Lightbits CSI Bundle Package

Lightbits supplies an optional supplementary package that contains the configuration files used for Lightbits CSI plugin deployment, as well as some Persistent Volume usage example files.

Downloading the Lightbits CSI Bundle Package

The link to the supplementary package should be similar to:

Bash
Copy

Recent lb-csi bundles:

  • v1.20 - lb-csi-bundle-v1.20.0.15961757728.tar.gz
  • v1.19 - lb-csi-bundle-1.19.0.15002456970.tar.gz
  • v1.18 - lb-csi-bundle-1.18.0.14010542861.tar.gz
  • v1.17 - lb-csi-bundle-1.17.0.125.tar.gz
  • v1.16 - lb-csi-bundle-1.16.0.66.tar.gz
  • v1.15 - lb-csi-bundle-1.15.0.1650.tar.gz
  • v1.14 - lb-csi-bundle-1.14.0.1517.tar.gz
  • v1.13 - lb-csi-bundle-1.13.0.1503.tar.gz

Lightbits CSI Bundle Package Content

The lb-csi-bundle includes the following content:

Bash
Copy
  • k8s: Contains static manifests to deploy lb-csi-plugin on various Kubernetes versions.
  • examples: Provides various workload examples that use lb-csi as persistent storage backend using static manifests.
  • helm/charts: Contain two Helm Charts:
    • – lb-csi-plugin-.tgz: Provides a customizable way to deploy lb-csi-plugin using Helm on various Kubernetes versions using Helm Chart.
    • – lb-csi-workload-examples-.tgz: Provides various workload examples that use lb-csi as persistent storage backend using Helm Chart.
    • – snapshot-controller-3-.tgz: Chart to deploy VolumeSnapshot CRDs and Snapshot-Controller deployment for K8s versions < v1.20. A package that automates the process is documented here.
    • – snapshot-controller-4-.tgz: Chart to deploy VolumeSnapshot CRDs and Snapshot-Controller deployment for K8s versions >= v1.20. A package that automates the process is documented here.

When configuring all.yaml, always set enable_iptables: false.

The provided deployment spec files are examples only. While they include a rudimentary set of Kubernetes Service Account, Role, Binding, etc. definitions required to deploy a fully functional Lightbits CSI plugin, the plugin users are expected to significantly refine and extend them to match their production-grade deployment requirements. This is especially true of the various security-related Kubernetes features, including Pod Security Policies.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard