Skip to content

Commit f5697dd

Browse files
committed
add weka storageclass for RWX volumes
1 parent bd26262 commit f5697dd

File tree

3 files changed

+44
-0
lines changed

3 files changed

+44
-0
lines changed

csi-wekafsplugin/base/kustomization.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ resources:
77
- core/serviceaccounts/csi-wekafsplugin-node
88
- core/serviceaccounts/csi-wekafsplugin-controller
99
- storage.k8s.io/csidrivers/csi.weka.io
10+
- storage.k8s.io/storageclasses/storageclass-wekafs-dir-api
1011
- security.openshift.io/securitycontextconstraints/csi-wekafsplugin-node-scc
1112
- security.openshift.io/securitycontextconstraints/csi-wekafsplugin-controller-scc
1213
- rbac.authorization.k8s.io/clusterrolebindings/csi-wekafsplugin-node
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
apiVersion: kustomize.config.k8s.io/v1beta1
2+
kind: Kustomization
3+
resources:
4+
- storageclass.yaml
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
apiVersion: storage.k8s.io/v1
2+
kind: StorageClass
3+
metadata:
4+
name: storageclass-wekafs-dir-api
5+
provisioner: csi.weka.io
6+
reclaimPolicy: Delete
7+
volumeBindingMode: Immediate
8+
allowVolumeExpansion: true
9+
parameters:
10+
volumeType: dir/v1
11+
filesystemName: default
12+
# optional parameters setting UID, GID and permissions on volume
13+
# UID of the volume owner, default 0 (root)
14+
# ownerUid: "1000"
15+
16+
# GID of the volume owner, default 0 (root)
17+
# ownerGid: "1000"
18+
19+
# permissions in Unix octal format, default "0750"
20+
# permissions: "0775"
21+
22+
# capacity enforcement mode (either SOFT or HARD)
23+
# - HARD or unspecified: pod will not be able to write above quota
24+
# - SOFT: warning will be issued on Weka cluster, but writing will not be blocked
25+
capacityEnforcement: HARD
26+
# name of the secret that stores API credentials for a cluster
27+
# change the name of secret to match secret of a particular cluster (if you have several Weka clusters)
28+
csi.storage.k8s.io/provisioner-secret-name: &secretName csi-wekafs-api-secret
29+
# change the name of the namespace in which the cluster API credentials
30+
csi.storage.k8s.io/provisioner-secret-namespace: &secretNamespace csi-wekafsplugin
31+
# do not change anything below this line, or set to same parameters as above
32+
csi.storage.k8s.io/controller-publish-secret-name: *secretName
33+
csi.storage.k8s.io/controller-publish-secret-namespace: *secretNamespace
34+
csi.storage.k8s.io/controller-expand-secret-name: *secretName
35+
csi.storage.k8s.io/controller-expand-secret-namespace: *secretNamespace
36+
csi.storage.k8s.io/node-stage-secret-name: *secretName
37+
csi.storage.k8s.io/node-stage-secret-namespace: *secretNamespace
38+
csi.storage.k8s.io/node-publish-secret-name: *secretName
39+
csi.storage.k8s.io/node-publish-secret-namespace: *secretNamespace

0 commit comments

Comments
 (0)