You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/azure-files-dynamic-pv.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ A persistent volume is a piece of storage that has been created for use in a Kub
16
16
17
17
For more information on Kubernetes persistent volumes, including static creation, see [Kubernetes persistent volumes][kubernetes-volumes].
18
18
19
-
## Create storage account
19
+
## Create a storage account
20
20
21
21
When dynamically creating an Azure file share as a Kubernetes volume, any storage account can be used as long as it is in the AKS **node** resource group. This group is the one with the *MC_* prefix that was created by the provisioning of the resources for the AKS cluster. Get the resource group name with the [az aks show][az-aks-show] command.
22
22
@@ -37,7 +37,7 @@ az storage account create --resource-group MC_myResourceGroup_myAKSCluster_eastu
37
37
> [!NOTE]
38
38
> Azure Files currently only work with Standard storage. If you use Premium storage, the volume fails to provision.
39
39
40
-
## Create storage class
40
+
## Create a storage class
41
41
42
42
A storage class is used to define how an Azure file share is created. A storage account can be specified in the class. If a storage account is not specified, a *skuName* and *location* must be specified, and all storage accounts in the associated resource group are evaluated for a match. For more information on Kubernetes storage classes for Azure Files, see [Kubernetes Storage Classes][kubernetes-storage-classes].
43
43
@@ -65,9 +65,11 @@ Create the storage class with the [kubectl apply][kubectl-apply] command:
65
65
kubectl apply -f azure-file-sc.yaml
66
66
```
67
67
68
-
## Create cluster role and binding
68
+
## Create a cluster role and binding
69
69
70
-
AKS clusters use Kubernetes role-based access control (RBAC) to limit actions that can be performed. *Roles* define the permissions to grant, and *bindings* apply them to desired users. These assignments can be made on a given namespace, or across the entire cluster. To allow the Azure platform to create the required storage resources, create a *clusterrole* and *clusterrolebinding*. Create a file named `azure-pvc-roles.yaml` and copy in the following YAML:
70
+
AKS clusters use Kubernetes role-based access control (RBAC) to limit actions that can be performed. *Roles* define the permissions to grant, and *bindings* apply them to desired users. These assignments can be applied to a given namespace, or across the entire cluster. For more information, see [Using RBAC authorization][kubernetes-rbac].
71
+
72
+
To allow the Azure platform to create the required storage resources, create a *clusterrole* and *clusterrolebinding*. Create a file named `azure-pvc-roles.yaml` and copy in the following YAML:
71
73
72
74
```yaml
73
75
---
@@ -100,7 +102,7 @@ Assign the permissions with the [kubectl apply][kubectl-apply] command:
100
102
kubectl apply -f azure-pvc-roles.yaml
101
103
```
102
104
103
-
## Create persistent volume claim
105
+
## Create a persistent volume claim
104
106
105
107
A persistent volume claim (PVC) uses the storage class object to dynamically provision an Azure file share. The following YAML can be used to create a persistent volume claim *5GB* in size with *ReadWriteMany* access. For more information on access modes, see the [Kubernetes persistent volume][access-modes] documentation.
106
108
@@ -135,7 +137,7 @@ NAME STATUS VOLUME CAPACITY ACCE
0 commit comments