Skip to content

Commit 5615198

Browse files
committed
Merge branch 'main' into vmagelo/new-python-tutorial
2 parents 2b639e2 + fdb9fa3 commit 5615198

File tree

101 files changed

+1394
-1071
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

101 files changed

+1394
-1071
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,11 @@
6060
"redirect_url": "/azure/defender-for-cloud/os-coverage",
6161
"redirect_document_id": false
6262
},
63+
{
64+
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds.md",
65+
"redirect_url": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
66+
"redirect_document_id": false
67+
},
6368
{
6469
"source_path_from_root": "/articles/security-center/security-center-just-in-time.md",
6570
"redirect_url": "/azure/defender-for-cloud/just-in-time-access-usage",
@@ -632,7 +637,7 @@
632637
},
633638
{
634639
"source_path_from_root": "/articles/security-center/supported-machines-endpoint-solutions-clouds.md",
635-
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds",
640+
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
636641
"redirect_document_id": true
637642
},
638643
{

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.service: active-directory
1313
ms.subservice: enterprise-users
1414
ms.topic: reference
1515
ms.workload: identity
16-
ms.date: 02/16/2022
16+
ms.date: 03/10/2022
1717
ms.author: nicholak
1818
ms.reviewer: Nicholak-MS
1919
ms.custom: "it-pro;seo-update-azuread-jan"
@@ -32,7 +32,7 @@ When managing licenses in [the Azure portal](https://portal.azure.com/#blade/Mic
3232
- **Service plans included (friendly names)**: A list of service plans (friendly names) in the product that correspond to the string ID and GUID
3333

