Created
March 2, 2019 14:43
-
-
Save kjelly/97ebc4133b1293eff9135eada974d670 to your computer and use it in GitHub Desktop.
The yaml for creating ceph storage backend in kubernetes cluster.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
# kubectl -n kube-system create -f create-kube-ceph-pbrc.yaml | |
kind: ClusterRole | |
apiVersion: rbac.authorization.k8s.io/v1 | |
metadata: | |
name: rbd-provisioner | |
rules: | |
- apiGroups: [""] | |
resources: ["persistentvolumes"] | |
verbs: ["get", "list", "watch", "create", "delete"] | |
- apiGroups: [""] | |
resources: ["persistentvolumeclaims"] | |
verbs: ["get", "list", "watch", "update"] | |
- apiGroups: ["storage.k8s.io"] | |
resources: ["storageclasses"] | |
verbs: ["get", "list", "watch"] | |
- apiGroups: [""] | |
resources: ["events"] | |
verbs: ["create", "update", "patch"] | |
- apiGroups: [""] | |
resources: ["services"] | |
resourceNames: ["kube-dns","coredns"] | |
verbs: ["list", "get"] | |
- apiGroups: [""] | |
resources: ["endpoints"] | |
verbs: ["get", "list", "watch", "create", "update", "patch"] | |
--- | |
kind: ClusterRoleBinding | |
apiVersion: rbac.authorization.k8s.io/v1 | |
metadata: | |
name: rbd-provisioner | |
subjects: | |
- kind: ServiceAccount | |
name: rbd-provisioner | |
namespace: kube-system | |
roleRef: | |
kind: ClusterRole | |
name: rbd-provisioner | |
apiGroup: rbac.authorization.k8s.io | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
kind: Role | |
metadata: | |
name: rbd-provisioner | |
rules: | |
- apiGroups: [""] | |
resources: ["secrets"] | |
verbs: ["get"] | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: RoleBinding | |
metadata: | |
name: rbd-provisioner | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: Role | |
name: rbd-provisioner | |
subjects: | |
- kind: ServiceAccount | |
name: rbd-provisioner | |
namespace: kube-system | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: rbd-provisioner | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
name: rbd-provisioner | |
spec: | |
replicas: 1 | |
strategy: | |
type: Recreate | |
template: | |
metadata: | |
labels: | |
app: rbd-provisioner | |
spec: | |
containers: | |
- name: rbd-provisioner | |
image: "quay.io/external_storage/rbd-provisioner:latest" | |
env: | |
- name: PROVISIONER_NAME | |
value: ceph.com/rbd | |
serviceAccount: rbd-provisioner | |
--- | |
apiVersion: v1 | |
kind: Secret | |
metadata: | |
name: ceph-secret-admin | |
namespace: kube-system | |
data: | |
# change the value | |
# sudo ceph auth get-key client.admin | base64 | |
key: QVFDYlFubGNVZjVzRkJBQUtKanN1R1FuWUpvNlRweWZQT0E0d3c9PQ== | |
type: kubernetes.io/rbd | |
--- | |
apiVersion: v1 | |
kind: Secret | |
metadata: | |
name: ceph-secret-user | |
namespace: kube-system | |
data: | |
# change the value | |
# sudo ceph auth get-key client.admin | base64 | |
key: QVFDYlFubGNVZjVzRkJBQUtKanN1R1FuWUpvNlRweWZQT0E0d3c9PQ== | |
type: kubernetes.io/rbd | |
--- | |
kind: StorageClass | |
apiVersion: storage.k8s.io/v1 | |
metadata: | |
name: ceph-dynamic | |
annotations: | |
storageclass.beta.kubernetes.io/is-default-class: "true" | |
provisioner: ceph.com/rbd | |
parameters: | |
monitors: 10.20.0.5:6789 # change it if needed. | |
adminId: admin # change it if needed. | |
adminSecretName: ceph-secret-admin # change it if needed. | |
adminSecretNamespace: kube-system # change it if needed. | |
pool: kube # change it if needed. | |
userId: admin # change it if needed. | |
userSecretName: ceph-secret-user # change it if needed. | |
userSecretNamespace: kube-system # change it if needed. | |
imageFormat: "2" | |
imageFeatures: "layering" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment