##
We are going to make the following changes to the Object Store docs as
part of a larger QC/Content pass:
### Left Navigation
We want to modify the left navigation flow to be a natural progression
from a basic setup to more advanced.
For example:
- Core Concepts
- Deployment Architecture
- Availability and Resiliency
- Erasure Coding and Object Healing
- Object Scanner
- Site Replication and Failover
- Thresholds and Limits
- Installation
- Deployment Checklist
- Deploy MinIO on Kubernetes
- Deploy MinIO on Red Hat Linux
- Deploy MinIO on Ubuntu Linux
- Deploy MinIO for Development (MacOS, Windows, Container)
- Security and Encryption (Conceptual Overview)
- Network Encryption (TLS) (Conceptual overview)
- Enable Network Encryption using Single Domain
- Enable Network Encryption using Multiple Domains
- Enable Network Encryption using certmanager (Kubernetes only)
- Data Encryption (SSE) (Conceptual overview)
- Enable SSE using AIStor Key Management Server
- Enable SSE using KES (Summary page + linkouts)
- External Identity Management (Conceptual Overview)
- Enable External Identity management using OpenID
- Enable External Identity management using AD/LDAP
- Backup and Recovery
- Create a Multi-Site Replication Configuration
- Recovery after Hardware Failure
- Recover after drive failure
- Recover after node failure
- Recover after site failure
- Monitoring and Alerts
- Metrics and Alerting (v3 reference)
- Monitoring and Alerting using Prometheus
- Monitoring and Alerting using InfluxDB
- Monitoring and Alerting using Grafana
- Metrics V2 Reference
- Publish Server and Audit Logs to External Services
- MinIO Healthcheck API
The Administration, Developer, and Reference sections will remain as-is
for now.
http://192.241.195.202:9000/staging/singleplat/mindocs/index.html
# Goals
Maintaining multiple platforms is getting to be too much, and based on
analytics the actual number of users taking advantage of it is minimal.
Furthermore, the majority of traffic is to installation pages.
Therefore we're going to try to collapse back into a single MinIO Object
Storage product, and use simple navigation and on-page selectors to
handle Baremetal vs Kubernetes.
This may also help to eventually stage us to migrate to Hugo + Markdown
---------
Co-authored-by: Daryl White <53910321+djwfyi@users.noreply.github.com>
Co-authored-by: Rushan <rushenn@minio.io>
Co-authored-by: rushenn <rushenn123@gmail.com>
6.4 KiB
MinIO Kubernetes Operator
minio
Table of Contents
MinIO is a Kubernetes-native high performance object store with an S3-compatible API. The MinIO Kubernetes Operator supports deploying MinIO Tenants onto private and public cloud infrastructures ("Hybrid" Cloud).
The MinIO Operator installs a Custom Resource Definition (CRD) <concepts/extend-kubernetes/api-extension/custom-resources/#customresourcedefinitions>
to support describing MinIO tenants as a Kubernetes object <concepts/overview/working-with-objects/kubernetes-objects/>.
The MinIO Operator exists in its own namespace. Within the Operator's namespace, the MinIO Operator utilizes two pods:
- The Operator pod for the base Operator functions to deploy, manage, modify, and maintain tenants.
- Console pod for the Operator's Graphical User Interface, the Operator Console.
See the MinIO Operator CRD Reference <operator/blob/master/docs/tenant_crd.adoc>
for complete documentation on the MinIO CRD.
Operator Prerequisites
Kubernetes Version
MinIO supports maintained Kubernetes APIs for deploying the Operator.
Kubernetes infrastructure running end-of-life API versions may exhibit unexpected or undesired behavior if used for deploying the Operator.
Kustomize and kubectl
Kustomize
is a YAML-based templating tool that allows you to define Kubernetes
resources in a declarative and repeatable fashion. Kustomize is included
with the kubectl <reference/kubectl> command line
tool.
This procedure assumes that your local host machine has both the
matching version of kubectl for your Kubernetes cluster
and the necessary access to that cluster to create new
resources.
The default MinIO Operator Kustomize template provides a starting point for customizing configurations for your local environment. You can modify the default Kustomization file or apply your own patches to customize the Operator deployment for your Kubernetes cluster.
Kubernetes TLS Certificate API
The MinIO Operator manages TLS Certificate Signing Requests (CSR)
using the Kubernetes certificates.k8s.io TLS certificate management API <tasks/tls/managing-tls-in-a-cluster/>
to create signed TLS certificates in the following circumstances:
- When
autoCertis enabled. - For the MinIO Console when the
MINIO_CONSOLE_TLS_ENABLEenvironment variable is set toon. - For
STS service <minio-security-token-service>whenOPERATOR_STS_ENABLEDenvironment variable is set toon. - For retrieving the health of the cluster.
The MinIO Operator reads certificates inside the
operator-ca-tls secret and syncs this secret within the
tenant namespace to trust private certificate authorities, such as when
using cert-manager.
For any of these circumstances, the MinIO Operator requires
that the Kubernetes kube-controller-manager configuration
include the following configuration settings <reference/command-line-tools-reference/kube-controller-manager/#options>:
--cluster-signing-key-file- Specify the PEM-encoded RSA or ECDSA private key used to sign cluster-scoped certificates.--cluster-signing-cert-file- Specify the PEM-encoded x.509 Certificate Authority certificate used to issue cluster-scoped certificates.
The Kubernetes TLS API uses the CA signature algorithm for generating
new TLS certificate. MinIO recommends ECDSA (e.g. NIST
P-256 curve) or EdDSA (e.g. Curve25519 <7748>) TLS private keys/certificates
due to their lower computation requirements compared to RSA. See minio-TLS-supported-cipher-suites for a complete list
of supported TLS Cipher Suites.
If the Kubernetes cluster is not configured to respond to a generated
CSR (Certificate Signing Request), the Operator
cannot complete initialization. Some Kubernetes providers do not specify
these configuration values by default.
To check whether the kube-controller-manager specifies
the cluster signing key and certificate files, use the following
command:
kubectl get pod kube-controller-manager-$CLUSTERNAME-control-plane \
-n kube-system -o yaml
- Replace
$CLUSTERNAMEwith the name of the Kubernetes cluster.
Confirm that the output contains the highlighted lines. The output of the example command above may differ from the output in your terminal:
spec:
containers:
- command:
- kube-controller-manager
- --allocate-node-cidrs=true
- --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf
- --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf
- --bind-address=127.0.0.1
- --client-ca-file=/etc/kubernetes/pki/ca.crt
- --cluster-cidr=10.244.0.0/16
- --cluster-name=my-cluster-name
- --cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt
- --cluster-signing-key-file=/etc/kubernetes/pki/ca.key
...
Important
The MinIO Operator automatically generates TLS certificates for all MinIO Tenant pods using the specified Certificate Authority (CA). Clients external to the Kubernetes cluster must trust the Kubernetes cluster CA to connect to the MinIO Operator or MinIO Tenants.
Clients which cannot trust the Kubernetes cluster CA can disable TLS validation for connections to the MinIO Operator or a MinIO Tenant.
Alternatively, you can generate x.509 TLS certificates signed by a
known and trusted CA and pass those certificates to MinIO Tenants. See
minio-tls for more
complete documentation.
/operations/deployments/k8s-deploy-minio-on-kubernetes /operations/deployments/k8s-deploy-operator-helm-on-kubernetes /operations/deployments/k8s-upgrade-minio-operator-kubernetes