github - Configuring Checkpoint and Event Replay.
Checkpointing itself cannot be disabled and there will be exactly zero or one
checkpoint per controller. If at-most-once event delivery is desired, i.e.
no event replay upon controller start, simply set maxAgeSeconds: 0
.
maxAgeSeconds: 0
maxAgeSeconds: 0
Note: Knative’s built-in retry mechanisms is used so your function might still be involved multiple times depending on its response code. However, if an event
provider
crashes before sending an event to Knative or when the Knative returns an error, the event is not retried and discarded.
Note: It is possible though to run multiple instances of a source (e.g.
VSphereSource
) with different configurations to address multi-vCenter scenarios. This decision was made for scalability and resource/tenancy isolation purposes.
Note: Knative supports Dead Letter Queues when using
Broker
mode.
For more detailed information check the official VMware Tanzu Sources for Knative repository on Github.
Installing Tanzu Sources for Knative is a straightforward process that enables you to integrate VMware event sources into your Knative environment.
The following prerequisites must be in place:
kubectl
commandsknative-vsphere
installed
mv
the kn-vsphere
binary into e.g. /usr/local/bin/
Install Tanzu Sources for Knative by applying the YAML manifest provided by VMware. This manifest defines the necessary Kubernetes resources for Knative event sources.
Use the kubectl apply
command:
kubectl apply -f https://github.com/vmware-tanzu/sources-for-knative/releases/latest/download/release.yaml
namespace/vmware-sources created
serviceaccount/horizon-source-controller created
serviceaccount/horizon-source-webhook created
clusterrole.rbac.authorization.k8s.io/vsphere-receive-adapter-cm created
clusterrole.rbac.authorization.k8s.io/vmware-sources-admin created
clusterrole.rbac.authorization.k8s.io/vmware-sources-core created
clusterrole.rbac.authorization.k8s.io/podspecable-binding configured
clusterrole.rbac.authorization.k8s.io/builtin-podspecable-binding configured
serviceaccount/vsphere-controller created
clusterrole.rbac.authorization.k8s.io/horizon-source-controller created
clusterrole.rbac.authorization.k8s.io/horizon-source-observer created
clusterrolebinding.rbac.authorization.k8s.io/vmware-sources-controller-admin created
clusterrolebinding.rbac.authorization.k8s.io/vmware-sources-webhook-podspecable-binding created
clusterrolebinding.rbac.authorization.k8s.io/vmware-sources-webhook-addressable-resolver-binding created
clusterrolebinding.rbac.authorization.k8s.io/horizon-source-controller-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/horizon-source-webhook-rolebinding created
clusterrolebinding.rbac.authorization.k8s.io/horizon-source-controller-addressable-resolver created
clusterrole.rbac.authorization.k8s.io/horizon-source-webhook created
customresourcedefinition.apiextensions.k8s.io/horizonsources.sources.tanzu.vmware.com created
customresourcedefinition.apiextensions.k8s.io/vspherebindings.sources.tanzu.vmware.com created
customresourcedefinition.apiextensions.k8s.io/vspheresources.sources.tanzu.vmware.com created
service/horizon-source-controller-manager created
service/horizon-source-webhook created
service/vsphere-source-webhook created
deployment.apps/horizon-source-controller created
mutatingwebhookconfiguration.admissionregistration.k8s.io/defaulting.webhook.horizon.sources.tanzu.vmware.com created
validatingwebhookconfiguration.admissionregistration.k8s.io/validation.webhook.horizon.sources.tanzu.vmware.com created
validatingwebhookconfiguration.admissionregistration.k8s.io/config.webhook.horizon.sources.tanzu.vmware.com created
secret/webhook-certs created
deployment.apps/horizon-source-webhook created
mutatingwebhookconfiguration.admissionregistration.k8s.io/defaulting.webhook.vsphere.sources.tanzu.vmware.com created
validatingwebhookconfiguration.admissionregistration.k8s.io/validation.webhook.vsphere.sources.tanzu.vmware.com created
validatingwebhookconfiguration.admissionregistration.k8s.io/config.webhook.vsphere.sources.tanzu.vmware.com created
secret/vsphere-webhook-certs created
mutatingwebhookconfiguration.admissionregistration.k8s.io/vspherebindings.webhook.vsphere.sources.tanzu.vmware.com created
deployment.apps/vsphere-source-webhook created
configmap/config-logging created
configmap/config-observability created
The VSphereSource
provides a simple mechanism to enable users to react to
vSphere events.
VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling your VMware vSphere environments, allowing you to automate and deliver a virtual infrastructure across the hybrid cloud with confidence.
Since VMware vCenter Server event types are environment specific (vSphere version, extensions), a list of events for vCenter as an event source can be found on the following Github repository - William Lam - vcenter-event-mapping.
