With the SAP BTP service operator, you can consume SAP BTP services from your Kubernetes cluster using Kubernetes-native tools.
SAP BTP service operator allows you to provision and manage service instances and service bindings of SAP BTP services so that your Kubernetes-native applications can access and use needed services from the cluster.
The SAP BTP service operator is based on the Kubernetes Operator pattern.
- Overview and Architecture
- Prerequisites for Deployment
- Installation and Setup
- Managing Access Permissions
- Configuring Multiple Subaccounts
- Using the SAP BTP Service Operator
- Creating Service Instances
- Managing Service Bindings
- Service Binding Secret Formats
- Automating Service Binding Rotation
- Specifying Parameters
- Reference Documentation
- Service Instance Properties
- Service Binding Properties
- Uninstalling the SAP BTP Service Operator
- Troubleshooting and Support
The SAP BTP Service Operator enables seamless integration with SAP Business Technology Platform (BTP) services by communicating with the SAP Service Manager via the Open Service Broker API. It acts as an intermediary, allowing the Kubernetes API Server to provision services and retrieve credentials for applications. The operator leverages a Custom Resource Definitions (CRDs)-based architecture for extensibility and modularity.
Before installing the SAP BTP Service Operator, ensure the following requirements are met:
- SAP BTP Global Account and Subaccount
- Familiarity with SAP Service Manager.
- A Kubernetes cluster running version 1.17 or higher.
- kubectl version 1.17 or higher.
- Helm version 3.0 or higher.
To deploy the SAP BTP Service Operator, follow these steps:
-
Install cert-manager:
- For operator releases v0.1.18 or higher, use cert-manager v1.6.0 or later.
- For releases v0.1.17 or lower, use cert-manager versions below v1.6.0.
-
Obtain access credentials:
- Create an instance of the SAP Service Manager service (technical name:
service-manager
) with theservice-operator-access
plan. - Note: If the plan is not visible, entitle your subaccount for the SAP Service Manager service. See Configure Entitlements and Quotas for Subaccounts.
- Create a service binding to retrieve credentials. For details, see:
- Create an instance of the SAP Service Manager service (technical name:
-
Retrieve the credentials from the binding. Example default binding:
{
"clientid": "<clientid>",
"clientsecret": "<clientsecret>",
"url": "https://mysubaccount.authentication.eu10.hana.ondemand.com",
"xsappname": "b15166|service-manager!b1234",
"sm_url": "https://service-manager.cfapps.eu10.hana.ondemand.com"
}
Example binding with X.509 certificate:
{
"clientid": "<clientid>",
"certificate": "-----BEGIN CERTIFICATE-----...-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----..-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----...-----END CERTIFICATE-----\n",
"key": "-----BEGIN RSA PRIVATE KEY-----...-----END RSA PRIVATE KEY-----\n",
"certurl": "https://mysubaccount.authentication.cert.eu10.hana.ondemand.com",
"xsappname": "b15166|service-manager!b1234",
"sm_url": "https://service-manager.cfapps.eu10.hana.ondemand.com"
}
- Add the SAP BTP Service Operator Helm chart repository:
helm repo add sap-btp-operator https://sap.github.io/sap-btp-service-operator
-
Deploy the operator using the obtained access credentials:
Note: If you are deploying the SAP BTP service operator in the registered cluster based on the Service Catalog (svcat) and Service Manager agent so that you can migrate svcat-based content to service operator-based content, add
--set cluster.id=<clusterID>
to your deployment script. For more information, see the step 2 of the Setup section of Migration to SAP BTP service operator.An example of the deployment that uses the default access credentials type:
helm upgrade --install sap-btp-operator sap-btp-operator/sap-btp-operator \
--create-namespace \
--namespace=sap-btp-operator \
--set manager.secret.clientid=<clientid> \
--set manager.secret.clientsecret=<clientsecret> \
--set manager.secret.sm_url=<sm_url> \
--set manager.secret.tokenurl=<auth_url>
An example of the deployment that uses the X.509 certificate:
helm upgrade --install sap-btp-operator sap-btp-operator/sap-btp-service-operator \
--create-namespace \
--namespace=sap-btp-operator \
--set manager.secret.clientid=<clientid> \
--set manager.secret.tls.crt="$(cat /path/to/cert)" \
--set manager.secret.tls.key="$(cat /path/to/key)" \
--set manager.secret.sm_url=<sm_url> \
--set manager.secret.tokenurl=<auth_url>
The credentials provided during the installation are stored in a secret named sap-btp-service-operator
, in the sap-btp-operator
namespace. These credentials are used by the BTP service operator to communicate with the SAP BTP subaccount.
