Skip to main content
Version: 1.4.0

Deploy to Kubernetes

The easiest way to deploy YuniKorn is to leverage our helm charts, you can find the guide here. This document describes the manual process to deploy YuniKorn scheduler and admission controller. It is primarily intended for developers.

Note The primary source of deployment information is the Helm chart, which can be found at yunikorn-release. Manual deployment may lead to out-of-sync configurations, see deployments/scheduler

Build docker image

Under project root of the yunikorn-k8shim, run the command to build an image using the map for the configuration:

make image

This command will build an image. The image will be tagged with a default version, image tag and your build architecture.

Note the default build uses a hardcoded user and tag. You must update the IMAGE_TAG variable in the Makefile to push to an appropriate repository.

Note the latest yunikorn images in docker hub are not updated anymore due to ASF policy. Hence, you should build both scheduler image and web image locally before deploying them.

Note the imaging tagging includes your build architecture. For Intel, it would be amd64 and for Mac M1, it would be arm64.

Setup RBAC for Scheduler

In the example, RBAC are configured for the yuniKorn namespace. The first step is to create the RBAC role for the scheduler, see yunikorn-rbac.yaml

kubectl create -f deployments/scheduler/yunikorn-rbac.yaml

The role is a requirement on the current versions of kubernetes.

Create/Update the ConfigMap

This must be done before deploying the scheduler. It requires a correctly setup kubernetes environment. This kubernetes environment can be either local or remote.

  • download configuration file if not available on the node to add to kubernetes:
curl -o yunikorn-configs.yaml https://raw.githubusercontent.com/apache/yunikorn-k8shim/master/deployments/scheduler/yunikorn-configs.yaml
  • modify the content of yunikorn-configs.yaml file as needed, and create ConfigMap in kubernetes:
kubectl create configmap yunikorn-configs --from-file=yunikorn-configs.yaml
  • Or update ConfigMap in kubernetes:
kubectl create configmap yunikorn-configs --from-file=yunikorn-configs.yaml -o yaml --dry-run=client | kubectl apply -f -
  • check if the ConfigMap was created/updated correctly:
kubectl describe configmaps yunikorn-configs

Deploy the Scheduler

The scheduler can be deployed with following command.

kubectl create -f deployments/scheduler/scheduler.yaml

The deployment will run 2 containers from your pre-built docker images in 1 pod,

  • yunikorn-scheduler-core (yunikorn scheduler core and shim for K8s)
  • yunikorn-scheduler-web (web UI)

Alternatively, the scheduler can be deployed as a K8S scheduler plugin:

kubectl create -f deployments/scheduler/plugin.yaml

The pod is deployed as a customized scheduler, it will take the responsibility to schedule pods which explicitly specifies schedulerName: yunikorn in pod's spec. In addition to the schedulerName, you will also have to add a label applicationId to the pod.

  metadata:
name: pod_example
labels:
applicationId: appID
spec:
schedulerName: yunikorn

Note: Admission controller abstracts the addition of schedulerName and applicationId from the user and hence, routes all traffic to YuniKorn. If you use helm chart to deploy, it will install admission controller along with the scheduler. Otherwise, proceed to the steps below to manually deploy the admission controller if running non-example workloads where schedulerName and applicationId are not present in the pod spec and metadata, respectively.

Setup RBAC for Admission Controller

Before the admission controller is deployed, we must create its RBAC role, see admission-controller-rbac.yaml.

kubectl create -f deployments/scheduler/admission-controller-rbac.yaml

Create the Secret

Since the admission controller intercepts calls to the API server to validate/mutate incoming requests, we must deploy an empty secret used by the webhook server to store TLS certificates and keys. See admission-controller-secrets.yaml.

kubectl create -f deployments/scheduler/admission-controller-secrets.yaml

Deploy the Admission Controller

Now we can deploy the admission controller as a service. This will automatically validate/modify incoming requests and objects, respectively, in accordance with the example in Deploy the Scheduler. See the contents of the admission controller deployment and service in admission-controller.yaml.

kubectl create -f deployments/scheduler/admission-controller.yaml

Access to the web UI

When the scheduler is deployed, the web UI is also deployed in a container. Port forwarding for the web interface on the standard ports can be turned on via:

kubectl port-forward svc/yunikorn-service 9889 9080

9889 is the default port for Web UI, 9080 is the default port of scheduler's Restful service where web UI retrieves info from. Once this is done, web UI will be available at: http://localhost:9889.

Configuration Hot Refresh

YuniKorn uses config maps for configurations, and it supports loading configuration changes automatically by watching config map changes using shared informers.

To make configuration changes, simply update the content in the configmap, which can be done either via Kubernetes dashboard UI or command line. Note, changes made to the configmap might have some delay to be picked up by the scheduler.