Unified Distributed Storage
In this tutorial, we will cover how to implement unified distributed storage on a set of clusters, using Fleet
Architecture
Fleet’s unified distributed storage is built on top of Rook, and the overall architecture is shown as below:
Prerequisites
1. Fleet Manager Setup
Set up the Fleet manager by following the instructions in the installation guide.
2. Rook prerequisites
To support Kurator’s Unified Distributed Storage, you must first configure the Distributed Storage plug-in for Fleet. Kurator uses Rook as the Distributed Storage plugin. These are some of the prerequisites needed to use rook.
-
Kubernetes v1.22 or higher is supported
-
To configure the Ceph storage cluster, at least one of these local storage types is required:
- Raw devices (no partitions or formatted filesystems)
- Raw partitions (no formatted filesystem)
- LVM Logical Volumes (no formatted filesystem)
- Persistent Volumes available from a storage class in
block
mode
The easiest way to do this is to mount an Raw disk on the nodes.
3. Secrets and Setup for Attached Clusters
In Kurator, clusters not created by Kurator are called AttachedClusters. Kurator provides the ability to incorporate these AttachedClusters into the kurator fleet management and implement unified distributed storage on these attachedclusters with fleet. Therefore we need a fleet that already manages several AttachedClusters. Specific operations can be referred to Manage AttachedCluster.
Create a Fleet with the DistributedStorage Plugin Enabled
Run following command to create rook operator and rook ceph cluster in the Fleet:
kubectl apply -f -<<EOF
apiVersion: fleet.kurator.dev/v1alpha1
kind: Fleet
metadata:
name: quickstart
namespace: default
spec:
clusters:
- name: kurator-member1
kind: AttachedCluster
- name: kurator-member2
kind: AttachedCluster
plugin:
distributedStorage:
storage:
dataDirHostPath: /var/lib/rook
monitor:
count: 3
labels:
role: MonitorNodeLabel
manager:
count: 2
labels:
role: ManagerNodeLabel
EOF
Fleet DistributedStorage Plugin Configuration Explained
Let’s delve into the spec
section of the above Fleet:
clusters
: Contains the twoAttachedCluster
objects created earlier, indicating that the distributedstorage plugin will be installed in these two clusters.plugin
: ThedistributedStorage
indicates the configuration of a distributedstorage plugin.dataDirHostPath
defines the directory in which the rook-ceph cluster will save the cluster configuration.monitor
andmanager
provide configuration for the mon and mgr components of ceph. For more configuration options, please refer to the Fleet API.- In addition to the configuration fields mentioned above, kurator also provides
storage.devices
field that allows you to specify the use of device mounted in a specific directory (such as /dev/sda) on all nodes in the cluster. Andstorage.nodes
field that allows you to specify the use of storage resources on specific nodes. It is also possible to specify the devices to be used. For more configuration options, please refer to the Fleet API.
Verify the Installation
To ensure that the distributedstorage plugin is successfully installed and running, run the following commands:
kubectl get pod -n rook-ceph --kubeconfig=/root/.kube/kurator-member1.config
kubectl get pod -n rook-ceph --kubeconfig=/root/.kube/kurator-member2.config
After waiting for some time check the status of all pods under the rook-ceph namespace. The result is shown below:
