DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Related

  • The Importance of Persistent Storage in Kubernetes- OpenEBS
  • Containerization and Helm Templatization Best Practices for Microservices in Kubernetes
  • EFK Stack on Kubernetes (Part 1)
  • Setting Up a CrateDB Cluster With Kubernetes to Store and Query Machine Data

Trending

  • How Kubernetes Cluster Sizing Affects Performance and Cost Efficiency in Cloud Deployments
  • Exploring Intercooler.js: Simplify AJAX With HTML Attributes
  • Designing a Java Connector for Software Integrations
  • The Full-Stack Developer's Blind Spot: Why Data Cleansing Shouldn't Be an Afterthought
  1. DZone
  2. Software Design and Architecture
  3. Cloud Architecture
  4. Running Couchbase Autonomous Operator 2.0 With Prometheus (Part 1)

Running Couchbase Autonomous Operator 2.0 With Prometheus (Part 1)

By 
Krishna Doddi user avatar
Krishna Doddi
·
Apr. 27, 20 · Tutorial
Likes (3)
Comment
Save
Tweet
Share
4.7K Views

Join the DZone community and get the full member experience.

Join For Free

We recently announced the latest preview of the Couchbase Autonomous Operator (CAO) 2.0 beta. This release is a significant update to the Couchbase Autonomous Operator. Couchbase Autonomous Operator 2.0 introduces several new enterprise-grade features with fully autonomous capabilities – security, monitoring, high-availability, and manageability. In this blog, we will examine in-depth how one of those works.

Prometheus Metrics Collection

The latest operator provides native integration with the Couchbase Prometheus Exporter for collecting and exposing Couchbase Server metrics. These exported metrics can be scraped by Prometheus and then visualized in tools like Grafana.

We will describe the steps to deploy the cluster with the Couchbase Prometheus Exporter and look at some of the metrics through Grafana. This will be a simple single cluster test deployment and will not detail all the other necessary steps for a production level deployment.

We will be closely following the Couchbase Autonomous Operator 2.0 Beta tutorial on installing on Amazon EKS.

Prerequisites

I assume you already have an Amazon Virtual Private Cloud (VPC) to use. Follow the documentation on Getting Started with Amazon EKS and install the following:

  • kubectl
  • aws-iam-authenticator
  • eksctl
  • Amazon EC2 key pairs
  • Couchbase Autonomous Operator 2.0 Beta

Deployment Architecture

A quick overview of the architecture of our deployment.

Referring the above diagram:

1: Create the Kubernetes cluster on Amazon EKS. The cluster manages Kubernetes Resources and Services.
2: Add Couchbase Resources by installing the Couchbase Custom Resource Definitions.
3: Install the Couchbase Autonomous Operator. This creates 2 Pods, the Operator and the Admission Controller in the Default namespace.
4: Deploy a 3 node Couchbase Cluster in the Default namespace. This creates 3 pods, each pod has a Couchbase 6.5.0 container and a Couchbase Metrics Exporter container.
5: Create a ServiceMonitor which tells Prometheus to monitor a Service resource that defines the endpoints Prometheus scrapes.
6: Create a Service will define the port that we described in our ServiceMonitor at earlier in the Default namespace.
7: Add Prometheus Resources by installing the Prometheus Custom Resource Definitions.
8: Create the Prometheus/Grafana Pods in the Monitoring namespace.

Create the Cluster and Configure kubectl

PowerShell
 




xxxxxxxxxx
1
44


 
1
$ eksctl create cluster \
2
--name prasadCAO2 \
3
--region us-east-1 \
4
--zones us-east-1a,us-east-1b,us-east-1c \
5
--nodegroup-name standard-workers \
6
--node-type t3.medium \
7
--nodes 3 \
8
--nodes-min 1 \
9
--nodes-max 4 \
10
--ssh-access \
11
--ssh-public-key ~/couchbase-prasad.pub \
12
--managed
13

