- Overview
- Compatibility
- Support
- Getting Started
- Basic Use
- Contributing to the Project
- Releases
- Versioning
- License
The BeeGFS Container Storage Interface (CSI) driver provides high performing and scalable storage for workloads running in container orchestrators like Kubernetes. This driver allows containers to access existing datasets or request on-demand ephemeral or persistent high speed storage backed by BeeGFS parallel file systems.
The driver can be easily deployed using the provided Kubernetes manifests. Optionally the BeeGFS CSI Driver Operator can be used to automate day-1 (install/ configure) and day-2 (reconfigure/update) tasks for the driver. This especially simplifies discovery and installation from Operator Lifecycle Manger (OLM) enabled clusters. Multi-arch images supporting amd64 and arm64 Kubernetes nodes are provided for the BeeGFS CSI driver and operator.
- Integration of Storage Classes in Kubernetes with storage pools in BeeGFS, allowing different tiers of storage within the same file system to be exposed to end users.
- Management of global and node specific BeeGFS client configuration applied to Kubernetes nodes, simplifying use in large environments.
- Specify permissions in BeeGFS from Storage Classes in Kubernetes simplifying integration with BeeGFS quotas and providing visibility and control over user consumption of the shared file system.
- Set striping parameters in BeeGFS from Storage Classes in Kubernetes to optimize for diverse workloads sharing the same file system.
- Support for ReadWriteOnce, ReadOnlyMany, and ReadWriteMany access modes in Kubernetes allow workloads distributed across multiple Kubernetes nodes to share access to the same working directories and enable multi-user/application access to common datasets.
The BeeGFS CSI driver must interact with both Kubernetes and a BeeGFS filesystem. To ensure compatibility with relevant versions of these key software components regular testing is done throughout each release cycle. The following table describes the versions of each component used in testing each release of the BeeGFS CSI driver. These configurations should be considered compatible and supported.
BeeGFS CSI Driver | K8s Versions | BeeGFS Client Versions | CSI Version |
---|---|---|---|
v1.7.0 | 1.27.11, 1.28.7, 1.29.10, 1.30.6, 1.31.2 | 7.3.4, 7.4.5 | v1.10.0 |
v1.6.0 | 1.25.16, 1.26.14, 1.27.11, 1.28.7 | 7.3.4, 7.4.2 | v1.8.0 |
v1.5.0 | 1.23.17, 1.24.15, 1.25.11, 1.26.3, 1.27.3 | 7.3.4, 7.4.0 | v1.7.0 |
v1.4.0 | 1.22.6, 1.23.5, 1.24.1, 1.25.2 | 7.3.2, 7.2.8 | v1.7.0 |
v1.3.0 | 1.21.4, 1.22.3, 1.23.1, 1.24.1 | 7.3.1, 7.2.7 | v1.6.0 |
v1.2.2 | 1.20.11, 1.21.4, 1.22.3, 1.23.1 | 7.3.0, 7.2.6 1 | v1.5.0 |
v1.2.1 | 1.19.15, 1.20.11, 1.21.4, 1.22.3 | 7.2.5 1 | v1.5.0 |
v1.2.0 | 1.18, 1.19, 1.20, 1.21 | 7.2.4 1 | v1.5.0 |
v1.1.0 | 1.18, 1.19, 1.20 | 7.2.1 1 | v1.3.0 |
v1.0.0 | 1.19 | 7.2 1 | v1.3.0 |
Additional notes:
- Starting with v1.6.0 official multi-arch container images are provided for both amd64 and arm64.
- The BeeGFS CSI driver offers experimental support for Hashicorp Nomad.
- As of v1.5.0 the BeeGFS CSI driver is no longer tested with Red Hat OpenShift.
See the compatibility guide for more details on expectations of compatibility for the BeeGFS CSI driver.
Versions of the BeeGFS CSI driver prior to v1.3.0 are known to have issues initializing the driver when used in conjunction with BeeGFS clients 7.2.7 or 7.3.1. These issues relate to the changes in these BeeGFS versions that require Connection Authentication configuration to be set. The v1.3.0 release of the driver resolves these issues and maintains compatibility with the prior BeeGFS versions (7.2.6 and 7.3.0). Therefore, in an environment where an existing installation is upgrading from BeeGFS 7.2.6 or 7.3.0 to 7.2.7 or 7.3.1 the recommendation would be to upgrade the BeeGFS CSI driver to v1.3.0 or later before upgrading the BeeGFS clients.
Support for the BeeGFS CSI driver is "best effort". The following policy is in no way binding and may change without notice.
Only the latest version of the BeeGFS CSI driver is supported. Bugs or vulnerabilities found in this version may be fixed in a patch release or may be fixed in a new minor version. If they are fixed in a new minor version, upgrading to this version may be required to obtain the fix.
Fixes for old minor versions of the driver or backporting fixes to an older minor release of the driver should not be expected. The maintainers may choose to release a fix in a patch for an older release at their discretion.
Support for the BeeGFS driver can be expected when the driver is used with components listed in the compatibility table. The ability to provide support for issues with components outside of the compatibility matrix will depend on the details of the issue.
