Talos Prerequisites
Talos Linux ⧉ is a minimal Linux distribution optimized for Kubernetes. Built as an immutable distribution image, it provides a minimal attack surface but requires some changes to the image to run simplyblock.
Simplyblock requires a set of additional Linux kernel modules, as well as tools being available in the Talos image. That means that a custom Talos image has to be built to run simplyblock. The following section explains the required changes to make Talos compliant.
Required Kernel Modules (Worker Node)
On Kubernetes worker nodes, simplyblock requires few kernel modules to be loaded.
machine:
kernel:
modules:
- name: nbd
- name: uio_pci_generic
- name: vfio_pci
- name: vfio_iommu_type1
Huge Pages Reservations
Simplyblock requires huge pages memory to operate. The storage engine expects to find huge pages of 2 MiB page size. The required amount of huge pages depends on a number of factors.
To apply the change to Talos' worker nodes, a YAML configuration file with the following content is required. The number of pages is to be replaced with the number calculated above.
machine:
sysctls:
vm.nr_hugepages: "<number-of-pages>"
To activate the huge pages, the talosctl
command should be used.
demo@demo ~> talosctl apply-config --nodes <worker_node_ip> \
--file huge-pages-config.yaml -m reboot
demo@demo ~> talosctl service kubelet restart --nodes <worker_node_ip>
Required Talos Permissions
Simyplyblock's CSI driver requires connecting NVMe over Fabrics devices, as well as mounting and formatting them. Therefore, the CSI driver has to run as a privileged container. Hence, Talos must be configured to start the simplyblock's CSI driver in privileged mode.
Talos allows overriding the pod security admission settings at a Kubernetes namespace level. To enable privileged mode and grant the required access to the simplyblock CSI driver, a specific simplyblock namespace with the appropriate security exemptions must be created:
apiVersion: v1
kind: Namespace
metadata:
name: simplyblock
labels:
pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/enforce-version: latest
pod-security.kubernetes.io/audit: privileged
pod-security.kubernetes.io/audit-version: latest
pod-security.kubernetes.io/warn: privileged
pod-security.kubernetes.io/warn-version: latest
To enable the required permissions, apply the namespace configuration using kubectl
.
demo@demo ~> kubectl apply -f simplyblock-namespace.yaml