All posts

What Domino Data Lab Longhorn Actually Does and When to Use It

Your data team’s storage layer should be invisible until it fails. Then it becomes everyone’s problem. That’s the tension Domino Data Lab Longhorn resolves: persistent volume management you can actually trust when workloads scale or crash in spectacular fashion. Domino Data Lab provides the enterprise platform for reproducible, secure data science. Longhorn, an open-source distributed block storage system built for Kubernetes, handles the low-level persistence so notebooks, experiments, and mod

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Your data team’s storage layer should be invisible until it fails. Then it becomes everyone’s problem. That’s the tension Domino Data Lab Longhorn resolves: persistent volume management you can actually trust when workloads scale or crash in spectacular fashion.

Domino Data Lab provides the enterprise platform for reproducible, secure data science. Longhorn, an open-source distributed block storage system built for Kubernetes, handles the low-level persistence so notebooks, experiments, and models survive pod restarts, node drains, and chaotic cluster upgrades. When you combine them, you get a repeatable compute environment with durable storage baked in, rather than bolted on.

In this setup, Domino’s project spaces map to Kubernetes namespaces. Each workspace spins up persistent volumes underneath Longhorn. Longhorn replicates these volumes across nodes, maintaining quorum writes even when infrastructure goes sideways. The workflow is elegant: Domino declares a PVC, Longhorn fulfills it through its engine, and the data scientist keeps coding without worrying which node their data lives on. That’s the kind of problem you only appreciate when you lose a terabyte to a faulty detach.

Security teams appreciate how Longhorn enforces cluster-scoped operations. Use fine-grained RBAC to control who can attach volumes or perform snapshots. Tie these rules to your identity provider—Okta or Azure AD—so volume access reflects real corporate roles. Rotate service account tokens frequently and let your storage credentials expire with human sessions. Domino picks up that security context cleanly through OIDC or AWS IAM integration.

Troubleshooting the pair usually comes down to policy alignment. When Longhorn reports “volume stuck,” check Domino’s pending pod scheduling. Nine times out of ten the storage class doesn’t match the namespace permissions. Fixing it means updating the PVC definition, not hacking around with manual mounts. Keep your storage classes consistent across Domino environments to avoid ghost volumes.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits of this integration:

  • Continuous availability across node failures and rolling upgrades
  • Automatic replication, snapshots, and restores for reproducible research
  • Native compatibility with Kubernetes RBAC and enterprise identity providers
  • Faster experiment reruns and shorter debug loops for data scientists
  • Simplified audit trails for governance and SOC 2 compliance

Engineers love it because it removes friction. Developer velocity improves when storage works like a background service instead of a daily chore. You push experiments without waiting for shared NFS approvals. You debug without begging ops for temporary mounts. The model flows faster from idea to production.

AI workflows depend on this kind of predictability. When an automated agent retrains a model overnight, surviving through node eviction is mandatory. Longhorn ensures your pipeline’s persistence layer never becomes the weak link.

Platforms like hoop.dev turn these same access rules into real-time guardrails. Each identity-based policy becomes an automatic protection around your endpoints. Teams gain storage integrity and API-level security in the same motion, with no extra YAML gymnastics.

How do I connect Domino Data Lab and Longhorn?
Install Longhorn into your Kubernetes cluster before provisioning Domino. Define a StorageClass named “longhorn,” set Domino’s persistent volume claims to use it, and confirm snapshots replicate as expected. Domino automatically discovers the backend once volumes are bound.

Domino Data Lab Longhorn makes infrastructure resilient, predictable, and pleasantly boring—the way stable systems should be.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts