This section describes how to use an existing Object Storage Service (OBS) bucket to statically create PVs and PVCs for data persistence and sharing in workloads.
Parameter |
Description |
---|---|
PVC Type |
In this example, select OBS. |
PVC Name |
Enter the PVC name, which must be unique in a namespace. |
Creation Method |
In this example, select Create new to create both a PV and PVC on the console. |
PVa |
Select an existing PV in the cluster. For details about how to create a PV, see "Creating a storage volume" in Related Operations. You do not need to specify this parameter in this example. |
OBSb |
Click Select OBS. On the displayed page, select the OBS volume that meets your requirements and click OK. |
PV Nameb |
Enter the PV name, which must be unique in the same cluster. |
Access Modeb |
OBS volumes support only ReadWriteMany, indicating that a storage volume can be mounted to multiple nodes in read/write mode. For details, see Volume Access Modes. |
Reclaim Policyb |
You can select Delete or Retain to specify the reclaim policy of the underlying storage when the PVC is deleted. For details, see PV Reclaim Policy. NOTE:
If multiple PVs use the same OBS volume, use Retain to prevent the underlying volume from being deleted with a PV. |
Access Key (AK/SK)b |
Custom (Recommended): Customize a secret if you want to assign different user permissions to different OBS storage devices. For details, see Using a Custom Access Key (AK/SK) to Mount an OBS Volume. Only secrets with the secret.kubernetes.io/used-by = csi label can be selected. The secret type is cfe/secure-opaque. If no secret is available, click Create Secret to create one.
|
Mount Optionsb |
Enter the mounting parameter key-value pairs. For details, see Configuring OBS Mount Options. |
a: The parameter is available when Creation Method is set to Use existing.
b: The parameter is available when Creation Method is set to Create new.
You can choose Storage in the navigation pane and view the created PVC and PV on the PVCs and PVs tab pages, respectively.
Parameter |
Description |
---|---|
PVC |
Select an existing OBS volume. |
Mount Path |
Enter a mount path, for example, /tmp. This parameter specifies a container path to which a data volume will be mounted. Do not mount the volume to a system directory such as / or /var/run. Otherwise, containers will be malfunctional. Mount the volume to an empty directory. If the directory is not empty, ensure that there are no files that affect container startup. Otherwise, the files will be replaced, leading to container startup failures or workload creation failures.
NOTICE:
If a volume is mounted to a high-risk directory, use an account with minimum permissions to start the container. Otherwise, high-risk files on the host may be damaged. |
Subpath |
Enter the subpath of the storage volume and mount a path in the storage volume to the container. In this way, different folders of the same storage volume can be used in a single pod. tmp, for example, indicates that data in the mount path of the container is stored in the tmp folder of the storage volume. If this parameter is left blank, the root path is used by default. |
Permission |
|
In this example, the disk is mounted to the /data path of the container. The container data generated in this path is stored in the OBS volume.
After the workload is created, the data in the container mount directory will be persistently stored. Verify the storage by referring to Verifying Data Persistence and Sharing.
apiVersion: v1 kind: PersistentVolume metadata: annotations: pv.kubernetes.io/provisioned-by: everest-csi-provisioner everest.io/reclaim-policy: retain-volume-only # (Optional) The underlying volume is retained when the PV is deleted. name: pv-obs # PV name spec: accessModes: - ReadWriteMany # Access mode. The value must be ReadWriteMany for OBS. capacity: storage: 1Gi # OBS volume capacity csi: driver: obs.csi.everest.io # Dependent storage driver for the mounting fsType: obsfs # Instance type volumeHandle: <your_volume_id> # Name of the OBS volume volumeAttributes: storage.kubernetes.io/csiProvisionerIdentity: everest-csi-provisioner everest.io/obs-volume-type: STANDARD everest.io/region: <your_region> # Region where the OBS volume is nodePublishSecretRef: # Custom secret of the OBS volume name: <your_secret_name> # Custom secret name namespace: <your_namespace> # Namespace of the custom secret persistentVolumeReclaimPolicy: Retain # Reclaim policy storageClassName: csi-obs # Storage class name mountOptions: [] # Mount options
Parameter |
Mandatory |
Description |
---|---|---|
everest.io/reclaim-policy: retain-volume-only |
No |
Optional. Only retain-volume-only is supported. This parameter is valid only when the Everest version is 1.2.9 or later and the reclaim policy is Delete. If the reclaim policy is Delete and the current value is retain-volume-only, the associated PV is deleted while the underlying storage volume is retained, when a PVC is deleted. |
fsType |
Yes |
Instance type. The value can be obsfs or s3fs.
|
volumeHandle |
Yes |
OBS volume name. |
everest.io/obs-volume-type |
Yes |
OBS storage class.
