title | excerpt | updated |
---|---|---|
Configuring multi-attach persistent volumes with OVHcloud NAS-HA |
Find out how to configure a multi-attach persistent volume using OVHcloud NAS-HA |
2024-08-05 |
OVHcloud Managed Kubernetes natively integrates Block Storage as persistent volumes. This technology may however not be suited to some legacy or non cloud-native applications, often requiring to share this persistent data accross different pods on multiple worker nodes (ReadWriteMany or RWX). If you would need to do this for some of your workloads, one solution is to use NFS volumes. OVHcloud NAS-HA is a managed solution that lets you easily configure an NFS server and multiple NFS volumes. In this tutorial we are going to see how to configure your OVHcloud Managed Kubernetes cluster to use OVHcloud NAS-HA as an NFS provider for Kubernetes Persistent Volumes.
This tutorial assumes that you already have a working OVHcloud Managed Kubernetes cluster, and some basic knowledge of how to operate it. If you want to know more on those topics, please look at the deploying a Hello World application documentation.
It also assumes you have an OVHcloud NAS-HA already available. If you don't, you can order one in the OVHcloud Control Panel.
You also need to have Helm installed on your workstation, please refer to the How to install Helm on OVHcloud Managed Kubernetes Service tutorial.
Your NAS-HA can expose multiple partitions, and supports a variety of protocols. Each partition is accessible only from a specific range of IPs. We will create one exposing NFS and make it accessible from your Kubernetes worker nodes.
Access the UI for OVHcloud NAS-HA by clicking the HA-NAS and CDN menu in the Bare Metal Cloud section of the OVHcloud Control Panel
Click on your NAS, then on the Partitions
{.action} tab, then on the Create a partition
{.action} button and create the new NFS partition with the following content:
Your cluster is installed with Public Network or a private network without using an OVHcloud Internet Gateway or a custom one as your default route
Once the partition is created, we need to allow our Kubernetes nodes to access our newly created partition.
Get our Kubernetes nodes IP:
kubectl get nodes -o jsonpath='{ $.items[*].status.addresses[?(@.type=="InternalIP")].address }'
$ kubectl get nodes -o jsonpath='{ $.items[*].status.addresses[?(@.type=="InternalIP")].address }'
51.77.204.175 51.77.205.79
Your cluster is installed with Private Network and a default route via your Private Network (OVHcloud Internet Gateway/OpenStack Router or a custom one)
Because your nodes are configured to be routed by the private network gateway, you need to add the gateway IP address to the ACLs.
By using Public Cloud Gateway through our Managed Kubernetes Service, Public IPs on nodes are only for management purposes: MKS Known Limits
You can get your OVHcloud Internet Gateway's Public IP by navigating through the OVHcloud Control Panel:
Public Cloud
{.action} > Select your tenant > Network / Gateway
{.action} > Public IP
{.action}
You can also get your OVHcloud Internet Gateway's Public IP by using our APIs:
[!api]
@api {v1} /cloud GET /cloud/project/{serviceName}/region/{regionName}/gateway/{id}
You can find more details about how to use OVHcloud APIs with this guide: First Steps with the OVHcloud APIs
If you want to use your Kubernetes cluster to know your Gateway Public's IP, you can run these commands:
kubectl run get-gateway-ip --image=ubuntu:latest -i --tty --rm
This command will create a temporary pod and open a console.
You may have to wait a bit to let the pod be created. Once the shell appears, you can run this command:
apt update && apt upgrade -y && apt install -y curl && curl ifconfig.me
The Public IP of the Gateway you're using should appear.
Click on the Manage Access
{.action} menu of our newly created partition:
Add either the nodes' IPs one by one or the Gateway's Public IP depending on your configuration:
You should now have something similar to this:
In this example our ZPOOL_IP
is 10.201.18.33
, our ZPOOL_NAME
is zpool-127659
, and our PARTITION_NAME
is kubernetes
. Please modify this accordingly in the later steps.
Your Kubernetes cluster needs some additionnal piece of software to make use of the NFS partition. We will install those and then create a first volume, shared accross multiple pods.
To do so, you can install the csi-driver-nfs:
helm repo add csi-driver-nfs https://raw.githubusercontent.com/kubernetes-csi/csi-driver-nfs/master/charts
helm install csi-driver-nfs csi-driver-nfs/csi-driver-nfs --namespace kube-system --version v4.7.0 --set driver.name="nfs2.csi.k8s.io" --set controller.name="csi-nfs2-controller" --set rbac.name=nfs2
$ helm install csi-driver-nfs -n kube-system csi-driver-nfs/csi-driver-nfs --version v4.7.0 --set driver.name="nfs2.csi.k8s.io" --set rbac.name=nfs --set controller.name="csi-nfs2-controller"
NAME: csi-driver-nfs
LAST DEPLOYED: Thu Jul 11 15:13:34 2024
NAMESPACE: kube-system
STATUS: deployed
REVISION: 1
TEST SUITE: None
NOTES:
The CSI NFS Driver is getting deployed to your cluster.
To check CSI NFS Driver pods status, please run:
kubectl --namespace=kube-system get pods --selector="app.kubernetes.io/instance=csi-driver-nfs" --watch
Let's verify our installation:
kubectl --namespace=kube-system get pods --selector="app.kubernetes.io/instance=csi-driver-nfs"
$ kubectl --namespace=kube-system get pods --selector="app.kubernetes.io/instance=csi-driver-nfs"
NAME READY STATUS RESTARTS AGE
csi-nfs-node-2qczs 3/3 Running 0 16s
csi-nfs-node-tw77p 3/3 Running 0 16s
csi-nfs2-controller-58b8b4cf7f-nk727 4/4 Running 0 16s
Let's create a nfs-storageclass.yaml
file:
[!primary]
Don't forget to replace
[ZPOOL_IP]
,[ZPOOL_NAME]
and[PARTITION_NAME]
with the correct information.
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: nfs-csi
provisioner: nfs2.csi.k8s.io
parameters:
server: '[ZPOOL_IP]'
share: '/[ZPOOL_NAME]/[PARTITION_NAME]'
reclaimPolicy: Delete
volumeBindingMode: Immediate
mountOptions:
- nfsvers=4.1
- tcp
- rsize=1048576
- wsize=1048576
[!primary]
The
rsize
andwsize
parameters define the maximum number of bytes of data that the NFS client can receive for each READ or WRITE request.The
tcp
parameter instructs the NFS mount to use the TCP protocol.
Then apply the YAML file to create the StorageClass:
kubectl apply -f nfs-storageclass.yaml
Let’s create a nfs-persistent-volume-claim.yaml
file:
kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: nfs-pvc
namespace: default
spec:
accessModes:
- ReadWriteOnce
storageClassName: nfs-csi
resources:
requests:
storage: 1Gi
And apply this to create the persistent volume claim:
kubectl apply -f nfs-persistent-volume-claim.yaml
You can find more information about the PVC by running this command:
kubectl describe pvc nfs-pvc
$ kubectl describe pvc nfs-pvc
Name: nfs-pvc
Namespace: default
StorageClass: nfs-csi
Status: Pending
Volume:
[...]
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal Provisioning 2m25s nfs2.csi.k8s.io_nodepool-c7ef08a9-2a22-40fd-9c-node-993f96_7078d019-f44a-42a1-8e7f-c6ee36f3f466 External provisioner is provisioning volume for claim "default/nfs-pvc"
Normal ExternalProvisioning 15s (x10 over 2m25s) persistentvolume-controller Waiting for a volume to be created either by the external provisioner 'nfs2.csi.k8s.io' or manually by the system administrator. If volume creation is delayed, please verify that the provisioner is running and correctly registered.
The external provisioner (here the HA-NAS) is provisioning your volume. Wait a bit and the volume should appear:
$ kubectl describe pvc nfs-pvc
Name: nfs-pvc
Namespace: default
StorageClass: nfs-csi
Status: Bound
Volume: pvc-a213e1a9-2fee-4632-ae9e-c952fab74e38
[...]
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal Provisioning 2m25s nfs2.csi.k8s.io_nodepool-c7ef08a9-2a22-40fd-9c-node-993f96_7078d019-f44a-42a1-8e7f-c6ee36f3f466 External provisioner is provisioning volume for claim "default/nfs-pvc"
Normal ExternalProvisioning 15s (x10 over 2m25s) persistentvolume-controller Waiting for a volume to be created either by the external provisioner 'nfs2.csi.k8s.io' or manually by the system administrator. If volume creation is delayed, please verify that the provisioner is running and correctly registered.
Normal ProvisioningSucceeded 14s nfs2.csi.k8s.io_nodepool-c7ef08a9-2a22-40fd-9c-node-993f96_7078d019-f44a-42a1-8e7f-c6ee36f3f466 Successfully provisioned volume pvc-a213e1a9-2fee-4632-ae9e-c952fab74e38
If you encounter errors such as:
Warning ProvisioningFailed 3s (x3 over 7s) nfs2.csi.k8s.io_nodepool-c7ef08a9-2a22-40fd-9c-node-993f96_7078d019-f44a-42a1-8e7f-c6ee36f3f466 failed to provision volume with StorageClass "nfs-csi": rpc error: code = Internal desc = failed to make subdirectory: mkdir /tmp/pvc-31210848-7f3f-40e6-aa7a-fafa616da4e7/pvc-31210848-7f3f-40e6-aa7a-fafa616da4e7: input/output error
or such as:
Warning ProvisioningFailed 1s (x3 over 4s) nfs2.csi.k8s.io_nodepool-8bdec3f1-f54a-4de8-ad-node-091e7d_15634ab1-b7e2-45b5-9565-3a775490c4e3 failed to provision volume with StorageClass "nfs-csi": rpc error: code = Internal desc = failed to mount nfs server: rpc error: code = Internal desc = mount failed: exit status 32
Mounting command: mount
Mounting arguments: -t nfs -o nfsvers=4.1 [ZPOOL_IP]:/[ZPOOL_NAME]/[PARTITION_NAME] /tmp/pvc-f7693542-a817-472d-bb55-de7af91306b5
Output: mount.nfs: access denied by server while mounting [ZPOOL_IP]:/[ZPOOL_NAME]/[PARTITION_NAME]
It mostly means that something went wrong with the HA-NAS ACLs. Check the authorized IPs which can access to the wanted partition on the ACLs list.