          
14
[ℹ]  eksctl version 0.16.0
15
[ℹ]  using region us-east-1
16
[ℹ]  subnets for us-east-1a - public:192.168.0.0/19 private:192.168.96.0/19
17
[ℹ]  subnets for us-east-1b - public:192.168.32.0/19 private:192.168.128.0/19
18
[ℹ]  subnets for us-east-1c - public:192.168.64.0/19 private:192.168.160.0/19
19
[ℹ]  using SSH public key "/Users/krishna.doddi/couchbase-prasad.pub" as "eksctl-prasadCAO2-nodegroup-standard-workers-42:57:cd:cb:28:33:4a:d9:59:4e:73:3b:c0:e8:a3:fe"
20
[ℹ]  using Kubernetes version 1.14
21
[ℹ]  creating EKS cluster "prasadCAO2" in "us-east-1" region with managed nodes
22
[ℹ]  will create 2 separate CloudFormation stacks for cluster itself and the initial managed nodegroup
23
[ℹ]  if you encounter any issues, check CloudFormation console or try 'eksctl utils describe-stacks --region=us-east-1 --cluster=prasadCAO2'
24
[ℹ]  CloudWatch logging will not be enabled for cluster "prasadCAO2" in "us-east-1"
25
[ℹ]  you can enable it with 'eksctl utils update-cluster-logging --region=us-east-1 --cluster=prasadCAO2'
26
[ℹ]  Kubernetes API endpoint access will use default of {publicAccess=true, privateAccess=false} for cluster "prasadCAO2" in "us-east-1"
27
[ℹ]  2 sequential tasks: { create cluster control plane "prasadCAO2", create managed nodegroup "standard-workers" }
28
[ℹ]  building cluster stack "eksctl-prasadCAO2-cluster"
29
[ℹ]  deploying stack "eksctl-prasadCAO2-cluster"
30
[ℹ]  building managed nodegroup stack "eksctl-prasadCAO2-nodegroup-standard-workers"
31
[ℹ]  deploying stack "eksctl-prasadCAO2-nodegroup-standard-workers"
32
[✔]  all EKS cluster resources for "prasadCAO2" have been created
33
[✔]  saved kubeconfig as "/Users/krishna.doddi/.kube/config"
34
[ℹ]  nodegroup "standard-workers" has 3 node(s)
35
[ℹ]  node "ip-192-168-13-207.ec2.internal" is ready
36
[ℹ]  node "ip-192-168-62-181.ec2.internal" is ready
37
[ℹ]  node "ip-192-168-93-184.ec2.internal" is ready
38
[ℹ]  waiting for at least 1 node(s) to become ready in "standard-workers"
39
[ℹ]  nodegroup "standard-workers" has 3 node(s)
40
[ℹ]  node "ip-192-168-13-207.ec2.internal" is ready
41
[ℹ]  node "ip-192-168-62-181.ec2.internal" is ready
42
[ℹ]  node "ip-192-168-93-184.ec2.internal" is ready
43
[ℹ]  kubectl command should work with "/Users/krishna.doddi/.kube/config", try 'kubectl get nodes'
44
[✔]  EKS cluster "prasadCAO2" in "us-east-1" region is ready


Check Services and Nodes

PowerShell
 




x
9


 
1
$ kubectl get svc
2
NAME         TYPE        CLUSTER-IP   EXTERNAL-IP   PORT(S)   AGE
3
kubernetes   ClusterIP   10.100.0.1   <none>        443/TCP   15m
4

          
5
$ kubectl get nodes
6
NAME                             STATUS ROLES AGE VERSION
7
ip-192-168-13-207.ec2.internal   Ready <none> 4d4h v1.14.9-eks-1f0ca9
8
ip-192-168-62-181.ec2.internal   Ready <none> 4d4h v1.14.9-eks-1f0ca9
9
ip-192-168-93-184.ec2.internal   Ready <none> 4d4h v1.14.9-eks-1f0ca9


Configure kubectl

This command is vital as it sets the relevant Amazon Resource Name (ARN) variables in ~/.kube/config. Optionally, you can add --region regionName to specify a cluster in a region that is different than the default. (Your default region should have been specified when you first setup the AWS CLI through aws configurecommand.)

PowerShell
 




xxxxxxxxxx
1


 
1
$ aws eks update-kubeconfig --name prasadCAO2
2
Added new context arn:aws:eks:us-east-1:429712224361:cluster/prasadCAO2 to /Users/krishna.doddi/.kube/config


Install the Custom Resource Definitions (CRD)

Note: I downloaded the Operator for MacOS, renamed the package from  couchbase-autonomous-operator-kubernetes_2.0.0-macos-x86_64 to cao-2 and cd’d into this directory. 

The first step in installing the Operator is to install the custom resource definitions (CRD) that describe the Couchbase resource types.

