This service broker enables Kubernetes & Cloud Foundry applications to create, delete and modify Dell EMC ECS (Elastic Cloud Storage) and Dell Objectscale object storage buckets & namespaces; and bind multiple applications to the same resources.
This service broker supports a number of Cloud Foundry and ECS features including:
- Create and Delete Object Storage Buckets
- Create and Delete Object Storage Namespaces
- Bind one or more Cloud Foundry applications to a bucket or namespace, with unique credentials and permissions for each application
- Support quota enforced plans for buckets to limit the amount of capacity
- Support for encryption and retention of namespaces
- Change plans of an existing bucket
- Browse Cloud Foundry instance and binding metadata through an internal bucket
- Specify an ECS namespace and replication group for provisioning
- Provide a string prefix for bucket and user names
- Support a self-signed SSL certificate for the ECS management API
- Configure offered services & plans through a YAML based configuration
- Support file system mounts of file access enabled buckets via NFS
- Support for multiple PCF instances to share data through ECS buckets and namespaces
To build, make sure you have a Java 11 runtime environment, and use Gradle.
# The ecs-simulator starts automatically when the test-suite is run
./gradlew test
# Then build the project
./gradlew assemble
The service broker supports a number of configuration parameters that are available as environment variables or through
Spring configuration. All parameters are prefixed with the broker-config.
string. Default parameters point to the
bundled ECS simulator. For more info, check the
example config.
Parameter | Default Value | Required | Description |
---|---|---|---|
managementEndpoint | - | true | ECS management API URI (https://:) |
replicationGroup | - | true | Name (not ID) of replication group |
namespace | - | true | Default ECS Namespace name |
baseUrl | - | false | ECS Base URL name (DefaultBaseUrl is picked if value is not provided) |
useSsl | false | false | Whether to use HTTPS for object endpoint connections (when base url is provided) |
objectEndpoint | - | false | Override endpoint for the object endpoint |
repositoryEndpoint | objectEndpoint | false | Override endpoint for broker metadata storage |
repositoryUser | user | false | Username to authenticate to intenal bucket |
username | root | false | Username to authenticate to ECS management API |
password | ChangeMe | false | Password to authenticate to ECS management API |
repositoryBucket | repository | false | Internal bucket for metadata storage |
prefix | ecs-cf-broker- | false | Prefix to prepend to ECS buckets and users |
brokerApiVersion | * | false | Version of the CF broker API to advertise |
certificate | - | false | ECS SSL public key cert file |
ignoreSslValidation | - | false | Allows to ignore SSL validation errors |
If running within IDE, you can set the environment variables within "Run Configuration".
When connecting to Objectscale, Service Broker requires different set of parameters:
Parameter | Default Value | Required | Description |
---|---|---|---|
apiType | objectscale | true | Storage API type (ECS or Objectscale) |
username | root | true | Objectscale management user name |
password | ChangeMe | true | Objectscale management user password |
objectscaleId | - | true | Objectscale ID |
objectscaleGatewayEndpoint | - | true | Objectscale Gateway endpoint url |
objectstoreId | - | true | Objectstore ID |
objectstoreName | - | true | Objectstore name |
objectstoreManagementEndpoint | - | true | Objectstore management endpoint url |
objectstoreS3Endpoint | - | true | Objectstore S3 endpoint url |
accountId | - | true | Account ID |
accessKey | - | true | Access key of a pre-created IAM user with S3 access |
secretKey | - | true | Secret key of a pre-created IAM user with S3 access |
repositoryBucket | repository | false | Internal bucket name for metadata storage |
prefix | ecs-cf-broker- | false | Prefix to prepend to ECS buckets and users |
brokerApiVersion | * | false | Version of the CF broker API to advertise |
certificate | - | false | ECS SSL public key cert file |
ignoreSslValidation | - | false | Allows to ignore SSL validation errors |
The ECS Simulator is helpful for ensuring that the application starts up, without actually having an ECS cluster accessible. You'll find the simulator in the test-suite. Just run this file as a Java program, and the broker will be able to initialize against the "mocked" API calls.
You can also start the simulator from the command-line:
./gradlew simulate
The simulator is also useful when running certain JUnit tests outside of the TestSuite provided. To run an individual test that references the ECS API, just start the simulator, and then execute a test.
To load a self-signed certificate for an ECS system, just provide a PEM formatted certificate file named localhost.pem
into the src/main/resources
directory.
