The EKCO add-on is a utility tool to perform maintenance operations on a kURL cluster.
The latest version of EKCO is installed for every kURL cluster since v2023.04.10-0, even if it is not included in the spec, or if an older version is specified.
spec: ekco: version: "latest" nodeUnreachableToleration: 1h minReadyMasterNodeCount: 2 minReadyWorkerNodeCount: 0 rookShouldUseAllNodes: true rookShouldDisableReconcileMDSPlacement: false rookShouldDisableReconcileCephCSIResources: false shouldDisableRebootServices: true shouldDisableClearNodes: false shouldEnablePurgeNodes: false enableInternalLoadBalancer: true shouldDisableRestartFailedEnvoyPods: false envoyPodsNotReadyDuration: 5m minioShouldDisableManagement: false kotsadmShouldDisableManagement: false
|version||The version of EKCO to be installed.|
|nodeUnreachableToleration||How long a Node must be unreachable before considered dead. Default is 1h.|
|minReadyMasterNodeCount||Don't purge the node if it will result in less than this many ready primaries. Default is 2.|
|minReadyWorkerNodeCount||Don't purge the node if it will result in less than this many ready workers. Default is 0.|
|rookShouldUseAllNodes||Enabling this will configure Rook to use all nodes for storage rather than EKCO managing a list of nodes. Additionally, this will disable EKCO scaling of Ceph mgr and mon counts and pool replication levels when additional nodes are added to the cluster.|
|rookShouldDisableReconcileMDSPlacement||This will disable reconciliation of CephFilesystem MDS placement when the cluster is scaled beyond one node.|
|rookShouldDisableReconcileCephCSIResources||This will disable reconciliation of Ceph CSI provisioner and plugin resources to their recommendations once the cluster is scaled to three nodes.|
|shouldDisableRebootServices||Do not install the systemd shutdown service that cordons a node and deletes pods with PVC and Shared FS volumes mounted.|
|shouldDisableClearNodes||Do not force-delete pods stuck in terminating state on unreachable nodes|
|shouldEnablePurgeNodes||Automatically delete and cleanup unreachable nodes|
|enableInternalLoadBalancer||Run an internal load balanacer with HAProxy listening on localhost:6444 on all nodes|
|podImageOverrides||A list of Pod container image overrides in the format "[original]=[overridden]"|
|minioShouldDisableManagement||Prevent high availability (HA) MinIO from being enabled and do not manage existing HA MinIO pods|
|kotsadmShouldDisableManagement||Prevent high availability (HA) Kotsadm from being enabled and do not manage existing HA Kotsadm components|
This section describes maintenance tasks that the EKCO operator performs.
The clear nodes feature ensures that pods running on an unreachable node are quickly rescheduled to healthy nodes.
When a node is unreachable for more than forty seconds, Kubernetes changes the node's ready status to
After five minutes in the Unknown state, Kubernetes deletes all of the pods on the unreachable node so they can be rescheduled on healthy nodes.
The deleted pods typically remain in the Terminating state since kubelet is not reachable to confirm that the pods have stopped.
If a pod mounts a PVC, it maintains its lock on the PVC while stuck in the Terminating state and replacement pods are not able to start.
This can cause applications using PVCs to be unavailable longer than the five minute grace period applied by Kubernetes.
To avoid extended downtime, the EKCO operator watches for nodes in the Unknown state for more than five minutes and force deletes all pods on those nodes that have been terminating for at least 30 seconds. This 30 seconds, in addition to the 5 minute 40 second latency period before Kubernetes begins deleting pods on unreachable nodes, means that a minimum of 6 minutes 10 seconds passes before pods can begin to be rescheduled. In practice, pods take 7 to 10 minutes to be rescheduled due to a variety of factors, such as whether EKCO itself was on the lost node and the image pull times on the healthy nodes.
The clear node feature is a safer alternative to the purge node feature and is enabled by default. When using the clear node feature and a node is lost, the cluster is degraded until the node is cleaned up. In a degraded state, new nodes cannot join the cluster, the cluster cannot be upgraded, and cluster components report health warnings. For more information, see to the command below for manually purging a lost node.
When enabled, the EKCO operator automatically purges failed nodes that have been unreachable for more than
node_unreachable_toleration (Default: 5 minutes).
The following steps are taken during a purge:
ceph osd purge <id>.
A command is made available on all primary nodes to manually purge a node. This command takes a parameter
[name] of the node that you want to purge. The command inherits all of the configuration from the EKCO operator running in the cluster.
$ ekco-purge-node --help Manually purge a Kurl cluster node Usage: ekco purge-node [name] [flags] Flags: --certificates_dir string Kubernetes certificates directory (default "/etc/kubernetes/pki") -h, --help help for purge-node --maintain_rook_storage_nodes Add and remove nodes to the ceph cluster and scale replication of pools --min_ready_master_nodes int Minimum number of ready primary nodes required for auto-purge (default 2) --min_ready_worker_nodes int Minimum number of ready secondary nodes required for auto-purge Global Flags: --config string Config file (default is /etc/ekco/config.yaml) --log_level string Log level (default "info")
⚠️ Warning: Purging a node is intended to be an irrevocable operation and is meant to permanently remove the node from the cluster with the expectation that it will never become a member again.