PowerShell
 




x


 
1
$cao-2 kubectl create -f crd.yaml
2
customresourcedefinition.apiextensions.k8s.io/couchbasebuckets.couchbase.com created
3
customresourcedefinition.apiextensions.k8s.io/couchbaseephemeralbuckets.couchbase.com created
4
customresourcedefinition.apiextensions.k8s.io/couchbasememcachedbuckets.couchbase.com created
5
customresourcedefinition.apiextensions.k8s.io/couchbasereplications.couchbase.com created
6
customresourcedefinition.apiextensions.k8s.io/couchbaseusers.couchbase.com created
7
customresourcedefinition.apiextensions.k8s.io/couchbasegroups.couchbase.com created
8
customresourcedefinition.apiextensions.k8s.io/couchbaserolebindings.couchbase.com created
9
customresourcedefinition.apiextensions.k8s.io/couchbaseclusters.couchbase.com created
10
customresourcedefinition.apiextensions.k8s.io/couchbasebackups.couchbase.com created
11
customresourcedefinition.apiextensions.k8s.io/couchbasebackuprestores.couchbase.com created


Install the Autonomous Operator 2.0

PowerShell
 




x


 
1
$cao-2 bin/cbopcfg | kubectl create -f -
2
serviceaccount/couchbase-operator-admission created
3
clusterrole.rbac.authorization.k8s.io/couchbase-operator-admission created
4
clusterrolebinding.rbac.authorization.k8s.io/couchbase-operator-admission created
5
secret/couchbase-operator-admission created
6
deployment.apps/couchbase-operator-admission created
7
service/couchbase-operator-admission created
8
mutatingwebhookconfiguration.admissionregistration.k8s.io/couchbase-operator-admission created
9
validatingwebhookconfiguration.admissionregistration.k8s.io/couchbase-operator-admission created
10
serviceaccount/couchbase-operator created
11
role.rbac.authorization.k8s.io/couchbase-operator created
12
rolebinding.rbac.authorization.k8s.io/couchbase-operator created
13
deployment.apps/couchbase-operator created
14
service/couchbase-operator created


Check the status of the Operator

PowerShell
 




x


 
1
$cao-2 kubectl get deployments
2
NAME                           READY UP-TO-DATE AVAILABLE   AGE
3
couchbase-operator             1/1 1 1   96s
4
couchbase-operator-admission   1/1 1 1   97s


The Operator is ready to deploy CouchbaseCluster resources when both the Dynamic Admission Controller (couchbase-operator-admission) and Operator (couchbase-operator) deployments are fully ready and available.

Prepare the Couchbase Cluster Configuration

I’ll deploy a 3 node Couchbase Server 6.5.0 Cluster with Prometheus Couchbase Exporter. For this, I created my-cluster.yaml file in the current directory. This is just my sample. Here is the file:

YAML
 




xxxxxxxxxx
1
74


 
1
apiVersion: v1
2
kind: Secret
3
metadata:
4
  name: cb-example-auth
5
type: Opaque
6
data:
7
  username: QWRtaW5pc3RyYXRvcg== # Administrator
8
  password: cGFzc3dvcmQ=         # password
9
---
10
apiVersion: couchbase.com/v2
11
kind: CouchbaseCluster
12
metadata:
13
  name: cb-example
14
spec:
15
  image: couchbase/server:6.5.0
16
  security:
17
    adminSecret: cb-example-auth
18
  paused: false
19
  antiAffinity: true
20
  softwareUpdateNotifications: true
21
  serverGroups:
22
  - us-east-1a
23
  - us-east-1b
24
  - us-east-1c
25
  securityContext:
26
    runAsUser: 1000
27
    runAsNonRoot: true
28
    fsGroup: 1000
29
  platform: aws
30
  cluster:
31
    clusterName: cb-example
32
    dataServiceMemoryQuota: 512Mi
33
    indexServiceMemoryQuota: 256Mi
34
    searchServiceMemoryQuota: 256Mi
35
    indexStorageSetting: memory_optimized
36
    autoFailoverTimeout: 120s
37
    autoFailoverMaxCount: 3
38
    autoFailoverOnDataDiskIssues: true
39
    autoFailoverOnDataDiskIssuesTimePeriod: 120s
40
    autoFailoverServerGroup: false
41
    autoCompaction:
42
      databaseFragmentationThreshold:
43
        percent: 30
44
        size: 1Gi
45
      viewFragmentationThreshold:
46
        percent: 30
47
        size: 1Gi
48
      parallelCompaction: false
49
      timeWindow:
50
        start: 02:00
51
        end: 06:00
52
        abortCompactionOutsideWindow: true
53
      tombstonePurgeInterval: 72h
54
  servers:
55
  - size: 3
56
    name: all_services
57
    services:
58
    - data
59
    - index
60
    - query
61
    - search
62
  buckets:
63
    managed: false
64
    selector:
65
      matchLabels:
66
        cluster: cb-example
67
  monitoring:
68
    prometheus:
69
      enabled: true
70
      image: couchbase/exporter:1.0.0
71
      resources:
72
        requests:
73
          cpu: 100m
74
          memory: 100Mi


