cat nfs-sc.yamlapiVersion: v1kind: ServiceAccount #服务的账号metadata: name: nfs-client-provisioner namespace: kube-system---kind: ClusterRole #集群角色(不受namespace控制) apiVersion: rbac.authorization.k8s.io/v1metadata: name: nfs-client-provisioner-runnerrules: #赋予class角色权限(不然会报错) - apiGroups: [""] resources: ["persistentvolumes"] verbs: ["get", "list", "watch", "create", "delete"] - apiGroups: [""] resources: ["persistentvolumeclaims"] verbs: ["get", "list", "watch", "update"] - apiGroups: ["storage.k8s.io"] resources: ["storageclasses"] verbs: ["get", "list", "watch"] - apiGroups: [""] resources: ["events"] verbs: ["list", "watch", "create", "update", "patch"] - apiGroups: [""] resources: ["endpoints"] verbs: ["get", "list", "watch", "create", "update", "patch"]---kind: ClusterRoleBinding #关联apiVersion: rbac.authorization.k8s.io/v1metadata: name: run-nfs-client-provisionersubjects: - kind: ServiceAccount name: nfs-client-provisioner namespace: kube-system roleRef: kind: ClusterRole name: nfs-client-provisioner-runner apiGroup: rbac.authorization.k8s.io---kind: DeploymentapiVersion: apps/v1metadata: name: nfs-provisioner-01 namespace: kube-systemspec: replicas: 1 strategy: type: Recreate selector: matchLabels: app: nfs-provisioner-01 template: metadata: labels: app: nfs-provisioner-01 spec: serviceAccountName: nfs-client-provisioner containers: - name: nfs-client-provisioner image: jmgao1983/nfs-client-provisioner:latest imagePullPolicy: IfNotPresent volumeMounts: - name: nfs-client-root mountPath: /persistentvolumes env: - name: PROVISIONER_NAME value: nfs-provisioner-01 # 此处供应者名字供storageclass调用 - name: NFS_SERVER value: 10.0.1.201 # 填入NFS的地址 - name: NFS_PATH value: /nfs_dir # 填入NFS挂载的目录 volumes: - name: nfs-client-root nfs: server: 10.0.1.201 # 填入NFS的地址 path: /nfs_dir # 填入NFS挂载的目录---apiVersion: storage.k8s.io/v1kind: StorageClassmetadata: name: nfs-bogeprovisioner: nfs-provisioner-01# Supported policies: Delete、 Retain , default is DeletereclaimPolicy: Retain