3434
>[!NOTE]
35-
>This information last updated on February 16th, 2022.<br/>You can also download a CSV version of this table [here](https://download.microsoft.com/download/e/3/e/e3e9faf2-f28b-490a-9ada-c6089a1fc5b0/Product%20names%20and%20service%20plan%20identifiers%20for%20licensing.csv).
35+
>This information last updated on March 10th, 2022.<br/>You can also download a CSV version of this table [here](https://download.microsoft.com/download/e/3/e/e3e9faf2-f28b-490a-9ada-c6089a1fc5b0/Product%20names%20and%20service%20plan%20identifiers%20for%20licensing.csv).
3636
><br/>
3737
3838
| Product name | String ID | GUID | Service plans included | Service plans included (friendly names) |
@@ -289,6 +289,7 @@ When managing licenses in [the Azure portal](https://portal.azure.com/#blade/Mic
289289
| SKYPE FOR BUSINESS PSTN DOMESTIC CALLING | MCOPSTN1 | 0dab259f-bf13-4952-b7f8-7db8f131b28d | MCOPSTN1 (4ed3ff63-69d7-4fb7-b984-5aec7f605ca8) | DOMESTIC CALLING PLAN (4ed3ff63-69d7-4fb7-b984-5aec7f605ca8) |
290290
| SKYPE FOR BUSINESS PSTN DOMESTIC CALLING (120 Minutes)| MCOPSTN5 | 54a152dc-90de-4996-93d2-bc47e670fc06 | MCOPSTN5 (54a152dc-90de-4996-93d2-bc47e670fc06) | DOMESTIC CALLING PLAN (54a152dc-90de-4996-93d2-bc47e670fc06) |
291291
| Skype for Business PSTN Usage Calling Plan | MCOPSTNPP | 06b48c5f-01d9-4b18-9015-03b52040f51a | MCOPSTN3 (6b340437-d6f9-4dc5-8cc2-99163f7f83d6) | MCOPSTN3 (6b340437-d6f9-4dc5-8cc2-99163f7f83d6) |
292+
| Teams Phone with Calling Plan | MCOTEAMS_ESSENTIALS | ae2343d1-0999-43f6-ae18-d816516f6e78 | MCOPSTN1 (4ed3ff63-69d7-4fb7-b984-5aec7f605ca8)<br/>MCOEV (4828c8ec-dc2e-4779-b502-87ac9ce28ab7) | Microsoft 365 Domestic Calling Plan (4ed3ff63-69d7-4fb7-b984-5aec7f605ca8)<br/>Microsoft 365 Phone System (4828c8ec-dc2e-4779-b502-87ac9ce28ab7) |
292293
| Teams Rooms Premium | MTR_PREM | 4fb214cb-a430-4a91-9c91-4976763aa78f | MMR_P1 (bdaa59a3-74fd-4137-981a-31d4f84eb8a0)<br/>MCOMEETADV (3e26ee1f-8a5f-4d52-aee2-b81ce45c8f40)<br/>MCOEV (4828c8ec-dc2e-4779-b502-87ac9ce28ab7)<br/>INTUNE_A (c1ec4a95-1f05-45b3-a911-aa3fa01094f5)<br/>TEAMS1 (57ff2da0-773e-42df-b2af-ffb7a2317929)<br/>MCOSTANDARD (0feaeb32-d00e-4d66-bd5a-43b5b83db82c)<br/>WHITEBOARD_PLAN3 (4a51bca5-1eff-43f5-878c-177680f191af) | Meeting Room Managed Services (bdaa59a3-74fd-4137-981a-31d4f84eb8a0)<br/>Microsoft 365 Audio Conferencing (3e26ee1f-8a5f-4d52-aee2-b81ce45c8f40)<br/>Microsoft 365 Phone System (4828c8ec-dc2e-4779-b502-87ac9ce28ab7)<br/>Microsoft Intune (c1ec4a95-1f05-45b3-a911-aa3fa01094f5)<br/>Microsoft Teams (57ff2da0-773e-42df-b2af-ffb7a2317929)<br/>Skype for Business Online (Plan 2) (0feaeb32-d00e-4d66-bd5a-43b5b83db82c)<br/>Whiteboard (Plan 3) (4a51bca5-1eff-43f5-878c-177680f191af) |
293294
| TELSTRA CALLING FOR O365 | MCOPSTNEAU2 | de3312e1-c7b0-46e6-a7c3-a515ff90bc86 | MCOPSTNEAU (7861360b-dc3b-4eba-a3fc-0d323a035746) | AUSTRALIA CALLING PLAN (7861360b-dc3b-4eba-a3fc-0d323a035746) |
294295
| Universal Print | UNIVERSAL_PRINT | 9f3d9c1d-25a5-4aaa-8e59-23a1e6450a67 | EXCHANGE_S_FOUNDATION (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>UNIVERSAL_PRINT_01 (795f6fe0-cc4d-4773-b050-5dde4dc704c9) | Exchange Foundation (113feb6c-3fe4-4440-bddc-54d774bf0318)<br/>Universal Print (795f6fe0-cc4d-4773-b050-5dde4dc704c9) |

articles/active-directory/manage-apps/f5-big-ip-sap-erp-easy-button.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ Selected policies should either have an **Include** or **Exclude** option checke
259259
![ Screenshot for CA policies](./media/f5-big-ip-easy-button-ldap/conditional-access-policy.png)
260260

261261
>[!NOTE]
262-
>The policy list is enumerated only once when first switching to this tab. A refresh button is available to manually force the wizard to query your tenant, but this button is displayed only when the application has been deployed.
262+
>The policy list is enumerated only once when first switching to this tab. A refresh button is available to manually force the wizard to query your tenant, but this button is displayed only when the application has been deployed.
263263
264264
### Virtual Server Properties
265265

-30.5 KB
Loading

articles/aks/azure-disk-csi.md

Lines changed: 7 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Container Storage Interface (CSI) drivers for Azure Disks on Azure Ku
33
description: Learn how to use the Container Storage Interface (CSI) drivers for Azure disks in an Azure Kubernetes Service (AKS) cluster.
44
services: container-service
55
ms.topic: article
6-
ms.date: 10/15/2021
6+
ms.date: 03/09/2022
77
author: palma21
88

99
---
@@ -26,6 +26,7 @@ Besides original in-tree driver features, Azure Disk CSI driver already provides
2626
- `Premium_ZRS`, `StandardSSD_ZRS` disk types are supported, check more details about [Zone-redundant storage for managed disks](../virtual-machines/disks-redundancy.md)
2727
- [Snapshot](#volume-snapshots)
2828
- [Volume clone](#clone-volumes)
29+
- [Resize disk PV without downtime](#resize-a-persistent-volume-without-downtime)
2930

