Project Description

The SUSE Enterprise Storage team has embarked on a new open source project: Aquarium.

Aquarium is our take on an opinionated storage appliance. It is designed to take the fundamentals of Ceph, hide everything that makes it complicated to use, and develop an easy to use, rock solid storage appliance. The project started development in January, and has become a passion project for the team. The project is split into two clearly defined work streams: Gravel (backend) and Glass (frontend).

Currently, we see Ceph as being too complex to use for the average user. This complexity stems from Ceph's flexibility that supports a huge matrix of use cases and the effects this has on available capacity, performance and thus availability.

All current management tooling deploys Ceph bottom-up, i.e. the user must specify deployment patterns at the daemon level, create pools and crushmaps (which encode various availability and performance requirements) and only then can a user deploy their workload.

We are exploring if other user interface abstractions are practical and ultimately an improvement. The goal should be simplification where a user is not required to configure individual daemons or disk layouts, but can provide a high level specification of what they want (in terms of availability, usable capacity, ...?) and a piece of code translates that to a deployment layout. Whether this deployment layout can be set up on the current hardware can be determined by software and the user can be provided with the feedback (be it positive or negative).

Who can be involved?

Literally, anyone. We're looking for people who are interested in hacking on new projects, or want to learn something new. We're also more than happy to teach you about storage if you come from a different knowledge background.

If you consider yourself to be non-technical, but interested in how communities work - we're also looking for people to get involved with the other sides of community management that are not related to code only.

Goal for this Hackweek

We are currently in Phase 2 (Milestone 2) of the project where we are actively developing how to deploy a multi-node setup. Our goals:

  • Testing deployment
  • Bug finding/squashing
  • And if you like the project, active development! We have a series of issues related to multi-node deployment, and anything you can grab is yours.

If you want to get involved in another way:

  • Work on the plans for announcements/communication plan
  • Work with the frontend development on UX/UI
  • Documentation


  • Project repo:
  • We're on slack:
  • Check out our From Zero to Hacking quickstart to help you get off your feet
  • Check out the issue list and our project board
  • Contributing guidelines:

Looking for hackers with the skills:

storage ceph development debug documentation marketing design frontend backend

This project is part of:

Hack Week 20


  • 10 months ago: mgfritch liked this project.
  • 10 months ago: mgfritch joined this project.
  • 10 months ago: LKucharczyk liked this project.
  • 10 months ago: danrodriguez liked this project.
  • 10 months ago: ganghe joined this project.
  • 10 months ago: davidko liked this project.
  • 10 months ago: alexlau joined this project.
  • 10 months ago: fanyadan liked this project.
  • 10 months ago: abonilla joined this project.
  • 10 months ago: tdehler liked this project.
  • All Activity


    Be the first to comment!

    Similar Projects

    multipath-tools: cleaner model for path device information by mwilck

    Project Description

    Obtaining correct inf...

    multipathd: improve asynchronous behavior by mwilck

    Project Description

    multipathd is multi...

    knots by LarsMB


    knots aims to be a multi-node S3...

    k8s-rook-client by haass

    [comment]: # (Please use the project descriptio...

    document/blog commit -> container workflow by hennevogel

    we have fresh containers for every commit for O...

    document/blog commit -> container workflow by hennevogel

    we have fresh containers for every commit for O...

    Design the 2021 Open Build Service sticker by hennevogel


    ![2019 sticker](

    Terraform GUI by kevinklinger

    [comment]: # (Please use the project descriptio...

    Zero Trust vSphere Provisioning from Rancher by wjimenez

    Currently, when Rancher tries to provision a Ku...