The EKCO operator is responsible for appending nodes to the CephCluster
storage.nodes setting to include the node in the list of nodes used by Ceph for storage. This operation only appends nodes. Removing nodes is done during the purge.
EKCO is also responsible for adjusting the Ceph block pool, filesystem, and object store replication factor up and down in accordance with the size of the cluster from
min_ceph_pool_replication (Default: 1) to
max_ceph_pool_replication (Default: 3).
In order to allow for single node Rook clusters, the kURL install script makes the pod anti-affinity rules less strict for the Rook MDS daemons.
Once the cluster is scaled beyond one node, EKCO will revert this change in anti-affinity and rebalance the MDS pods.
This functionality can be disabled by setting the
ekco.rookShouldDisableReconcileMDSPlacement property to
Additionally, the kURL script will omit resource requests and limits for Ceph CSI provisioner and plugin Pods.
Once the cluster is scaled to three Nodes, and thus has enough capacity, EKCO will set the requests and limits to their recommended quantities. This functionality can be disabled by setting the
ekco.rookShouldDisableReconcileCephCSIResources property to
The EKCO operator will forcefully delete Envoy pods that change from a ready state to one where the Envoy container is not ready and have been in that state for at least 5 minutes.
This has been added to work around a known issue that may be caused by resource contention.
This functionality can be disabled by setting the
ekco.shouldDisableRestartFailedEnvoyPods property to
The duration can be adjusted by changing the
When you install kURL with
ekco.minioShouldDisableManagement set to
false, the EKCO operator manages data in the MinIO deployment to ensure that the data is properly replicated and has high availability.
To manage data in MinIO, the EKCO operator first enables a high availability six-replica StatefulSet when at least three nodes are healthy and the OpenEBS localpv storage class is available.
Then, EKCO migrates data from the original MinIO deployment to the StatefulSet before deleting the data. MinIO is temporarily unavailable while the data migration is in progress. If this migration fails, it will be retried but MinIO will remain offline until it succeeds.
After data has been migrated to the StatefulSet, EKCO ensures that replicas are evenly distributed across nodes.
To disable EKCO's management of data in MinIO, set
When you install kURL with
ekco.kotsadmShouldDisableManagement set to
false, the EKCO operator ensures that necessary KOTS components run with multiple replicas for high availability.
For Kotsadm v1.89.0+, the EKCO operator enables a high availability three-replica StatefulSet for the database when at least three nodes are healthy and the OpenEBS localpv storage class is available.
To disable EKCO's management of Kotsadm components, set
EKCO supports automatic certificate rotation for the registry add-on and the Kubernetes control plane since version 0.5.0 and for the KOTS add-on since version 0.7.0. For more information about automatic certificate rotation for the KOTS add-on, which is used by the Replicated app manager, see Using TLS Certificates in the Replicated documentation.
EKCO 0.11.0+ can maintain an internal load balancer forwarding all traffic from host port 6444 to one of the Kubernetes API server pods. To do this, EKCO runs HAProxy as a static pod on all nodes. EKCO ensures that, when new nodes are added and removed from the cluster, the correct HAProxy configuration is applied on all nodes.
In addition to the
ekco.enableInternalLoadBalancer parameter, the
ekco-enable-internal-load-balancer flag can be specified at install time to enable this feature.
curl https://kurl.sh/latest | sudo bash -s ekco-enable-internal-load-balancer
With auto-resource scaling, EKCO automatically scales some cluster resources that were installed by kURL to the specified replica count.
Auto-resource scaling is useful because a subset of cluster resources require that all nodes join the cluster before the desired replica count can be fulfilled. This can cause issues such as false positives in health check error reporting. Auto-resource scaling helps to avoid issues like this by scaling this subset of custom resources to the specified replica count without requiring that all nodes join the cluster.
Auto-resource scaling is available in v0.13.0 and later.
EKCO adds an admission controller that can be configured to override container images in pods.
A list can be specified in the
podImageOverrides property as an array of strings in the format
ekco: version: latest podImageOverrides: - projectcontour/contour:v1.18.0=myregistry.io/contour:v1.18.0-fips
EKCO installs the
ekco-reboot.service to safely unmount pod volumes before the system shutdown.
This service runs
/opt/ekco/shutdown.sh when it is stopped, which happens automatically when the system begins to shutdown.
The shutdown script deletes pods on the current node that mount volumes provisioned by Rook and cordons the node.
ekco-reboot.service is started, it runs
This happens automatically when the system starts after docker is running.
This script uncordons the node.
The shutdown script can fail to complete because it depends on services running on the node to be available to delete pods, but these services can be shutting down already. To avoid race conditions, manually run the ekco-reboot service's shutdown script before proceeding with the system shutdown or reboot: