Pulsar Function CRD configurations
This document lists CRD configurations available for Pulsar Functions. The CRD configurations for Pulsar Functions consist of Function configurations and common CRD configurations.
Function configurations
This table lists Pulsar Function configurations.
Field | Description |
---|---|
name | The function name is a string of up to 43 characters. |
classname | The class name of a Pulsar Function. |
tenant | The tenant of a Pulsar Function. |
namespace | The Pulsar namespace of a Pulsar Function. |
clusterName | The Pulsar cluster of a Pulsar Function. |
replicas | The number of instances that you want to run this Pulsar Function. If no value is set, the system will set it to 1 . |
minReplicas | The minimum number of instances that you want to run for this Pulsar function. If no value is set, the system will set it to 1 . When HPA auto-scaling is enabled, the HPA controller scales the Pods up / down based on the values of the minReplicas and maxReplicas options. The number of the Pods should be greater than the value of the minReplicas and be smaller than the value of the maxReplicas . |
maxReplicas | The maximum number of instances that you want to run for this Pulsar function. When the value of the maxReplicas parameter is greater than the value of replicas , it indicates that the Functions controller automatically scales the Pulsar Functions based on the CPU usage. By default, maxReplicas is set to 0, which indicates that auto-scaling is disabled. |
timeout | The message timeout in milliseconds. |
deadLetterTopic | The topic where all messages that were not processed successfully are sent. This parameter is not supported in Python Functions. |
funcConfig | Pulsar Functions configurations in YAML format. |
logTopic | The topic to which the logs of a Pulsar Function are produced. |
autoAck | Whether or not the framework acknowledges messages automatically. This field is required. You can set it to true or false . |
maxMessageRetry | How many times to process a message before giving up. |
processingGuarantee | The processing guarantees (delivery semantics) applied to the function. Available values: atleast_once , atmost_once , effectively_once . |
forwardSourceMessageProperty | Configure whether to pass message properties to a target topic. |
retainOrdering | Function consumes and processes messages in order. |
retainKeyOrdering | Configure whether to retain the key order of messages. |
subscriptionName | Pulsar Functions' subscription name if you want a specific subscription name for the input-topic consumer. |
cleanupSubscription | Configure whether to clean up subscriptions. |
subscriptionPosition | The subscription position. |
Annotations
In Kubernetes, an annotation defines an unstructured Key Value Map (KVM) that can be set by external tools to store and retrieve metadata. annotations
must be a map of string keys and string values. Annotation values must pass Kubernetes annotations validation. For details, see Kubernetes documentation on Annotations.
This example shows how to use an annotation to make an object unmanaged. Therefore, the Controller will skip reconciling unmanaged objects in reconciliation loop.
apiVersion: compute.functionmesh.io/v1alpha1
kind: Function
metadata:
annotations:
compute.functionmesh.io/managed: "false"
Images
This section describes image options available for Pulsar Function, source, sink and Function Mesh CRDs.
Base runner
The base runner is an image base for other runners. The base runner is located at ./pulsar-functions-base-runner
. The base runner image contains basic tool-chains like /pulsar/bin
, /pulsar/conf
and /pulsar/lib
to ensure that the pulsar-admin
CLI tool works properly to support Apache Pulsar Packages.
Runner images
Function Mesh uses runner images as images of Pulsar functions and connectors. Each runner image only contains necessary tool-chains and libraries for specified runtime.
This table lists available Function runtime runner images.