If you have any questions, feature requests, or would like to report an issue please submit them at https://github.com/ThinkParQ/beegfs-csi-driver/issues.
- Deploying the driver requires access to a terminal with kubectl.
- The BeeGFS DKMS
client must be
preinstalled to each Kubernetes node that needs BeeGFS access.
- As part of this setup the beegfs-helperd and beegfs-utils packages must be
installed, and the
beegfs-helperd
service must be started and enabled. - For BeeGFS versions 7.3.1+ or 7.2.7+, the
beegfs-helperd
service must be configured withconnDisableAuthentication = true
orconnAuthFile = <path to a connAuthFile shared by all file systems>
. See BeeGFS Helperd Configuration for other options or more details. - Experimental support for OpenShift environments with RedHat CoreOS nodes negates this requirement.
- As part of this setup the beegfs-helperd and beegfs-utils packages must be
installed, and the
- Each BeeGFS mount point uses an ephemeral UDP port. On Linux the selected ephemeral port is constrained by the values of IP variables. Ensure that firewalls allow UDP traffic between BeeGFS management/metadata/storage nodes and ephemeral ports on Kubernetes nodes.
- One or more existing BeeGFS file systems should be available to the Kubernetes nodes over a TCP/IP and/or RDMA (InfiniBand/RoCE) capable network (not required to deploy the driver).
The steps in this section allow you to get the driver up and running quickly. See them in action on NetApp TV. For production use cases or air-gapped environments it is recommended to read through the full kubectl deployment guide or operator deployment guide.
- On a machine with kubectl and access to the Kubernetes cluster where you want
to deploy the BeeGFS CSI driver clone this repository:
git clone https://github.com/ThinkParQ/beegfs-csi-driver.git
. - Change to the BeeGFS CSI driver directory (
cd beegfs-csi-driver
). - In BeeGFS versions 7.3.1+ or 7.2.7+, explicit connAuth configuration is
required. Do one of the following or see ConnAuth
Configuration for more details.
- Set connDisableAuthentication to true in
csi-beegfs-config.yaml
if your existing file system does not use connection authentication.config: beegfsClientConf: connDisableAuthentication: true
- Provide connAuth details in
csi-beegfs-connauth.yaml
if your existing file system does use connection authentication.- sysMgmtdHost: <sysMgmtdHost> connAuth: <connAuthSecret> encoding: <encodingType> # raw or base64
- Set connDisableAuthentication to true in
- Run
kubectl apply -k deploy/k8s/overlays/default
. Note by default the beegfs-csi-driver image will be pulled from GitHub Container Registry. - Verify all components are installed and operational:
kubectl get pods -n beegfs-csi
.
Provided all Pods are running the driver is now ready for use. See the following sections for how to get started using the driver.
This section provides a quick summary of basic driver use and functionality. Please see the full usage documentation for a complete overview of all available functionality. The driver was designed to support both dynamic and static storage provisioning and allows directories in BeeGFS to be used as Persistent Volumes (PVs) in Kubernetes. Pods with Persistent Volume Claims (PVCs) are only able to see/access the specified directory (and any subdirectories), providing isolation between multiple applications and users using the same BeeGFS file system when desired.
Administrators create a Storage Class in Kubernetes referencing at minimum a specific BeeGFS file system and parent directory within that file system. Users can then submit PVCs against the Storage Class, and are provided isolated access to new directories under the parent specified in the Storage Class. See the process in action on NetApp TV.
Administrators create a PV and PVC representing an existing directory in a BeeGFS file system. This is useful for exposing some existing dataset or shared directory to Kubernetes users and applications. See the process in action on NetApp TV.
Example Kubernetes manifests of how to use the driver are provided. These are meant to be repurposed to simplify creating objects related to the driver including Storage Classes, Persistent Volumes, and Persistent Volume Claims in your environment.
The BeeGFS CSI Driver maintainers welcome improvements from the BeeGFS and open source community! Please see CONTRIBUTING.md for how to get started.
The goal is to release a new driver version three to four times per year (roughly quarterly). Releases may be major, minor, or patch at the discretion of the maintainers in accordance with needs of the community (i.e. large features, small features, or miscellaneous bug fixes).
The BeeGFS CSI driver versioning is based on the semantic versioning scheme outlined at semver.org. According to this scheme, given a version number MAJOR.MINOR.PATCH, we increment the:
- MAJOR version when:
- We make significant code changes beyond just a new feature.
- Backwards incompatible changes are made.
- MINOR version when:
- New driver features are added.
- New versions of Kubernetes or BeeGFS are supported.
- PATCH version when: small bug or security fixes are needed in a more timely manner.
When upgrading the driver using default Kustomize (kubectl
) deployment option,
it is recommended to reference the upgrade
notes for your particular upgrade path.
While the driver itself may be backwards compatible, if you used a non-standard
file layout or customized the Kubernetes manifests used to deploy the driver,
you may need to make adjustments to your manifests.
Apache License 2.0