@@ -33,8 +33,8 @@ drivers, but the functionality is somewhat limited.
33
33
Kubernetes supports many types of volumes. A {{< glossary_tooltip term_id="pod" text="Pod" >}}
34
34
can use any number of volume types simultaneously.
35
35
Ephemeral volume types have a lifetime of a pod, but persistent volumes exist beyond
36
- the lifetime of a pod. When a pod ceases to exist, Kubernetes destroys ephemeral volumes;
37
- however, Kubernetes does not destroy persistent volumes.
36
+ the lifetime of a pod. When a pod ceases to exist, Kubernetes destroys ephemeral volumes;
37
+ however, Kubernetes does not destroy persistent volumes.
38
38
For any kind of volume in a given pod, data is preserved across container restarts.
39
39
40
40
At its core, a volume is a directory, possibly with some data in it, which
@@ -44,12 +44,21 @@ volume type used.
44
44
45
45
To use a volume, specify the volumes to provide for the Pod in ` .spec.volumes `
46
46
and declare where to mount those volumes into containers in ` .spec.containers[*].volumeMounts ` .
47
- A process in a container sees a filesystem view composed from their Docker
48
- image and volumes. The [ Docker image] ( https://docs.docker.com/userguide/dockerimages/ )
49
- is at the root of the filesystem hierarchy. Volumes mount at the specified paths within
50
- the image. Volumes can not mount onto other volumes or have hard links to
51
- other volumes. Each Container in the Pod's configuration must independently specify where to
52
- mount each volume.
47
+ A process in a container sees a filesystem view composed from the initial contents of
48
+ the {{< glossary_tooltip text="container image" term_id="image" >}}, plus volumes
49
+ (if defined) mounted inside the container.
50
+ The process sees a root filesystem that initially matches the contents of the container
51
+ image.
52
+ Any writes to within that filesystem hierarchy, if allowed, affect what that process views
53
+ when it performs a subsequent filesystem access.
54
+ Volumes mount at the [ specified paths] ( #using-subpath ) within
55
+ the image.
56
+ For each container defined within a Pod, you must independently specify where
57
+ to mount each volume that the container uses.
58
+
59
+ Volumes cannot mount within other volumes (but see [ Using subPath] ( #using-subpath )
60
+ for a related mechanism). Also, a volume cannot contain a hard link to anything in
61
+ a different volume.
53
62
54
63
## Types of Volumes {#volume-types}
55
64
@@ -217,7 +226,7 @@ It redirects all plugin operations from the existing in-tree plugin to the
217
226
` cinder.csi.openstack.org` Container Storage Interface (CSI) Driver.
218
227
[OpenStack Cinder CSI Driver](https://github.com/kubernetes/cloud-provider-openstack/blob/master/docs/cinder-csi-plugin/using-cinder-csi-plugin.md)
219
228
must be installed on the cluster.
220
- You can disable Cinder CSI migration for your cluster by setting the `CSIMigrationOpenStack`
229
+ You can disable Cinder CSI migration for your cluster by setting the `CSIMigrationOpenStack`
221
230
[feature gate](/docs/reference/command-line-tools-reference/feature-gates/) to `false`.
222
231
If you disable the `CSIMigrationOpenStack` feature, the in-tree Cinder volume plugin takes responsibility
223
232
for all aspects of Cinder volume storage management.
0 commit comments