You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
borrowed from @ddebroy 's slack message, added some metadata. Also added example files to look at to make it easier to grok the way its used by looking at SMB/Azure File implementations
Co-authored-by: Mark Rossetti <[email protected]>
Copy file name to clipboardExpand all lines: README.md
+37-7
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,40 @@
1
1
# CSI Proxy
2
2
3
-
CSI Proxy is a binary that exposes a set of gRPC APIs around storage operations
4
-
over named pipes in Windows. A container, such as CSI node plugins, can mount
5
-
the named pipes depending on operations it wants to exercise on the host and
6
-
invoke the APIs.
3
+
CSI Proxy (which might be more aptly named "csi-node-proxy") is a binary that exposes a set of gRPC APIs (over named pipes) around local storage operations for nodes in Windows. A container, such as CSI node plugins, can mount the named pipes depending on operations it wants to exercise on the host and
4
+
invoke the APIs. This allows a storage plugin to run as if were a CSI plugin on linux which have the ability to perform "privileged" actions on the windows host OS.
In the above diagram, there are 3 communication channels being utilized for CSI proxy:
34
+
35
+
-`csi.sock` : This usually lives at c:/var/lib/kubelet/plugins/csi-plugin/csi.sock, and is used for the host OS to communicate with the CSI node plugin
36
+
-`csi-plugin-reg.sock` : This lives here, c:/var/lib/kubelet/plugins_registry/csi-plugin-reg.sock, and is used for the kubelet itself to get metadata as needed from the csi plugin .
37
+
-`\\.\pipe\csi-proxy` : This will live in a pipe, i.e. at \\.\pipe/csi-proxy-api-group-v-... : upon receipt of specific requests from the Node plugin, it carries out actions on the node plugins behalf. Since it doesn't execute arbitrary commands on the host, its more secure then simply being a black-box proxy to run host commands.
7
38
8
39
Each named pipe will support a specific version of an API (e.g. v1alpha1, v2beta1)
9
40
that targets a specific area of storage (e.g. disk, volume, file, SMB, iSCSI).
@@ -13,7 +44,6 @@ that targets a specific area of storage (e.g. disk, volume, file, SMB, iSCSI).
13
44
CSI drivers are recommended to be deployed as containers. Node plugin containers need to run with privileges to perform storage related operations. However, Windows does not support privileged containers currently. With CSIProxy, the node plugins can now be deployed as unprivileged pods that use the proxy to perform privileged storage operations on the node. Kubernetes administrators will need to install and maintain csi-proxy.exe on all Windows nodes in a manner similar to kubelet.exe.
14
45
15
46
## Compatibility
16
-
17
47
Recommended K8s Version: 1.18
18
48
19
49
## Feature status
@@ -143,11 +173,11 @@ You can reach the maintainers of this project at:
-[SMB CSI Driver](https://github.com/kubernetes-csi/csi-driver-smb/tree/master/deploy/example/windows). To see specifically how this driver is invoked, you can look at https://github.com/kubernetes-csi/csi-driver-smb/blob/master/pkg/mounter/safe_mounter_windows.go.
147
177
148
178
-[Azure Disk CSI Driver](https://github.com/kubernetes-sigs/azuredisk-csi-driver/tree/master/deploy/example/windows)
-[Azure File CSI Driver](https://github.com/kubernetes-sigs/azurefile-csi-driver/tree/master/deploy/example/windows). See https://github.com/kubernetes-sigs/azurefile-csi-driver/blob/master/pkg/mounter/safe_mounter_windows.go as an example of the invocation path
151
181
152
182
-[Google Compute Engine Persistent Disk CSI Driver](https://github.com/kubernetes-sigs/gcp-compute-persistent-disk-csi-driver)
0 commit comments