OpenFaaS has its own YAML file called a "stack file" which is used to provide configuration for functions.
This page is the reference guide to the schema and how to use each field.
Configuration is split between:
build-time - how to build a container from the source provided
deploy time - how to deploy the function to and in OpenFaaS
Generate Kubernetes resources
Did you know that the OpenFaaS YAML files can also be converted into Kubernetes resources using faas-cli generate?
If you use a GitOps tool like Argo or Flux, you can retain your stack.yml file for building functions, and testing locally, then generate a CustomResource when required with: faas-cli generate | kubectl apply -f
The functions element holds a map of functions, by default all functions are acted on with CLI verbs, but you can filter them with --filter or --regex.
The function Name is specified by a key in the functions map, i.e. fn1 in the above example. Function name must be unique within a stack.yml file.
Valid function names follow ietf rfc1035 which is also used for DNS sub-domains.
(DNS_LABEL): An alphanumeric (a-z, and 0-9) string, with a maximum length of 63 characters, with the '-' character allowed anywhere except the first or last character, suitable for use as a hostname or segment in a domain name.
The lang field refers to which template is going to be used to build the function. The templates are expected to be found in the ./template folder and will be pulled from GitHub if not present.
The skip_build field controls whether the CLI will attempt to build the Docker image for the function. When true, the build step is skipped and you should see a message printed to the terminal Skipping build of: "function name".
This an optional boolean field, set to false by default.
The build_options field can be used to pass a list of additional configurations for a template.
These must be pre-defined within the template and can be used to populate the ADDITIONAL_PACKAGE field in the Dockerfile used by the template.
For instance, here's an example from the python3 template which is based upon Alpine Linux.
Note: if you want to install Python development packages, you may find that the python3-debian template is a better fit, since it comes with build tools pre-installed.
Given the template defines a mysql and pillow build option, you can add either or both of them to your stack.yml file so that these preconfigured packages are installed at build time.
build_options:-ca-certificates
The packages listed will be expounded into the Dockerfile at build-time via the ADDITIONAL_PACKAGE environment variable.
FROM--platform=${TARGETPLATFORM:-linux/amd64}python:3-alpine
# Allows you to add additional packages via build-argARGADDITIONAL_PACKAGE
# Install packagesRUNapk--no-cacheaddca-certificates${ADDITIONAL_PACKAGE}
If you don't want to or cannot update the template, then you can pass the ADDITIONAL_PACKAGE directly instead, see the next section.
A map of build args can be passed to the container builder. These are compatible with Docker, BuildKit and Kaniko. Other containers builders may vary in their support.
An example of a build argument may be for enabling Go modules, or a HTTP_PROXY as per below:
You can set configuration via environmental variables either in-line within the YAML file or in a separate external file. Do not store confidential or private data in environmental variables. See: secrets.
Define environment in-line within the file:
Imagine you needed to define a http_proxy variable to operate within a corporate network:
environment_file - defined in zero to many external files
environment_file:-file1.yml-file2.yml
If you specify a variable such as "rss_feed_url" in more than one environment_file file then the last file in the list will take priority.
Environment file format:
environment:rss_feed_url:key1include_images:key2
Note: external files take priority over in-line environmental variables. This allows you to specify a default and then have overrides within an external file.
OpenFaaS functions can make use of secure secrets using the secret store from Kubernetes or faasd. This is the recommended way to store secure access keys, tokens and other private data.
Create the secret with your orchestration tool i.e. kubectl or docker secret create then list the secret name as part of an array of secrets.
The readonly_root_filesystem indicates that the function file system will be set to read-only except for the temporary folder /tmp. This prevents the function from writing to or modifying the filesystem (e.g. system files). This is used to provide tighter security for your functions. You can set this value as a boolean:
readonly_root_filesystem:true
This an optional boolean field, set to false by default.
Labels can be applied through a map which is passed directly to the container scheduler.
Labels are also available from the OpenFaaS REST API for querying or grouping functions.
Example of using a label to group by user or apply a canary label:
labels:canary:trueGit-Owner:alexellis
Important note: When used with a Kubernetes provider, labels support a restricted character set and length.
"Valid label values must be 63 characters or less and must be empty or begin and end with an alphanumeric character
([a-z0-9A-Z]) with dashes (-), underscores (_), dots (.), and alphanumerics between."
Annotations are a collection of meta-data which is stored with the function by the provider.
Annotations are also available from the OpenFaaS REST API for querying.
Example of setting a "topic" for the Kafka event connector:
Applying memory and CPU limits can be done through the limits and requestsfields. It is advisable to always set a limit for your functions to prevent them consuming too many resources in your system.
When using OpenFaaS on Kubernetes:
Requests ensure the stated host resource is available for the container to use.
Limits specify the maximum amount of host resources that a container can consume.
On OpenFaaS Edge:
Limits specify the maximum amount of host resources that a container can consume.
Setting requests is not supported. Any requests set on functions will be ignored.
Here we constrain the url-ping function to only use 40Mb of RAM at a maximum.
Important note: The value for memory for Kubernetes needs to be in the format "Mi".
The configuration section allows you to define additional configuration that is global to the entire stack, currently this mostly impacts function build time options.
The templates list allows you to define the information required to pull the templates for your functions. This list of templates will automatically be pulled when you build your functions. When configured correctly, this allows you to completely build your functions with just faas-cli build. Without this section, you must manually faas-cli template pull <source>before you use faas-cli build.
The CLI build command also has a related flag --copy-extra. When this flag is used, the paths specified by the flag will be merged into the list from the YAML. This means it will extend, not replace, the values specified in the file.
Note: These paths must be subpaths of the project and not equal to the entire project. For example, you can not reference ../ or $HOME/.ssh, any path outside of the current directory will be skipped.
The YAML stack format supports the use of envsubst-style templates. This means that you can have a single file with multiple configuration options such as for different user accounts, versions or environments.
Here is an example use-case, in your project there is an official and a development Docker Hub username/account. For the CI server images are always pushed to exampleco, but in development you may want to push to your own account such as alexellis2.
As an alternative, you can fork any template and customise it or change it to suit your needs, and use that URL instead, even if it has the same name as the original template.