juicefs | JuiceFS is a distributed POSIX file system built on top | Storage library
kandi X-RAY | juicefs Summary
kandi X-RAY | juicefs Summary
JuiceFS is a high-performance POSIX file system released under Apache License 2.0, particularly designed for the cloud-native environment. The data, stored via JuiceFS, will be persisted in object storage (e.g. Amazon S3), and the corresponding metadata can be persisted in various database engines such as Redis, MySQL, and SQLite based on the scenarios and requirements. With JuiceFS, massive cloud storage can be directly connected to big data, machine learning, artificial intelligence, and various application platforms in production environments. Without modifying code, the massive cloud storage can be used as efficiently as local storage. Video: What is JuiceFS?. Document: Quick start guide.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of juicefs
juicefs Key Features
juicefs Examples and Code Snippets
Community Discussions
Trending Discussions on juicefs
QUESTION
I'm using a juicefs-csi in GKE. I use postgre as meta-store and GCS as storage. The corresponding setting is as follow:
...ANSWER
Answered 2021-Dec-15 at 13:53Ok I misunderstood you at the beginning.
When you are creating GKE
cluster you can specify which GCP Service Account
will be used by this cluster, like below:
By Default
it's Compute Engine default service account
(71025XXXXXX-compute@developer.gserviceaccount.com) which is lack of a few Cloud Product permissions (like Cloud Storage
, it has Read Only
). It's even described in this message.
If you want to check which Service Account
was set by default to VM, you could do this via
Compute Engine > VM Instances > Choose one of the VMs from this cluster > In details find API and identity management
So You have like 3 options to solve this issue:
1. During Cluster creation
In Node Pools
> Security
, you have Access scopes
where you can add some additional permissions.
Allow full access to all Cloud APIs
to allow access for all listed Cloud APIsSet access for each API
In your case you could just use Set access for each API
and change Storage
to Full
.
2. Set permissions with a Service Account
You would need to create a new Service Account
and provide proper permissions for Compute Engine
and Storage
. More details about how to create SA
you can find in Creating and managing service accounts.
3. Use Workload Identity
Workload Identity on your Google Kubernetes Engine (GKE) clusters. Workload Identity allows workloads in your GKE clusters to impersonate Identity and Access Management (IAM) service accounts to access Google Cloud services.
For more details you should check Using Workload Identity.
Useful links
- Configuring Velero - Velero is software for backup and restore, however steps 2 and 3 are mentioned there. You would just need to adjust commands/permissions to your scenario.
- Authenticating to Google Cloud with service accounts
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install juicefs
Redis database for metadata storage
Object storage for storing data blocks
JuiceFS Client downloaded and installed
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page