A new VSphereSource
can be configured in two ways:
kn-vsphere
pluginVSphereSource
manifest file (yaml) using kubectl
The creation of a Kubernetes basic-auth
secret is required in order to create
a new VSphereSource
.
export VCENTER_USERNAME='[email protected]' \
export VCENTER_PASSWORD='my-secret-pwd' \
export VCENTER_HOSTNAME='vcsa.mydomain.com'
The new kn-vsphere
plugin for the Knative CLI (kn
) can be used for this
task.
Creating the new secret in the namespace vmware-system
:
kn vsphere auth create \
--namespace vmware-system \
--username $VCENTER_USERNAME \
--password $VCENTER_PASSWORD \
--name vcsa-ro-creds \
--verify-url https://$VCENTER_HOSTNAME \
--verify-insecure
The created secret stores your sensible data:
kubectl -n vmware-system get secret vcsa-ro-creds -oyaml
apiVersion: v1
data:
password: <base64-encoded-data>
username: <base64-encoded-data>
kind: Secret
metadata:
name: vcsa-ro-creds
namespace: vmware-system
type: kubernetes.io/basic-auth
Create the new VSphereSource
by also using the kn-vsphere
plugin. Make sure
to not only provide valid vCenter data but also the correct Knative Sink data.
If the Sink is a Broker, retrieve the correct URI via kn broker list -A
:
kn broker list -A
NAMESPACE NAME URL AGE CONDITIONS READY REASON
vmware-functions default http://default-broker-ingress.vmware-functions.svc.cluster.local 167d 8 OK / 8 True
Create the new VSphereSource
in the vmware-system
namespace as well:
kn vsphere source create \
--namespace vmware-system \
--name vcsa-source \
--vc-address https://$VCENTER_HOSTNAME \
--skip-tls-verify \
--secret-ref vcsa-ro-creds \
--sink-uri http://default-broker-ingress.vmware-functions.svc.cluster.local \
--encoding json
Created source
First indications of its functionality can be validated by checking the logs:
kubectl -n vmware-system logs vcsa-source-adapter-58c744d8db-ttddd
{"level":"info","ts":"2023-12-01T10:28:30.955Z","logger":"vsphere-source-adapter","caller":"vsphere/adapter.go:312","msg":"setting begin of event stream","commit":"8fda92a-dirty","beginTimestamp":"2023-12-01 10:28:30.950583 +0000 UTC"}
{"level":"info","ts":"2023-12-01T10:33:30.920Z","logger":"vsphere-source-adapter","caller":"vsphere/client.go:115","msg":"Executing SOAP keep-alive handler","commit":"8fda92a-dirty","rpc":"keepalive"}
{"level":"info","ts":"2023-12-01T10:33:30.939Z","logger":"vsphere-source-adapter","caller":"vsphere/client.go:121","msg":"vCenter current time: 2023-12-01 10:33:30.930277 +0000 UTC","commit":"8fda92a-dirty","rpc":"keepalive"}
{"level":"info","ts":"2023-12-01T10:38:30.940Z","logger":"vsphere-source-adapter","caller":"vsphere/client.go:115","msg":"Executing SOAP keep-alive handler","commit":"8fda92a-dirty","rpc":"keepalive"}
{"level":"info","ts":"2023-12-01T10:38:30.968Z","logger":"vsphere-source-adapter","caller":"vsphere/client.go:121","msg":"vCenter current time: 2023-12-01 10:38:30.965905 +0000 UTC","commit":"8fda92a-dirty","rpc":"keepalive"}
The following table lists allowed and required fields for connecting to a vCenter Server and the respective type values and examples for these fields.
Field | Type | Description | Required | Example |
---|---|---|---|---|
address |
String | URI of the VMware vCenter Server | true | https://$VCENTER_HOSTNAME |
skipTLSVerify |
Boolean | Skip TSL verification | true | true (i.e. ignore errors) |
checkpointConfig |
String | Configure checkpointing using options maxAgeSeconds and periodSeconds . |
true | Defaults are maxAgeSeconds: 300 and periodSeconds: 10 |
payloadEncoding |
String | Set the CloudEvent data encoding scheme to e.g. json or xml |
true | payloadEncoding: application/json |
secretRef |
Object | secretRef holds the name of the Kubernetes secret which is used by the source to authenticate against it. |
true | see section Authentication with vSphere |
sink |
Object | Where to send the events. | true | Default for VEBA is the adress of the RabbitMQ broker: http://default-broker-ingress.vmware-functions.svc.cluster.local |
The following vspheresource.yaml
sample shows the configuration of the VSphereSource
which got created above using the kn vsphere
cli.
apiVersion: sources.tanzu.vmware.com/v1alpha1
kind: VSphereSource
metadata:
name: vcsa-source
namespace: vmware-system
spec:
address: https://vcsa.mydomain.com
checkpointConfig:
maxAgeSeconds: 300
periodSeconds: 10
payloadEncoding: application/json
secretRef:
name: vcsa-ro-creds
sink:
uri: http://default-broker-ingress.vmware-functions.svc.cluster.local
skipTLSVerify: true
The HorizonSource
provides a simple mechanism to enable users to react to
Horizon events.
