Skip to content

Commit

Permalink
🛠 NEW: how to bake an ortelius pi cosmetics
Browse files Browse the repository at this point in the history
  • Loading branch information
sachajw committed Oct 25, 2024
1 parent b32a4c4 commit 3ff7f67
Show file tree
Hide file tree
Showing 2 changed files with 17 additions and 0 deletions.
17 changes: 17 additions & 0 deletions content/en/blog/contributors/how-to-bake-an-ortelius-pi-part03.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,7 @@ author: Sacha Wharton
- [NFS Architecture](#nfs-architecture)
- [NFS Observations](#nfs-observations)
- [NFS Netdata Observations](#nfs-netdata-observations)
- [Update](#update)
- [Mount Permissions](#mount-permissions)
- [Fluxcd is doing the following under the hood | CSI NFS Driver](#fluxcd-is-doing-the-following-under-the-hood--csi-nfs-driver)
- [Kubernetes check | CSI NFS Driver](#kubernetes-check--csi-nfs-driver)
Expand Down Expand Up @@ -607,6 +608,19 @@ I tried a different approach for the Netdata parent I moved away from the CSI NF

My configuration for Netdata persistence looks like the following now which I thought had fixed the issue but then after a period of time the dreaded `chown` error returned. In the below content I have left the CSI NFS Driver configuration for Netdata to show both methods.

#### Update

This has finally been fixed with the lucky `777` permissions. I also suggested to Netdata to allow us to force the permissions using something like this in the Netdata Helm Chart. I made an issue for Netdata [here](https://github.com/netdata/helmchart/issues/449)

```yaml
volumePermissions:
## @param netdata.volumePermissions.enabled Enable init container that changes the owner and group of the persistent volume(s) mountpoint to `runAsUser:fsGroup`
##
enabled: true
## @param netdata.volumePermissions.image.tag Init container volume-permissions image tag (immutable tags are recommended)
```


```yaml
# netdata-manifest.yaml which is stored in the Gimlet directory manifests
apiVersion: storage.k8s.io/v1
Expand Down Expand Up @@ -669,6 +683,9 @@ spec:
- **Full access only for the owner (rwx------).**
- The owner has full permissions (read, write, execute), and no permissions are granted to group or others. This is useful for private data that should not be accessible to others.




Here is what my persistent volumes, persistent volume claims and storage classes look like now:

```shell
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 3ff7f67

Please sign in to comment.