k8s-ecr-login-renew
local-path-provisioner
k8s-ecr-login-renew | local-path-provisioner | |
---|---|---|
4 | 30 | |
195 | 2,003 | |
- | 2.2% | |
3.8 | 6.1 | |
16 days ago | 3 days ago | |
Go | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
k8s-ecr-login-renew
-
EKS needing an updated refresh token with ECR
I've done some googling and found some solutions like this https://github.com/nabsul/k8s-ecr-login-renew which seems to indicate that others have had the same issue.
- Interesting tools?
-
Replacing YAML with TypeScript
As for challenges I foresee: In this example, the applications are defined generically such that you could use them even if you wanted to skip Kubernetes altogether. However, I have two Kubernetes-specific applications that I run in the cluster: KCert and ecr-login-renewal. These applications require special Kubernetes configurations around service accounts and permissions. I'm not yet sure how to cleanly encode those.
- Image pull secret controller for AWS ECR
local-path-provisioner
-
Deploy Ghost with MySQL DB replication using helm chart
Deploy local-path-provisioner storage class but it does not support readwritemany so for high availability of your Kubernetes cluster better to use longhorn
-
lvp: Local Volume CSI Provisioner -- Dynamic PV Provisioning for your Home Cluster
I use this one. I'm waiting for the day it's combined with syncthing to sync across all nodes. https://github.com/rancher/local-path-provisioner
-
issues with pv retaining data on local-path SC
So I have this single node k3s cluster. k3s uses local-path (https://github.com/rancher/local-path-provisioner) as default SC that allows one to create dynamic volumes using nodes local storage.
-
How to format drives for local persistent volumes
Just create 1 single partition and format it with whatevery filesystem you like. And then use ranchers local-path-provisioner which will create a folder per PV (k3s has this integrated by default).
-
Persisting data in a dynamic volume?
Tinkering locally with local path provisioner (https://github.com/rancher/local-path-provisioner), I find that I can delete and re-create the pod, and the data persists on disk. However, if I delete the PVC, when I recreate the PVC, a new directory on disk is created.
-
Issues with "victoria-metrics-k8s-stack", monitoring k8s targets
It is better to use https://github.com/rancher/local-path-provisioner (or similar) for this case which will do PVC on local directories because manually linking PV<>PVC will not work.
-
single node k8s on nuc - homelab/prod - storage question
Since you only have one physical node anyway, I would just make the cluster a single-node cluster (1 VM) and use local storage on that VM. I’m biased though because this is what I do (I run K3s and use local path provisioner).
-
Using local disks for both K8s workloads, and exporting via SMB?
Rancher's Local Path Provisioner - From reading, seems to just use HostPath or Local PVs under the hood, but adds dynamic provisoning
-
Kubernetes: How to Persistent Storage
With any of those tools, you'd implement a network storage on top of a network storage. I would go with mouting few volumes per node +local storage like (https://github.com/rancher/local-path-provisioner).
- There doesn't seam to be any good distributed block storage for Kubernetes
What are some alternatives?
k8s-yaml-alternative - An alternative to yaml files for Kubernetes
sig-storage-local-static-provisioner - Static provisioner of local volumes
aws-ecr-image-pull-secret-controller - Custom controller for Kubernetes which automatically renews image pull secrets for AWS ECR
topolvm - Capacity-aware CSI plugin for Kubernetes
Flux - Successor: https://github.com/fluxcd/flux2
csi-lib-utils - Common code for Kubernetes CSI sidecar containers (e.g. `external-attacher`, `external-provisioner`, etc.)
awesome-k8s-resources - A curated list of awesome Kubernetes tools and resources.
kind - Kubernetes IN Docker - local clusters for testing Kubernetes
rook - Storage Orchestration for Kubernetes
nfs-ganesha-server-and-external-provisioner - NFS Ganesha Server and Volume Provisioner.
kcert - KCert: A Simple Let's Encrypt Manager for Kubernetes
csi-driver-nfs - This driver allows Kubernetes to access NFS server on Linux node.