Warning
If the number of PersistentVolumes to schedule simultaneously is too important, some slowness can be encountered and volume creation can be delayed.
Let’s now create a DaemonSet of Nginx pods using the persistent volume claim as their webroot folder.
Using a DaemonSet will create a pod on each deployed node and make troubleshooting easier in case of a misconfiguration or to isolate a node issue.
Let's create a file named nginx-daemonset.yaml
:
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: nfs-nginx
namespace: default
spec:
selector:
matchLabels:
name: nginx
template:
metadata:
labels:
name: nginx
spec:
volumes:
- name: nfs-volume
persistentVolumeClaim:
claimName: nfs-pvc
containers:
- name: nginx
image: nginx
ports:
- containerPort: 80
name: "http-server"
volumeMounts:
- mountPath: "/usr/share/nginx/html"
name: nfs-volume
And apply this to create the Nginx DaemonSet:
kubectl apply -f nginx-daemonset.yaml
Both pods should be running:
kubectl get pods
NAME READY STATUS RESTARTS AGE
nfs-nginx-29r49 1/1 Running 0 14m
nfs-nginx-f5j92 1/1 Running 0 14m
Let’s enter inside the first Nginx pod and container to check if the zpool is properly mounted and create a file on the NFS persistent volume:
FIRST_POD=$(kubectl get pod -l name=nginx --no-headers=true -o custom-columns=:metadata.name | head -1)
kubectl exec -it $FIRST_POD -n default -- bash
Check if the zpool is mounted on the Nginx pod:
root@nfs-nginx-29r49:/# mount -l | grep zpool
[ZPOOL_IP]:/[ZPOOL_NAME]/[PARTITION_NAME]/[PV_NAME] on /usr/share/nginx/html type nfs4 (rw,relatime,vers=4.1,rsize=131072,wsize=131072,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,clientaddr=[NODE_IP],local_lock=none,addr=[ZPOOL_IP])
You can test HA-NAS IOPS and speed by installing and running FIO tool inside a container:
apt update
apt install fio
And then running those commands (don't forget to move into the folder mounted from the HA-NAS):
cd /usr/share/nginx/html/
fio --randrepeat=1 --ioengine=libaio --direct=1 --gtod_reduce=1 --name=testfiofrommks --filename=random_read_write.fio --bs=128k --iodepth=64 --size=10G --readwrite=randrw --rwmixread=75
At the end of the bench, you should have an output like this:
End of the FIO test:
testfiofrommks: Laying out IO file (1 file / 10240MiB)
Jobs: 1 (f=1): [m(1)][100.0%][r=117MiB/s,w=36.1MiB/s][r=933,w=289 IOPS][eta 00m:00s]
testfiofrommks: (groupid=0, jobs=1): err= 0: pid=748: Tue May 21 15:22:14 2024
read: IOPS=931, BW=116MiB/s (122MB/s)(7683MiB/65965msec)
bw ( KiB/s): min=119040, max=119824, per=100.00%, avg=119333.25, stdev=106.46, samples=131
iops : min= 930, max= 936, avg=932.29, stdev= 0.83, samples=131
write: IOPS=310, BW=38.8MiB/s (40.7MB/s)(2557MiB/65965msec); 0 zone resets
[...]
Now, we will check if the HA-NAS is properly shared between the deployed pods.
Create a new index.html
file:
echo "NFS volume!" > /usr/share/nginx/html/index.html
And exit the Nginx container:
exit
Let’s try to access our new web page:
kubectl proxy
Generate the URL to open in your broswer:
URL=$(echo "http://localhost:8001/api/v1/namespaces/default/pods/http:$FIRST_POD:/proxy/")
echo $URL
You can open the URL which is displayed to access the Nginx Service.
Now let’s try to see if the data is shared with the second pod (if you have more than one node deployed).
$ SECOND_POD=$(kubectl get pod -l name=nginx --no-headers=true -o custom-columns=:metadata.name | head -2 | tail -1)
URL2=$(echo "http://localhost:8001/api/v1/namespaces/default/pods/http:$SECOND_POD:/proxy/")
echo $URL2
You can open the URL which is displayed to access the Nginx Service on the other pod.
As you can see the data is correctly shared between the two Nginx pods running on two different Kubernetes nodes.
Congratulations, you have successfully set up a multi-attach persistent volume with OVHcloud NAS-HA!
To learn more about using your Kubernetes cluster the practical way, we invite you to look at our OVHcloud Managed Kubernetes doc site.
- If you need training or technical assistance to implement our solutions, contact your sales representative or click on this link to get a quote and ask our Professional Services experts for assisting you on your specific use case of your project.
Join our community of users.