Customize Trident operator installation
The Trident operator allows you to customize Trident installation using the attributes in the TridentOrchestrator
spec. If you want to customize the installation beyond what TridentOrchestrator
arguments allow, consider using tridentctl
to generate custom YAML manifests to modify as needed.
Understanding controller pods and node pods
Trident runs as a single controller pod, plus a node pod on each worker node in the cluster. The node pod must be running on any host where you want to potentially mount a Trident volume.
Kubernetes node selectors and tolerations and taints are used to constrain a pod to run on a specific or preferred node. Using the`ControllerPlugin` and NodePlugin
, you can specify constraints and overrides.
-
The controller plugin handles volume provisioning and management, such as snapshots and resizing.
-
The node plugin handles attaching the storage to the node.
Configuration options
spec.namespace is specified in TridentOrchestrator to signify the namespace where Trident is installed. This parameter cannot be updated after Trident is installed. Attempting to do so causes the TridentOrchestrator status to change to Failed . Trident is not intended to be migrated across namespaces.
|
This table details TridentOrchestrator
attributes.
Parameter | Description | Default |
---|---|---|
|
Namespace to install Trident in |
|
|
Enable debugging for Trident |
|
|
|
|
|
Setting to |
|
|
Set to |
|
|
Set to workload identity ("azure.workload.identity/client-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx") when using cloud identity on an AKS cluster. Set to AWS IAM role ("'eks.amazonaws.com/role-arn: arn:aws:iam::123456:role/trident-role") when using cloud identity on an EKS cluster. |
|
|
Install Trident over IPv6 |
false |
|
Timeout for Kubernetes operations |
|
|
Don't send autosupport bundles to NetApp |
|
|
The container image for Autosupport Telemetry |
|
|
The address/port of a proxy for sending Autosupport |
|
|
A flag used to uninstall Trident |
|
|
Trident logging format to be used [text,json] |
|
|
Trident image to install |
|
|
Path to internal registry, of the format |
|
|
Path to the kubelet directory on the host |
|
|
A list of resources to delete to perform a complete removal of |
|
|
Secrets to pull images from an internal registry |
|
|
Sets the image pull policy for the the Trident operator. Valid values are: |
|
|
Additional node selectors for pods. Follows same format as |
No default; optional |
|
Overrides Kubernetes tolerations for pods. Follows the same format as |
No default; optional |
|
Additional node selectors for pods. Follows same format as |
No default; optional |
|
Overrides Kubernetes tolerations for pods. Follows the same format as |
No default; optional |
|
Enables Trident to prepare the nodes of the Kubernetes cluster to manage volumes using the specified data storage protocol. |
For more information on formatting pod parameters, refer to Assigning Pods to Nodes. |
Details about force detach
Force detach is available for ontap-san
, ontap-san-economy
and onatp-nas-economy
only. Before enabling force detach, non-graceful node shutdown (NGNS) must be enabled on the Kubernetes cluster. For more information, refer to Kubernetes: Non Graceful node shutdown.
When using the ontap-nas-economy driver, you need to set the autoExportPolicy parameter in the backend configuration to true so that Trident can restrict access from the Kubernetes node with the taint applied using managed export policies.
|
Because Trident relies on Kubernetes NGNS, do not remove out-of-service taints from an unhealthy node until all non-tolerable workloads are rescheduled. Recklessly applying or removing the taint can jeopardize backend data protection.
|
When the Kubernetes cluster administrator has applied the node.kubernetes.io/out-of-service=nodeshutdown:NoExecute
taint to the node and enableForceDetach
is set to true
, Trident will determine the node status and:
-
Cease backend I/O access for volumes mounted to that node.
-
Mark the Trident node object as
dirty
(not safe for new publications).The Trident controller will reject new publish volume requests until the node is re-qualified (after having been marked as dirty
) by the Trident node pod. Any workloads scheduled with a mounted PVC (even after the cluster node is healthy and ready) will be not be accepted until Trident can verify the nodeclean
(safe for new publications).
When node health is restored and the taint is removed, Trident will:
-
Identify and clean stale published paths on the node.
-
If the node is in a
cleanable
state (the out-of-service taint has been removed and the node is inReady
state) and all stale, published paths are clean, Trident will readmit the node asclean
and allow new published volumes to the node.
Sample configurations
You can use the attributes in Configuration options when defining TridentOrchestrator
to customize your installation.
Basic custom configuration
This is an example for a basic custom installation.
cat deploy/crds/tridentorchestrator_cr_imagepullsecrets.yaml apiVersion: trident.netapp.io/v1 kind: TridentOrchestrator metadata: name: trident spec: debug: true namespace: trident imagePullSecrets: - thisisasecret
Node selectors
This example installs Trident with node selectors.
apiVersion: trident.netapp.io/v1 kind: TridentOrchestrator metadata: name: trident spec: debug: true namespace: trident controllerPluginNodeSelector: nodetype: master nodePluginNodeSelector: storage: netapp
Windows worker nodes
This example installs Trident on a Windows worker node.
cat deploy/crds/tridentorchestrator_cr.yaml apiVersion: trident.netapp.io/v1 kind: TridentOrchestrator metadata: name: trident spec: debug: true namespace: trident windows: true
Managed identities on an AKS cluster
This example installs Trident to enable managed identities on an AKS cluster.
apiVersion: trident.netapp.io/v1 kind: TridentOrchestrator metadata: name: trident spec: debug: true namespace: trident cloudProvider: "Azure"
Cloud identity on an AKS cluster
This example installs Trident for use with a cloud identity on an AKS cluster.
apiVersion: trident.netapp.io/v1 kind: TridentOrchestrator metadata: name: trident spec: debug: true namespace: trident cloudProvider: "Azure" cloudIdentity: 'azure.workload.identity/client-id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx'
Cloud identity on an EKS cluster
This example installs Trident for use with a cloud identity on an AKS cluster.
apiVersion: trident.netapp.io/v1 kind: TridentOrchestrator metadata: name: trident spec: debug: true namespace: trident cloudProvider: "AWS" cloudIdentity: "'eks.amazonaws.com/role-arn: arn:aws:iam::123456:role/trident-role'"
Cloud identity for GKE
This example installs Trident for use with a cloud identity on a GKE cluster.
apiVersion: trident.netapp.io/v1 kind: TridentBackendConfig metadata: name: backend-tbc-gcp-gcnv spec: version: 1 storageDriverName: google-cloud-netapp-volumes projectNumber: '012345678901' network: gcnv-network location: us-west2 serviceLevel: Premium storagePool: pool-premium1