BTP Access Secret Structure
apiVersion: v1
kind: Secret
metadata:
name: sap-btp-service-operator
namespace: sap-btp-operator
type: Opaque
stringData:
clientid: "<clientid>"
clientsecret: "<clientsecret>"
sm_url: "<sm_url>"
tokenurl: "<auth_url>"
tokenurlsuffix: "/oauth/token"
apiVersion: v1
kind: Secret
metadata:
name: sap-btp-service-operator
namespace: sap-btp-operator
type: Opaque
stringData:
clientid: "<clientid>"
tls.crt: "<certificate>"
tls.key: "<key>"
sm_url: "<sm_url>"
tokenurl: "<auth_url>"
tokenurlsuffix: "/oauth/token"
Note: To rotate the credentials between the BTP service operator and Service Manager, you have to create a new binding for the service-operator-access
service instance, and then execute the setup script again with the new set of credentials. Afterward, you can delete the old binding.
By default, the SAP BTP operator has cluster-wide permissions. You can also limit them to one or more namespaces; for this, you need to set the following two Helm parameters:
--set manager.allow_cluster_access=false
--set manager.allowed_namespaces={namespace1,namespace2}
Note: If allow_cluster_access
is set to true
, then the allowed_namespaces
parameter is ignored.
By default, a Kubernetes cluster is associated with a single subaccount (as described in step 4 of the Installation and Setup section). Consequently, any service instance created within any namespace will be provisioned in that subaccount.
However, the SAP BTP service operator also supports multi-subaccount configurations in a single cluster. This is achieved through:
- Namespace-based mapping: Connect different namespaces to separate subaccounts. This approach leverages dedicated credentials configured for each namespace.
- Explicit instance-level mapping: Define the specific subaccount for each service instance, regardless of the namespace context.
Both can be achieved through dedicated secrets managed in the centrally managed namespace. Choosing the most suitable approach depends on your specific needs and application architecture.
Note: The system’s centrally managed namespace is set by the value in .Values.manager.management_namespace
. You can provide this value during installation (refer to step 4 in the Installation and Setup section). If you don’t specify this value, the system will use the installation namespace as the default.
To associate a namespace to a specific subaccount, maintain the access credentials to the subaccount in a Secret
that is dedicated to a specific namespace. Define a secret named <namespace-name>-sap-btp-service-operator
in the centrally-managed namespace.
apiVersion: v1
kind: Secret
metadata:
name: <namespace-name>-sap-btp-service-operator
namespace: <centrally-managed-namespace>
type: Opaque
stringData:
clientid: "<clientid>"
clientsecret: "<clientsecret>"
sm_url: "<sm_url>"
tokenurl: "<auth_url>"
tokenurlsuffix: "/oauth/token"
apiVersion: v1
kind: Secret
metadata:
name: "<namespace-name>-sap-btp-service-operator"
namespace: "<centrally-managed-namespace>"
type: Opaque
stringData:
clientid: "<clientid>"
tls.crt: "<certificate>"
tls.key: "<key>"
sm_url: "<sm_url>"
tokenurl: "<auth_url>"
tokenurlsuffix: "/oauth/token"
You can deploy service instances belonging to different subaccounts within the same namespace. To achieve this, follow these steps:
- Store access credentials: Securely store the access credentials for each subaccount in separate
Secret
resources within the centrally-managed namespace. - Specify subaccount per service: In the
ServiceInstance
resource, use thebtpAccessCredentialsSecret
property to reference the specificSecret
containing the relevant subaccount’s credentials. This explicitly tells the operator which subaccount to use to provision the service instance.
