text stringlengths 0 59.1k |
|---|
``` |
$ kubectl create secret generic ceph-secret-admin --from-literal=key='AQBfxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx==' --namespace=kube-system --type=kubernetes.io/rbd |
``` |
Now modify `examples/persistent-volume-provisioning/rbd/rbd-storage-class.yaml` to reflect your environment, particularly the `monitors` field. We are now ready to create our RBD Storage Class: |
``` |
$ kubectl create -f examples/persistent-volume-provisioning/rbd/rbd-storage-class.yaml |
``` |
The kube-controller-manager is now able to provision storage, however we still need to be able to map the RBD volume to a node. Mapping should be done with a non-privileged key, if you have existing users you can get all keys by running `ceph auth list` on your Ceph cluster with the admin key. For this example we will ... |
``` |
$ ceph osd pool create kube 512 |
$ ceph auth get-or-create client.kube mon 'allow r' osd 'allow rwx pool=kube' |
[client.kube] |
key = AQBQyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy== |
``` |
This key will be made into a secret, just like the admin secret. However this user secret will need to be created in every namespace where you intend to consume RBD volumes provisioned in our example storage class. Let's create a namespace called `myns`, and create the user secret in that namespace. |
``` |
kubectl create namespace myns |
kubectl create secret generic ceph-secret-user --from-literal=key='AQBQyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy==' --namespace=myns --type=kubernetes.io/rbd |
``` |
You are now ready to provision and use RBD storage. |
##### Usage |
With the storageclass configured, let's create a PVC in our example namespace, `myns`: |
``` |
$ kubectl create -f examples/persistent-volume-provisioning/claim1.json --namespace=myns |
``` |
Eventually the PVC creation will result in a PV and RBD volume to match: |
``` |
$ kubectl describe pvc --namespace=myns |
Name: claim1 |
Namespace: myns |
Status: Bound |
Volume: pvc-1cfa23b3-664b-11e6-9eb9-90b11c09520d |
Labels: <none> |
Capacity: 3Gi |
Access Modes: RWO |
No events. |
$ kubectl describe pv |
Name: pvc-1cfa23b3-664b-11e6-9eb9-90b11c09520d |
Labels: <none> |
Status: Bound |
Claim: myns/claim1 |
Reclaim Policy: Delete |
Access Modes: RWO |
Capacity: 3Gi |
Message: |
Source: |
Type: RBD (a Rados Block Device mount on the host that shares a pod's lifetime) |
CephMonitors: [127.0.0.1:6789] |
RBDImage: kubernetes-dynamic-pvc-1cfb1862-664b-11e6-9a5d-90b11c09520d |
FSType: |
RBDPool: kube |
RadosUser: kube |
Keyring: /etc/ceph/keyring |
SecretRef: &{ceph-secret-user} |
ReadOnly: false |
No events. |
``` |
With our storage provisioned, we can now create a Pod to use the PVC: |
``` |
$ kubectl create -f examples/persistent-volume-provisioning/rbd/pod.yaml --namespace=myns |
``` |
Now our pod has an RBD mount! |
``` |
$ export PODNAME=`kubectl get pod --selector='role=server' --namespace=myns --output=template --template="{{with index .items 0}}{{.metadata.name}}{{end}}"` |
$ kubectl exec -it $PODNAME --namespace=myns -- df -h | grep rbd |
/dev/rbd1 2.9G 4.5M 2.8G 1% /var/lib/www/html |
``` |
<|endoftext|> |
# source: k8s_examples/_archived/persistent-volume-provisioning/gce-pd.yaml type: yaml |
kind: StorageClass |
apiVersion: storage.k8s.io/v1 |
metadata: |
name: slow |
provisioner: kubernetes.io/gce-pd |
parameters: |
type: pd-standard |
zone: us-central1-a |
<|endoftext|> |
# source: k8s_examples/_archived/persistent-volume-provisioning/glusterfs/glusterfs-storageclass.yaml type: yaml |
apiVersion: storage.k8s.io/v1 |
kind: StorageClass |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.