Type | Description |
---|---|
Java runner | The Java runner is based on the base runner and contains the Java function instance to run Java functions or connectors. The streamnative/pulsar-functions-java-runner Java runner is stored at the Docker Hub and is automatically updated to align with Apache Pulsar release. |
Python runner | The Python runner is based on the base runner and contains the Python function instance to run Python functions. You can build your own Python runner to customize Python dependencies. The streamnative/pulsar-functions-python-runner Python runner is located at the Docker Hub and is automatically updated to align with Apache Pulsar release. |
Golang runner | The Golang runner provides all the tool-chains and dependencies required to run Golang functions. The streamnative/pulsar-functions-go-runner Golang runner is located at the Docker Hub and is automatically updated to align with Apache Pulsar release. |
Image pull policies
When the Function Mesh Operator creates a container, it uses the imagePullPolicy
option to determine whether the image should be pulled prior to starting the container. There are three possible values for the imagePullPolicy
option:
Field | Description |
---|---|
Always | Always pull the image. |
Never | Never pull the image. |
IfNotPresent | Only pull the image if the image does not already exist locally. |
State storage
Function Mesh provides the following fields for Stateful functions in the CRD definition.
Field | Description |
---|---|
statefulConfig | The state storage configuration for the Stateful Functions. |
statefulConfig.pulsar.serviceUrl | The service URL that points to the state storage service. By default, the state storage service is the BookKeeper table service. |
statefulConfig.pulsar.javaProvider | (Optional) If you want to overwrite the default configuration, you can use the state storage configuration for the Java runtime. For example, you can change it to other backend services other than the BookKeeper table service. |
statefulConfig.pulsar.javaProvider.className | The Java class name of the state storage provider implementation. The class must implement the org.apache.pulsar.functions.instance.state.StateStoreProvider interface. If not, org.apache.pulsar.functions.instance.state.BKStateStoreProviderImpl will be used. |
statefulConfig.pulsar.javaProvider.config | The configurations that are passed to the state storage provider. |
Window function configurations
Function Mesh provides the following fields for window functions in the CRD definition.
Field | Description |
---|---|
actualWindowFunctionClassName | Optional. The runner class name of the implemented window function. By default, the value is the same as the spec.className . |
lateDataTopic | Optional. The late data topic for the late tuple messages. The late data topic must be defined when specifying a timestamp extractor class (timestampExtractorClassName ). |
maxLagMs | Optional. The maximum lag duration (in milliseconds) of the window function. By default, it is set to 0. |
slidingIntervalCount | Optional. The number of messages before the window slides. |
slidingIntervalDurationMs | Optional. The time duration (in milliseconds) after which the window slides. |
timestampExtractorClassName | Optional. The timestamp extractor class name. It should be set to org.apache.pulsar.functions.windowing.TimestampExtractor . |
watermarkEmitIntervalMs | Optional. The watermark interval (in milliseconds) of the window function. By default, it is set to 1000 ms. |
windowLengthCount | Optional. The number of messages per window. |
windowLengthDurationMs | Optional. The time duration (in milliseconds) of the window. |
Input
The input topics of a Pulsar Function. The following table lists options available for the Input
.
Field | Description |
---|---|
topics | The configuration of the topic from which messages are fetched. |
customSerdeSources | The map of input topics to SerDe class names (as a JSON string). |
customSchemaSources | The map of input topics to Schema class names (as a JSON string). |
sourceSpecs | The map of source specifications to consumer specifications. Consumer specifications include these options: - SchemaType : the built-in schema type or custom schema class name to be used for messages fetched by the function. - SerdeClassName : the SerDe class to be used for messages fetched by the function. - IsRegexPattern : configure whether the input topic adopts a Regex pattern. - SchemaProperties : the schema properties for messages fetched by the function. - ConsumerProperties : the consumer properties for messages fetched by the function. - ReceiverQueueSize : the size of the consumer receive queue. br /> - cryptoConfig : cryptography configurations of the consumer. |
Output
The output topics of a Pulsar Function. This table lists options available for the Output
.
Name | Description |
---|---|
topics | The output topic of a Pulsar Function (If none is specified, no output is written). |
sinkSerdeClassName | The map of output topics to SerDe class names (as a JSON string). |
sinkSchemaType | The built-in schema type or custom schema class name to be used for messages sent by the function. |
producerConf | The producer specifications. Available options: < br />- maxPendingMessages : the maximum number of pending messages. - maxPendingMessagesAcrossPartitions : the maximum number of pending messages across partitions. - useThreadLocalProducers : configure whether the producer uses a thread. - cryptoConfig : cryptography configurations of the producer. - batchBuilder : support key-based batcher. |
customSchemaSinks | The map of output topics to Schema class names (as a JSON string). |
Resources
When you specify a function or connector, you can optionally specify how much of each resource they need. The resources available to specify are CPU and memory (RAM).
If the node where a Pod is running has enough of a resource available, it's possible (and allowed) for a pod to use more resources than its request
for that resource specifies. However, a pod is not allowed to use more than its resource limit
.
Secrets
Function Mesh provides the secretsMap
field for Function, Source, and Sink in the CRD definition. You can refer to the created secrets under the same namespace and the controller can include those referred secrets. The secrets are provide by EnvironmentBasedSecretsProvider
, which can be used by context.getSecret()
in Pulsar functions and connectors.
The secretsMap
field is defined as a Map
struct with String
keys and SecretReference
values. The key indicates the environment value in the container, and the SecretReference
is defined as below.
Field | Description |
---|---|
path | The name of the secret in the Pod's namespace to select from. |
key | The key of the secret to select from. It must be a valid secret key. |
Suppose that there is a Kubernetes Secret named credential-secret
defined as below:
apiVersion: v1
data:
username: foo
password: bar
kind: Secret
metadata:
name: credential-secret
type: Opaque
To use it in Pulsar Functions in a secure way, you can define the secretsMap
in the Custom Resource:
secretsMap:
username:
path: credential-secret
key: username
password:
path: credential-secret
key: password
Then, in the Pulsar Functions and Connectors, you can call context.getSecret("username")
to get the secret value (foo
).
Authentication
Function Mesh provides the tlsConfig
, tlsSecret
, authSecret
, authConfig
fields for Function, Source, and Sink in the CRD definition. You can configure TLS encryption, TLS authentication, and OAuth2 authentication using the following configurations.
Note
The TLS configurations and TLS Secret configurations are exclusive. If you configure TLS configurations, TLS Secret configurations will not take effect.
TLS configurations
Field Description allowInsecure
Allow insecure TLS connection. certSecretKey
The Secret key. certSecretName
The Secret name. enabled
Enable TLS configurations. hostnameVerification
Enable hostname verification. TLS Secret
Field Description tlsAllowInsecureConnection
Allow insecure TLS connection. By default, it is set to false
.tlsHostnameVerificationEnable
Enable hostname verification. By default, it is set to true
.tlsTrustCertsFilePath
The path of the TLS trust certificate file. Authentication Secret
Field Description clientAuthenticationPlugin
The client authentication plugin. clientAuthenticationParameters
The client authentication parameters. Authentication configurations
Note
Currently, only OAuth2 authentication configurations are supported. For other authentication methods, you can configure them using the Authentication Secret.
Field Description OAuth2 authentication audience
The OAuth2 "resource server" identifier for the Pulsar cluster. issuerUrl
The URL of the authentication provider that allows a Pulsar client to obtain an access token. scope
The scope of an access request. For more information, see access token scope. keySecretName
The name of the Kubernetes secret. keySecretKey
The key of the Kubernetes secret, which contains the content of the OAuth2 private key.
Packages
Function Mesh supports running Pulsar Functions in Java, Python and Go. This table lists fields available for running Pulsar Functions in different languages.
Field | Description |
---|---|
jarLocation | Path to the JAR file for the function. It is only available for Pulsar functions written in Java. |
goLocation | Path to the JAR file for the function. It is only available for Pulsar functions written in Go. |
pyLocation | Path to the JAR file for the function. It is only available for Pulsar functions written in Python. |
extraDependenciesDir | It specifies the dependent directory for the JAR package. |
Log levels
By default, the log level for Pulsar functions is info
. Function Mesh supports setting multiple log levels for Pulsar functions.
Notes
The log levels are only available for the Go runtime 2.11 or higher.
Critical | Description | Java runtime | Python runtime | Go runtime |
---|---|---|---|---|
off | Nothing will be logged. | ✔ | ✗ | ✗ |
trace | The logs that contain the most detailed messages. | ✔ | ✔ | ✔ |
debug | The logs that are used for interactive investigation during development. These logs primarily contain information useful for debugging and have no long-term value. | ✔ | ✔ | ✔ |
warn | The logs that highlight an abnormal or unexpected event in the function, but do not cause the function to stop. | ✔ | ✔ | ✔ |
error | The logs that highlight when the function is stopped due to a failure. These indicate a failure in the current activity, not an application-wide failure. | ✔ | ✔ | ✔ |
fatal | The logs that contain fatal errors. It indicates that the function is unusable. | ✔ | ✔ | ✔ |
all | All events are logged. | ✔ | ✗ | ✗ |
panic | It indicates the function is in panic. | ✗ | ✗ | ✔ |
For details about how to set log levels and produce logs for Pulsar functions, see produce function logs.
Log rotation policies
With more and more logs being written to the log file, the log file grows in size. Therefore, Function Mesh supports log rotation to avoid large files that could create issues when opening them. You can set the log rotation policies based on the time or the log file size.
Field | Description |
---|---|
TimedPolicyWithDaily | Rotate the log file daily. |
TimedPolicyWithWeekly | Rotate the log file weekly. |
TimedPolicyWithMonthly | Rotate the log file monthly. |
SizedPolicyWith10MB | Rotate the log file at every 10 MB. |
SizedPolicyWith50MB | Rotate the log file at every 50 MB. |
SizedPolicyWith100MB | Rotate the log file at every 100 MB. |
For details about how to set a log rotation policy, see set log rotation policies.
Cluster location
In Function Mesh, the Pulsar cluster is defined through a ConfigMap. Pods can consume ConfigMaps as environment variables in a volume. The Pulsar cluster ConfigMap defines the Pulsar cluster URLs.
Field | Description |
---|---|
webServiceURL | The Web service URL of the Pulsar cluster. |
brokerServiceURL | The broker service URL of the Pulsar cluster. |
Pod specifications
Function Mesh supports customizing the Pod running function instance. This table lists sub-fields available for the pod
field.
Field | Description |
---|---|
labels | Specify labels attached to a Pod. |
nodeSelector | Specify a map of key-value pairs. For a Pod running on a node, the node must have each of the indicated key-value pairs as labels. |
affinity | Specify the scheduling constraints of a Pod. |
tolerations | Specify the tolerations of a Pod. |
annotations | Specify the annotations attached to a Pod. |
securityContext | Specify the security context for a Pod. |
terminationGracePeriodSeconds | The amount of time that Kubernetes gives for a Pod before terminating it. |
volumes | A list of volumes that can be mounted by containers belonging to a Pod. |
imagePullSecrets | An optional list of references to secrets in the same namespace for pulling any of the images used by a Pod. |
serviceAccountName | Specify the name of the service account that is used to run Pulsar Functions or connectors. |
initContainers | The initialization containers belonging to a Pod. A typical use case could be using an initialization container to download a remote JAR to a local path. |
sidecars | Sidecar containers run together with the main function container in a Pod. |
builtinAutoscaler | Specify the built-in autoscaling rules.
If you configure the |
autoScalingMetrics | Specify how to scale based on customized metrics defined in connectors. For details, see MetricSpec v2 autoscaling. |
autoScalingBehavior | Configure the scaling behavior of the target in both up and down directions (scaleUp and scaleDown fields respectively). If not specified, the default Kubernetes scaling behaviors are adopted. For details, see HorizontalPodAutoscalerBehavior v2 autoscaling. |
env | Specify the environment variables to expose on the containers. It is a key/value map. You can either use the value option to specify a particular value for the environment variable or use the valueFrom option to specify the source for the environment variable's value, as shown below.
|