Follow the documentation to register the broker to Cloud Foundry.
Download the ECS Service Broker tile from Broadcom Support portal, and and follow the installation instructions found there.
Cloud Foundry end-users can create and bind services to their applications using the cf
CLI application.
cf create-service ecs-bucket unlimited my_bucket
This creates a bucket of the ecs-bucket
service with the unlimited
plan and the name: my-bucket
. To bind
an application to this bucket:
cf bind-service my-app my-bucket
The default will give my-app
"full control" of the bucket. To give a reduced set of permissions, you can provide
additional configuration parameters with the -c
flag:
cf bind-service my-app my-bucket -c '{"permissions": ["read", "write"]}'
Valid permissions include:
- read
- read_acl
- write
- write_acl
- execute
- full_control
- privileged_write
- delete
- none
Service plan can be changed using update-service
command. Only a subset of service attributes are applied:
- Buckets: quota and default retention
- Namespaces: bucket quota, retention policies, ADO, compliance and domain group admins
More detailed instructions for using the broker in Cloud Foundry can be found in the ECS broker documentation.
The service broker catalog can be configured through YAML based configuration. You can create the file manually,
via PCF or another build tool. Just add a catalog
section to the src/main/resources/application.yml
file:
The following feature flags are supported by the bucket & namespace. All parameters are optional, and can be set at the service or plan level in the service-settings
block. Parameters are observed with the following precedence: service-definition (in the catalog), plan and then in command-line parameters.
Resource | Parameter | Default | Type | Description |
---|---|---|---|---|
bucket | namespace | false | String | Namespace where bucket will be created |
bucket | replication-group | false | String | Replication group for bucket |
bucket | encrypted | false | Boolean | Enable encryption of bucket |
bucket | access-during-outage | false | Boolean | Enable potentially stale data during outage |
bucket | ado-read-only | false | Boolean | Only allow read access during outage (requires ADO to be enabled) |
bucket | file-accessible | false | Boolean | Enable file-access (NFS, HDFS) for bucket |
bucket | head-type | s3 | String | Specify object type (s3, swift) for bucket |
bucket | default-retention | - | Int | Number of seconds to prevent object deletion/modification |
bucket | quota* | - | JSON Map | Quota applied to bucket |
bucket | remote_connection*** | - | JSON Map | Remote connection details for previously created bucket |
bucket | name | - | String | String to add to bucket name after the broker prefix (prefix-name-id) |
bucket | tags**** | - | JSON List | List of tags that are key-value pairs associated with a bucket |
bucket | search-metadata***** | - | JSON List | List of search metadata that are used for bucket indexing |
bucket binding | base-url | - | String | Base URL name for object URI |
bucket binding | permissions | - | JSON List | List of permissions for user in bucket ACL |
bucket binding | path-style-access | true | Boolean | Use path style access for S3 URL, the alternative is to use host style access |
bucket binding | name | - | String | String to add to binding name after the broker prefix (prefix-name-id) |
namespace | replication-group | false | String | Replication group of namespace |
namespace | domain-group-admins | - | JSON List | List of domain admins to be added to namespace |
namespace | encrypted | false | Boolean | Enable encryption of namespace |
namespace | compliance-enabled | false | Boolean | Enable compliance adhearance of retention |
namespace | access-during-outage | false | Boolean | Enable potentially stale data during outage |
namespace | default-bucket-quota | -1 | Integer | Default quota applied to bucket (-1 for none) |
namespace | quota* | - | JSON Map | Quota applied to namespace |
namespace | retention** | - | JSON Map | Retention policies applied to namespace |
namespace | default-retention | - | Int | Number of seconds to prevent object deletion/modification |
namespace | remote_connection*** | - | JSON Map | Remote connection details for previously created namespace |
namespace | name | - | String | String to add to namespace name after the broker prefix (prefix-name-id) |
namespace binding | base-url | - | String | Base URL name for object URI |
namespace binding | use-ssl | false | Boolean | Use SSL for object endpoint |
namespace binding | name | - | String | String to add to binding name after the broker prefix (prefix-name-id) |
NOTE: When working with Objectstore, Service Broker does not support Namespace services!
* Quotas are defined with the following format: {quota: {limit: <int>, warn: <int>}}
** Retention policies are defined with the following format: {retention: {<policy name>: <seconds retained>}}
*** Remote connection details are describe below in remote connections
**** Tags are defined with the following format: {tags:[{"key": <str>,"value": <str>}, ...]}
.