VMware Horizon is a platform for delivering virtual desktops and apps efficiently and securely across hybrid cloud for the best end-user digital workspace experience.
This provider supports all audit events (model AuditEventSummary
) exposed
through the Horizon REST API starting with
version
2106
.
The following table lists allowed and required fields for connecting to the Horizon REST API and the respective type values and examples for these fields.
Field | Type | Description | Required | Example |
---|---|---|---|---|
address |
String | URI of the Horizon REST API | true | https://myhorizon.corp.local |
skipTLSVerify |
Boolean | Skip TSL verification | true | true (i.e. ignore errors) |
secretRef |
Object | secretRef holds the name of the Kubernetes secret which is used by the source to authenticate against it. | true | See secret example below. |
sink |
Object | Where to send the events. | true | Default for VEBA is the adress of the RabbitMQ broker: http://default-broker-ingress.vmware-functions.svc.cluster.local |
Create a Kubernetes Secret
as per the name under secretRef
in the
HorizonSource
above which holds the required Horizon credentials. domain
,
username
and password
are required fields. Replace the field values
accordingly.
kubectl create secret generic horizon-credentials --from-literal=domain="example.com" --from-literal=username="horizon-source-account" --from-literal=password='ReplaceMe'
Modify the HorizonSource
example according to your environment.
address
is the HTTPs endpoint of the Horizon API server. To skip TLS and
certificate verification, set skipTLSVerify
to true
.
Change the values under sink
to match your Knative Eventing environment.
apiVersion: sources.tanzu.vmware.com/v1alpha1
kind: HorizonSource
metadata:
name: horizon-example
spec:
sink:
ref:
apiVersion: eventing.knative.dev/v1
kind: Broker
name: example-broker
namespace: default
address: https://horizon.server.example.com
skipTLSVerify: false
secretRef:
name: horizon-credentials
serviceAccountName: horizon-source-sa
If the specified serviceAccountName
does not exist, it will be created
automatically.
kubectl get serviceaccount
NAME SECRETS AGE
default 0 5h7m
horizon-source-sa 0 152m
Verify the new created HorizonSource
:
kn source list
NAME TYPE RESOURCE SINK READY
horizon-example HorizonSource horizonsources.sources.tanzu.vmware.com broker:in-mem-broker True
kubectl get horizonsources
NAME SOURCE SINK READY REASON
horizon-example https://horizon.server.example.com http://broker-ingress.knative-eventing.svc.cluster.local/default/in-mem-broker True
The following example shows a Horizon userloggedin
event displayed via the
event viewer application Sockeye (default in project VEBA).
[...]
specversion: 1.0
type: com.vmware.horizon.vlsi_userloggedin_rest.v0
source: https://horizon.server.example.com
id: 3405990
time: 2023-12-06T13:48:05Z
datacontenttype: application/json
Extensions,
knativearrivaltime: 2023-12-06T13:48:06.324666167Z
Data,
2023/12/06 13:48:06 Broadasting to 0 clients: {"data":{"id":3405990,"machine_dns_name":"horizon.server.example.com","message":"User example.com\\horizonedge has logged in to Horizon REST API","module":"Vlsi","severity":"AUDIT_SUCCESS","time":1701870485733,"type":"VLSI_USERLOGGEDIN_REST","user_id":"S-1-5-21-2404106297-684390199-568881881-4197"},"datacontenttype":"application/json","id":"3405990","knativearrivaltime":"2023-12-06T13:48:06.324666167Z","source":"https://horizon.server.example.com","specversion":"1.0","time":"2023-12-06T13:48:05Z","type":"com.vmware.horizon.vlsi_userloggedin_rest.v0"}
{
"id": 3405990,
"machine_dns_name": "horizon.server.example.com",
"message": "User example.com\\horizonedge has logged in to Horizon REST API",
"module": "Vlsi",
"severity": "AUDIT_SUCCESS",
"time": 1701870485733,
"type": "VLSI_USERLOGGEDIN_REST",
"user_id": "S-1-5-21-2404106297-684390199-568881881-4197"
}
[...]
In order to provide users with the ability to display incoming events from a
source, the VEBA project is using the open-source event viewer application
Sockeye. When using the appliance
form factor the event viewer is accessible via https://veba-fqdn/events
.
The manual installation of Sockeye will be explained in section Deploy Tanzu Sources to KinD.
