...
Purpose | Machine | Cores | Memory | Network | Storage |
---|---|---|---|---|---|
Shared block storage for IP-SAN or NVMeoF | Storage Optimized Lsv2-series | 8 | 64GB | ~3Gbps | Premium_LRS Ephemeral direct NVMe or SSD |
Capacity Optimized NFS server LVM + VDO + XFS + NFS Server | General Family D-series | 4 | 16GB | ~8Gbps | Bcache(writeback) on Premium_LRS Data on Standard_LRS ssd:standard ratio 1:4 |
High Performance NFS Server | General Family DS-Series | 8 | 30GB | ~16Gbps | Bcache uses Premium_LRS Data on Standard_LRS |
All Flash NFS server ZFS Storage Appliance | D32s_v3 | 32 | 128GB | ~16Gbps | Data & Log uses SSD Persistent Disk (Premium_LRS) |
High-Availability | High Availability Set Requires Service Principal | Azure internal LoadBalancer. Floating Virtual IP address |
...
Here is the sequence of steps involved in deploying High-Availability (HA) MayaNAS on Azure cloud platform. The next steps assume you’ve already deployed at two MayaNAS instances from Azure marketplace, with desired Availability Set. In this tutorial we will assume we are pllaning on deploying All Flash NFS Server configuration
...
planning
...
on
...
deploying
...
All
...
Flash
...
NFS
...
Server
...
configuration
...
- 2 compute instances
mayanas1, mayans2
2TB pd-ssdmayanas-ha1, mayans-ha2
- 1TB Premium SSD persistent storage
- Default network for the internal
- Virtual IP: 1050.950.050.1050
Connect to mayanas instances using SSH to create setup Service Principal account, which is required only if you are planning to configure HA services. Otherwise you may skip to Step 2. MayaNAS requires a Service Principal account with sufficient permissions to manipulate disk attachments for proper sharing and fencing, and also storage read-write access to object storage. It also needs sufficient permission to float the virtual IP across multiple instances. By having separate service account for all MayaNAS deployments you can enforce proper security measures as the assigned roles are limited to this project instance only.
On Azure cloud shell or other system where login credentials were already establishedThe service principal account is created from Azure cloud shell or other system where login credentials were already established, and not from the MayaNAS instances
az ad sp create-for-rbac --name mayasnasmayanas-sp --password Mayanas@123
Info Please take a note of the tenant ID for the newly created service principal account. You may choose the same service principal name but the password is given as an example only.
On mayanas1:
sudo az login--service-principal -u http://mayanas-sp --tenant b9f7862a-7153-4501-8039-8d9b37d7c0a9
On mayanas2:sudo az login--service-principal -u http://mayanas-sp --tenant b9f7862a-7153-4501-8039-8d9b37d7c0a9
Warning Please make sure login to service principal is done as root user. It is a one time setup only.
Change the default password to something random by running
Code Block language bash # /opt/mayastor/web/genrandpass.sh
Or to set your own password
Code Block language bash # /opt/mayastor/web/changepass.sh Login name (default admin): Login password: Password again:
And then restart the web server for password changes to take effect
No Format # /opt/mayastor/web/stop # /opt/mayastor/web/start
40.78.60.49Now you can proceed with High-Availability setup using the wizard from Administration Web console available on http://<mayanas-ip>:2020