# Patterns to ignore when building packages.
# This supports shell glob matching, relative path matching, and
# negation (prefixed with !). Only one pattern per line.
.DS_Store
# Common VCS dirs
.git/
.gitignore
.bzr/
.bzrignore
.hg/
.hgignore
.svn/
# Common backup files
*.swp
*.bak
*.tmp
*.orig
*~
# Various IDEs
.project
.idea/
*.tmproj
.vscode/
execute the command below to valid the storage class has been installed
kubectl get storageclass
and the command below to set the default storage class
kubectl patch storageclass StorageClassName -p '{"metadata":{"annotations":{"storageclass.kubernetes.io/is-default-class":"false"}}}'
rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:name: nfs-client-provisioner
# replace with namespace where provisioner is deployednamespace: kube-system
---kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: nfs-client-provisioner-runner
rules:-apiGroups:[""]resources:["persistentvolumes"]verbs:["get","list","watch","create","delete"]-apiGroups:[""]resources:["persistentvolumeclaims"]verbs:["get","list","watch","update"]-apiGroups:["storage.k8s.io"]resources:["storageclasses"]verbs:["get","list","watch"]-apiGroups:[""]resources:["events"]verbs:["create","update","patch"]---kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: run-nfs-client-provisioner
subjects:-kind: ServiceAccount
name: nfs-client-provisioner
# replace with namespace where provisioner is deployednamespace: kube-system
roleRef:kind: ClusterRole
name: nfs-client-provisioner-runner
apiGroup: rbac.authorization.k8s.io
---kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: leader-locking-nfs-client-provisioner
# replace with namespace where provisioner is deployednamespace: kube-system
rules:-apiGroups:[""]resources:["endpoints"]verbs:["get","list","watch","create","update","patch"]---kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:name: leader-locking-nfs-client-provisioner
# replace with namespace where provisioner is deployednamespace: kube-system
subjects:-kind: ServiceAccount
name: nfs-client-provisioner
# replace with namespace where provisioner is deployednamespace: kube-system
roleRef:kind: Role
name: leader-locking-nfs-client-provisioner
apiGroup: rbac.authorization.k8s.io