|
everest.io/region |
Yes |
Region where the OBS bucket is deployed. For details about the value of region, see Regions and Endpoints. |
nodePublishSecretRef |
No |
Access key (AK/SK) used for mounting the object storage volume. You can use the AK/SK to create a secret and mount it to the PV. For details, see Using a Custom Access Key (AK/SK) to Mount an OBS Volume. An example is as follows:
nodePublishSecretRef: name: secret-demo namespace: default |
mountOptions |
No |
Mount options. For details, see Configuring OBS Mount Options. |
persistentVolumeReclaimPolicy |
Yes |
A reclaim policy is supported when the cluster version is or later than 1.19.10 and the Everest version is or later than 1.2.9. The Delete and Retain reclaim policies are supported. For details, see PV Reclaim Policy. If multiple PVs use the same OBS volume, use Retain to prevent the underlying volume from being deleted with a PV. Delete:
Retain: When a PVC is deleted, both the PV and underlying storage resources will be retained. You need to manually delete these resources. After the PVC is deleted, the PV is in the Released state and cannot be bound to a PVC again. |
storage |
Yes |
Storage capacity, in Gi. For OBS, this field is used only for verification (cannot be empty or 0). Its value is fixed at 1, and any value you set does not take effect for OBS. |
storageClassName |
Yes |
StorageClass name, which is csi-obs for an OBS volume. |
kubectl apply -f pv-obs.yaml
apiVersion: v1 kind: PersistentVolumeClaim metadata: name: pvc-obs namespace: default annotations: volume.beta.kubernetes.io/storage-provisioner: everest-csi-provisioner everest.io/obs-volume-type: STANDARD csi.storage.k8s.io/fstype: obsfs csi.storage.k8s.io/node-publish-secret-name: <your_secret_name> # Custom secret name. csi.storage.k8s.io/node-publish-secret-namespace: <your_namespace> # Namespace of the custom secret. spec: accessModes: - ReadWriteMany # The value must be ReadWriteMany for OBS. resources: requests: storage: 1Gi storageClassName: csi-obs # Storage class name, which must be the same as that of the PV. volumeName: pv-obs # PV name
Parameter |
Mandatory |
Description |
---|---|---|
csi.storage.k8s.io/node-publish-secret-name |
No |
Name of the custom secret specified in the PV. |
csi.storage.k8s.io/node-publish-secret-namespace |
No |
Namespace of the custom secret specified in the PV. |
storage |
Yes |
Requested capacity in the PVC, in Gi. For OBS, this field is used only for verification (cannot be empty or 0). Its value is fixed at 1, and any value you set does not take effect for OBS. |
storageClassName |
Yes |
Storage class name, which must be the same as the storage class of the PV in 1. StorageClass name, which is csi-obs for an OBS volume. |
volumeName |
Yes |
PV name, which must be the same as the PV name in 1. |
kubectl apply -f pvc-obs.yaml
apiVersion: apps/v1 kind: Deployment metadata: name: web-demo namespace: default spec: replicas: 2 selector: matchLabels: app: web-demo template: metadata: labels: app: web-demo spec: containers: - name: container-1 image: nginx:latest volumeMounts: - name: pvc-obs-volume # Volume name, which must be the same as the volume name in the volumes field mountPath: /data # Location where the storage volume is mounted imagePullSecrets: - name: default-secret volumes: - name: pvc-obs-volume # Volume name, which can be customized persistentVolumeClaim: claimName: pvc-obs # Name of the created PVC
kubectl apply -f web-demo.yaml
After the workload is created, you can try Verifying Data Persistence and Sharing.
kubectl get pod | grep web-demo
web-demo-846b489584-mjhm9 1/1 Running 0 46s web-demo-846b489584-wvv5s 1/1 Running 0 46s
kubectl exec web-demo-846b489584-mjhm9 -- ls /data kubectl exec web-demo-846b489584-wvv5s -- ls /data
If no result is returned for both pods, no file exists in the /data path.
kubectl exec web-demo-846b489584-mjhm9 -- touch /data/static
kubectl exec web-demo-846b489584-mjhm9 -- ls /data
Expected output:
static
kubectl delete pod web-demo-846b489584-mjhm9
Expected output:
pod "web-demo-846b489584-mjhm9" deleted
After the deletion, the Deployment controller automatically creates a replica.
kubectl get pod | grep web-demo
web-demo-846b489584-d4d4j 1/1 Running 0 110s web-demo-846b489584-wvv5s 1/1 Running 0 7m50s
kubectl exec web-demo-846b489584-d4d4j -- ls /data
Expected output:
static
The static file is retained, indicating that the data in the file system can be stored persistently.
kubectl get pod | grep web-demo
web-demo-846b489584-d4d4j 1/1 Running 0 7m web-demo-846b489584-wvv5s 1/1 Running 0 13m
kubectl exec web-demo-846b489584-d4d4j -- touch /data/share
kubectl exec web-demo-846b489584-d4d4j -- ls /data
Expected output:
share static
kubectl exec web-demo-846b489584-wvv5s -- ls /data
Expected output:
share static
After you create a file in the /data path of a pod, if the file is also created in the /data path of the other pod, the two pods share the same volume.
Operation |
Description |
Procedure |
---|---|---|
Creating a storage volume (PV) |
Create a PV on the CCE console. |
|
Updating an access key |
Update the access key of object storage on the CCE console. |
|
Viewing events |
View event names, event types, number of occurrences, Kubernetes events, first occurrence time, and last occurrence time of the PVC or PV. |
|
Viewing a YAML file |
View, copy, or download the YAML file of a PVC or PV. |
|