Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mount Bucket on the Kubernetes pod #328

Closed
andreyvelich opened this issue May 29, 2019 · 3 comments
Closed

Mount Bucket on the Kubernetes pod #328

andreyvelich opened this issue May 29, 2019 · 3 comments

Comments

@andreyvelich
Copy link

I want to mount my Bucket on the Kubernetes container using gcsfuse.
I followed this example https://github.com/maciekrb/gcs-fuse-sample and it works fine, but I have a question.
Is it possible to mount my bucket on the Kubernetes container without running my container in privileged mode ?

Probably, mount it, when I am building my Docker image.

@wuservices
Copy link

moby/moby#9448 (comment) shows with Docker you can get away with --device /dev/fuse --cap-add SYS_ADMIN instead of --privileged. However, there seems to be no equivalent of --device for right now for Kubernetes, as people are looking for a feature to do just that to use with /dev/fuse in kubernetes/kubernetes#5607 (comment).

@pre
Copy link

pre commented Jan 23, 2021

Here’s how to mount a FUSE volume /dev/fuse in Kubernetes without privileged: true: kubernetes/kubernetes#7890 (comment)

@avidullu
Copy link
Contributor

Thanks @pre for the pointer to the k8s issue. From that bug I also found this link which has detailed instructions from your post including some minor fixes.
This issue does not seem related to gcsfuse per se so will close this out from here.
Please open a new bug/reopen this if we can provide any further assistance.
Appreciate your help in providing such useful resources to the members of the community!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants