1. Packages
  2. Kubernetes
  3. How-to Guides
  4. Managing Resources with Server-Side Apply
Kubernetes v4.18.3 published on Thursday, Oct 31, 2024 by Pulumi

Managing Resources with Server-Side Apply

kubernetes logo
Kubernetes v4.18.3 published on Thursday, Oct 31, 2024 by Pulumi

    Server-Side Apply (SSA) is a resource management strategy that was introduced in Kubernetes v1.13. Clients using SSA can safely share the management of Kubernetes resources by making the API Server responsible for computing diffs and resolving conflicts.

    The v4 release of the Pulumi Kubernetes provider enables SSA by default. Using SSA provides the following benefits:

    1. Kubernetes resources may be safely managed by more than one controller.
    2. It is now possible to “Upsert” resources; create the resource if it does not exist, or apply the configuration to an existing resource.
    3. It is now possible to patch resources with the Patch resource types in the SDK. Each resource type in the SDK has a corresponding Patch resource.
    4. The last-applied-configuration annotation is no longer used.

    This guide will show you how to enable SSA support and use these features to manage Kubernetes resources.

    Prerequisites

    Server-Side Apply support requires patch permission on the Kubernetes cluster for update operations. Previews are computed using input diffs, so they may be performed with restricted permissions.

    Enable Server-Side Apply

    SSA is enabled by default in pulumi-kubernetes v4, but the enableServerSideApply Provider option may be set explicitly in the following ways:

    1. Set the stack config explicitly with pulumi config set kubernetes:enableServerSideApply true
    2. Set the stack config using an environment variable: PULUMI_K8S_ENABLE_SERVER_SIDE_APPLY=true
    3. Set the enableServerSideApply option on a first-class Provider as shown in the following example
    import * as pulumi from "@pulumi/pulumi";
    import * as kubernetes from "@pulumi/kubernetes";
    
    const provider = new kubernetes.Provider("k8s", {enableServerSideApply: true});
    
    import pulumi_kubernetes as kubernetes
    
    provider = kubernetes.Provider("k8s", enable_server_side_apply=True)
    
    package main
    
    import (
        "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
            _, err := kubernetes.NewProvider(ctx, "k8s", &kubernetes.ProviderArgs{
                EnableServerSideApply: pulumi.BoolPtr(true),
            })
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using Pulumi;
    using Pulumi.Kubernetes;
    
    await Deployment.RunAsync(() =>
    {
        var provider = new Provider("k8s", new ProviderArgs
        {
            EnableServerSideApply = true,
        });
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.kubernetes;
    import com.pulumi.kubernetes.ProviderArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var provider = new Provider("provider", ProviderArgs.builder()
                .enableServerSideApply(true)
                .build());
    
        }
    }
    
    resources:
        provider:
            type: pulumi:providers:kubernetes
            properties:
                enableServerSideApply: true
    
    Users may opt into the previous default Client-side Apply (CSA) mode by setting the enableServerSideApply provider configuration to “false”.

    Upsert a Resource

    With Server-Side Apply mode enabled, you can “upsert” a resource; that is, update a resource if it already exists, or create it if it does not yet exist. You can set the pulumi.com/patchForce annotation if you want to force an override for any conflicts with an existing version of the resource.

    import * as pulumi from "@pulumi/pulumi";
    import * as kubernetes from "@pulumi/kubernetes";
    
    const provider = new kubernetes.Provider("k8s", {enableServerSideApply: true});
    const example = new kubernetes.core.v1.ConfigMap("example", {
        metadata: {
            annotations: {
                "pulumi.com/patchForce": "true",
            },
            name: "example",
        },
        data: {
            foo: "bar",
        },
    }, {
        provider: provider,
    });
    
    import pulumi
    import pulumi_kubernetes as kubernetes
    
    provider = kubernetes.Provider("k8s", enable_server_side_apply=True)
    example = kubernetes.core.v1.ConfigMap("example",
                                           metadata=kubernetes.meta.v1.ObjectMetaArgs(
                                               annotations={
                                                   "pulumi.com/patchForce": "true",
                                               },
                                               name="example",
                                           ),
                                           data={
                                               "foo": "bar",
                                           },
                                           opts=pulumi.ResourceOptions(provider=provider))
    
    package main
    
    import (
        "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes"
        corev1 "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/core/v1"
        metav1 "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/meta/v1"
        "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
        pulumi.Run(func(ctx *pulumi.Context) error {
            provider, err := kubernetes.NewProvider(ctx, "provider", &kubernetes.ProviderArgs{
                EnableServerSideApply: pulumi.Bool(true),
            })
            if err != nil {
                return err
            }
            _, err = corev1.NewConfigMap(ctx, "example", &corev1.ConfigMapArgs{
                Metadata: &metav1.ObjectMetaArgs{
                    Annotations: pulumi.StringMap{
                        "pulumi.com/patchForce": pulumi.String("true"),
                    },
                    Name: pulumi.String("example"),
                },
                Data: pulumi.StringMap{
                    "foo": pulumi.String("bar"),
                },
            }, pulumi.Provider(provider))
            if err != nil {
                return err
            }
            return nil
        })
    }
    
    using System.Collections.Generic;
    using Pulumi;
    using Kubernetes = Pulumi.Kubernetes;
    
    return await Deployment.RunAsync(() =>
    {
        var provider = new Kubernetes.Provider("provider", new()
        {
            EnableServerSideApply = true,
        });
    
        var example = new Kubernetes.Core.V1.ConfigMap("example", new()
        {
            Metadata = new Kubernetes.Types.Inputs.Meta.V1.ObjectMetaArgs
            {
                Annotations =
                {
                    { "pulumi.com/patchForce", "true" },
                },
                Name = "example",
            },
            Data =
            {
                { "foo", "bar" },
            },
        }, new CustomResourceOptions
        {
            Provider = provider,
        });
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.kubernetes;
    import com.pulumi.kubernetes.ProviderArgs;
    import com.pulumi.kubernetes.core_v1.ConfigMap;
    import com.pulumi.kubernetes.core_v1.ConfigMapArgs;
    import com.pulumi.kubernetes.meta_v1.inputs.ObjectMetaArgs;
    import com.pulumi.resources.CustomResourceOptions;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var provider = new Provider("provider", ProviderArgs.builder()
                .enableServerSideApply(true)
                .build());
    
            var example = new ConfigMap("example", ConfigMapArgs.builder()
                .metadata(ObjectMetaArgs.builder()
                    .annotations(Map.of("pulumi.com/patchForce", "true"))
                    .name("example")
                    .build())
                .data(Map.of("foo", "bar"))
                .build(), CustomResourceOptions.builder()
                    .provider(provider)
                    .build());
    
        }
    }
    
    resources:
        provider:
            type: pulumi:providers:kubernetes
            properties:
                enableServerSideApply: true
        example:
            type: kubernetes:core/v1:ConfigMap
            properties:
                metadata:
                    annotations:
                        pulumi.com/patchForce: "true"
                    name:
                        example
                data:
                    foo: bar
            options:
                provider: ${provider}
    

    Patch a Resource

    With Server-Side Apply mode enabled, you can patch an existing resource to make changes to it. Every resource type in the SDK includes a corresponding Patch resource for this purpose. Patch resources have a few important differences from typical SDK resources:

    1. The resource name (.metadata.name) is required, and auto-naming is not supported. The patch operation applies to an existing resource, so this field is used to specify which resource to patch. Remember to specify the namespace as well if required.
    2. All other fields are optional, even if they would be required for a normal resource. The patch specification must be unambiguous, but it is not necessary to specify the complete resource.
    3. More than one Patch resource may modify the same underlying Kubernetes resource. Each Patch resource is assigned a unique FieldManager name by default, or you can manually specify one using the pulumi.com/patchFieldManager annotation.
    4. Server-Side Apply mode must be enabled to use Patch resources.
    5. Deleting a Patch resource will undo the patched changes to the Kubernetes resource, but the resource will not be deleted. Any fields that become unmanaged during this process will reset to their default values, so the resulting resource may have changes from its original state before patching. See the upstream docs for more information about this behavior.

    You can set the pulumi.com/patchForce annotation if you want to force an override for any conflicts with an existing version of the resource.

    import * as pulumi from "@pulumi/pulumi";
    import * as kubernetes from "@pulumi/kubernetes";
    
    const provider = new kubernetes.Provider("provider", {enableServerSideApply: true});
    const patch1 = new kubernetes.core.v1.ConfigMapPatch("patch1", {
        metadata: {
            annotations: {
                "pulumi.com/patchForce": "true",
            },
            name: "example",
        },
        data: {
            foo: "bar",
        },
    }, {
        provider: provider,
    });
    const patch2 = new kubernetes.core.v1.ConfigMapPatch("patch2", {
        metadata: {
            annotations: {
                "pulumi.com/patchForce": "true",
            },
            name: "example",
        },
        data: {
            oof: "rab",
        },
    }, {
        provider: provider,
        dependsOn: [patch1],
    });
    