Notes:

  • I have used only a minimum set of configuration parameters. Please refer to the Couchbase Cluster Resource documentation for a complete list.
  • Included the secrets section in the same file to keep things simple. 
  • Used only the Data, Query, Index and Search services. 
  • Managing my own buckets instead of leaving it to the Operator.
  • Make a note of the cluster label cb-example as this will be used by Prometheus to discover the service later.

Tip: Make sure that buckets.managed is set to false. Otherwise, if you create a bucket manually once the cluster is up and running, Kubernetes will automatically drop it.

Deploy the Couchbase Cluster

PowerShell
 




xxxxxxxxxx
1


 
1
$cao-2 kubectl create -f my-cluster.yaml
2
secret/cb-example-auth created
3
couchbasecluster.couchbase.com/cb-example created


Both the secret as well as the cluster are created. This does not mean they are up and running yet, for that you will have to verify as described in the next step.

Verify the deployment

Pods running in the default namespace
PowerShell
 




xxxxxxxxxx
1


 
1
$cao-2 kubectl get pods
2
NAME                                            READY STATUS RESTARTS AGE
3
cb-example-0000                                 2/2 Running 0 9m5s
4
cb-example-0001                                 2/2 Running 0 8m53s
5
cb-example-0002                                 2/2 Running 0 8m42s
6
couchbase-operator-5c4bd54bbf-fcj9m             1/1 Running 0 10m
7
couchbase-operator-admission-6789cd5847-w9rfd   1/1 Running 0 10m


Make sure that all the pods are Ready and Running. In case there is some problem, you can get the logs from the Operator.

Optional: Get the Logs

If you encounter any problems in the previous step, you can check the logs as shown below.

PowerShell
 




xxxxxxxxxx
1


 
1
$cao-2 kubectl logs couchbase-operator-5c4bd54bbf-fcj9m
2
{"level":"info","ts":1586879846.061044,"logger":"main","msg":"couchbase-operator","version":"2.0.0","revision":"release"}
3
......
4
{"level":"info","ts":1586879986.2216492,"logger":"cluster","msg":"Pod added to cluster","cluster":"default/cb-example","name":"cb-example-0002"}
5
{"level":"info","ts":1586879987.0798743,"logger":"couchbaseutil","msg":"Rebalancing","cluster":"default/cb-example","progress":0}
6
{"level":"info","ts":1586879993.087347,"logger":"cluster","msg":"Rebalance completed successfully","cluster":"default/cb-example"}
7
{"level":"info","ts":1586879993.124682,"logger":"cluster","msg":"Reconcile completed","cluster":"default/cb-example"}


Here, the Couchbase cluster deployed without any errors.

Optional: Examine a Couchbase pod.

Let’s describe a Couchbase pod to check what its running.

PowerShell
 




xxxxxxxxxx
1
29


 
1
$cao-2 kubectl describe pod cb-example-0000
2
Name:           cb-example-0000
3
Namespace:      default
4
...
5
Labels:         app=couchbase
6
                couchbase_cluster=cb-example
7
...
8
{"containers":[{"name":"couchbase-server","image":"couchbase/server:6.5.0","ports":[{"name":"admin","containerPort":8091,"protocol":"TCP"}
9
...
10
                server.couchbase.com/version: 6.5.0
11
Status:         Running
12
...
13
Controlled By:  CouchbaseCluster/cb-example
14
Containers:
15
  couchbase-server:
16
    Container ID:   docker://7b0e5df433582ad432114248fdce922fd92f63435b110265b823c013fea8c2ac
17
    Image:          couchbase/server:6.5.0
18
...
19
    State:          Running
20
...
21
  metrics:
22
    Container ID:  docker://b4406ec41d2119978971c8fa41fb8077ace782611298ba23d254a0d4383ab5ca
23
    Image:         couchbase/exporter:1.0.0
24
    Image ID:
25
...
26
    Port:          9091/TC
27
...
28
    State:          Running


From the output above, we see that each Couchbase pod is running 2 containers. The first is running Couchbase Server 6.5.0 and and the other is running the Couchbase Prometheus Exporter which is using Port 9091.