apiVersion: v1
kind: Secret
metadata:
name: "<my-secret>"
namespace: <centrally-managed-namespace>
type: Opaque
stringData:
clientid: "<clientid>"
clientsecret: "<clientsecret>"
sm_url: "<sm_url>"
tokenurl: "<auth_url>"
tokenurlsuffix: "/oauth/token"
apiVersion: v1
kind: Secret
metadata:
name: "<my-secret>"
namespace: <centrally-managed-namespace>
type: Opaque
stringData:
clientid: "<clientid>"
tls.crt: "<certificate>"
tls.key: "<key>"
sm_url: "<sm_url>"
tokenurl: "<auth_url>"
tokenurlsuffix: "/oauth/token"
Configure the secret name in the ServiceInstance
resource within the property btpAccessCredentialsSecret
:
The secret must be located in the management namespace.
apiVersion: services.cloud.sap.com/v1
kind: ServiceInstance
metadata:
name: sample-instance-1
spec:
serviceOfferingName: service-manager
servicePlanName: subaccount-audit
btpAccessCredentialsSecret: mybtpsecret
SAP BTP service operator searches for the credentials in the following order:
- Explicit secret defined in the
ServiceInstance
- Default namespace secret
- Default cluster secret
To create an instance of a service offered by SAP BTP, first create a ServiceInstance
custom-resource file:
apiVersion: services.cloud.sap.com/v1
kind: ServiceInstance
metadata:
name: my-service-instance
spec:
serviceOfferingName: sample-service
servicePlanName: sample-plan
externalName: my-service-btp-name
parameters:
key1: val1
key2: val2
-
<offering>
- The name of the SAP BTP service that you want to create. To learn more about viewing and managing the available services for your subaccount in the SAP BTP cockpit, see Service Marketplace.Tip: Use the Environment filter to get all offerings that are relevant for Kubernetes.
-
<plan>
- The plan of the selected service offering you want to create.
Apply the custom resource file in your cluster to create the instance:
kubectl apply -f path/to/my-service-instance.yaml
Check that the service’s status in your cluster is Created
:
kubectl get serviceinstances
NAME OFFERING PLAN STATUS AGE
my-service-instance sample-service sample-plan Created 44s
To allow an application to obtain access credentials to communicate with a service, create a ServiceBinding
custom resource. Set the serviceInstanceName
field within the ServiceBinding
to match the name of the ServiceInstance
resource you previously created.
These access credentials are available to applications through a Secret
resource generated in your cluster.
apiVersion: services.cloud.sap.com/v1
kind: ServiceBinding
metadata:
name: sample-binding
spec:
serviceInstanceName: sample-instance
externalName: my-binding-external
secretName: my-secret
parameters:
key1: val1
key2: val2
Apply the custom resource file in your cluster to create the ServiceBinding
:
kubectl apply -f path/to/my-binding.yaml
Verify that your ServiceBinding
status is Created
before you proceed:
kubectl get servicebindings
NAME INSTANCE STATUS AGE
my-binding my-service-instance Created 16s
Check that the Secret
with the name as specified in the spec.secretName
field of the ServiceBinding
custom resource is created. The Secret
contains access credentials needed for the apps to use the service:
kubectl get secrets
NAME TYPE DATA AGE
my-secret Opaque 5 32s
See Using Secrets to learn about different options on how to use the credentials from your application running in the Kubernetes cluster.
You can use different attributes in your ServiceBinding
resource to generate different formats of your Secret
resources. Even though Secret
resources can come in various formats, they all share a common basic content. The parameters within the Secret
fall into two categories:
- Credentials returned from the broker: These credentials allow your applications to access and consume the service.
- Attributes of the associated
ServiceInstance
: This information provides details about the service instance itself.
Now let’s explore these various formats:
If you do not use any of the attributes, the generated Secret
will be in a key-value pair format.
