Merge pull request #16015 from feihujiang/fixMinorErrorsInNfsExample

Auto commit by PR queue bot
This commit is contained in:
k8s-merge-robot 2015-10-22 11:41:41 -07:00
commit dcf58fe50c
2 changed files with 3 additions and 3 deletions

View File

@ -295,7 +295,7 @@ For example, [this file](../../examples/nfs/nfs-web-pod.yaml) demonstrates how t
specify the usage of an NFS volume within a pod. specify the usage of an NFS volume within a pod.
In this example one can see that a `volumeMount` called `nfs` is being mounted In this example one can see that a `volumeMount` called `nfs` is being mounted
onto `/var/www/html` in the container `web`. The volume "nfs" is defined as onto `/usr/share/nginx/html` in the container `web`. The volume "nfs" is defined as
type `nfs`, with the NFS server serving from `nfs-server.default.kube.local` type `nfs`, with the NFS server serving from `nfs-server.default.kube.local`
and exporting directory `/` as the share. The mount being created in this and exporting directory `/` as the share. The mount being created in this
example is writeable. example is writeable.

View File

@ -38,7 +38,7 @@ in a pod.
## Complete setup ## Complete setup
The example below shows how to export a NFS share from a pod and import it The example below shows how to export a NFS share from a pod and imports it
into another one. into another one.
### Prerequisites ### Prerequisites
@ -46,7 +46,7 @@ into another one.
The nfs server pod creates a privileged container, so if you are using a Salt based KUBERNETES_PROVIDER (**gce**, **vagrant**, **aws**), you have to enable the ability to create privileged containers by API. The nfs server pod creates a privileged container, so if you are using a Salt based KUBERNETES_PROVIDER (**gce**, **vagrant**, **aws**), you have to enable the ability to create privileged containers by API.
```sh ```sh
#At the root of Kubernetes source code # At the root of Kubernetes source code
$ vi cluster/saltbase/pillar/privilege.sls $ vi cluster/saltbase/pillar/privilege.sls
# If true, allow privileged containers to be created by API # If true, allow privileged containers to be created by API