网站首页 返回列表 像“草根”一样,紧贴着地面,低调的存在,冬去春来,枯荣无恙。 k8s创建nfs类型的storageclass 24-09-23 11:06:12 曹大卫 51 ```shell ```bash ###nfs-client.yaml apiVersion: storage.k8s.io/v1 kind: StorageClass metadata: name: nfs-client namespace: kube-system annotations: storageclass.kubernetes.io/is-default-class: "true" provisioner: k8s-sigs.io/nfs-subdir-external-provisioner parameters: archiveOnDelete: "true" reclaimPolicy: Delete volumeBindingMode: Immediate allowVolumeExpansion: true --- apiVersion: apps/v1 kind: Deployment metadata: name: nfs-client-provisioner labels: app: nfs-client-provisioner namespace: kube-system spec: replicas: 1 strategy: type: Recreate selector: matchLabels: app: nfs-client-provisioner template: metadata: labels: app: nfs-client-provisioner spec: serviceAccountName: nfs-client-provisioner containers: - name: nfs-client-provisioner image: harbor-test.cartechfin.com/bitnami/nfs-subdir-external-provisioner:v4.0.2 volumeMounts: - name: nfs-client-root mountPath: /persistentvolumes env: - name: PROVISIONER_NAME value: k8s-sigs.io/nfs-subdir-external-provisioner - name: NFS_SERVER value: 172.17.100.190 - name: NFS_PATH value: /data/nfs_kubesphere volumes: - name: nfs-client-root nfs: server: 172.17.100.190 path: /data/nfs_kubesphere --- apiVersion: v1 kind: ServiceAccount metadata: name: nfs-client-provisioner namespace: kube-system --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: nfs-client-provisioner-runner namespace: kube-system rules: - apiGroups: [""] resources: ["nodes"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["persistentvolumes"] verbs: ["get", "list", "watch", "create", "delete"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["get", "list", "watch", "update"] - apiGroups: ["storage.k8s.io"] resources: ["storageclasses"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["events"] verbs: ["create", "update", "patch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: run-nfs-client-provisioner namespace: kube-system subjects: - kind: ServiceAccount name: nfs-client-provisioner namespace: kube-system roleRef: kind: ClusterRole name: nfs-client-provisioner-runner apiGroup: rbac.authorization.k8s.io --- kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: leader-locking-nfs-client-provisioner namespace: kube-system rules: - apiGroups: [""] resources: ["endpoints"] verbs: ["get", "list", "watch", "create", "update", "patch"] --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: leader-locking-nfs-client-provisioner namespace: kube-system subjects: - kind: ServiceAccount name: nfs-client-provisioner namespace: kube-system roleRef: kind: Role name: leader-locking-nfs-client-provisioner apiGroup: rbac.authorization.k8s.io ``` ``` 关键字词[k8s] 分享到: 上一篇:centos7配置sap环境 下一篇:while循环截取多个变量 如需留言,请 登录,没有账号?请 注册 0 条评论 0 人参与 最新文章 centos7 rsyslog v8.24.0-34.el7 版本bug efk中将宿主机ip地址采集到日志输出中 企业微信群机器人@成员的方式 promethues operator修改告警规则 centos7配置阿里云yum源 pt-duplicate-key-checker 工具检测mysql是否有重复索引 阿里云ecs扩容磁盘 es启用 tcp和http的ssl后报错 点击排行 alertmanager按标签分发告警到接收者 calico三种网络模式 promethues operator修改告警规则 企业微信群机器人@成员的方式 centos7配置阿里云yum源 最新评论 友情链接
0 条评论 0 人参与