    import pulumi
    import pulumi_kubernetes as kubernetes
    
    provider = kubernetes.Provider("k8s", enable_server_side_apply=True)
    patch1 = kubernetes.core.v1.ConfigMapPatch("patch1",
                                               metadata=kubernetes.meta.v1.ObjectMetaPatchArgs(
                                                   annotations={
                                                       "pulumi.com/patchForce": "true",
                                                   },
                                                   name="example",
                                               ),
                                               data={
                                                   "foo": "bar",
                                               },
                                               opts=pulumi.ResourceOptions(provider=provider))
    patch2 = kubernetes.core.v1.ConfigMapPatch("patch2",
                                               metadata=kubernetes.meta.v1.ObjectMetaPatchArgs(
                                                   annotations={
                                                       "pulumi.com/patchForce": "true",
                                                   },
                                                   name="example",
                                               ),
                                               data={
                                                   "oof": "rab",
                                               },
                                               opts=pulumi.ResourceOptions(provider=provider,
                                                                           depends_on=[patch1]))
    
    package main
    
    import (
        "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes"
        corev1 "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/core/v1"
        metav1 "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/meta/v1"
        "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
        pulumi.Run(func(ctx *pulumi.Context) error {
            provider, err := kubernetes.NewProvider(ctx, "provider", &kubernetes.ProviderArgs{
                EnableServerSideApply: pulumi.Bool(true),
            })
            if err != nil {
                return err
            }
            patch1, err := corev1.NewConfigMapPatch(ctx, "patch1", &corev1.ConfigMapPatchArgs{
                Metadata: &metav1.ObjectMetaPatchArgs{
                    Annotations: pulumi.StringMap{
                        "pulumi.com/patchForce": pulumi.String("true"),
                    },
                    Name: pulumi.String("example"),
                },
                Data: pulumi.StringMap{
                    "foo": pulumi.String("bar"),
                },
            }, pulumi.Provider(provider))
            if err != nil {
                return err
            }
            _, err = corev1.NewConfigMapPatch(ctx, "patch2", &corev1.ConfigMapPatchArgs{
                Metadata: &metav1.ObjectMetaPatchArgs{
                    Annotations: pulumi.StringMap{
                        "pulumi.com/patchForce": pulumi.String("true"),
                    },
                    Name: pulumi.String("example"),
                },
                Data: pulumi.StringMap{
                    "oof": pulumi.String("rab"),
                },
            }, pulumi.Provider(provider), pulumi.DependsOn([]pulumi.Resource{
                patch1,
            }))
            if err != nil {
                return err
            }
            return nil
        })
    }
    
    using System.Collections.Generic;
    using Pulumi;
    using Kubernetes = Pulumi.Kubernetes;
    
    return await Deployment.RunAsync(() =>
    {
        var provider = new Kubernetes.Provider("provider", new()
        {
            EnableServerSideApply = true,
        });
    
        var patch1 = new Kubernetes.Core.V1.ConfigMapPatch("patch1", new()
        {
            Metadata = new Kubernetes.Types.Inputs.Meta.V1.ObjectMetaPatchArgs
            {
                Annotations =
                {
                    { "pulumi.com/patchForce", "true" },
                },
                Name = "example",
            },
            Data =
            {
                { "foo", "bar" },
            },
        }, new CustomResourceOptions
        {
            Provider = provider,
        });
    
        var patch2 = new Kubernetes.Core.V1.ConfigMapPatch("patch2", new()
        {
            Metadata = new Kubernetes.Types.Inputs.Meta.V1.ObjectMetaPatchArgs
            {
                Annotations =
                {
                    { "pulumi.com/patchForce", "true" },
                },
                Name = "example",
            },
            Data =
            {
                { "oof", "rab" },
            },
        }, new CustomResourceOptions
        {
            Provider = provider,
            DependsOn = new[]
            {
                patch1,
            },
        });
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.kubernetes;
    import com.pulumi.kubernetes.ProviderArgs;
    import com.pulumi.kubernetes.core_v1.ConfigMapPatch;
    import com.pulumi.kubernetes.core_v1.ConfigMapPatchArgs;
    import com.pulumi.kubernetes.meta_v1.inputs.ObjectMetaPatchArgs;
    import com.pulumi.resources.CustomResourceOptions;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var provider = new Provider("provider", ProviderArgs.builder()
                .enableServerSideApply(true)
                .build());
    
            var patch1 = new ConfigMapPatch("patch1", ConfigMapPatchArgs.builder()
                .metadata(ObjectMetaPatchArgs.builder()
                    .annotations(Map.of("pulumi.com/patchForce", "true"))
                    .name("example")
                    .build())
                .data(Map.of("foo", "bar"))
                .build(), CustomResourceOptions.builder()
                    .provider(provider)
                    .build());
    
            var patch2 = new ConfigMapPatch("patch2", ConfigMapPatchArgs.builder()
                .metadata(ObjectMetaPatchArgs.builder()
                    .annotations(Map.of("pulumi.com/patchForce", "true"))
                    .name("example")
                    .build())
                .data(Map.of("oof", "rab"))
                .build(), CustomResourceOptions.builder()
                    .provider(provider)
                    .dependsOn(patch1)
                    .build());
    