NAME READY STATUS RESTARTS AGE
csi-cephfsplugin-75lqn 2/2 Running 0 32h
csi-cephfsplugin-bd7d6 2/2 Running 0 32h
csi-cephfsplugin-lk6wz 2/2 Running 0 32h
csi-cephfsplugin-provisioner-86788ff996-2vfg2 5/5 Running 0 32h
csi-cephfsplugin-provisioner-86788ff996-bc6cg 5/5 Running 0 32h
csi-rbdplugin-28s5x 2/2 Running 0 32h
csi-rbdplugin-7pj48 2/2 Running 0 32h
csi-rbdplugin-ffpxn 2/2 Running 0 32h
csi-rbdplugin-provisioner-7b5494c7fd-bxm4f 5/5 Running 0 32h
csi-rbdplugin-provisioner-7b5494c7fd-nm4kp 5/5 Running 0 32h
rook-ceph-crashcollector-testpool-dev-linux-0001-6cfb5c54ff-mf6l4 1/1 Running 0 32h
rook-ceph-crashcollector-testpool-dev-linux-0003-84f6f85cb7-9grjp 1/1 Running 0 32h
rook-ceph-crashcollector-testpool-dev-linux-0004-65bf4f84c4-cvwpp 1/1 Running 0 32h
rook-ceph-mds-ceph-filesystem-a-65688966df-5zq7d 2/2 Running 0 32h
rook-ceph-mds-ceph-filesystem-a-6d5dcb85b6-k8pqr 2/2 Running 0 32h
rook-ceph-mgr-a-8456d8cc98-n54n2 3/3 Running 0 32h
rook-ceph-mgr-b-67c9cc8c95-gk82m 3/3 Running 0 32h
rook-ceph-mon-a-68659ffbfb-bqn6q 2/2 Running 0 32h
rook-ceph-mon-b-85479654f8-n26vs 2/2 Running 0 32h
rook-ceph-mon-c-6779986564-p8dmc 2/2 Running 0 32h
rook-ceph-operator-b89ccd545-vlg2r 1/1 Running 0 32h
rook-ceph-osd-0-996475cb6f-cfbwh 1/1 Running 0 32h
rook-ceph-osd-1-67f5ff649c-vs5qt 1/1 Running 0 32h
rook-ceph-osd-2-7d4c78b74b-l8jg5 1/1 Running 0 32h
rook-ceph-osd-prepare-testpool-dev-linux-0001-jz766 0/1 Completed 0 32h
rook-ceph-osd-prepare-testpool-dev-linux-0003-t47st 0/1 Completed 0 32h
rook-ceph-osd-prepare-testpool-dev-linux-0004-kw94n 0/1 Completed 0 32h
rook-ceph-rgw-ceph-objectstore-a-5c4df48bbb-bf6jn 2/2 Running 0 32h
Persistent Volume Use Guide
After rook operator and rook ceph cluster are installed, this chapter provides examples of using Block Storage, Filesystem Storage and Object Storage.
Block Storage Class Configuration
Block storage allows a single pod to mount storage. This section how to create a block storage persistent volume kubernetes pod that uses the block storage provided by Rook.
The StorageClass
and CephBlockPool
need to be created before the Rook can configure storage.This will allow Kubernetes to interact with the Rook when configuring persistent volumes.
Run the following commands, can create a CephBlockPool
:
kubectl apply -f - <<EOF
apiVersion: ceph.rook.io/v1
kind: CephBlockPool
metadata:
name: replicapool
namespace: rook-ceph
spec:
failureDomain: host
replicated:
size: 3
EOF
Run the following commands, can create a block mod StorageClass
:
kubectl apply -f - <<EOF
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: rook-ceph-block
provisioner: rook-ceph.rbd.csi.ceph.com
parameters:
clusterID: rook-ceph
pool: replicapool
reclaimPolicy: Delete
allowVolumeExpansion: true
There are a few things to note in the above block storage class configuration:
- provisioner is configured in the format (operator-namespace).rbd.csi.ceph.com. Change “rook-ceph” provisioner prefix to match the operator namespace if needed.
parameters.clusterID
is the namespace where the rook cluster is running.parameters.pool
is theCephBlockPool
created before.
FileSystem Storage Class Configuration
A filesystem storage (also named shared filesystem) can be mounted with read/write permission from multiple pods. This may be useful for applications which can be clustered using a shared filesystem.This section describes how to create a kubernetes pod of file storage persistent volumes using the file storage provided by Rook.
