Kubernetes
Kubernetes is the leading technology for the deployment and orchestration of containerized workloads in cloud-native environments.
Seqera Platform streamlines the deployment of Nextflow pipelines into Kubernetes, both for cloud-based and on-prem clusters.
The following instructions create a Seqera compute environment for a generic Kubernetes distribution. See Amazon EKS or Google GKE for EKS and GKE compute environment instructions.
Cluster preparation
To prepare your Kubernetes cluster for the deployment of Nextflow pipelines using Seqera, this guide assumes that you've already created the cluster and that you have administrative privileges.
This guide applies a Kubernetes manifest that creates a service account named tower-launcher-sa
and the associated role bindings, all contained in the tower-nf
namespace. Seqera uses the service account to launch Nextflow pipelines. Use this service account name when setting up the compute environment for this Kubernetes cluster in Seqera.
Prepare your Kubernetes cluster for Seqera Platform
-
Verify the connection to your Kubernetes cluster:
kubectl cluster-info
-
Create a file named
tower-launcher.yml
with the following YAML:apiVersion: v1
kind: Namespace
metadata:
name: tower-nf
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: tower-launcher-sa
namespace: tower-nf
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: tower-launcher-role
namespace: tower-nf
rules:
- apiGroups: [""]
resources: ["pods", "pods/status", "pods/log", "pods/exec", "persistentvolumeclaims", "configmaps"]
verbs: ["get", "list", "watch", "create", "delete"]
- apiGroups: ["apps"]
resources: ["deployments"]
verbs: ["get", "list", "watch", "create", "delete"]
- apiGroups: ["batch"]
resources: ["jobs", "jobs/status", "jobs/log"]
verbs: ["get", "list", "watch", "create", "delete"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: tower-launcher-rolebind
namespace: tower-nf
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: tower-launcher-role
subjects:
- kind: ServiceAccount
name: tower-launcher-sa
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: tower-launcher-userbind
namespace: tower-nf
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: tower-launcher-role
subjects:
- kind: User
name: tower-launcher-user -
Apply the manifest:
kubectl apply -f tower-launcher.yml
-
Create a persistent API token for the
tower-launcher-sa
service account:kubectl apply -f - <<EOF
apiVersion: v1
kind: Secret
metadata:
name: tower-launcher-token
annotations:
kubernetes.io/service-account.name: tower-launcher-sa
type: kubernetes.io/service-account-token
EOF -
Confirm that Kubernetes created the persistent API token secret:
kubectl describe secrets/tower-launcher-token
-
Create persistent storage. Seqera requires a
ReadWriteMany
persistent volume claim (PVC) mounted to all nodes where workflow pods will be dispatched.You can use any storage solution that supports the
ReadWriteMany
access mode. The setup of this storage is beyond the scope of these instructions — the right solution for you will depend on what is available for your infrastructure or cloud vendor (NFS, GlusterFS, CephFS, Amazon FSx). Ask your cluster administrator for more information.-
Example PVC backed by local storage: tower-scratch-local.yml
-
Example PVC backed by NFS server: tower-scratch-nfs.yml
-
-
Apply the appropriate PVC configuration to your cluster:
kubectl apply -f <PVC_YAML_FILE>
Seqera compute environment
After you've prepared your Kubernetes cluster for Seqera integration, create a compute environment:
Create a Seqera Kubernetes compute environment
-
In a workspace, select Compute environments > New environment.
-
Enter a descriptive name for this environment, e.g., K8s cluster.
-
Select Kubernetes as the target platform.
-
From the Credentials drop-down, select existing Kubernetes credentials, or select + to add new credentials. If you choose to use existing credentials, skip to step 7.
You can create multiple credentials in your Seqera workspace. See Credentials.
-
Enter a name, such as K8s Credentials.
-
Select either the Service Account Token or X509 Client Certs tab:
-
To authenticate using a Kubernetes service account, enter your Service account token. Obtain the token with the following command:
kubectl describe secret <SERVICE-ACCOUNT-TOKEN-NAME> | grep -E '^token' | cut -f2 -d':' | tr -d '\t '
Replace
<SERVICE-ACCOUNT-TOKEN-NAME>
with the name of the service account token created in the cluster preparation instructions (default:tower-launcher-token
). -
To authenticate using an X509 client certificate, paste the contents of your certificate and key file (including the
-----BEGIN...-----
and-----END...-----
lines) in the Client certificate and Client Key fields respectively. See the Kubernetes documentation for instructions to generate your client certificate and key.
-
-
Enter the Control plane URL, obtained with this command:
kubectl cluster-info
It can also be found in your
~/.kube/config
file under theserver
field corresponding to your cluster. -
Specify the SSL certificate to authenticate your connection.
Find the certificate data in your
~/.kube/config
file. It is thecertificate-authority-data
field corresponding to your cluster. -
Specify the Namespace created in the cluster preparation instructions, which is tower-nf by default.
-
Specify the Head service account created in the cluster preparation instructions, which is tower-launcher-sa by default.
-
Specify the Storage claim created in the cluster preparation instructions, which serves as a scratch filesystem for Nextflow pipelines. The storage claim is called tower-scratch in each of the provided examples.
-
Apply Resource labels to the cloud resources consumed by this compute environment. Workspace default resource labels are prefilled.
-
Expand Staging options to include:
- Optional pre- or post-run Bash scripts that execute before or after the Nextflow pipeline execution in your environment.
- Global Nextflow configuration settings for all pipeline runs launched with this compute environment. Values defined here are pre-filled in the Nextflow config file field in the pipeline launch form. These values can be overridden during pipeline launch.
Configuration settings in this field override the same values in the pipeline repository
nextflow.config
file. See Nextflow config file for more information on configuration priority. -
You can use the Environment variables option to specify custom environment variables for the Head job and/or Compute jobs.
-
Configure any advanced options described below, as needed.
-
Select Create to finalize the compute environment setup.
See Launch pipelines to start executing workflows in your Kubernetes compute environment.
Advanced options
Seqera Platform compute environments for Kubernetes include advanced options for storage and work directory paths, resource allocation, and pod customization.
Seqera Kubernetes advanced options
- The Storage mount path is the file system path where the Storage claim is mounted (default:
/scratch
). - The Work directory is the file system path used as a working directory by Nextflow pipelines. It must be the storage mount path (default) or a subdirectory of it.
- The Compute service account is the service account used by Nextflow to submit tasks (default: the
default
account in the given namespace). - The Pod cleanup policy determines when to delete terminated pods.
- Use Custom head pod specs to provide custom options for the Nextflow workflow pod (
nodeSelector
,affinity
, etc). For example:
spec:
nodeSelector:
disktype: ssd
- Use Custom service pod specs to provide custom options for the compute environment pod. See above for an example.
- Use Head Job CPUs and Head Job memory to specify the hardware resources allocated to the Nextflow workflow pod.