3031
## Use CSI persistent volumes with Azure disks
3132

@@ -208,7 +209,7 @@ outfile
208209
test.txt
209210
```
210211

211-
## Resize a persistent volume
212+
## Resize a persistent volume without downtime
212213

213214
You can instead request a larger volume for a PVC. Edit the PVC object, and specify a larger size. This change triggers the expansion of the underlying volume that backs the PV.
214215

@@ -225,15 +226,8 @@ Filesystem Size Used Avail Use% Mounted on
225226
```
226227

227228
> [!IMPORTANT]
228-
> Currently, the Azure disk CSI driver only supports resizing PVCs with no pods associated (and the volume not mounted to a specific node).
229-
230-
As such, let's delete the pod we created earlier:
231-
232-
```console
233-
$ kubectl delete -f https://raw.githubusercontent.com/kubernetes-sigs/azuredisk-csi-driver/master/deploy/example/nginx-pod-azuredisk.yaml
234-
235-
pod "nginx-azuredisk" deleted
236-
```
229+
> Currently, Azure disk CSI driver supports resizing PVCs without downtime on specific regions.
230+
> Follow this [link][expand-an-azure-managed-disk] to register the disk online resize feature.
237231

238232
Let's expand the PVC by increasing the `spec.resources.requests.storage` field:
239233

@@ -253,18 +247,7 @@ pvc-391ea1a6-0191-4022-b915-c8dc4216174a 15Gi RWO Delete
253247
(...)
254248
```
255249

256-
> [!NOTE]
257-
> The PVC won't reflect the new size until it has a pod associated to it again.
258-
259-
Let's create a new pod:
260-
261-
```console
262-
$ kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/azuredisk-csi-driver/master/deploy/example/nginx-pod-azuredisk.yaml
263-
264-
pod/nginx-azuredisk created
265-
```
266-
267-
And, finally, confirm the size of the PVC and inside the pod:
250+
And after a few minutes, confirm the size of the PVC and inside the pod:
268251

269252
```console
270253
$ kubectl get pvc pvc-azuredisk
@@ -393,10 +376,6 @@ $ kubectl exec -it busybox-azuredisk-0 -- cat c:\mnt\azuredisk\data.txt # on Win
393376
(...)
394377
```
395378

396-
## Using Azure tags
397-
398-
For more details on using Azure tags, see [Use Azure tags in Azure Kubernetes Service (AKS)][use-tags].
399-
400379
## Next steps
401380

402381
- To learn how to use CSI drivers for Azure Files, see [Use Azure Files with CSI drivers](azure-files-csi.md).
@@ -414,6 +393,7 @@ For more details on using Azure tags, see [Use Azure tags in Azure Kubernetes Se
414393
[azure-disk-volume]: azure-disk-volume.md
415394
[azure-files-pvc]: azure-files-dynamic-pv.md
416395
[premium-storage]: ../virtual-machines/disks-types.md
396+
[expand-an-azure-managed-disk]: ../virtual-machines/linux/expand-disks.md#expand-an-azure-managed-disk
417397
[az-disk-list]: /cli/azure/disk#az_disk_list
418398
[az-snapshot-create]: /cli/azure/snapshot#az_snapshot_create
419399
[az-disk-create]: /cli/azure/disk#az_disk_create
@@ -429,4 +409,3 @@ For more details on using Azure tags, see [Use Azure tags in Azure Kubernetes Se
429409
[az-feature-register]: /cli/azure/feature#az_feature_register
430410
[az-feature-list]: /cli/azure/feature#az_feature_list
431411
[az-provider-register]: /cli/azure/provider#az_provider_register
432-
[use-tags]: use-tags.md

articles/aks/azure-disk-volume.md

Lines changed: 57 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create a static volume for pods in Azure Kubernetes Service (AKS)
33
description: Learn how to manually create a volume with Azure disks for use with a pod in Azure Kubernetes Service (AKS)
44
services: container-service
55
ms.topic: article
6-
ms.date: 03/01/2019
6+
ms.date: 03/09/2019
77

88

99
#Customer intent: As a developer, I want to learn how to manually create and attach storage to a specific pod in AKS.
@@ -56,8 +56,60 @@ The disk resource ID is displayed once the command has successfully completed, a
5656
```
5757