        }
    }
    
    resources:
        provider:
            type: pulumi:providers:kubernetes
            properties:
                enableServerSideApply: true
        patch1:
            type: kubernetes:core/v1:ConfigMapPatch
            properties:
                metadata:
                    annotations:
                        pulumi.com/patchForce: "true"
                    name:
                        example
                data:
                    foo: bar
            options:
                provider: ${provider}
        patch2:
            type: kubernetes:core/v1:ConfigMapPatch
            properties:
                metadata:
                    annotations:
                        pulumi.com/patchForce: "true"
                    name:
                        example
                data:
                    oof: rab
            options:
                dependsOn:
                    - ${patch1}
                provider: ${provider}
    

    Delete an existing field using Patch

    With Server-Side Apply mode enabled, you can also remove a field from an existing resource. This example demonstrates removing .labels.foo from an existing Namespace.

    In most cases, it is not necessary to set the fieldManager name explicitly because the provider automatically assigns a unique manager name to each resource by default.

    Deleting an existing field is a special case where this is needed. In this workflow, we first take ownership of the field to delete (using the patch1 resource in this example), and then set it to null/undefined in a subsequent step (using the patch2 in this example). Since both patches need to operate on the same field, they must use the same fieldManager rather than using the auto-assigned value. Also note the use of the patchForce option to explicitly take ownership of the field from another fieldManager.

    import * as pulumi from "@pulumi/pulumi";
    import * as kubernetes from "@pulumi/kubernetes";
    
    const uuid = "ee0d1b94-e749-4de4-ae8a-e4319a7f3ef2"; // Arbitrary UUID
    const provider = new kubernetes.Provider("provider", {enableServerSideApply: true});
    const patch1 = new kubernetes.core.v1.NamespacePatch("patch1", {metadata: {
            name: "foo",
            annotations: {
                "pulumi.com/patchForce": "true",
                "pulumi.com/patchFieldManager": uuid,
            },
            labels: {
                foo: "",
            },
        }}, {
        provider: provider,
    });
    const patch2 = new kubernetes.core.v1.NamespacePatch("patch2", {metadata: {
            name: "foo",
            annotations: {
                "pulumi.com/patchForce": "true",
                "pulumi.com/patchFieldManager": uuid,
            },
            labels: {
                foo: undefined,
            },
        }}, {
        provider: provider,
        dependsOn: [patch1],
    });
    
    import pulumi
    import pulumi_kubernetes as kubernetes
    
    uuid = "ee0d1b94-e749-4de4-ae8a-e4319a7f3ef2" # Arbitrary UUID
    provider = pulumi.providers.Kubernetes("provider", enable_server_side_apply=True)
    patch1 = kubernetes.core.v1.NamespacePatch("patch1", metadata=kubernetes.meta.v1.ObjectMetaPatchArgs(
        name="foo",
        annotations={
            "pulumi.com/patchForce": "true",
            "pulumi.com/patchFieldManager": uuid,
        },
        labels={
            "foo": "",
        },
    ), opts=pulumi.ResourceOptions(provider=provider))
    patch2 = kubernetes.core.v1.NamespacePatch("patch2", metadata=kubernetes.meta.v1.ObjectMetaPatchArgs(
        name="foo",
        annotations={
            "pulumi.com/patchForce": "true",
            "pulumi.com/patchFieldManager": uuid,
        },
        labels={
            "foo": None,
        },
    ), opts=pulumi.ResourceOptions(provider=provider, depends_on=[patch1]))
    
