Ceph
PLEASE NOTE: This document applies to v1.3 version and not to the latest stable release v1.8
Documentation for other releases can be found by using the version selector in the top right of any doc page.Ceph Object Bucket Claim
Rook supports the creation of new buckets and access to existing buckets via two custom resources:
- an
Object Bucket Claim (OBC)is custom resource which requests a bucket (new or existing) and is described by a Custom Resource Definition (CRD) shown below. - an
Object Bucket (OB)is a custom resource automatically generated when a bucket is provisioned. It is a global resource, typically not visible to non-admin users, and contains information specific to the bucket. It is described by an OB CRD, also shown below.
An OBC references a storage class which is created by an administrator. The storage class defines whether the bucket requested is a new bucket or an existing bucket. It also defines the bucket retention policy. Users request a new or existing bucket by creating an OBC which is shown below. The ceph provisioner detects the OBC and creates a new bucket or grants access to an existing bucket, depending the the storage class referenced in the OBC. It also generates a Secret which provides credentials to access the bucket, and a ConfigMap which contains the bucket’s endpoint. Application pods consume the information in the Secret and ConfigMap to access the bucket
Sample
OBC Custom Resource
apiVersion: objectbucket.io/v1alpha1
kind: ObjectBucketClaim
metadata:
name: ceph-bucket [1]
namespace: rook-ceph [2]
spec:
bucketName: [3]
generateBucketName: photo-booth [4]
storageClassName: rook-ceph-bucket [4]
additionalConfig: [5]
ANY_KEY: VALUE ...
nameof theObjectBucketClaim. This name becomes the name of the Secret and ConfigMap.namespace(optional) of theObjectBucketClaim, which is also the namespace of the ConfigMap and Secret.bucketNamename of thebucket. Not recommended for new buckets since names must be unique within an entire object store.generateBucketNamevalue becomes the prefix for a randomly generated name, if supplied thenbucketNamemust be empty. If bothbucketNameandgenerateBucketNameare supplied thenBucketNamehas precedence andGenerateBucketNameis ignored. If bothbucketNameandgenerateBucketNameare blank or omitted then the storage class is expected to contain the name of an existing bucket. It’s an error if all three bucket related names are blank or omitted.storageClassNamewhich defines the StorageClass which contains the names of the bucket provisioner, the object-store and specifies the bucket retention policy.additionalConfigis an optional list of key-value pairs used to define attributes specific to the bucket being provisioned by this OBC. This information is typically tuned to a particular bucket provisioner and may limit application portability. Examples can include config values such as tenant, user and policy settings, etc.
OBC Custom Resource after Bucket Provisioning
apiVersion: objectbucket.io/v1alpha1
kind: ObjectBucketClaim
metadata:
creationTimestamp: "2019-10-18T09:54:01Z"
generation: 2
name: ceph-bucket
namespace: default [1]
resourceVersion: "559491"
spec:
ObjectBucketName: obc-default-ceph-bucket [2]
additionalConfig: null
bucketName: photo-booth-c1178d61-1517-431f-8408-ec4c9fa50bee [3]
cannedBucketAcl: ""
ssl: false
storageClassName: rook-ceph-bucket [4]
versioned: false
status:
Phase: bound [5]
namespacewhere OBC got created.ObjectBucketNamegenerated OB name created using name space and OBC name.- the generated (in this case), unique
bucket namefor the new bucket. - name of the storage class from OBC got created.
- phases of bucket creation:
- Pending: the operator is processing the request.
- Bound: the operator finished processing the request and linked the OBC and OB
- Released: the OB has been deleted, leaving the OBC unclaimed but unavailable.
- Failed: not currently set.
App Pod
apiVersion: v1
kind: Pod
metadata:
name: app-pod
namespace: dev-user
spec:
containers:
- name: mycontainer
image: redis
envFrom: [1]
- configMapRef:
name: ceph-bucket [2]
- secretRef:
name: ceph-bucket [3]
- use
env:if mapping of the defined key names to the env var names used by the app is needed. - makes available to the pod as env variables:
BUCKET_HOST,BUCKET_PORT,BUCKET_NAME - makes available to the pod as env variables:
AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY
StorageClass
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: rook-ceph-bucket
labels:
aws-s3/object [1]
provisioner: rook-ceph.ceph.rook.io/bucket [2]
parameters: [3]
objectStoreName: my-store
objectStoreNamespace: rook-ceph
region: us-west-1
bucketName: ceph-bucket [4]
reclaimPolicy: Delete [5]
label(optional) here associates thisStorageClassto a specific provisioner.provisionerresponsible for handlingOBCsreferencing thisStorageClass.- all
parameterrequired. bucketNameis required for access to existing buckets but is omitted when provisioning new buckets. Unlike greenfield provisioning, the brownfield bucket name appears in theStorageClass, not theOBC.- rook-ceph provisioner decides how to treat the
reclaimPolicywhen anOBCis deleted for the bucket. See explanation as specified in Kubernetes- Delete = physically delete the bucket.
- Retain = do not physically delete the bucket.