ServiceBinding
apiVersion: services.cloud.sap.com/v1
kind: ServiceBinding
metadata:
name: sample-binding
spec:
serviceInstanceName: sample-instance
Secret
apiVersion: v1
metadata:
name: sample-binding
kind: Secret
stringData:
uri: https://my-service.authentication.eu10.hana.ondemand.com
client_id: admin
client_secret: ********
instance_guid: your-sample-instance-guid # The service instance ID
instance_name: sample-instance # Taken from the service instance external_name field if set. Otherwise from metadata.name
plan: sample-plan # The service plan name
type: sample-service # The service offering name
To show credentials returned from the broker within the Secret
resource as a JSON object, use the secretKey
attribute in the ServiceBinding
spec. The value of this secretKey
is the name of the key that stores the credentials in JSON format:
ServiceBinding
apiVersion: services.cloud.sap.com/v1
kind: ServiceBinding
metadata:
name: sample-binding
spec:
serviceInstanceName: sample-instance
secretKey: myCredentials
Secret
apiVersion: v1
kind: Secret
metadata:
name: sample-binding
stringData:
myCredentials: |
{
"uri": "https://my-service.authentication.eu10.hana.ondemand.com",
"client_id": "admin",
"client_secret": "********"
}
instance_guid: your-sample-instance-guid # The service instance ID
instance_name: sample-binding # Taken from the service instance external_name field if set. Otherwise from metadata.name
plan: sample-plan # The service plan name
type: sample-service # The service offering name
To show both credentials returned from the broker and additional ServiceInstance
attributes as a JSON object, use the secretRootKey
attribute in the ServiceBinding
spec. The value of secretRootKey
is the name of the key that stores both credentials and ServiceInstance
info in JSON format.
ServiceBinding
apiVersion: services.cloud.sap.com/v1
kind: ServiceBinding
metadata:
name: sample-binding
spec:
serviceInstanceName: sample-instance
secretRootKey: myCredentialsAndInstance
Secret
apiVersion: v1
kind: Secret
metadata:
name: sample-binding
stringData:
myCredentialsAndInstance: |
{
"uri": "https://my-service.authentication.eu10.hana.ondemand.com",
"client_id": "admin",
"client_secret": "********",
"instance_guid": "your-sample-instance-guid",
"instance_name": "sample-instance-name",
"plan": "sample-instance-plan",
"type": "sample-instance-offering"
}
For additional flexibility, you can model the Secret
resources according to your needs. To generate a custom-formatted Secret
, use the secretTemplate
attribute in the ServiceBinding
spec.
This attribute expects a Go template as its value (for more information, see Go Templates). Ensure the template is in YAML format, and its structure is of a Kubernetes Secret
.
In the provided Secret
, you can customize the metadata
and stringData
sections with the following options:
metadata
: labels and annotationsstringData
: customize or utilize one of the available formatting options as detailed in the Service Binding Secret Formats section.
Important: If you customize stringData
, it takes precedence over the pre-defined formats (if you provided one of them in parallel).
Provided templates are then executed on a map with the following available attributes:
Reference | Description |
---|---|
instance.instance_guid |
The service instance ID. |
instance.instance_name |
The service instance name. |
instance.plan |
The name of the service plan used to create this service instance. |
instance.type |
The name of the associated service offering. |
credentials.attributes(var) |
The content of the credentials depends on a service. For more details, refer to the documentation of the service you’re using. |
Below are two examples demonstrating ServiceBinding
and generated Secret
resources. The first ServiceBinding
example utilizes a custom template, while the second example combines a custom template with a predefined formatting option:
In this example, you specify both metadata
and stringData
in the secretTemplate
:
ServiceBinding
apiVersion: services.cloud.sap.com/v1
kind: ServiceBinding
metadata:
name: sample-binding
spec:
serviceInstanceName: sample-instance
secretTemplate: |
apiVersion: v1
kind: Secret
metadata:
labels:
service_plan: {{ .instance.plan }}
annotations:
instance: {{ .instance.instance_name }}
stringData:
USERNAME: {{ .credentials.client_id }}
PASSWORD: {{ .credentials.client_secret }}
Secret
apiVersion: v1
kind: Secret
metadata:
labels:
service_plan: sample-plan
annotations:
instance: sample-instance
stringData:
USERNAME: admin
PASSWORD: ********
Example of a binding with customized metadata section and applied pre-existing formatting option for stringData (credentials as JSON object)
In this example, you omit stringData
from the secretTemplate
and use the secretKey
to format your stringData
instead (see Service Binding Secret Formats):
ServiceBinding
apiVersion: services.cloud.sap.com/v1
kind: ServiceBinding
metadata:
name: sample-binding
spec:
serviceInstanceName: sample-instance
secretKey: myCredentials
secretTemplate: |
apiVersion: v1
kind: Secret
metadata:
labels:
service_plan: {{ .instance.plan }}
annotations:
instance: {{ .instance.instance_name }}
Secret
apiVersion: v1
kind: Secret
metadata:
labels:
service_plan: sample-plan
annotations:
instance: sample-instance
stringData:
myCredentials: |
{
"uri": "https://my-service.authentication.eu10.hana.ondemand.com",
"client_id": "admin",
"client_secret": "********"
}
instance_guid: your-sample-instance-guid # The service instance ID
instance_name: sample-binding # Taken from the service instance external_name field if set. Otherwise from metadata.name
plan: sample-plan # The service plan name
type: sample-service # The service offering name
Enhance security by automatically rotating the credentials associated with your service bindings. This process involves generating a new service binding while keeping the old credentials active for a specified period to ensure a smooth transition.