    package main
    
    import (
        "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes"
        corev1 "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/core/v1"
        metav1 "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/meta/v1"
        "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
        pulumi.Run(func(ctx *pulumi.Context) error {
            uuid := "ee0d1b94-e749-4de4-ae8a-e4319a7f3ef2" // Arbitrary UUID
            provider, err := kubernetes.NewProvider(ctx, "provider", &kubernetes.ProviderArgs{
                EnableServerSideApply: pulumi.Bool(true),
            })
            if err != nil {
                return err
            }
            patch1, err := corev1.NewNamespacePatch(ctx, "patch1", &corev1.NamespacePatchArgs{
                Metadata: &metav1.ObjectMetaPatchArgs{
                    Name: pulumi.String("foo"),
                    Annotations: pulumi.StringMap{
                        "pulumi.com/patchForce":        pulumi.String("true"),
                        "pulumi.com/patchFieldManager": pulumi.String(uuid),
                    },
                    Labels: pulumi.StringMap{
                        "foo": pulumi.String(""),
                    },
                },
            }, pulumi.Provider(provider))
            if err != nil {
                return err
            }
            _, err = corev1.NewNamespacePatch(ctx, "patch2", &corev1.NamespacePatchArgs{
                Metadata: &metav1.ObjectMetaPatchArgs{
                    Name: pulumi.String("foo"),
                    Annotations: pulumi.StringMap{
                        "pulumi.com/patchForce":        pulumi.String("true"),
                        "pulumi.com/patchFieldManager": pulumi.String(uuid),
                    },
                    Labels: pulumi.StringMap{
                        "foo": nil,
                    },
                },
            }, pulumi.Provider(provider), pulumi.DependsOn([]pulumi.Resource{
                patch1,
            }))
            if err != nil {
                return err
            }
            return nil
        })
    }
    
    using System.Collections.Generic;
    using Pulumi;
    using Kubernetes = Pulumi.Kubernetes;
    
    return await Deployment.RunAsync(() =>
    {
        var uuid = "ee0d1b94-e749-4de4-ae8a-e4319a7f3ef2"; // Arbitrary UUID
    
        var provider = new Kubernetes.Provider("provider", new()
        {
            EnableServerSideApply = true,
        });
    
        var patch1 = new Kubernetes.Core.V1.NamespacePatch("patch1", new()
        {
            Metadata = new Kubernetes.Types.Inputs.Meta.V1.ObjectMetaPatchArgs
            {
                Name = "foo",
                Annotations =
                {
                    { "pulumi.com/patchForce", "true" },
                    { "pulumi.com/patchFieldManager", uuid },
                },
                Labels =
                {
                    { "foo", "" },
                },
            },
        }, new CustomResourceOptions
        {
            Provider = provider,
        });
    
        var patch2 = new Kubernetes.Core.V1.NamespacePatch("patch2", new()
        {
            Metadata = new Kubernetes.Types.Inputs.Meta.V1.ObjectMetaPatchArgs
            {
                Name = "foo",
                Annotations =
                {
                    { "pulumi.com/patchForce", "true" },
                    { "pulumi.com/patchFieldManager", uuid },
                },
                Labels =
                {
                    { "foo", null },
                },
            },
        }, new CustomResourceOptions
        {
            Provider = provider,
            DependsOn = new[]
            {
                patch1,
            },
        });
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.kubernetes;
    import com.pulumi.kubernetes.ProviderArgs;
    import com.pulumi.kubernetes.core_v1.NamespacePatch;
    import com.pulumi.kubernetes.core_v1.NamespacePatchArgs;
    import com.pulumi.kubernetes.meta_v1.inputs.ObjectMetaPatchArgs;
    import com.pulumi.resources.CustomResourceOptions;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var uuid = "ee0d1b94-e749-4de4-ae8a-e4319a7f3ef2"; // Arbitrary UUID
    
            var provider = new Provider("provider", ProviderArgs.builder()
                .enableServerSideApply(true)
                .build());
    
            var patch1 = new NamespacePatch("patch1", NamespacePatchArgs.builder()
                .metadata(ObjectMetaPatchArgs.builder()
                    .name("foo")
                    .annotations(Map.ofEntries(
                        Map.entry("pulumi.com/patchForce", "true"),
                        Map.entry("pulumi.com/patchFieldManager", uuid)
                    ))
                    .labels(Map.of("foo", ""))
                    .build())
                .build(), CustomResourceOptions.builder()
                    .provider(provider)
                    .build());
    
            var patch2 = new NamespacePatch("patch2", NamespacePatchArgs.builder()
                .metadata(ObjectMetaPatchArgs.builder()
                    .name("foo")
                    .annotations(Map.ofEntries(
                        Map.entry("pulumi.com/patchForce", "true"),
                        Map.entry("pulumi.com/patchFieldManager", uuid)
                    ))
                    .labels(Map.of("foo", null))
                    .build())
                .build(), CustomResourceOptions.builder()
                    .provider(provider)
                    .dependsOn(patch1)
                    .build());
    
