Use Helm to Create an Aerospike Cluster on Kubernetes
This page describes how to use AKO to deploy an Aerospike Database Enterprise Edition (EE) cluster using Helm.
Requirements
Before deploying your Aerospike cluster using Helm, you need to install Aerospike Kubernetes Operator (AKO). You can use Helm to install AKO on your Kubernetes cluster.
-
Create the namespace. Aerospike recommends using at least one namespace called
aerospike
for Aerospike clusters instead of AKO’s namespace for your clusters. If this is your first cluster to be launched, create and provide access for AKO to use this namespace.You can use the
kubectl
orakoctl
tools to grant permissions for theaerospike
namespace.-
Create the Kubernetes namespace if not already created.
kubectl create namespace aerospike -
Create a service account.
kubectl -n aerospike create serviceaccount aerospike-operator-controller-manager -
Create a RoleBinding or ClusterRoleBinding to attach this service account to the
aerospike-cluster
ClusterRole. This ClusterRole is created as part of AKO installation and grants Aerospike cluster permissions to the service account.- For using the Kubernetes native, pod-only network to connect to the Aerospike cluster, create a RoleBinding with the following command:
kubectl -n aerospike create rolebinding aerospike-cluster --clusterrole=aerospike-cluster --serviceaccount=aerospike:aerospike-operator-controller-manager-
For connecting to the Aerospike cluster from outside Kubernetes, create a ClusterRoleBinding with the following command:
kubectl create clusterrolebinding aerospike-cluster --clusterrole=aerospike-cluster --serviceaccount=aerospike:aerospike-operator-controller-manager
-
If the required ClusterRoleBinding already exists in the cluster, edit it to attach a new service account.
kubectl edit clusterrolebinding aerospike-cluster -
The
kubectl edit
command launches an editor. Append the following lines to thesubjects
section:kind: ServiceAccountname: aerospike-operator-controller-managernamespace: aerospike -
Save and ensure that the changes are applied.
For instructions on installing the
akoctl
plugin, see akoctl installation.-
For using the Kubernetes native, pod-only network to connect to the Aerospike cluster, grant namespace scope permissions:
kubectl akoctl auth create -n aerospike --cluster-scope=false -
For connecting to the Aerospike cluster from outside Kubernetes, grant cluster scope permissions:
kubectl akoctl auth create -n aerospikeTo grant permissions for multiple namespaces at the same time, specify a comma-separated namespace list with the
-n
flag.kubectl akoctl auth create -n aerospike,aerospike1
-
-
Configure persistent storage. AKO uses dynamically-provisioned storage classes that automatically provision storage as needed. Aerospike Database pods may have different storage volumes associated with each service. Persistent storage on the pods uses storage class provisioners that are set up in the storage class file.
Apply one of the following sample storage classes based on your Kubernetes environment:
- Amazon Elastic Kubernetes Service (EKS):
kubectl apply -f eks_ssd_storage_class.yaml
- Google Compute Engine (GCE):
kubectl apply -f gce_ssd_storage_class.yaml
- Microk8s:
kubectl apply -f microk8s_filesystem_storage_class.yaml
See Storage Provisioning for more details on configuring persistent storage.
- Amazon Elastic Kubernetes Service (EKS):
-
Add the Helm repository to get the Helm charts.
Terminal window helm repo add aerospike https://aerospike.github.io/aerospike-kubernetes-enterpriseIf the Helm repository is already added, update the index:
Terminal window helm repo update -
Deploy the cluster. Choose “dev” or “production” mode for your deployment.
Deploy in “dev” mode
“Dev” mode creates a minimal Aerospike cluster with security disabled. Use this for testing only, not in production.
Create a Secret containing the Aerospike feature-key file
features.conf
.Terminal window kubectl -n aerospike create secret generic aerospike-secret --from-file=-=PATH_TO_DIRECTORY_WITH_FEATURES.CONFDefault values in “dev” mode
These values are set as defaults when the cluster is deployed in “dev” mode (
devMode=true
).aerospikeConfig:service:feature-key-file: /etc/aerospike/secrets/features.confnetwork:service:port: 3000fabric:port: 3001heartbeat:port: 3002namespaces:- name: testreplication-factor: 2storage-engine:type: memorydata-size: 1073741824podSpec:multiPodPerHost: truestorage:volumes:- name: aerospike-config-secretsource:secret:secretName: aerospike-secretaerospike:path: /etc/aerospike/secretsvalidationPolicy:skipWorkDirValidate: trueskipXdrDlogFileValidate: trueInstall the chart.