To enable automatic rotation of service bindings, use the credentialsRotationPolicy
field within the spec
section of the ServiceBinding
resource. This field allows you to configure several parameters:
Parameter | Type | Description | Valid Values |
---|---|---|---|
enabled |
bool | Controls whether the automatic rotation is enabled or disabled. | |
rotationFrequency |
string | Specifies the desired time interval between binding rotations. | "m" (minute), "h" (hour) |
rotatedBindingTTL |
string | Determines how long to keep the old ServiceBinding resource after rotation (prior to deletion). The actual TTL may be slightly longer (details below). |
"m" (minute), "h" (hour) |
Note: The credentialsRotationPolicy
does not manage the validity or expiration of the credentials themselves. This is determined by the specific service you are bound to.
The credentialsRotationPolicy
is evaluated periodically during a control loop, which runs on every service binding update or during a full reconciliation process. This means the actual rotation will occur in the closest upcoming reconciliation loop.
You can trigger an immediate rotation (regardless of the configured rotationFrequency
) by adding the services.cloud.sap.com/forceRotate: "true"
annotation to the ServiceBinding
resource. This immediate rotation only works if automatic rotation is already enabled.
This example configures a ServiceBinding
to rotate credentials every 25 days (600 hours) and keep the old ServiceBinding
for 2 days (48 hours) before deleting it:
apiVersion: services.cloud.sap.com/v1
kind: ServiceBinding
metadata:
name: sample-binding
spec:
serviceInstanceName: sample-instance
credentialsRotationPolicy:
enabled: true
rotatedBindingTTL: 48h
rotationFrequency: 600h
Once the ServiceBinding
is rotated:
- The
Secret
is updated with the latest credentials. The old credentials are kept in a newly-created secret namedoriginal-secret-name-<guid>
. This temporary secret is kept until the configured deletion time (TTL) expires.
To view the timestamp of the last service binding rotation, refer to the status.lastCredentialsRotationTime
field.
Automatic credential rotation cannot be enabled for a backup ServiceBinding
(named: original-binding-name-<guid>
) which is marked with the services.cloud.sap.com/stale
label. This backup service binding was created during the credentials rotation process to facilitate the process.
For more details about ServiceBinding
, refer to the dedicated Managing Service Bindings section in this documentation.
To set input parameters, you may use the parameters
and parametersFrom
fields in the spec
field of the ServiceInstance
or ServiceBinding
resource:
parameters
: Can be used to specify a set of properties to be sent to the broker. The data specified will be passed "as-is" to the broker without any modifications - aside from converting it to JSON for transmission to the broker if thespec
field is specified as YAML. Any valid YAML or JSON constructs are supported. Only oneparameters
field may be specified perspec
.parametersFrom
: Enables you to specify one or more secrets, and the corresponding keys within those secrets, holding JSON-formatted parameters to be sent to the broker. TheparametersFrom
field is a list that supports multiple sources referenced perspec
, defining an asymmetric relationship where theServiceInstance
resource can define several related secrets.watchParametersFromChanges
: (boolean) This field determines whether changes to the secret values referenced inparametersFrom
should trigger an automatic update of the service instance. Iftrue
, any change to the referenced secret values will trigger the update of the service instance. Defaults tofalse
.
While you may use either or both of parameters
and parametersFrom
fields, watchParametersFromChanges
is only relevant when used alongside parametersFrom
.
Note: The watchParametersFromChanges
field is only relevant for ServiceInstance
resources because ServiceBinding
resources can’t be updated.
If multiple sources in the parameters
and parametersFrom
blocks are specified, the final payload merges all of them at the top level. If there are any duplicate properties defined at the top level, the specification is considered to be invalid, the further processing of the ServiceInstance
/ServiceBinding
resource stops, and its status
is marked with an error condition.
The format of the spec
in YAML:
spec:
parameters:
name: value
parametersFrom:
- secretKeyRef:
name: my-secret,
key: secret-parameter
The format of the spec
in JSON:
{
"spec": {
"parameters": {
"name": "value"
},
"parametersFrom": {
"secretKeyRef": {
"name": "my-secret",
"key": "secret-parameter"
}
}
}
}
The secret with the secret-parameter
named key:
apiVersion: v1
kind: Secret
metadata:
name: my-secret
type: Opaque
stringData:
secret-parameter: |
{
"password": "password"
}
The final JSON payload to send to the broker:
{
"name": "value",
"password": "password"
}
You can list multiple parameters in the secret. To do so, separate “key”: “value” pairs with commas as in this example:
secret-parameter: |
{
"password": "password",
"key2": "value2",
"key3": "value3"
}
Parameter | Type | Description |
---|---|---|
serviceOfferingName* |
string |
The name of the SAP BTP service offering. |
servicePlanName* |
string |
The plan to use for the service instance. |
servicePlanID |
string |
The plan ID in case the service offering and plan name are ambiguous. |
externalName |
string |
The name for the service instance in SAP BTP, defaults to the instance metadata.name if not specified. |
parameters |
[]object |
Some services support the provisioning of additional configuration parameters during the instance creation. For the list of supported parameters, check the documentation of the particular service offering. |
parametersFrom |
[]object |
List of sources to populate parameters. |
watchParametersFromChanges |
bool |
This field determines whether changes to the secret values referenced in parametersFrom should trigger an automatic update of the service instance. When set to true , any change to the referenced secret values will trigger the update of the service instance. Defaults to false . It is only relevant when used in conjunction with the parametersFrom field. |
customTags |
[]string |
A list of custom tags describing the ServiceInstance , will be copied to ServiceBinding secret in the key called tags . |
userInfo |
object |
Contains information about the user that last modified this service instance. |
shared |
*bool |
The shared state. Possible values: true , false , or nil (value was not specified, counts as “false”). |
btpAccessCredentialsSecret |
string |
Name of a secret that contains access credentials for the SAP BTP service operator. See Configuring Multiple Subaccounts. |
Parameter | Type | Description |
---|---|---|
instanceID |
string |
The service instance ID in SAP Service Manager service. |
operationURL |
string |
The URL of the current operation performed on the service instance. |
operationType |
string |
The type of the current operation. Possible values are CREATE , UPDATE , or DELETE . |
conditions |
[]condition |
An array of conditions describing the status of the service instance. The possible condition types are: - Ready : set to true if the instance is ready and usable. - Failed : set to true when an operation on the service instance fails. In the case of failure, the details about the error are available in the condition message. - Succeeded : set to true when an operation on the service instance succeeded. In case of a false operation, it is considered as in progress unless a Failed condition exists. - Shared : set to true when sharing of the service instance succeeded. Set to false when unsharing of the service instance succeeded or when the service instance is not shared. |
tags |
[]string |
Tags describing the ServiceInstance as provided in the service catalog, will be copied to the ServiceBinding secret in the key called tags . |
Parameter | Type | Description |
---|---|---|
services.cloud.sap.com/preventDeletion |
map[string]string |
You can prevent deletion of any service instance by adding the following annotation: services.cloud.sap.com/preventDeletion: "true" . To enable back the deletion of the instance, either remove the annotation or set it to false . |
Parameter | Type | Description |
---|---|---|
serviceInstanceName* |
string |
The Kubernetes name of the service instance to bind. |
serviceInstanceNamespace |
string |
The namespace of the service instance to bind, if not specified the default is the binding’s namespace. |
externalName |
string |
The name for the service binding in SAP BTP, defaults to the binding metadata.name if not specified. |
