Integrate Azure HPC Cache with Azure Kubernetes Service (AKS)
Azure HPC Cache speeds access to your data for high-performance computing (HPC) tasks. By caching files in Azure, Azure HPC Cache brings the scalability of cloud computing to your existing workflow. This article shows you how to integrate Azure HPC Cache with Azure Kubernetes Service (AKS).
Before you begin
This article assumes you have an existing AKS cluster. If you need an AKS cluster, you can create one using Azure CLI, Azure PowerShell, or Azure portal.
Important
Your AKS cluster must be in a region that supports Azure HPC Cache.
You need Azure CLI version 2.7 or later. RunĀ
az --version
to find the version. If you need to install or upgrade, seeĀ Install Azure CLI. For more information on using HPC Cache with Azure CLI, see the HPC Cache CLI prerequisites.Install the
hpc-cache
Azure CLI extension using the [az extension add --upgrade -n hpc-cache][az-extension-add]
command.Review the HPC Cache prerequisites. You need to satisfy these prerequisites before you can run an HPC Cache. Important prerequisites include the following:
- The cache requires a dedicated subnet with at least 64 IP addresses available.
- The subnet must not host other VMs or containers.
- The subnet must be accessible from the AKS nodes.
Create the Azure HPC Cache
Get the node resource group using the
az aks show
command with the--query nodeResourceGroup
query parameter.az aks show --resource-group myResourceGroup --name myAKSCluster --query nodeResourceGroup -o tsv
Your output should look similar to the following example output:
MC_myResourceGroup_myAKSCluster_eastus
Create the dedicated HPC Cache subnet using the
az network vnet subnet create
command.RESOURCE_GROUP=MC_myResourceGroup_myAKSCluster_eastus VNET_NAME=$(az network vnet list --resource-group $RESOURCE_GROUP --query [].name -o tsv) VNET_ID=$(az network vnet show --resource-group $RESOURCE_GROUP --name $VNET_NAME --query "id" -o tsv) SUBNET_NAME=MyHpcCacheSubnet az network vnet subnet create \ --resource-group $RESOURCE_GROUP \ --vnet-name $VNET_NAME \ --name $SUBNET_NAME \ --address-prefixes 10.0.0.0/26
Register the Microsoft.StorageCache resource provider using the
az provider register
command.az provider register --namespace Microsoft.StorageCache --wait
Note
The resource provider registration can take some time to complete.
Create an HPC Cache in the same node resource group and region using the
az hpc-cache create
.Note
The HPC Cache takes approximately 20 minutes to be created.
RESOURCE_GROUP=MC_myResourceGroup_myAKSCluster_eastus VNET_NAME=$(az network vnet list --resource-group $RESOURCE_GROUP --query [].name -o tsv) VNET_ID=$(az network vnet show --resource-group $RESOURCE_GROUP --name $VNET_NAME --query "id" -o tsv) SUBNET_NAME=MyHpcCacheSubnet SUBNET_ID=$(az network vnet subnet show --resource-group $RESOURCE_GROUP --vnet-name $VNET_NAME --name $SUBNET_NAME --query "id" -o tsv) az hpc-cache create \ --resource-group $RESOURCE_GROUP \ --cache-size-gb "3072" \ --location eastus \ --subnet $SUBNET_ID \ --sku-name "Standard_2G" \ --name MyHpcCache
Create and configure Azure storage
Important
You need to select a unique storage account name. Replace uniquestorageaccount
with something unique for you. Storage account names must be between 3 and 24 characters in length and can contain only numbers and lowercase letters.
Create a storage account using the
az storage account create
command.RESOURCE_GROUP=MC_myResourceGroup_myAKSCluster_eastus STORAGE_ACCOUNT_NAME=uniquestorageaccount az storage account create \ -n $STORAGE_ACCOUNT_NAME \ -g $RESOURCE_GROUP \ -l eastus \ --sku Standard_LRS
Assign the "Storage Blob Data Contributor Role" on your subscription using the
az role assignment create
command.STORAGE_ACCOUNT_NAME=uniquestorageaccount STORAGE_ACCOUNT_ID=$(az storage account show --name $STORAGE_ACCOUNT_NAME --query "id" -o tsv) AD_USER=$(az ad signed-in-user show --query objectId -o tsv) CONTAINER_NAME=mystoragecontainer az role assignment create --role "Storage Blob Data Contributor" --assignee $AD_USER --scope $STORAGE_ACCOUNT_ID
Create the Blob container within the storage account using the
az storage container create
command.az storage container create --name $CONTAINER_NAME --account-name $STORAGE_ACCOUNT_NAME --auth-mode login
Provide permissions to the Azure HPC Cache service account to access your storage account and Blob container using the following
az role assignment
commands.HPC_CACHE_USER="StorageCache Resource Provider" HPC_CACHE_ID=$(az ad sp list --display-name "${HPC_CACHE_USER}" --query "[].objectId" -o tsv) az role assignment create --role "Storage Account Contributor" --assignee $HPC_CACHE_ID --scope $STORAGE_ACCOUNT_ID az role assignment create --role "Storage Blob Data Contributor" --assignee $HPC_CACHE_ID --scope $STORAGE_ACCOUNT_ID
