Skip to content
/ civo-csi Public

A Container Storage Interface plugin/driver for Civo's managed k3s service

Notifications You must be signed in to change notification settings

civo/civo-csi

Repository files navigation

Civo CSI Driver

This controller is installed in to Civo K3s client clusters and handles the mounting of Civo Volumes on to the correct nodes and promoting the storage into the cluster as a Persistent Volume.

Background reading

Key takeaways

  • We need to enable dynamic provisioning
  • We're going to build a single binary and use the sidecars to register the appropriate parts of it in the appropriate place (one part runs on the control plane as a deployment, the other part runs on each node as a DaemonSet)

Getting started

There are three parts to a CSI driver - node, controller and identity. The easiest way to think about these is:

  • identity just identifies the driver itself: version, capabilities and a probe call to see if it's still alive
  • controller is responsible for communicating with the external API, to check capacity and provision real world resources, and attach them to the node
  • node is for after the volume is attached to the underlying node - formatting and mounting it

The order for calls is usually:

  1. CSI driver launches and Identity's GetPluginCapabilities is called
  2. On an ongoing and regular basis Identity's Probe is called
  3. When a pod requests a PV (dynamically created from a PVC), Controller's CreateVolume is called to create it in the Civo API
  4. The Kubernetes control plane then calls Controller's ControllerPublishVolume to attach the volume to the correct node
  5. After the volume is attached Node's NodeStageVolume is called to format the volume (if not already formatted) and mount it to a node-wide set of mount points
  6. When the volume is formatted and mounted, Node's NodePublishVolume is called to bind mount that mount point into the pod's specific mount point.
  7. Then the volume is in use normally by the pod. When it's finished with...
  8. The bind-mount for the volume is removed with Node's NodeUnpublishVolume
  9. Then the actual volume is unmounted with Node's NodeUnstageVolume.
  10. Finally the volume is detached from the instance within Civo's API with Controller's ControllerUnpublishVolume.

At this point the volume still exists and still contains data. If the operator wants to delete it, then the kubectl pv delete ... will actually call Controller's DeleteVolume. If a PV is requested, the Kubernetes control plane will ensure space is available with Controller's GetCapacity, and if the operator lists all volumes this is done with Controller's ListVolumes.

Requirements on K3s Clusters

  1. Must have a secret called civo-api-access within the kube-system namespace containing keys of api-key, api-url, cluster-id, namespace and region.
  2. Must have a folder created called /var/lib/kubelet/plugins/csi.civo.com (for writing a socket to that is shared between containers)
  3. Must have a file called /etc/civostatsd containing a TOML set of configuration (the same that's used for https://github.com/civo/civostatsd so it should already be available), for example:
server="https://api.civo.com"
token="12345678901234567890"
region="NYC1"
instance_id="12345678-1234-1234-1234-1234567890"

Known issues

  • Killing the node daemonset leaves /dev/vda1 (yes the entire filesystem) mounted at /var/lib/kubelet/plugins/csi.civo.com
  • Volumes take a while to create but Controller's ControllerPublishVolume immediately returns success if the API succeeded, needs to retry unless it is actually mounted?

Workflow

volumeworkflow

Development

Normally for our Civo Kubernetes integrations we'd recommend visiting the getting started document for CivoStack guide, but this is a different situation (installed on the client cluster, not the supercluster), so below are some similar sort of steps to get you started:

How do I run the driver in development

Unlike Operators, you can't as easily run CSI drivers locally just connected in to a cluster (there is a way with socat and forwarding Unix sockets, but we haven't experimented with that yet).

So the way we test our work is:

A. Run the test suite

The CSI Sanity suite is integrated as well as some custom unit tests and is a simple go test away 🥳

This will run the full Kubernetes Storage SIG's suite of tests against the endpoints we're supposed to have implemented to comply with the spec.

B. Install in to a cluster

The steps are:

  1. Create an environment variable called IMAGE_NAME with a random or recognisable name (export IMAGE_NAME=$(uuidgen | tr '[:upper:]' '[:lower:]') works well)
  2. Build the Docker image with docker build -t ttl.sh/${IMAGE_NAME}:2h .
  3. Push the Docker image to ttl.sh (a short lived Docker image repository, useful for dev): docker push ttl.sh/${IMAGE_NAME}:2h
  4. Copy recursively the deploy/kubernetes folder to deploy/kubernetes-dev with cp -rv deploy/kubernetes deploy/kubernetes-dev and replace all occurences of civo-csi:latest in there with YOUR_IMAGE_NAME:2h (ENV variable interpolation won't work here), this folder is automatically in .gitignore
  5. In a test cluster (a Civo K3s 1 node cluster will work) you'll need to create a Secret within the civo-system called api-access containing the keys api-key set to your Civo API key, api-url pointing to either https://api.civo.com or a xip.io/ngrok pointing to your local development environment (depending on where your cluster is running) and region set to the region the current cluster is running in
  6. Deploy the Kubernetes resources required to the cluster with kubectl apply -f deploy/kubernetes-dev

e2e Testing

There are e2e tests included in this repo that will provision a cluster and run integrations against the cluster. These tests require a valid Civo API key to be present in the .env file (sample provided) in the root of the project dir. The tests can be found in the e2e directory and can be run with the following

go test -v ./e2e/...

To aid in development, the tests can be run with a -retain flag to persist the provisioned cluster between test runs:

go test -v ./e2e/... -retain