This controller is installed in to Civo K3s client clusters and handles the mounting of Civo Volumes on to the correct nodes and promoting the storage into the cluster as a Persistent Volume.
- Official Kubernetes CSI announcement blog
- Official CSI documentation
- Good list of current CSI drivers to see how others have done things
- Presentation on how CSI is architected
- Example Hostpath CSI driver
- Notes on Hostpath CSI driver
- We need to enable dynamic provisioning
- We're going to build a single binary and use the sidecars to register the appropriate parts of it in the appropriate place (one part runs on the control plane as a deployment, the other part runs on each node as a DaemonSet)
There are three parts to a CSI driver - node, controller and identity. The easiest way to think about these is:
- identity just identifies the driver itself: version, capabilities and a probe call to see if it's still alive
- controller is responsible for communicating with the external API, to check capacity and provision real world resources, and attach them to the node
- node is for after the volume is attached to the underlying node - formatting and mounting it
The order for calls is usually:
- CSI driver launches and Identity's
GetPluginCapabilities
is called - On an ongoing and regular basis Identity's
Probe
is called - When a pod requests a PV (dynamically created from a PVC), Controller's
CreateVolume
is called to create it in the Civo API - The Kubernetes control plane then calls Controller's
ControllerPublishVolume
to attach the volume to the correct node - After the volume is attached Node's
NodeStageVolume
is called to format the volume (if not already formatted) and mount it to a node-wide set of mount points - When the volume is formatted and mounted, Node's
NodePublishVolume
is called to bind mount that mount point into the pod's specific mount point. - Then the volume is in use normally by the pod. When it's finished with...
- The bind-mount for the volume is removed with Node's
NodeUnpublishVolume
- Then the actual volume is unmounted with Node's
NodeUnstageVolume
. - Finally the volume is detached from the instance within Civo's API with Controller's
ControllerUnpublishVolume
.
At this point the volume still exists and still contains data. If the operator wants to delete it, then the kubectl pv delete ...
will actually call Controller's DeleteVolume
. If a PV is requested, the Kubernetes control plane will ensure space is available with Controller's GetCapacity
, and if the operator lists all volumes this is done with Controller's ListVolumes
.
- Must have a secret called
civo-api-access
within thekube-system
namespace containing keys ofapi-key
,api-url
,cluster-id
,namespace
andregion
. - Must have a folder created called
/var/lib/kubelet/plugins/csi.civo.com
(for writing a socket to that is shared between containers) - Must have a file called
/etc/civostatsd
containing a TOML set of configuration (the same that's used for https://github.com/civo/civostatsd so it should already be available), for example:
server="https://api.civo.com"
token="12345678901234567890"
region="NYC1"
instance_id="12345678-1234-1234-1234-1234567890"
- Killing the node daemonset leaves /dev/vda1 (yes the entire filesystem) mounted at /var/lib/kubelet/plugins/csi.civo.com
- Volumes take a while to create but Controller's ControllerPublishVolume immediately returns success if the API succeeded, needs to retry unless it is actually mounted?
Normally for our Civo Kubernetes integrations we'd recommend visiting the getting started document for CivoStack guide, but this is a different situation (installed on the client cluster, not the supercluster), so below are some similar sort of steps to get you started:
Unlike Operators, you can't as easily run CSI drivers locally just connected in to a cluster (there is a way with socat
and forwarding Unix sockets, but we haven't experimented with that yet).
So the way we test our work is:
The CSI Sanity suite is integrated as well as some custom unit tests and is a simple go test
away š„³
This will run the full Kubernetes Storage SIG's suite of tests against the endpoints we're supposed to have implemented to comply with the spec.
The steps are:
- Create an environment variable called
IMAGE_NAME
with a random or recognisable name (export IMAGE_NAME=$(uuidgen | tr '[:upper:]' '[:lower:]')
works well) - Build the Docker image with
docker build -t ttl.sh/${IMAGE_NAME}:2h .
- Push the Docker image to ttl.sh (a short lived Docker image repository, useful for dev):
docker push ttl.sh/${IMAGE_NAME}:2h
- Copy recursively the
deploy/kubernetes
folder todeploy/kubernetes-dev
withcp -rv deploy/kubernetes deploy/kubernetes-dev
and replace all occurences ofcivo-csi:latest
in there withYOUR_IMAGE_NAME:2h
(ENV variable interpolation won't work here), this folder is automatically in.gitignore
- In a test cluster (a Civo K3s 1 node cluster will work) you'll need to create a
Secret
within thecivo-system
calledapi-access
containing the keysapi-key
set to your Civo API key,api-url
pointing to eitherhttps://api.civo.com
or a xip.io/ngrok pointing to your local development environment (depending on where your cluster is running) andregion
set to the region the current cluster is running in - Deploy the Kubernetes resources required to the cluster with
kubectl apply -f deploy/kubernetes-dev
There are e2e tests included in this repo that will provision a cluster and run integrations against the cluster. These tests require a valid Civo API key to be present in the .env file (sample provided) in the root of the project dir. The tests can be found in the e2e directory and can be run with the following
go test -v ./e2e/...
To aid in development, the tests can be run with a -retain
flag to persist the provisioned cluster between test runs:
go test -v ./e2e/... -retain