5858
## Mount disk as volume
59+
Create a *pv-azuredisk.yaml* file with a *PersistentVolume*. Update `volumeHandle` with disk resource ID. For example:
5960

60-
To mount the Azure disk into your pod, configure the volume in the container spec. Create a new file named `azure-disk-pod.yaml` with the following contents. Update `diskName` with the name of the disk created in the previous step, and `diskURI` with the disk ID shown in output of the disk create command. If desired, update the `mountPath`, which is the path where the Azure disk is mounted in the pod. For Windows Server containers, specify a *mountPath* using the Windows path convention, such as *'D:'*.
61+
```yaml
62+
apiVersion: v1
63+
kind: PersistentVolume
64+
metadata:
65+
name: pv-azuredisk
66+
spec:
67+
capacity:
68+
storage: 100Gi
69+
accessModes:
70+
- ReadWriteOnce
71+
persistentVolumeReclaimPolicy: Retain
72+
csi:
73+
driver: disk.csi.azure.com
74+
readOnly: false
75+
volumeHandle: /subscriptions/<subscriptionID>/resourceGroups/MC_myAKSCluster_myAKSCluster_eastus/providers/Microsoft.Compute/disks/myAKSDisk
76+
volumeAttributes:
77+
fsType: ext4
78+
```
79+
80+
Create a *pvc-azuredisk.yaml* file with a *PersistentVolumeClaim* that uses the *PersistentVolume*. For example:
81+
82+
```yaml
83+
apiVersion: v1
84+
metadata:
85+
name: pvc-azuredisk
86+
spec:
87+
accessModes:
88+
- ReadWriteOnce
89+
resources:
90+
requests:
91+
storage: 100Gi
92+
volumeName: pv-azuredisk
93+
storageClassName: ""
94+
```
95+
96+
Use the `kubectl` commands to create the *PersistentVolume* and *PersistentVolumeClaim*.
97+
98+
```console
99+
kubectl apply -f pv-azuredisk.yaml
100+
kubectl apply -f pvc-azuredisk.yaml
101+
```
102+
103+
Verify your *PersistentVolumeClaim* is created and bound to the *PersistentVolume*.
104+
105+
```console
106+
$ kubectl get pvc pvc-azuredisk
107+
108+
NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE
109+
pvc-azuredisk Bound pv-azuredisk 100Gi RWO 5s
110+
```
111+
112+
Create a *azure-disk-pod.yaml* file to reference your *PersistentVolumeClaim*. For example:
61113

62114
```yaml
63115
apiVersion: v1
@@ -79,50 +131,15 @@ spec:
79131
- name: azure
80132
mountPath: /mnt/azure
81133
volumes:
82-
- name: azure
83-
azureDisk:
84-
kind: Managed
85-
diskName: myAKSDisk
86-
diskURI: /subscriptions/<subscriptionID>/resourceGroups/MC_myAKSCluster_myAKSCluster_eastus/providers/Microsoft.Compute/disks/myAKSDisk
134+
- name: azure
135+
persistentVolumeClaim:
136+
claimName: pvc-azuredisk
87137
```
88138

89-
Use the `kubectl` command to create the pod.
90-
91139
```console
92140
kubectl apply -f azure-disk-pod.yaml
93141
```
94142