Access the Couchbase Administration UI

In an actual production environment, you would typically deploy using DNS and a LoadBalancer acting as the proxy and would access Couchbase UI securely, with SSL using DNS SRV records. Since we are in a test environment, we will access the Couchbase UI directly from Port 8091. We do need one more step to achieve this and that is Port Forwarding.

Port Forwarding

PowerShell
 




xxxxxxxxxx
1


 
1
$cao-2 kubectl port-forward cb-example-0000 8091 &
2
[1] 11375
3
cao-2 $ Forwarding from 127.0.0.1:8091 -> 8091
4
Forwarding from [::1]:8091 -> 8091


We now have deployed three pods, however, it’s enough to port forward from one pod to access the Couchbase Admin UI.

Access the UI

http://localhost:8091

Create the buckets

Add sample bucket and create pillow bucket


Run a workload to generate some metrics

We will use cbc-pillowfight to generate the workload. Luckily, this is bundled along with the Operator and lets deploy this. Let’s make a minor modification to the YAML file first, so that it doesn’t stop with loading the data but performs operations on the bucket. We will use the pillow bucket we just created.

YAML
 




xxxxxxxxxx
1
16


 
1
apiVersion: batch/v1
2
kind: Job
3
metadata:
4
  name: pillowfight
5
spec:
6
  template:
7
    metadata:
8
      name: pillowfight
9
    spec:
10
      containers:
11
      - name: pillowfight
12
        image: sequoiatools/pillowfight:v5.0.1
13
        command: ["cbc-pillowfight",
14
                  "-U", "couchbase://cb-example-0000.cb-example.default.svc/pillow?  select_bucket=true","-I", "10000", "-B", "1000", "-c", "10000", "-t", "1", "-u", "Administrator", "-P", "password"]
15
      restartPolicy: Never


Change the bucket from default to pillow and changed the -c (number of loops) option from 10 to 10,000.

Then:

PowerShell
 




xxxxxxxxxx
1


 
1
$cao-2 kubectl create -f pillowfight-data-loader.yaml
2
job.batch/pillowfight created


Testing Prometheus and Grafana locally

We now have a three node Couchbase Cluster with the Prometheus Couchbase Exporter. The Exporter is scraping Couchbase metrics to Port 9091. Now, we could forward that port just like we forwarded port 8091 to access the Couchbase Web Console UI from our desktop. With that forwarded port, we could then have Prometheus and Grafana running in Docker containers on the desktop and use the forwarded 9091 port to get the metrics into Prometheus and visualize it in Grafana.

With the above approach, there is a limitation. First is, we would have to forward port 9091 from all 3 nodes and those node names would be hardcoded. Hardcoding node names is a huge problem in a Kubernetes environment. Moreover, you would really not be doing port forwarding in a Production environment, where you would be typically deploying with DNS and would use the DNS SRV to connect to the cluster. Finally, its best practice to run Prometheus and Grafana in Kubernetes itself, aligning with the Cloud Native paradigm.

Next Steps

In Part 2, we will be doing just that, apart from DNS since we still want to keep this as simple as possible for quick testing.

Resources:

  • Download Couchbase Autonomous Operator 2.0 Beta for Kubernetes
  • Getting started Couchbase Autonomous Operator 2.0 Beta
  • Tutorial – Couchbase Autonomous Operator on EKS
  • Share your thoughts on the Couchbase Forums
Operator (extension) Docker (software) Kubernetes PowerShell pods Couchbase Server Metric (unit)

Opinions expressed by DZone contributors are their own.

Related

  • The Importance of Persistent Storage in Kubernetes- OpenEBS
  • Containerization and Helm Templatization Best Practices for Microservices in Kubernetes
  • EFK Stack on Kubernetes (Part 1)
  • Setting Up a CrateDB Cluster With Kubernetes to Store and Query Machine Data

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!