--- apiVersion: v1 kind: Namespace metadata: name: nfs-storage labels: name: nfs-storage security.openshift.io/scc.podSecurityLabelSync: 'false' kubernetes.io/metadata.name: nfs-storage pod-security.kubernetes.io/audit: privileged pod-security.kubernetes.io/audit-version: v1.24 pod-security.kubernetes.io/enforce: privileged pod-security.kubernetes.io/enforce-version: v1.24 pod-security.kubernetes.io/warn: privileged pod-security.kubernetes.io/warn-version: v1.24 --- allowHostDirVolumePlugin: true allowHostIPC: false allowHostNetwork: false allowHostPID: false allowHostPorts: false allowPrivilegeEscalation: true allowPrivilegedContainer: false allowedCapabilities: null apiVersion: security.openshift.io/v1 defaultAddCapabilities: null fsGroup: type: RunAsAny groups: [] kind: SecurityContextConstraints metadata: annotations: kubernetes.io/description: 'hostmount-anyuid provides all the features of the restricted SCC but allows host mounts and any UID by a pod. This is primarily used by the persistent volume recycler. WARNING: this SCC allows host file system access as any UID, including UID 0. Grant with caution.' name: nfs-storage-hostmount-anyuid readOnlyRootFilesystem: false requiredDropCapabilities: - MKNOD runAsUser: type: RunAsAny seLinuxContext: type: MustRunAs supplementalGroups: type: RunAsAny users: - system:serviceaccount:nfs-storage:nfs-client-provisioner volumes: - configMap - downwardAPI - emptyDir - hostPath - nfs - persistentVolumeClaim - projected - secret --- apiVersion: storage.k8s.io/v1 kind: StorageClass metadata: labels: app: nfs-client-provisioner name: efs-nfs-client annotations: storageclass.kubernetes.io/is-default-class: "false" provisioner: k8s-sigs.io/nfs-client-provisioner allowVolumeExpansion: true reclaimPolicy: Delete parameters: archiveOnDelete: "false" --- apiVersion: v1 kind: ServiceAccount metadata: labels: app: nfs-client-provisioner name: nfs-client-provisioner namespace: nfs-storage --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: labels: app: nfs-client-provisioner name: nfs-client-provisioner-runner rules: - apiGroups: [""] resources: ["persistentvolumes"] verbs: ["get", "list", "watch", "create", "delete"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["get", "list", "watch", "update"] - apiGroups: ["storage.k8s.io"] resources: ["storageclasses"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["events"] verbs: ["create", "update", "patch"] --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: labels: app: nfs-client-provisioner name: run-nfs-client-provisioner subjects: - kind: ServiceAccount name: nfs-client-provisioner namespace: nfs-storage roleRef: kind: ClusterRole name: nfs-client-provisioner-runner apiGroup: rbac.authorization.k8s.io --- kind: Role apiVersion: rbac.authorization.k8s.io/v1 metadata: labels: app: nfs-client-provisioner name: leader-locking-nfs-client-provisioner namespace: nfs-storage rules: - apiGroups: [""] resources: ["endpoints"] verbs: ["get", "list", "watch", "create", "update", "patch"] --- kind: RoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: labels: app: nfs-client-provisioner name: leader-locking-nfs-client-provisioner namespace: nfs-storage subjects: - kind: ServiceAccount name: nfs-client-provisioner namespace: nfs-storage roleRef: kind: Role name: leader-locking-nfs-client-provisioner apiGroup: rbac.authorization.k8s.io --- apiVersion: apps/v1 kind: Deployment metadata: name: nfs-client-provisioner namespace: nfs-storage labels: app: nfs-client-provisioner spec: replicas: 1 strategy: type: Recreate selector: matchLabels: app: nfs-client-provisioner template: metadata: annotations: labels: app: nfs-client-provisioner spec: serviceAccountName: nfs-client-provisioner containers: - name: nfs-client-provisioner image: k8s.gcr.io/sig-storage/nfs-subdir-external-provisioner:v4.0.2 imagePullPolicy: IfNotPresent volumeMounts: - name: nfs-client-root mountPath: /persistentvolumes env: - name: PROVISIONER_NAME value: "k8s-sigs.io/nfs-client-provisioner" - name: NFS_SERVER value: "EFS_ID.efs.us-east-2.amazonaws.com" - name: NFS_PATH value: "/" nodeSelector: node-role.kubernetes.io/master: "" tolerations: - key: node-role.kubernetes.io/master operator: Exists volumes: - name: nfs-client-root nfs: server: "EFS_ID.efs.us-east-2.amazonaws.com" path: "/"