        }
    }
    
    variables:
        uuid: ee0d1b94-e749-4de4-ae8a-e4319a7f3ef2 # Arbitrary UUID
    resources:
        provider:
            type: pulumi:providers:kubernetes
            properties:
                enableServerSideApply: true
        patch1:
            type: kubernetes:core/v1:NamespacePatch
            properties:
                metadata:
                    name: foo
                    annotations:
                        pulumi.com/patchForce: "true"
                        pulumi.com/patchFieldManager: ${uuid}
                    labels:
                        foo: ""
            options:
                provider: ${provider}
        patch2:
            type: kubernetes:core/v1:NamespacePatch
            properties:
                metadata:
                    name: foo
                    annotations:
                        pulumi.com/patchForce: "true"
                        pulumi.com/patchFieldManager: ${uuid}
                    labels:
                        foo: null
            options:
                provider: ${provider}
                dependsOn:
                    - ${patch1}
    

    Handle Field Conflicts on Existing Resources

    After a resource is deployed to the cluster, it is possible for other controllers to start managing it. Thanks to the power of SSA, it is possible to see a detailed record of which controller last changed every field for the resource. An additional benefit of this fine-grained tracking is the ability to deliberately resolve conflicts rather than inadvertently overwriting changes made by another controller.

    If you encounter a field conflict, there are several options for resolving the conflict:

    1. Overwrite conflicts by using the patchForce option. This option can be enabled either by setting an annotation, or by using the PULUMI_K8S_ENABLE_PATCH_FORCE environment variable.
    2. Use the ignoreChanges resource option to skip the update for the conflicting field.
    3. Transfer ownership of the conflicting field to another field manager. See the upstream documentation for additional information about this approach.

    Use the PULUMI_K8S_ENABLE_PATCH_FORCE environment variable for a one-time override

    # Enable patch force for the target resource. In this example, we use the `**` wildcard to ignore most of the URN,
    # and match based on the type and name of the resource. (type=DeploymentPatch, name=example)
    PULUMI_K8S_ENABLE_PATCH_FORCE="true" pulumi up --target="**DeploymentPatch::example"
    

    Set the pulumi.com/patchForce annotation to persistently overwrite any field conflicts for a resource

    import * as pulumi from "@pulumi/pulumi";
    import * as kubernetes from "@pulumi/kubernetes";
    
    const provider = new kubernetes.Provider("k8s", {enableServerSideApply: true});
    const example = new kubernetes.core.v1.ConfigMap("example", {
        metadata: {
            annotations: {
                "pulumi.com/patchForce": "true",
            },
            name: "example",
        },
        data: {
            foo: "bar",
        },
    }, {
        provider: provider,
    });
    
    import pulumi
    import pulumi_kubernetes as kubernetes
    
    provider = kubernetes.Provider("k8s", enable_server_side_apply=True)
    example = kubernetes.core.v1.ConfigMap("example",
                                           metadata=kubernetes.meta.v1.ObjectMetaArgs(
                                               annotations={
                                                   "pulumi.com/patchForce": "true",
                                               },
                                               name="example",
                                           ),
                                           data={
                                               "foo": "bar",
                                           },
                                           opts=pulumi.ResourceOptions(provider=provider))
    
    package main
    
    import (
        "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes"
        corev1 "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/core/v1"
        metav1 "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/meta/v1"
        "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
        pulumi.Run(func(ctx *pulumi.Context) error {
            provider, err := kubernetes.NewProvider(ctx, "provider", &kubernetes.ProviderArgs{
                EnableServerSideApply: pulumi.Bool(true),
            })
            if err != nil {
                return err
            }
            _, err = corev1.NewConfigMap(ctx, "example", &corev1.ConfigMapArgs{
                Metadata: &metav1.ObjectMetaArgs{
                    Annotations: pulumi.StringMap{
                        "pulumi.com/patchForce": pulumi.String("true"),
                    },
                    Name: pulumi.String("example"),
                },
                Data: pulumi.StringMap{
                    "foo": pulumi.String("bar"),
                },
            }, pulumi.Provider(provider))
            if err != nil {
                return err
            }
            return nil
        })
    }
    
    using System.Collections.Generic;
    using Pulumi;
    using Kubernetes = Pulumi.Kubernetes;
    
    return await Deployment.RunAsync(() =>
    {
        var provider = new Kubernetes.Provider("provider", new()
        {
            EnableServerSideApply = true,
        });
    
        var example = new Kubernetes.Core.V1.ConfigMap("example", new()
        {
            Metadata = new Kubernetes.Types.Inputs.Meta.V1.ObjectMetaArgs
            {
                Annotations =
                {
                    { "pulumi.com/patchForce", "true" },
                },
                Name = "example",
            },
            Data =
            {
                { "foo", "bar" },
            },
        }, new CustomResourceOptions
        {
            Provider = provider,
        });
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.kubernetes;
    import com.pulumi.kubernetes.ProviderArgs;
    import com.pulumi.kubernetes.core_v1.ConfigMap;
    import com.pulumi.kubernetes.core_v1.ConfigMapArgs;
    import com.pulumi.kubernetes.meta_v1.inputs.ObjectMetaArgs;
    import com.pulumi.resources.CustomResourceOptions;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var provider = new Provider("provider", ProviderArgs.builder()
                .enableServerSideApply(true)
                .build());
    
            var example = new ConfigMap("example", ConfigMapArgs.builder()
                .metadata(ObjectMetaArgs.builder()
                    .annotations(Map.of("pulumi.com/patchForce", "true"))
                    .name("example")
                    .build())
                .data(Map.of("foo", "bar"))
                .build(), CustomResourceOptions.builder()
                    .provider(provider)
                    .build());
    
        }
    }
    
    resources:
        provider:
            type: pulumi:providers:kubernetes
            properties:
                enableServerSideApply: true
        example:
            type: kubernetes:core/v1:ConfigMap
            properties:
                metadata:
                    annotations:
                        pulumi.com/patchForce: "true"
                    name:
                        example
                data:
                    foo: bar
            options:
                provider: ${provider}
    

    Use ignoreChanges to allow another controller to manage a conflicting field

    Cert-manager is a common example of an operator that mutates other cluster resources. Consider the following sequence of events:

    1. Deploy the cert-manager operator.
    2. Deploy a ValidatingWebhookConfiguration resource “X” using Pulumi with the cert-manager.io/inject-ca-from annotation set.
    3. The cert-manager operator updates “X” by setting the webhooks[*].clientConfig.caBundle field(s). This field is now managed by cert-manager rather than by Pulumi, and doesn’t match Pulumi’s configuration.
    4. Run another Pulumi update, and the field conflict is detected.

    Pulumi provides a way to ignore changes for particular fields using the ignoreChanges resource option. Set this resource option on resource “X” to tell Pulumi to ignore changes to this field since another controller is managing it.

    const res = new ValidatingWebhookConfiguration("res",
        { prop: "new-value" },
        { ignoreChanges: ["webhooks[*].clientConfig", "webhooks[*].namespaceSelector"] });
    
    res = ValidatingWebhookConfiguration("res",
        prop="new-value",
        opts=ResourceOptions(ignore_changes=["webhooks[*].clientConfig", "webhooks[*].namespaceSelector"]))
    
    res, _ := NewValidatingWebhookConfiguration(ctx, "res",
        &ValidatingWebhookConfigurationArgs{Prop: "new-value"},
        pulumi.IgnoreChanges([]string{"webhooks[*].clientConfig", "webhooks[*].namespaceSelector"}))
    
    var res = new ValidatingWebhookConfiguration("res",
        new ValidatingWebhookConfigurationArgs { Prop = "new-value" },
        new CustomResourceOptions { IgnoreChanges = { "webhooks[*].clientConfig", "webhooks[*].namespaceSelector" } });
    
    var res = new ValidatingWebhookConfiguration("res",
        ValidatingWebhookConfigurationArgs.builder()
            .prop("new-value")
            .build(),
        CustomResourceOptions.builder()
            .ignoreChanges("webhooks[*].clientConfig")
            .ignoreChanges("webhooks[*].namespaceSelector")
            .build());
    
    resources:
      res:
        type: ValidatingWebhookConfiguration
        properties:
          prop: new-value
        options:
          ignoreChanges:
            - webhooks[*].clientConfig
            - webhooks[*].namespaceSelector
    

    Helm Charts

    Although any resource can be updated by multiple controllers, it is particularly common for Helm charts that are deployed by Pulumi. Consider the following sequence of events:

    1. Deploy a chart using Pulumi. This chart contains a resource “X” plus an operator that will update “X”.
    2. Once the chart is deployed, the operator starts running and makes an update to resource “X”. The updated field is now managed by a different controller, and the value does not match Pulumi’s configuration.
    3. Run another Pulumi update, and the field conflict is detected.

    Pulumi provides a way to ignore changes for particular fields using the ignoreChanges resource option. Normally we could set the resource option directly, but since the Helm component is managing the resources on our behalf, we need to use a transformation to accomplish this.

