Deploy the WEKA client on Amazon EKS
Deploy the WEKA client on an existing Amazon EKS cluster to enable Kubernetes workloads to access the WEKA filesystem.
Last updated
Deploy the WEKA client on an existing Amazon EKS cluster to enable Kubernetes workloads to access the WEKA filesystem.
Last updated
The WEKA client enables Kubernetes workloads on Amazon EKS to connect to and access a WEKA cluster deployed in AWS. Client pods are managed using Kubernetes custom resources and require coordination with the WEKA Operator for installation and lifecycle management.
Verify network access to the WEKA driver distribution service: Ensure that the deployment environment has network access to https://drivers.weka.io
. The WEKA client pods automatically download the required driver components from this public distribution service to interface with the WEKA filesystem. For more information, see Drivers distribution service.
Verify security groups and configuration: The WEKA client requires the ports specified in the following topics:
(in the WEKA Prerequisites and compatibility topic).
(in the WEKA Operator deployment topic).
Obtain setup information: Contact the to obtain the necessary setup information.
QUAY_USERNAME
QUAY_PASSWORD
example_user
example_password
WEKA Operator Version
VERSION
v1.6.0
WEKA Image
WEKA_IMAGE_VERSION_TAG
4.4.5.118-k8s.4
By gathering this information in advance, you have all the required values to complete the deployment workflow efficiently. Replace the placeholders with the actual values in the setup files.
A deployed WEKA cluster is required: Use the same subnets and security groups from the WEKA cluster when configuring the EKS environment for client deployment. For guidance on deploying the WEKA cluster with Terraform, see WEKA installation on AWS using Terraform.
EKS deployment prerequisites: Configure the EKS cluster with the following global settings:
IAM Role and policy configuration: Configure the appropriate IAM roles and policies for both the EKS cluster and its worker nodes:
Cluster IAM role
Attach the IAM role associated with the EKS cluster:
AmazonEKSBlockStoragePolicy
AmazonEKSClusterPolicy
AmazonEKSComputePolicy
AmazonEKSLoadBalancingPolicy
AmazonEKSNetworkingPolicy
(These policies are included when using the recommended IAM role: EKS - Auto Cluster.)
Node group IAM role Attach the IAM role for the managed node groups, which host the worker nodes running the WEKA operator:
AmazonEC2ContainerRegistryPullOnly
AmazonEKSWorkerNodeMinimalPolicy
Additionally, to ensure proper networking functionality, attach the following policy:
AmazonEKS_CNI_Policy
(These policies are included in the recommended IAM role: EKS - Auto Node.)
CPU allocation
Enable the Static CPU allocation.
Reserve Core 0.
Hugepages allocation
Reserve 1.5 GiB for the client core.
Label the EKS nodes: Label EKS worker nodes intended for WEKA client deployment. Apply the label to each node designated to host WEKA client pods.
Create namespaces and configure Quay authentication: Set up the required Kubernetes namespaces (weka-operator-system
and default
), and create a Docker registry secret to authenticate access to WEKA container images hosted on Quay:
Install the WEKA Operator: Install the WEKA Operator using the official Helm chart:
Configure NICs: Create the ensure-nics.yaml
manifest to enable multi-NIC support on selected nodes:
Apply the manifest:
Deploy the WEKA client resource: Define the WEKA client custom resource. Replace the joinIpPorts
value with a valid IP or ALB DNS of the deployed WEKA cluster:
Apply the manifest:
Install a CSI plugin: Follow the procedures in WEKA CSI Plugin.
Container repository ()