Using the file storage provided by Rook, you can set up the metadatapool, datapool, and metadata server, all of which can be set up in the CephFileSystem
. Run the following commands, can create a CephFileSystem
:
kubectl apply -f - <<EOF
apiVersion: ceph.rook.io/v1
kind: CephFilesystem
metadata:
name: ceph-filesystem
namespace: rook-ceph
spec:
metadataPool:
replicated:
size: 3
dataPools:
- name: data0
replicated:
size: 3
preserveFilesystemOnDelete: true
metadataServer:
activeCount: 1
activeStandby: true
The Rook operator will create all the pools and other resources necessary to start the service. Mds
stands for metadata service and is the metadata service that the ceph filesystem service relies on. The metadata and configuration information of the filesystem store is managed by mds. To confirm the filesystem is configured, wait for the mds pods to start.
kubectl get po -n rook-ceph -l app=rook-ceph-mds
NAME READY STATUS RESTARTS AGE
rook-ceph-mds-ceph-filesystem-a-65688966df-5zq7d 2/2 Running 0 32h
rook-ceph-mds-ceph-filesystem-a-6d5dcb85b6-k8pqr 2/2 Running 0 32h
Before you can use the file storage provided by Rook, you need to create a storage class for the file storage type, which is required for Kubernetes to interoperate with the CSI driver to create persistent volumes. Apply this storage class definition as:
kubectl apply -f - <<EOF
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: rook-cephfs
provisioner: rook-ceph.cephfs.csi.ceph.com
parameters:
clusterID: rook-ceph
fsName: ceph-filesystem
pool: data0
reclaimPolicy: Delete
EOF
There are a few things to note in the above filesystem storage class configuration:
- provisioner is configured in the format (operator-namespace).cephfs.csi.ceph.com. Change “rook-ceph” provisioner prefix to match the operator namespace if needed.
parameters.fsName
andparameters.pool
needs to correspond to the name created inCephFileSystem
.
Object Storage Class Configuration
In Rook, object storage exposes the S3 API to the storage cluster so that applications in the cluster can store data. As same as file storage, object storage requires metadata pool, data pool, and rgw a specific plug-in to support object storage. All of this can be set up in the CephObjectStorage
. Run the following commands, can create a CephObjectStorage
:
kubectl apply -f - <<EOF
apiVersion: ceph.rook.io/v1
kind: CephObjectStore
metadata:
name: ceph-objectstorage
namespace: rook-ceph
spec:
metadataPool:
failureDomain: host
replicated:
size: 3
dataPool:
failureDomain: host
erasureCoded:
dataChunks: 2
codingChunks: 1
preservePoolsOnDelete: true
gateway:
sslCertificateRef:
port: 80
instances: 1
EOF
The Rook operator will create all the pools and other resources necessary to start the service. To confirm the object storage is configured, wait for the rgw pods to start:
kubectl get po -n rook-ceph -l app=rook-ceph-rgw
NAME READY STATUS RESTARTS AGE
rook-ceph-rgw-ceph-objectstore-a-5c4df48bbb-bf6jn 2/2 Running 0 32h
Now that the object store is configured, we next need to create a storage bucket that will allow clients to read and write objects. Buckets can be created by defining storage classes, similar to the pattern used for block and file storage. Apply this storage class definition as:
kubectl apply -f - <<EOF
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: rook-ceph-bucket
provisioner: rook-ceph.ceph.rook.io/bucket
reclaimPolicy: Delete
parameters:
objectStoreName: ceph-objectstore
objectStoreNamespace: rook-ceph
EOF
There are a few things to note in the above filesystem storage class configuration:
- provisioner is configured in the format (operator-namespace).ceph.rook.io/bucket. Change “rook-ceph” provisioner prefix to match the operator namespace if needed.
parameters.objectStorageName
needs to correspond to the name created inCephObjectStorage
Use Block Storage
After creating the storagec class for block, file and object storage, it’s time to actually use this storage class. We can use Kurator application to create Persistent Volume Claim and Pod that consume it.
kubectl apply -f - <<EOF
apiVersion: apps.kurator.dev/v1alpha1
kind: Application
metadata:
name: blockstorage-demo
namespace: default
spec:
source:
gitRepository:
interval: 3m0s
ref:
branch: main
timeout: 1m0s
url: https://github.com/kurator-dev/kurator
syncPolicies:
- destination:
fleet: quickstart
kustomization:
interval: 5m0s
path: ./examples/fleet/distributedstorage/blockstore
prune: true
timeout: 2m0s
EOF
The above command creates a nginx-blockstorage pod and mounts Persistent Volume in its own Pod. You can run the following command to see the kubernetes volume claims:
kubectl get pvc -A --kubeconfig=/root/.kube/kurator-member1.config
NAME STATUS VOLUME CAPACITY ACCESSMODES AGE
block-pvc Bound pvc-n6w5hd42-sx7w-f996-7bdc-l7d4c78b74b8 1Gi RWO 3m
Use Filesystem Storage
Filesystem storage is similar to block storage, we also can use Kurator application to create Persistent Volume Claim and Pod that consume it.