secretName |
string |
The name of the secret where the credentials are stored, defaults to the binding metadata.name if not specified. |
secretKey |
string |
The secret key is a part of the Secret object, which stores service-binding data (credentials) received from the broker. When the secret key is used, all the credentials are stored under a single key. This makes it a convenient way to store credentials data in one file when using volumeMounts. Example |
secretRootKey |
string |
The root key is a part of the Secret object, which stores service-binding data (credentials) received from the broker, as well as additional service instance information. When the root key is used, all data is stored under a single key. This makes it a convenient way to store data in one file when using volumeMounts. Example |
parameters |
[]object |
Some services support the provisioning of additional configuration parameters during the bind request. For the list of supported parameters, check the documentation of the particular service offering. |
parametersFrom |
[]object |
List of sources to populate parameters. |
userInfo |
object |
Contains information about the user that last modified this service binding. |
credentialsRotationPolicy |
object |
Holds automatic credentials rotation configuration. |
credentialsRotationPolicy.enabled |
boolean |
Indicates whether automatic credentials rotation is enabled. |
credentialsRotationPolicy.rotationFrequency |
duration |
Specifies the frequency at which the binding rotation is performed. |
credentialsRotationPolicy.rotatedBindingTTL |
duration |
Specifies the time period for which to keep the rotated binding. |
SecretTemplate |
string |
A Go template used to generate a custom Kubernetes v1/Secret , working on both the access credentials returned by the broker and instance attributes. Refer to Go Templates for more details. |
Parameter | Type | Description |
---|---|---|
instanceID |
string |
The ID of the bound instance in the SAP Service Manager service. |
bindingID |
string |
The service binding ID in SAP Service Manager service. |
operationURL |
string |
The URL of the current operation performed on the service binding. |
operationType |
string |
The type of the current operation. Possible values are CREATE , UPDATE , or DELETE . |
conditions |
[]condition |
An array of conditions describing the status of the service instance. The possible conditions types are: - Ready : set to true if the binding is ready and usable. - Failed : set to true when an operation on the service binding fails. In the case of failure, the details about the error are available in the condition message. - Succeeded : set to true when an operation on the service binding succeeded. In case of a false operation considered as in progress unless a Failed condition exists. |
lastCredentialsRotationTime |
time |
Indicates the last time the binding secret was rotated. |
Before you uninstall the operator, we recommend you manually delete all associated service instances and bindings. This way, you’ll ensure all data stored with service instances and bindings are properly taken care of. Instances and bindings that were not manually deleted will be automatically deleted once you start the uninstallation process.
To uninstall the operator, run the following command:
helm uninstall sap-btp-operator -n sap-btp-operator
release sap-btp-operator uninstalled
- The operator has been successfully uninstalled.
What happened?
The deletion of instances and bindings takes more than 5 minutes, this happens when there is a large number of instances and bindings.
What to do:
Wait for the job to finish and re-trigger the uninstall process. To check the job status, run kubectl get jobs --namespace=sap-btp-operator
or log on to the cluster and check the job log. Note that you may have to repeat this step several times until the uninstall process has been successfully completed.
What happened?
One of the service instances or bindings could not be deleted.
What to do:
First, locate the service instance or binding in question and fix it, then re-trigger the uninstallation. To find it, log on to the cluster and check the pre-delete job, or check the logs by running the following two commands:
kubectl get pods --all-namespaces | grep pre-delete
kubectl logs <job_name> --namespace=sap-btp-operator
Note that the pre-delete job is only visible for approximately one minute after the job execution is completed. If you don’t have access to the pre-delete job, use kubectl
to view details about the failed resource and check its status by running:
kubectl describe <resource_type> <resource_name>
Check for resources with the deletion timestamp to determine if it tried to be deleted.
We currently do not accept community contributions.
Copyright 2024 SAP SE and sap-btp-service-operator contributors. Please see our LICENSE for copyright and license information. Detailed information including third-party components and their licensing/copyright information is available via the REUSE tool.