Add the blob container to your HPC Cache as a storage target using the
az hpc-cache blob-storage-target add
command.CONTAINER_NAME=mystoragecontainer az hpc-cache blob-storage-target add \ --resource-group $RESOURCE_GROUP \ --cache-name MyHpcCache \ --name MyStorageTarget \ --storage-account $STORAGE_ACCOUNT_ID \ --container-name $CONTAINER_NAME \ --virtual-namespace-path "/myfilepath"
Set up client load balancing
Create an Azure Private DNS Zone for the client-facing IP addresses using the
az network private-dns zone create
command.PRIVATE_DNS_ZONE="myhpccache.local" az network private-dns zone create \ -g $RESOURCE_GROUP \ -n $PRIVATE_DNS_ZONE
Create a DNS link between the Azure Private DNS Zone and the VNet using the
az network private-dns link vnet create
command.az network private-dns link vnet create \ -g $RESOURCE_GROUP \ -n MyDNSLink \ -z $PRIVATE_DNS_ZONE \ -v $VNET_NAME \ -e true
Create the round-robin DNS name for the client-facing IP addresses using the
az network private-dns record-set a create
command.DNS_NAME="server" HPC_MOUNTS0=$(az hpc-cache show --name "MyHpcCache" --resource-group $RESOURCE_GROUP --query "mountAddresses[0]" -o tsv | tr --delete '\r') HPC_MOUNTS1=$(az hpc-cache show --name "MyHpcCache" --resource-group $RESOURCE_GROUP --query "mountAddresses[1]" -o tsv | tr --delete '\r') HPC_MOUNTS2=$(az hpc-cache show --name "MyHpcCache" --resource-group $RESOURCE_GROUP --query "mountAddresses[2]" -o tsv | tr --delete '\r') az network private-dns record-set a add-record -g $RESOURCE_GROUP -z $PRIVATE_DNS_ZONE -n $DNS_NAME -a $HPC_MOUNTS0 az network private-dns record-set a add-record -g $RESOURCE_GROUP -z $PRIVATE_DNS_ZONE -n $DNS_NAME -a $HPC_MOUNTS1 az network private-dns record-set a add-record -g $RESOURCE_GROUP -z $PRIVATE_DNS_ZONE -n $DNS_NAME -a $HPC_MOUNTS2
Create a persistent volume
Create a
pv-nfs.yaml
file to define a persistent volume.--- apiVersion: v1 kind: PersistentVolume metadata: name: pv-nfs spec: capacity: storage: 10000Gi accessModes: - ReadWriteMany mountOptions: - vers=3 nfs: server: server.myhpccache.local path: /
Get the credentials for your Kubernetes cluster using the
az aks get-credentials
command.az aks get-credentials --resource-group myResourceGroup --name myAKSCluster
Update the server and path to the values of your NFS (Network File System) volume you created in the previous step.
Create the persistent volume using the
kubectl apply
command.kubectl apply -f pv-nfs.yaml
Verify the status of the persistent volume is Available using the
kubectl describe
command.kubectl describe pv pv-nfs
Create the persistent volume claim
Create a
pvc-nfs.yaml
to define a persistent volume claim.apiVersion: v1 kind: PersistentVolumeClaim metadata: name: pvc-nfs spec: accessModes: - ReadWriteMany storageClassName: "" resources: requests: storage: 100Gi
Create the persistent volume claim using the
kubectl apply
command.kubectl apply -f pvc-nfs.yaml
Verify the status of the persistent volume claim is Bound using the
kubectl describe
command.kubectl describe pvc pvc-nfs
Mount the HPC Cache with a pod
Create a
nginx-nfs.yaml
file to define a pod that uses the persistent volume claim.kind: Pod apiVersion: v1 metadata: name: nginx-nfs spec: containers: - image: mcr.microsoft.com/oss/nginx/nginx:1.15.5-alpine name: nginx-nfs command: - "/bin/sh" - "-c" - while true; do echo $(date) >> /mnt/azure/myfilepath/outfile; sleep 1; done volumeMounts: - name: disk01 mountPath: /mnt/azure volumes: - name: disk01 persistentVolumeClaim: claimName: pvc-nfs
Create the pod using the
kubectl apply
command.kubectl apply -f nginx-nfs.yaml
Verify the pod is running using the
kubectl describe
command.kubectl describe pod nginx-nfs
Verify your volume is mounted in the pod using the
kubectl exec
command to connect to the pod, thendf -h
to check if the volume is mounted.kubectl exec -it nginx-nfs -- sh
/ # df -h Filesystem Size Used Avail Use% Mounted on ... server.myhpccache.local:/myfilepath 8.0E 0 8.0E 0% /mnt/azure/myfilepath ...
Frequently asked questions (FAQ)
Running applications as non-root
If you need to run an application as a non-root user, you may need to disable root squashing to chown a directory to another user. The non-root user needs to own a directory to access the file system. For the user to own a directory, the root user must chown a directory to that user, but if the HPC Cache is squashing root, this operation is denied because the root user (UID 0) is being mapped to the anonymous user. For more information about root squashing and client access policies, see HPC Cache access policies.
Next steps
- For more information on Azure HPC Cache, see HPC Cache overview.
- For more information on using NFS with AKS, see Manually create and use a Network File System (NFS) Linux Server volume with AKS.
Feedback
Submit and view feedback for