Details about bucket tagging could be found below in Bucket Tags section
***** List of search metadata is defined with following format: {"search_metadata": [{"type": <str>,"name": <str>,"datatype": <str>>}, ...]}
Details about search metadata definition are described below in Search metadata section
For more info, check the example config.
By default the broker is secured with a dynamically generated password ala Spring Security. In order to register with Cloud Foundry, a user would need to view the output logs, and grab the password with each restart.
To statically set a broker password, simple add the following to the src/main/resources/application.yml
file:
...
security:
user:
password: <password>
...
Volume services allow bucket contents to be mounted into Cloud Foundry application containers as a file system. This enables applications to interact with bucket contents as though they are ordinary files.
There are a few prerequisites you must set up in your Cloud Foundry deployment in order to take advantage of volume services.
-
In your Cloud Foundry deployment, the property
cc.volume_services_enabled
must be set totrue
. -
The
nfsv3driver
job from nfs-volume-release must be running and colocated on your diego cells. See the README for details. -
The
ecs-bucket
service in your catalog must be configured to require volume mounts. The example application.yml provided in this repo is already set up with this property:
...
catalog:
services:
- name: ecs-file-bucket
type: bucket
requires:
- volume_mount
...
In order to use volume services once the prerequisites above are satisfied, your service instances must be created with
file-accessible
set to true. This can be set either in the service or service plan exposed from your service catalog,
or manually by the user during service instance creation:
cf create-service ecs-bucket 5gb mybucket -c '{"file-accessible":true}'
Buckets created in this manner will have file system access enabled, and file shares exposed. When application bindings are created, new bucket users will be created to correspond to those bindings, and uid mappings will ensure that traffic coming from the application operates as the correct user.
Information provided in response of binding creation request includes s3 URL, secret credentials and user Unix ID.
The application mount point defaults to /var/vcap/data/{binding-id-guid}
so that is where the file system will appear
within the application container. You can find this path and corresponding uid from within your application programmatically
by parsing it from the VCAP_SERVICES environment variable. If you prefer to have the volume mounted to a specific path
in your application container, you can use the mount
key from within your bind configuration:
cf bind-service myapp mybucket -c '{"mount":"/var/something"}'
A common use case for object storage, in general, and ECS specifically, is to share data across data-centers, platforms, Cloud Foundry instances, or clouds using a shared object-storage bucket. The ECS Service Broker supports with with a specialized feature, called "remote connections". This features allows you to share services across Cloud Foundry, or other service-broker-enabled platforms securely, and without user-provided-services, which can be error-prone.
To share a bucket or namespaces between Cloud Foundry instances, use the following steps:
- Create the ECS service at the original site or CF instance:
pcf-1$ cf create-service ecs-bucket 5gb mybucket
After creating the services, you may bind it to local applications as described above.
- Create a "remote connection" service-key
pcf-1$ cf create-service-key mybucket pcf2Key -c '{"remote_connection": true}'
- List the remote connection service key details:
pcf-1$ cf service-key mybucket pcf2Key
Getting key pcf2Key for service instance mybucket as user...
{
"accessKey": "...",
"instanceId": "...",
"secretKey": "..."
}
These service keys can be used by administrators to connect the service instance to any number of Cloud Foundry instances or other service broker enabled platforms, such as Pivotal Container Service.
- Connect to a separate Cloud Foundry instance, and create the remote instance of the service:
pcf-2$ cf create-service ecs-bucket 5gb mybucket -c '{"remote_connection": {"accessKey": "...", "instanceId": "...", "secretKey": "..."}}'
When using multiple service-brokers, ensure that the service and plan definitions (defined in the broker catalog) are the same between the deployed brokers. If the catalog definitions differ between the two, the broker will return an error to the user, and decline to remotely connect the service instance.
At this point, the service is created at the remote instance, and can be bound to apps.
When deleting a service instance through a Cloud Foundry command such as:
$ cf delete-service mybucket
The broker will only delete the actual service instance (bucket or namespace) once all remote connections have been removed. Prior to that, the service instance will be removed from the Cloud Foundry database, and the remote connection will be removed from the ECS broker metadata for that instance.
Changing/upgrading plans with remote connections is currently disabled, as it would leave one of the Cloud Foundry instances out of date.