95-
You now have a running pod with an Azure disk mounted at `/mnt/azure`. You can use `kubectl describe pod mypod` to verify the disk is mounted successfully. The following condensed example output shows the volume mounted in the container:
96-
97-
```
98-
[...]
99-
Volumes:
100-
azure:
101-
Type: AzureDisk (an Azure Data Disk mount on the host and bind mount to the pod)
102-
DiskName: myAKSDisk
103-
DiskURI: /subscriptions/<subscriptionID/resourceGroups/MC_myResourceGroupAKS_myAKSCluster_eastus/providers/Microsoft.Compute/disks/myAKSDisk
104-
Kind: Managed
105-
FSType: ext4
106-
CachingMode: ReadWrite
107-
ReadOnly: false
108-
default-token-z5sd7:
109-
Type: Secret (a volume populated by a Secret)
110-
SecretName: default-token-z5sd7
111-
Optional: false
112-
[...]
113-
Events:
114-
Type Reason Age From Message
115-
---- ------ ---- ---- -------
116-
Normal Scheduled 1m default-scheduler Successfully assigned mypod to aks-nodepool1-79590246-0
117-
Normal SuccessfulMountVolume 1m kubelet, aks-nodepool1-79590246-0 MountVolume.SetUp succeeded for volume "default-token-z5sd7"
118-
Normal SuccessfulMountVolume 41s kubelet, aks-nodepool1-79590246-0 MountVolume.SetUp succeeded for volume "azure"
119-
[...]
120-
```
121-
122-
## Using Azure tags
123-
124-
For more details on using Azure tags, see [Use Azure tags in Azure Kubernetes Service (AKS)][use-tags].
125-
126143
## Next steps
127144

128145
For associated best practices, see [Best practices for storage and backups in AKS][operator-best-practices-storage].
@@ -146,4 +163,3 @@ For more information about AKS clusters interact with Azure disks, see the [Kube
146163
[azure-files-volume]: azure-files-volume.md
147164
[operator-best-practices-storage]: operator-best-practices-storage.md
148165
[concepts-storage]: concepts-storage.md
149-
[use-tags]: use-tags.md

articles/aks/azure-files-csi.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -337,10 +337,6 @@ $ kubectl exec -it busybox-azurefile-0 -- cat c:\mnt\azurefile\data.txt # on Win
337337
(...)
338338
```
339339

340-
## Using Azure tags
341-
342-
For more details on using Azure tags, see [Use Azure tags in Azure Kubernetes Service (AKS)][use-tags].
343-
344340
## Next steps
345341

346342
- To learn how to use CSI drivers for Azure disks, see [Use Azure disks with CSI drivers](azure-disk-csi.md).
@@ -376,4 +372,4 @@ For more details on using Azure tags, see [Use Azure tags in Azure Kubernetes Se
376372
[az-provider-register]: /cli/azure/provider#az_provider_register
377373
[node-resource-group]: faq.md#why-are-two-resource-groups-created-with-aks
378374
[storage-skus]: ../storage/common/storage-redundancy.md
379-
[use-tags]: use-tags.md
375+
[use-tags]: use-tags.md

articles/aks/azure-files-volume.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure Kubernetes Service
44
description: Learn how to manually create a volume with Azure Files for use with multiple concurrent pods in Azure Kubernetes Service (AKS)
55
services: container-service
66
ms.topic: article
7-
ms.date: 01/29/2022
7+
ms.date: 03/9/2022
88

99

1010
#Customer intent: As a developer, I want to learn how to manually create and attach storage using Azure Files to a pod in AKS.
@@ -142,6 +142,7 @@ spec:
142142
- mfsymlinks
143143
- cache=strict
144144
- nosharesock
145+
- nobrl
145146
```
146147

147148
Create a *azurefile-mount-options-pvc.yaml* file with a *PersistentVolumeClaim* that uses the *PersistentVolume*. For example:

articles/aks/csi-storage-drivers.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enable Container Storage Interface (CSI) drivers on Azure Kubernetes Serv
33
description: Learn how to enable the Container Storage Interface (CSI) drivers for Azure disks and Azure Files in an Azure Kubernetes Service (AKS) cluster.
44
services: container-service
55
ms.topic: article
6-
ms.date: 10/15/2021
6+
ms.date: 03/10/2022
77
author: palma21
88

99
---
@@ -14,7 +14,7 @@ The Container Storage Interface (CSI) is a standard for exposing arbitrary block
1414

