When pod security policies are used, the default restricted policy does not allow root permissions. Even when a more permissive policy is assigned to the service account, we need to inform k8s that we need root permissions so that the correct policy can be selected. Signed-off-by: Aaron Spettl <aaron@spettl.de>
62 lines
1.4 KiB
YAML
62 lines
1.4 KiB
YAML
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
labels:
|
|
app: longhorn-ui
|
|
name: longhorn-ui
|
|
namespace: {{ .Release.Namespace }}
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
app: longhorn-ui
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: longhorn-ui
|
|
spec:
|
|
containers:
|
|
- name: longhorn-ui
|
|
image: "{{ .Values.image.longhorn.ui }}:{{ .Values.image.longhorn.uiTag }}"
|
|
imagePullPolicy: Always
|
|
securityContext:
|
|
runAsUser: 0
|
|
ports:
|
|
- containerPort: 8000
|
|
name: http
|
|
env:
|
|
- name: LONGHORN_MANAGER_IP
|
|
value: "http://longhorn-backend:9500"
|
|
{{- if .Values.defaultSettings.registrySecret }}
|
|
imagePullSecrets:
|
|
- name: {{ .Values.defaultSettings.registrySecret }}
|
|
{{- end }}
|
|
---
|
|
kind: Service
|
|
apiVersion: v1
|
|
metadata:
|
|
labels:
|
|
app: longhorn-ui
|
|
{{- if eq .Values.service.ui.type "Rancher-Proxy" }}
|
|
kubernetes.io/cluster-service: "true"
|
|
{{- end }}
|
|
name: longhorn-frontend
|
|
namespace: {{ .Release.Namespace }}
|
|
spec:
|
|
{{- if eq .Values.service.ui.type "Rancher-Proxy" }}
|
|
type: ClusterIP
|
|
{{- else }}
|
|
type: {{ .Values.service.ui.type }}
|
|
{{- end }}
|
|
selector:
|
|
app: longhorn-ui
|
|
ports:
|
|
- name: http
|
|
port: 80
|
|
targetPort: http
|
|
{{- if .Values.service.ui.nodePort }}
|
|
nodePort: {{ .Values.service.ui.nodePort }}
|
|
{{- else }}
|
|
nodePort: null
|
|
{{- end }}
|