    Note that you can also set the patchForce option to resolve conflicts using a transformation, but that this is likely to cause further conflicts if the operator expects to manage these fields.

    import * as k8s from "@pulumi/kubernetes";
    
    const kruise = new k8s.helm.v3.Chart("kruise", {
        chart: "kruise",
        version: "1.3.0",
        fetchOpts:{
            repo: "https://openkruise.github.io/charts/",
        },
    }, {
        transformations: [
            // Ignore changes that will be overwritten by the kruise-manager deployment.
            args => {
                if (args.type === "kubernetes:admissionregistration.k8s.io/v1:ValidatingWebhookConfiguration" ||
                    args.type === "kubernetes:admissionregistration.k8s.io/v1:MutatingWebhookConfiguration") {
                    return {
                        props: args.props,
                        opts: pulumi.mergeOptions(args.opts, {
                            ignoreChanges: ["metadata.annotations.template", "webhooks[*].clientConfig"],
                        })
                    }
                }
                return undefined;
            }
        ],
    });
    
    from pulumi import ResourceOptions, ResourceTransformationArgs, ResourceTransformationResult
    from pulumi_kubernetes.helm.v3 import Chart, ChartOpts, FetchOpts
    
    
    # Ignore changes that will be overwritten by the kruise-manager deployment.
    def ignore_changes(args: ResourceTransformationArgs):
        if args.type_ == "kubernetes:admissionregistration.k8s.io/v1:ValidatingWebhookConfiguration" or
            args.type_ == "kubernetes:admissionregistration.k8s.io/v1:MutatingWebhookConfiguration":
            return ResourceTransformationResult(
                props=args.props,
                opts=ResourceOptions.merge(args.opts, ResourceOptions(
                    ignore_changes=[
                        "metadata.annotations.template",
                        "webhooks[*].clientConfig",
                    ],
                )))
    
    
    kruise = Chart(
        "kruise",
        ChartOpts(
            chart="kruise",
            version="1.3.0",
            fetch_opts=FetchOpts(
                repo="https://openkruise.github.io/charts/",
            ),
        ),
        opts=ResourceOptions(
            transformations=[ignore_changes],
        )
    )
    
    package main
    
    import (
        "github.com/pulumi/pulumi-kubernetes/sdk/v3/go/kubernetes/helm/v3"
        "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
        pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := helm.NewChart(ctx, "kruise", helm.ChartArgs{
    			Chart:   pulumi.String("kruise"),
    			Version: pulumi.String("1.3.0"),
    			FetchArgs: helm.FetchArgs{
    				Repo: pulumi.String("https://openkruise.github.io/charts/"),
    			},
    		}, pulumi.Transformations([]pulumi.ResourceTransformation{
                // Ignore changes that will be overwritten by the kruise-manager deployment.
                func(args *pulumi.ResourceTransformationArgs) *pulumi.ResourceTransformationResult {
    				if args.Type == "kubernetes:admissionregistration.k8s.io/v1:ValidatingWebhookConfiguration" ||
    					args.Type == "kubernetes:admissionregistration.k8s.io/v1:MutatingWebhookConfiguration" {
    					return &pulumi.ResourceTransformationResult{
    						Props: args.Props,
    						Opts: append(args.Opts, pulumi.IgnoreChanges([]string{
    							"metadata.annotations.template",
    							"webhooks[*].clientConfig",
    						})),
    					}
    				}
    				return nil
    			},
    		}))
    		if err != nil {
    			return err
    		}
    
            return nil
        })
    }
    
    using System.Collections.Generic;
    using System.Collections.Immutable;
    using System.Threading.Tasks;
    using Pulumi;
    using Pulumi.Kubernetes.Helm;
    using Pulumi.Kubernetes.Helm.V3;
    
    return await Deployment.RunAsync(() =>
    {
        var kruise = new Chart("kruise", new ChartArgs
        {
            Chart = "kruise",
            Version = "1.3.0",
            FetchOptions = new ChartFetchArgs
            {
                Repo = "https://openkruise.github.io/charts/"
            },
        }, new ComponentResourceOptions
        {
            ResourceTransformations =
            {
                // Ignore changes that will be overwritten by the kruise-manager deployment.
                args =>
                {
                    if (args.Resource.GetResourceType() == "kubernetes:admissionregistration.k8s.io/v1:ValidatingWebhookConfiguration" ||
                        args.Resource.GetResourceType() == "kubernetes:admissionregistration.k8s.io/v1:MutatingWebhookConfiguration")
                    {
                        var options = CustomResourceOptions.Merge(
                            (CustomResourceOptions) args.Options,
                            new CustomResourceOptions {
                                IgnoreChanges = {"metadata.annotations.template", "webhooks[*].clientConfig"}
                            });
                        return new ResourceTransformationResult(args.Args, options);
                    }
    
                    return null;
                }
            }
        });
    });
    
    kubernetes logo
    Kubernetes v4.18.3 published on Thursday, Oct 31, 2024 by Pulumi