1515
The CSI storage driver support on AKS allows you to natively use:
1616
- [*Azure disks*](azure-disk-csi.md), which can be used to create a Kubernetes *DataDisk* resource. Disks can use Azure Premium Storage, backed by high-performance SSDs, or Azure Standard Storage, backed by regular HDDs or Standard SSDs. For most production and development workloads, use Premium Storage. Azure disks are mounted as *ReadWriteOnce*, so are only available to a single pod. For storage volumes that can be accessed by multiple pods simultaneously, use Azure Files.
17-
- [*Azure Files*](azure-files-csi.md), which can be used to mount an SMB 3.0 share backed by an Azure Storage account to pods. With Azure Files, you can share data across multiple nodes and pods. Azure Files can use Azure Standard Storage backed by regular HDDs or Azure Premium Storage backed by high-performance SSDs.
17+
- [*Azure Files*](azure-files-csi.md), which can be used to mount an SMB 3.0/3.1 share backed by an Azure Storage account to pods. With Azure Files, you can share data across multiple nodes and pods. Azure Files can use Azure Standard Storage backed by regular HDDs or Azure Premium Storage backed by high-performance SSDs.
1818

1919
> [!IMPORTANT]
2020
> Starting in Kubernetes version 1.21, Kubernetes will use CSI drivers only and by default. These drivers are the future of storage support in Kubernetes.
@@ -73,10 +73,7 @@ Whilst explicit migration to the CSI provider is not needed for your storage cla
7373

7474
Migration of these storage classes will involve deleting the existing storage classes, and re-provisioning them with the provisioner set to **disk.csi.azure.com** if using Azure Disks, and **files.csi.azure.com** if using Azure Files.
7575

76-
Whilst this will update the mapping of the storage classes, the binding of the Persistent Volume to the CSI provisioner will only take place at provisioning time. This could be during a cordon & drain operation (cluster update) or by detaching and reattaching the Volume.
77-
78-
> [!IMPORTANT]
79-
> If your Storage class reclaimPolicy is set to Delete you will need to change the Persistent Volume to Retain to persist your data. This can be achieved via a [patch operation on the PV](https://kubernetes.io/docs/tasks/administer-cluster/change-pv-reclaim-policy/).
76+
Whilst this will update the mapping of the storage classes, the binding of the Persistent Volume to the CSI provisioner will only take place at provisioning time. This could be during a cordon & drain operation (cluster update) or by detaching and reattaching the Volume.
8077

8178

8279
### Migrating Storage Class provisioner
@@ -114,6 +111,16 @@ parameters:
114111
The CSI storage system supports the same features as the In-tree drivers, so the only change needed would be the provisioner.
115112
116113
114+
### Migrating in-tree disk persistent volumes
115+
116+
> [!IMPORTANT]
117+
> If your in-tree Persistent Volume reclaimPolicy is set to Delete you will need to change the Persistent Volume to Retain to persist your data. This can be achieved via a [patch operation on the PV](https://kubernetes.io/docs/tasks/administer-cluster/change-pv-reclaim-policy/). For example:
118+
> ```console
119+
> $ kubectl patch pv pv-azuredisk --type merge --patch '{"spec": {"persistentVolumeReclaimPolicy": "Retain"}}'
120+
> ```
121+
122+
If you have in-tree persistent volumes, get disk ID from `azureDisk.diskURI` and then follow this [guide][azure-disk-static-mount] to set up CSI driver persistent volumes
123+
117124
## Next steps
118125

119126
- To use the CSI drive for Azure disks, see [Use Azure disks with CSI drivers](azure-disk-csi.md).
@@ -132,6 +139,7 @@ The CSI storage system supports the same features as the In-tree drivers, so the
132139

133140
<!-- LINKS - internal -->
134141
[azure-disk-volume]: azure-disk-volume.md
142+
[azure-disk-static-mount]: azure-disk-volume.md#mount-disk-as-volume
135143
[azure-files-pvc]: azure-files-dynamic-pv.md
136144
[premium-storage]: ../virtual-machines/disks-types.md
137145
[az-disk-list]: /cli/azure/disk#az_disk_list

0 commit comments

Comments
 (0)