The following example shows a vSphere DrsVmPoweredOn
event displayed via Sockeye.
[...]
Context Attributes,
specversion: 1.0
type: com.vmware.vsphere.DrsVmPoweredOnEvent.v0
source: https://vcsa.mydomain.com/sdk
id: 16957152
time: 2023-11-27T10:00:08.715999Z
datacontenttype: application/json
Extensions,
eventclass: event
knativearrivaltime: 2023-11-27T10:00:12.697365304Z
vsphereapiversion: 8.0.2.0
Data,
{
"Key": 16957152,
"ChainId": 16957145,
"CreatedTime": "2023-11-27T10:00:08.715999Z",
"UserName": "mydomain.com\\Administrator",
"Datacenter": {
"Name": "DC1",
"Datacenter": {
"Type": "Datacenter",
"Value": "datacenter-1"
}
},
"ComputeResource": {
"Name": "Cluster1",
"ComputeResource": {
"Type": "ClusterComputeResource",
"Value": "domain-c8"
}
},
"Host": {
"Name": "esx01.mydomain.com",
"Host": {
"Type": "HostSystem",
"Value": "host-15"
}
},
"Vm": {
"Name": "vm1",
"Vm": {
"Type": "VirtualMachine",
"Value": "vm-81"
}
},
"Ds": null,
"Net": null,
"Dvs": null,
"FullFormattedMessage": "DRS powered on vm1 on esx01.mydomain.com in DC1",
"ChangeTag": "",
"Template": false
}
[...]
All components follow the Knative logging convention.
The log level (debug
, info
, error
, etc. is configurable per component,
e.g. vsphere-source-webhook
, VSphereSource
adapter, etc.
The default logging level is info
.
The log level for adapters, e.g. a particular VSphereSource
deployment
can
be changed at runtime via the config-logging
ConfigMap
which is created
when deploying the Tanzu Sources for Knative.
⚠️ Note: These settings will affect all adapter (created sources) deployments. Changes to a particular adapter deployment are currently not possible.
kubectl -n vmware-sources edit cm config-logging
An interactive editor opens. Change the settings in the JSON object under the
zap-logger-config
key. For example, to change the log level from info
to
debug
use this configuration in the editor:
apiVersion: v1
data:
# details omitted
zap-logger-config: |
{
"level": "debug"
"development": false,
"outputPaths": ["stdout"],
"errorOutputPaths": ["stderr"],
"encoding": "json",
"encoderConfig": {
"timeKey": "ts",
"levelKey": "level",
"nameKey": "logger",
"callerKey": "caller",
"messageKey": "msg",
"stacktraceKey": "stacktrace",
"lineEnding": "",
"levelEncoder": "",
"timeEncoder": "iso8601",
"durationEncoder": "",
"callerEncoder": ""
}
}
Save and leave the interactive editor to apply the ConfigMap
changes.
Kubernetes will validate and confirm the changes:
configmap/config-logging edited
To verify that the Source
adapter owners (e.g. vsphere-source-webhook
for a
VSphereSource
) have noticed the desired change, inspect the log messages of
the owner (here: vsphere-source-webhook
) Pod
:
vsphere-source-webhook-f7d8ffbc9-4xfwl vsphere-source-webhook {"level":"info","ts":"2022-03-29T12:25:20.622Z","logger":"vsphere-source-webhook","caller":"vspheresource/vsphere.go:250","msg":"update from logging ConfigMap{snip...}
⚠️ Note: To avoid unwanted disruption during event retrieval/delivery, the
changes are not applied automatically to deployed adapters, i.e.
VSphereSource
adapter, etc. The operator is in full control over the lifecycle
(downtime) of the affected Deployment(s)
.
To make the changes take affect for existing adapter Deployment
, an operator
needs to manually perform a rolling upgrade. The existing adapter Pod
will be
terminated and a new instanced created with the desired log level changes.
kubectl get vspheresource
NAME SOURCE SINK READY REASON
example-vc-source https://my-vc.corp.local http://broker-ingress.knative-eventing.svc.cluster.local/default/example-broker True
kubectl rollout restart deployment/example-vc-source-adapter
deployment.apps/example-vc-source-adapter restarted
⚠️ Note: To avoid losing events due to this (brief) downtime, consider enabling the Checkpointing capability.
More details can be found at the Tanzu Sources for Knative repository on Github - Changing Log Levels.
kn vsphere source delete --name vcsim-source --namespace ns-vcsim
kn source delete --name horizon-example --namespace vmware-system
Explore the capabilities that the VMware Tanzu Sources for Knative enables
Install the Appliance to extend your SDDC with our community-sourced functions
Learn more about the Events in vCenter and how to find the right event for your use case
Learn more about Functions in this overview here.