Search metadata is used for ECS Object Storage bucket indexing and allows to lookup objects without iterating through bucket contents.
Metadata fields number is limited to 30, and must be defined when bucket is created. Note: plan changes will disable metadata search if plans defines different metadata field sets!
Each metadata field definition consists of three fields: type, name and datatype.
...
search-metadata:
- type: <type>
name: <name>
datatype: <datatype>
...
There are two types of search metadata provided in the ECS buckets: System and User.
ECS Documentation provides following system metadata:
Name (Alias) | Data Type | Description |
---|---|---|
ObjectName | String | Name of the object. |
Owner | String | Identify the owner of the object. |
Size | Integer | Size of the object. |
CreateTime | DateTime | Time at which the object was created. |
LastModified | DateTime | Time and date at which the object was last modified. |
System search metadata provided in service-settings
block should be tagged with System type, existing name and corresponding datatype.
User defined search metadata should be tagged with User type, existing datatype and name starting with prefix x-amz-meta-
.
Prefix will be added to field name if it is not already there.
When writing metadata to objects, client should provide data in format appropriate for each fields' datatype. ECS supports 4 types of datatype: String, Integer, DateTime and Decimal.
Datatype | Description |
---|---|
String | Search comparisons are done over plaintext. |
Integer | String should contain only digits, and is converted to integer in search comparisons. |
Decimal | Decimal value with "." character treates as decimap point. |
Datetime | Expected string format is yyyy-MM-ddTHH:mm:ssZ |
Example of service-settings
block part describing Search Metadata is presented in the listing:
...
search-metadata:
- type: System
name: Expiration
datatype: DateTime
- type: System
name: Size
datatype: Integer
- type: User
name: x-amz-meta-my-meta
datatype: Decimal
...
Reclaim policy decides what happens when a bucket service instance is deleted.
By default reclaim policy is set to Fail
. Below is a list of supported reclaim policies:
Reclaim Policy | Description |
---|---|
Fail | Attempt to delete bucket but fail with error if the bucket isn't empty |
Delete | Delete all objects and versions (if versioning is enabled) before deleting the bucket |
Detach | Delete the service instance but leave the bucket as is |
Reclaim policy can be overridden while creating or updating the service instance by providing additional configuration parameters in following format:
{
"reclaim-policy":"Delete",
"allowed-reclaim-policies":"Delete,Detach,Fail"
}
When specified in service definition or in request parameters, tags are defined with the following format: {tags:[{"key": <str>,"value": <str>}, ...]}
Tag value could contain a special placeholder, which will be replaced by request context value. Supported placeholder values are listed below:
Placeholder | Platform | Property | Comment |
---|---|---|---|
$CF_ORG_GUID | Cloud Foundry | organization_guid | The GUID of the organization that a Service Instance is associated with |
$CF_ORG_NAME | Cloud Foundry | organization_name | The name of the organization that a Service Instance is associated with. |
$CF_SPACE_GUID | Cloud Foundry | space_guid | The GUID of the space that a Service Instance is associated with. |
$CF_SPACE_NAME | Cloud Foundry | space_name | The name of the space that a Service Instance is associated with. |
$CF_INSTANCE_NAME | Cloud Foundry, Kubernetes | instance_name | The name of the Service Instance. |
$CTX_NAMESPACE | Kubernetes | namespace | The name of the Kubernetes namespace in which the Service Instance will be visible. |
$CTX_CLUSTER_ID | Kubernetes | clusterid | The unique identifier for the Kubernetes cluster from which the request was sent. |
For additional details, see Open Service Broker API documentation for request context object: https://github.com/openservicebrokerapi/servicebroker/blob/master/profile.md#context-object
Tag Placeholders usage example:
{ "tags":
[
{"key":"org_guid","value":"$CF_ORG_GUID"},
{"key":"org_name","value":"$CF_ORG_NAME"},
{"key":"org_space","value":"$CF_SPACE_GUID"},
{"key":"space_name","value":"$CF_SPACE_NAME"},
{"key":"instance_name","value":"$CF_INSTANCE_NAME"}
]
}
Local test suite can be run with either a live ECS platform, or using the included simulator. Configuration variables can be found and/or changed via the EcsActionTest class.
You can then run the test-suite with gradle:
./gradlew test
Up to date tasks are on our Github issues page.