apiVersion: storage.k8s.io/v1 kind: StorageClass metadata: name: nfs-hdd annotations: storageclass.kubernetes.io/is-default-class: "true" provisioner: nfs-hdd allowVolumeExpansion: True parameters: archiveOnDelete: "true" --- apiVersion: apps/v1 kind: Deployment metadata: name: nfs-hdd labels: app: nfs-hdd namespace: default spec: replicas: 1 strategy: type: Recreate selector: matchLabels: app: nfs-hdd template: metadata: labels: app: nfs-hdd spec: serviceAccountName: nfs-hdd containers: - name: nfs-hdd #image: registry.cn-hangzhou.aliyuncs.com/lfy_k8s_images/nfs-subdir-external-provisioner:v4.0.2 image: registry.cn-hangzhou.aliyuncs.com/zhengyu1992/nfs-subdir-external-provisioner:v4.0.2 #image: harbor.haidaifu.net/base/nfs-subdir-external-provisioner:v4.0.2 # resources: # limits: # cpu: 10m # requests: # cpu: 10m volumeMounts: - name: nfs-hdd-root mountPath: /persistentvolumes env: - name: PROVISIONER_NAME value: nfs-hdd - name: NFS_SERVER value: 192.168.120.239 - name: NFS_PATH value: /data/hdd volumes: - name: nfs-hdd-root nfs: server: 192.168.120.239 path: /data/hdd --- apiVersion: v1 kind: ServiceAccount metadata: name: nfs-hdd namespace: default --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: nfs-hdd-runner rules: - apiGroups: [""] resources: ["nodes"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["persistentvolumes"] verbs: ["get", "list", "watch", "create", "delete"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["get", "list", "watch", "update"] - apiGroups: ["storage.k8s.io"] resources: ["storageclasses"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["events"] verbs: ["create", "update", "patch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: nfs-hdd-runner-binding subjects: - kind: ServiceAccount name: nfs-hdd namespace: default roleRef: kind: ClusterRole name: nfs-hdd-runner apiGroup: rbac.authorization.k8s.io --- kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: name: leader-locking-nfs-hdd namespace: default rules: - apiGroups: [""] resources: ["endpoints"] verbs: ["get", "list", "watch", "create", "update", "patch"] --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: leader-locking-nfs-hdd namespace: default subjects: - kind: ServiceAccount name: nfs-hdd namespace: default roleRef: kind: Role name: leader-locking-nfs-hdd apiGroup: rbac.authorization.k8s.io