Skip to content

Commit 669a0a8

Browse files
committed
updated items per reviewer feedback
1 parent 74ac8c3 commit 669a0a8

10 files changed

+40
-28
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -162,32 +162,32 @@
162162
},
163163
{
164164
"source_path_from_root": "/articles/aks/azure-csi-blob-storage-dynamic.md",
165-
"redirect_url": "/azure/aks/azure-csi-blob-provision",
165+
"redirect_url": "/azure/aks/azure-csi-blob-storage-provision",
166166
"redirect_document_id": false
167167
},
168168
{
169169
"source_path_from_root": "/articles/aks/azure-csi-blob-storage-static.md",
170-
"redirect_url": "/azure/aks/azure-csi-blob-provision",
170+
"redirect_url": "/azure/aks/azure-csi-blob-storage-provision",
171171
"redirect_document_id": false
172172
},
173173
{
174174
"source_path_from_root": "/articles/aks/azure-disks-dynamic-pv.md",
175-
"redirect_url": "/azure/aks/azure-csi-disk-provision",
175+
"redirect_url": "/azure/aks/azure-csi-disk-storage-provision",
176176
"redirect_document_id": false
177177
},
178178
{
179179
"source_path_from_root": "/articles/aks/azure-disk-volume.md",
180-
"redirect_url": "/azure/aks/azure-csi-disk-provision",
180+
"redirect_url": "/azure/aks/azure-csi-disk-storage-provision",
181181
"redirect_document_id": false
182182
},
183183
{
184184
"source_path_from_root": "/articles/aks/azure-files-dynamic-pv.md",
185-
"redirect_url": "/azure/aks/azure-csi-files-provision",
185+
"redirect_url": "/azure/aks/azure-csi-files-storage-provision",
186186
"redirect_document_id": false
187187
},
188188
{
189189
"source_path_from_root": "/articles/aks/azure-files-volume.md",
190-
"redirect_url": "/azure/aks/azure-csi-files-provision",
190+
"redirect_url": "/azure/aks/azure-csi-files-storage-provision",
191191
"redirect_document_id": false
192192
},
193193
{

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -457,6 +457,8 @@
457457
href: azure-disk-csi.md
458458
- name: Provision Azure Disks storage
459459
href: azure-csi-disk-storage-provision.md
460+
- name: Use Azure Ultra Disks
461+
href: use-ultra-disks.md
460462
- name: Other storage options
461463
items:
462464
- name: Azure HPC Cache

articles/aks/azure-blob-csi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The Azure Blob storage Container Storage Interface (CSI) driver is a [CSI specif
1212

1313
By adopting and using CSI, AKS now can write, deploy, and iterate plug-ins to expose new or improve existing storage systems in Kubernetes. Using CSI drivers in AKS avoids having to touch the core Kubernetes code and wait for its release cycles.
1414

15-
Mounting Azure Blob storage as a file system into a container or pod, enables you to use blob storage with a number of applications that work massive amounts of unstructured data. For example:
15+
When you mount Azure Blob storage as a file system into a container or pod, it enables you to use blob storage with a number of applications that work massive amounts of unstructured data. For example:
1616

1717
* Log file data
1818
* Images, documents, and streaming video or audio
@@ -53,7 +53,7 @@ To enable the driver on an existing cluster, include the `--enable-blob-driver`
5353
az aks update --enable-blob-driver -n myAKSCluster -g myResourceGroup
5454
```
5555

56-
You're prompted to confirm there isn't an open-source Blob CSI driver installed. After confirming, it may take several minutes to complete this action. Once it's complete, you should see in the output the status of enabling the driver on your cluster. The following example is resembles the section indicating the results of the previous command:
56+
You're prompted to confirm there isn't an open-source Blob CSI driver installed. After you confirm, it may take several minutes to complete this action. Once it's complete, you should see in the output the status of enabling the driver on your cluster. The following example resembles the section indicating the results of the previous command:
5757

5858
```output
5959
"storageProfile": {

articles/aks/azure-csi-blob-storage-provision.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ This section provides guidance for cluster administrators who want to provision
4949
|storeAccountKey | Specify store account key to Kubernetes secret. <br><br> Note: <br> `false` means driver uses kubelet identity to get account key. | `true`,`false` | No | `true`|
5050
|secretName | Specify secret name to store account key. | | No |
5151
|secretNamespace | Specify the namespace of secret to store account key. | `default`,`kube-system`, etc. | No | pvc namespace |
52-
|isHnsEnabled | Enable `Hierarchical namespace` for Azure DataLake storage account. | `true`,`false` | No | `false`|
52+
|isHnsEnabled | Enable `Hierarchical namespace` for Azure Data Lake storage account. | `true`,`false` | No | `false`|
5353
|--- | **Following parameters are only for NFS protocol** | --- | --- |--- |
5454
|mountPermissions | Specify mounted folder permissions. |The default is `0777`. If set to `0`, driver won't perform `chmod` after mount. | `0777` | No |
5555

