ScalarDB Server is now deprecated. Please use ScalarDB Cluster instead.
This document explains the requirements and recommendations for creating an Amazon Elastic Kubernetes Service (EKS) cluster for ScalarDB Server deployment. For details on how to deploy ScalarDB Server on an EKS cluster, see Deploy ScalarDB Server on Amazon EKS.
Before you begin
You must create an EKS cluster based on the following requirements, recommendations, and your project’s requirements. For specific details about how to create an EKS cluster, see the official Amazon documentation at Creating an Amazon EKS cluster.
When deploying ScalarDB Server, you must:
- Create the EKS cluster by using Kubernetes version 1.21 or higher.
- Configure the EKS cluster based on the version of Kubernetes and your project’s requirements.
The following are some recommendations for deploying ScalarDB Server. These recommendations are not required, so you can choose whether or not to apply these recommendations based on your needs.
Create at least three worker nodes and three pods
To ensure that the EKS cluster has high availability, you should use at least three worker nodes and deploy at least three pods spread across the worker nodes. You can see the sample configurations of
podAntiAffinity for making three pods spread across the worker nodes.
If you place the worker nodes in different availability zones (AZs), you can withstand an AZ failure.
Use 4vCPU / 8GB memory nodes for the worker node in the ScalarDB Server node group
From the perspective of commercial licenses, resources for one pod running ScalarDB Server are limited to 2vCPU / 4GB memory. In addition to the ScalarDB Server pod, Kubernetes could deploy some of the following components to each worker node:
- ScalarDB Server pod (2vCPU / 4GB)
- Envoy proxy
- Your application pods (if you choose to run your application’s pods on the same worker node)
- Monitoring components (if you deploy monitoring components such as
- Kubernetes components
With this in mind, you should use a worker node that has at least 4vCPU / 8GB memory resources and use at least three worker nodes for availability, as mentioned in Create at least three worker nodes and three pods.
However, three nodes with at least 4vCPU / 8GB memory resources per node is the minimum for production environment. You should also consider the resources of the EKS cluster (for example, the number of worker nodes, vCPUs per node, memory per node, ScalarDB Server pods, and pods for your application), which depend on your system’s workload. In addition, if you plan to scale the pods automatically by using some features like Horizontal Pod Autoscaling (HPA), you should consider the maximum number of pods on the worker node when deciding the worker node resources.
Configure Cluster Autoscaler in EKS
If you want to scale ScalarDB Server pods automatically by using Horizontal Pod Autoscaler, you should configure Cluster Autoscaler in EKS too. For details, see the official Amazon documentation at Autoscaling.
In addition, if you configure Cluster Autoscaler, you should create a subnet in an Amazon Virtual Private Cloud (VPC) for EKS with the prefix (e.g.,
/24) to ensure a sufficient number of IPs exist so that EKS can work without network issues after scaling.
Create the EKS cluster on a private network
You should create the EKS cluster on a private network (private subnet in a VPC) since ScalarDB Server does not provide any services to users directly via internet access. We recommend accessing ScalarDB Server via a private network from your applications.
Restrict connections by using some security features based on your requirements
The connections (ports) that ScalarDB Server uses by default are as follows:
- ScalarDB Server
- 60051/TCP (accepts requests from a client)
- 8080/TCP (accepts monitoring requests)
- Scalar Envoy (used with ScalarDB Server)
- 60051/TCP (load balancing for ScalarDB Server)
- 9001/TCP (accepts monitoring requests for Scalar Envoy itself)
- If you change the default listening port for ScalarDB Server in the configuration file (
database.properties), you must allow connections by using the port that you configured.
- You must also allow the connections that EKS uses itself. For more details about Amazon EKS security group requirements, refer to Amazon EKS security group requirements and considerations.