Terminal window helm install aerospike aerospike/aerospike-cluster -n aerospike --set devMode=trueDeploy in “production” mode
Create Secrets
Create Secrets to set up features like the feature-key file (
features.conf
), Aerospike authentication, TLS, and the cluster admin password. See the Manage TLS Certificates section for more details.The example Secrets directory includes a collection of example TLS certificates, security credentials, and more. Download these files into a local folder called
secrets
, then apply them as a Kubernetes Secret:Terminal window kubectl -n aerospike create secret generic aerospike-secret --from-file=secretsNext, create a Secret containing the password for the Aerospike cluster admin:
Terminal window kubectl -n aerospike create secret generic auth-secret --from-literal=password='admin123'This is an example of a custom user-defined
values.yaml
file not using “dev” mode (installed withdevMode=false
).## Aerospike cluster sizereplicas: 3## Aerospike Database Docker imageimage:repository: aerospike/aerospike-server-enterprisetag: 8.0.0.2## Aerospike access control configurationaerospikeAccessControl:users:- name: adminsecretName: auth-secretroles:- sys-admin- user-admin## Aerospike ConfigurationaerospikeConfig:service:feature-key-file: /etc/aerospike/secret/features.confsecurity: {}network:service:port: 3000heartbeat:port: 3002fabric:port: 3001namespaces:- name: testreplication-factor: 2storage-engine:type: devicedevices:- /test/dev/xvdf- name: testMemreplication-factor: 1storage-engine:type: memorydata-size: 1073741824## Network policyaerospikeNetworkPolicy: {}## Pod specpodSpec:multiPodPerHost: true## Rack configurationrackConfig:namespaces:- testracks:- id: 1# Change to the zone for your k8s cluster.zone: us-central1-c- id: 2# Change to the zone for your k8s cluster.zone: us-central1-c## Storage configurationstorage:filesystemVolumePolicy:cascadeDelete: trueinitMethod: deleteFilesblockVolumePolicy:cascadeDelete: truevolumes:- name: workdiraerospike:path: /opt/aerospikesource:persistentVolume:storageClass: ssdvolumeMode: Filesystemsize: 1Gi- name: nsaerospike:path: /test/dev/xvdfsource:persistentVolume:storageClass: ssdvolumeMode: Blocksize: 5Gi- name: aerospike-config-secretsource:secret:secretName: aerospike-secretaerospike:path: /etc/aerospike/secret## Validation policyvalidationPolicy:skipWorkDirValidate: falseskipXdrDlogFileValidate: false## seedsFinderServices defines service, such as loadbalancer, to connect to AerospikeseedsFinderServices: {}## operatorClientCert defines certificates to connect to AerospikeoperatorClientCert: {}## Dev ModedevMode: falseInstall the chart with custom values.
Terminal window helm install aerospike aerospike/aerospike-cluster -n aerospike -f PATH_TO_CUSTOM_YAML_FILE
Configurations
For more details on these configurations, see the Aerospike Cluster Configuration Settings.
Name | Description | Default |
---|---|---|
replicas | Aerospike cluster size. | 3 |
image.repository | Aerospike Database container image repository. | aerospike/aerospike-server-enterprise |
image.tag | Aerospike Database container image tag. | 8.0.0.2 |
imagePullSecrets | Secrets containing credentials to pull Aerospike container image from a private registry. | {} (nil) |
customLabels | Custom labels to add on the Aerospike cluster resource | {} (nil) |
aerospikeAccessControl | Aerospike access control configuration. Define users and roles to be created on the cluster. | {} (nil) |
aerospikeConfig | Aerospike configuration. | {} (nil) |
aerospikeNetworkPolicy | Network policy (client access configuration). | {} (nil) |
commonName | Base string for naming pods, services, stateful sets, and so forth. | Release name truncated to 63 characters without hyphens |
podSpec | Aerospike pod spec configuration. | {} (nil) |
rackConfig | Aerospike rack configuration. | {} (nil) |
storage | Aerospike pod storage configuration. | {} (nil) |
validationPolicy | Validation policy. | {} (nil) |
operatorClientCert | Client certificates to connect to Aerospike. | {} (nil) |
seedsFinderServices | Service, such as loadbalancer, for Aerospike cluster discovery. | {} (nil) |
devMode | Deploy Aerospike cluster in dev mode. | false |