kubectl apply -f - <<EOF
apiVersion: apps.kurator.dev/v1alpha1
kind: Application
metadata:
name: filesystemstorage-demo
namespace: default
spec:
source:
gitRepository:
interval: 3m0s
ref:
branch: main
timeout: 1m0s
url: https://github.com/kurator-dev/kurator
syncPolicies:
- destination:
fleet: quickstart
kustomization:
interval: 5m0s
path: ./examples/fleet/distributedstorage/filesystemstore
prune: true
timeout: 2m0s
EOF
The above command creates a nginx-filesystemstorage pod and mounts Persistent Volume in its own Pod. You can run the following command to see the kubernetes volume claims:
kubectl get pvc -A --kubeconfig=/root/.kube/kurator-member1.config
NAME STATUS VOLUME CAPACITY ACCESSMODES AGE
cephfs-pvc Bound filesystem-volume 1Gi RWO 1h
Use Object Storage
In a rook-ceph cluster, the use of object storage is different from the use of block storage and filesystem storage. ObjectBucketClaim
is used instead of PersistentVolumeClaim. And the application needs secret and configmap to access the objectbucket. When Pod use object storage, they don’t mount PVC like block storage and filesystem storage, but instead uniquely specify the ObjectBucketClaim with secret and configmap.
We can still use Kurator application to create ObjectBucketClaim and Pod that consume it, but there will be some changes to the configuration.
kubectl apply -f - <<EOF
apiVersion: apps.kurator.dev/v1alpha1
kind: Application
metadata:
name: objectstorage-demo
namespace: default
spec:
source:
gitRepository:
interval: 3m0s
ref:
branch: main
timeout: 1m0s
url: https://github.com/kurator-dev/kurator
syncPolicies:
- destination:
fleet: quickstart
kustomization:
interval: 5m0s
path: ./examples/fleet/distributedstorage/objectstore
prune: true
timeout: 2m0s
EOF
The above command creates a redis-objectstorage pod and use a object bucket in its own Pod. You can run the following command to see the Pod:
kubectl get po --kubeconfig=/root/.kube/kurator-member1.config
NAME READY STATUS RESTARTS AGE
redis-objectstorage 1/1 Running 0 3m37s
Cleanup
This section guides you through the process of cleaning up the fleets and plugins.
1. Cleanup the Backup Plugin
If you only need to remove the distributedstorage plugin, simply edit the current fleet and remove the corresponding description:
kubectl edit fleet.fleet.kurator.dev quickstart
To check the results of the deletion, you can observe that the Velero components have been removed:
kubectl get po -A --kubeconfig=/root/.kube/kurator-member1.config
kubectl get po -A --kubeconfig=/root/.kube/kurator-member2.config
Perhaps there are still some rook components left over, which can be executed by running the following command:
kubectl api-resources --verbs=list --namespaced -o name | xargs -n 1 kubectl get --show-kind --ignore-not-found -n rook-ceph --kubeconfig=/root/.kube/kurator-member1.config
kubectl api-resources --verbs=list --namespaced -o name | xargs -n 1 kubectl get --show-kind --ignore-not-found -n rook-ceph --kubeconfig=/root/.kube/kurator-member2.config
After getting undeleted rook components, you can delete it by editing its configuration file via kubectl edit
and removing its finalizer.
More information on removing a Rook can be found at rook cleanup guide
If you wish to reinstall the components later, you can simply edit the fleet and add the necessary configurations.
2. Cleanup the Fleet
When the fleet is deleted, all associated plugins will also be removed:
kubectl delete fleet.fleet.kurator.dev quickstart
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.