The deletion of my service instance failed. To fix the failure, I have to create a service binding, but I can’t do that because the instance is in the Delete Failed
state.
Solution
Use the force_k8s_binding
query param when creating the service binding and set it to true
(force_k8s_binding=true
). You can do this with the following btp CLI
commands:
Note: Do not use the service-operator-access
plan credentials to run this command.
Example
btp create services/binding \
--subaccount [ID] \
--binding NAME \
[--instance-name NAME] \
[--service-instance ID] \
[--parameters '{"force_k8s_binding": true}'] \
[--labels JSON] \
[--force TRUE]
Delete the binding afterward:
btp delete services/binding \
--subaccount [ID] \
--binding NAME \
[--instance-name NAME] \
[--service-instance ID] \
[--parameters '{"force_k8s_binding": true}'] \
[--labels JSON] \
[--force FALSE]
Note: force_k8s_binding
is supported only for Kubernetes instances that are in the Delete Failed
state.
I cannot delete service instances and bindings because the cluster in which they were created is no longer available.
Solution
Use a dedicated Service Manager API to clean up cluster content. Access the API with the subaccount-admin
plan. For more information, see Technical Access.
Note: Do not call this API with the service-operator-access
plan credentials.
DELETE /v1/platforms/{platformID}/clusters/{clusterID}
Parameter | Type | Description |
---|---|---|
platformID |
string |
The ID of the platform (should be the service-operator-access instance ID). |
clusterID |
string |
The ID of the cluster. You should specify the ID from step 4 of the Installation and Setup section. If you are unable to retrieve it, use the GET service instance or binding API or equivalent BTP CLI command and extract it from the response. |
Status Code | Description |
---|---|
202 Accepted | The request has been accepted for processing. |
404 Resource Not Found | Platform or cluster not found. |
429 Too Many Requests | When the rate limit is exceeded, the client receives the HTTP 429 “Too Many Requests” response status code. |
Headers:
Location
: A path to the operation status. For more information about operations, see: Service Manager operation API.Retry-After
: Indicates the time in seconds after which the client can retry the request.
Attention: Use this option only for cleanup purposes for a no longer available cluster. Applying it to an active and available cluster may result in unintended resource leftovers in your cluster.
I can see my service instance/binding in SAP BTP, but not its corresponding custom resource in my cluster. How can I restore the custom resource?
Let’s break down how to recover your Kubernetes custom resource that exists in SAP BTP but not in your Kubernetes cluster:
If a Kubernetes custom resource (CR) representing an SAP BTP service instance or service binding is lost, you can restore the connection to the existing BTP resource by manually recreating the CR using the information from the BTP side. To successfully re-establish the link, the new CR must have the same name, reside in the same namespace, and be associated with the same cluster ID as the original. The SAP BTP resource itself holds the configuration and remains unchanged, so as long as these identifying attributes match, creating a new CR will not result in provisioning a new BTP resource, but will instead reconnect to the existing one.
-
Retrieve CR Details:
- Access the service instance or binding representing your CR in SAP BTP.
- Obtain the following details from the service instance:
- The name of the custom resource.
- The Kubernetes namespace where the CR should reside.
-
Recreate the CR:
- If you have a YAML definition or manifest for your CR, ensure it includes the exact name and namespace you retrieved from the SAP BTP service instance or binding.
- Use
kubectl apply -f <your_cr_manifest.yaml>
to create the CR in your Kubernetes cluster.
-
Verify:
- Use
kubectl get <your_cr_kind> <your_cr_name> -n <your_namespace>
to verify that the CR is successfully created in Kubernetes. - Check the service instance or binding in SAP BTP to confirm it now recognizes the re-established connection with the CR in Kubernetes.
- If the connection is not re-established, verify that the cluster ID in your Kubernetes cluster matches the one associated with the SAP BTP service instance or binding. You can find the cluster ID in the context details visible in the cockpit or BTP CLI. If the IDs don’t match, reconfigure your cluster with the correct ID.
- Use
You’re welcome to raise issues related to feature requests, bugs, or give general feedback on this project’s GitHub Issues page. The SAP BTP service operator project maintainers will respond to the best of their abilities.