@@ -185,7 +185,7 @@ In this example, the following manifest configures mounting a Blob storage conta
185185

186186
#### Storage class using blobfuse
187187

188-
In this example, the following manifest configures using blobfuse and mount a Blob storage container. Use it to update the *skuName* parameter.
188+
In this example, the following manifest configures using blobfuse and mounts a Blob storage container. Use it to update the *skuName* parameter.
189189

190190
1. Create a file named `blobfuse-sc.yaml`, and paste the following example manifest:
191191

@@ -241,7 +241,7 @@ This section provides guidance for cluster administrators who want to create one
241241
|volumeAttributes.secretName | Secret name that stores storage account name and key (only applies for SMB).| | No ||
242242
|volumeAttributes.secretNamespace | Specify namespace of secret to store account key. | `default` | No | Pvc namespace|
243243
|nodeStageSecretRef.name | Specify secret name that stores one of the following:<br> `azurestorageaccountkey`<br>`azurestorageaccountsastoken`<br>`msisecret`<br>`azurestoragespnclientsecret`. | |Existing Kubernetes secret name | No |
244-
|nodeStageSecretRef.namespace | Specify the namespace of secret. | k8s namespace | Yes ||
244+
|nodeStageSecretRef.namespace | Specify the namespace of secret. | Kubernetes namespace | Yes ||
245245
|--- | **Following parameters are only for NFS protocol** | --- | --- | --- |
246246
|volumeAttributes.mountPermissions | Specify mounted folder permissions. | `0777` | No ||
247247
|--- | **Following parameters are only for NFS VNet setting** | --- | --- | --- |
@@ -438,6 +438,8 @@ Kubernetes needs credentials to access the Blob storage container created earlie
438438
kubectl create -f pvc-blobfuse.yaml
439439
```
440440

441+
---
442+
441443
### Use the persistence volume
442444

443445
The following YAML creates a pod that uses the persistent volume or persistent volume claim named **pvc-blob** created earlier, to mount the Azure Blob storage at the `/mnt/blob' path.
@@ -494,10 +496,13 @@ The following YAML creates a pod that uses the persistent volume or persistent v
494496
[kubernetes-volumes]: https://kubernetes.io/docs/concepts/storage/volumes/
495497
[blobfuse-overview]: https://github.com/Azure/azure-storage-fuse
496498
[nfs-overview]: https://en.wikipedia.org/wiki/Network_File_System
499+
[kubectl-apply]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#apply
500+
[kubectl-get]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#get
497501

498502
<!-- LINKS - internal -->
499503
[operator-best-practices-storage]: operator-best-practices-storage.md
500504
[concepts-storage]: concepts-storage.md
501505
[azure-blob-storage-csi]: azure-blob-csi.md
502506
[azure-blob-storage-nfs-support]: ../storage/blobs/network-file-system-protocol-support.md
503-
[enable-blob-csi-driver]: azure-blob-csi.md#before-you-begin
507+
[enable-blob-csi-driver]: azure-blob-csi.md#before-you-begin
508+
[az-tags]: ../azure-resource-manager/management/tag-resources.md

articles/aks/azure-csi-disk-storage-provision.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -489,5 +489,5 @@ configuration file created in the previous steps:
489489
[azure-tags]: ../azure-resource-manager/management/tag-resources.md
490490
[disk-encryption]: ../virtual-machines/windows/disk-encryption.md
491491
[azure-disk-write-accelerator]: ../virtual-machines/windows/how-to-enable-write-accelerator.md
492-
[on-demand-bursting]: (../virtual-machines/disk-bursting.md
492+
[on-demand-bursting]: ../virtual-machines/disk-bursting.md
493493
[customer-usage-attribution]: ../marketplace/azure-partner-customer-usage-attribution.md

articles/aks/azure-csi-files-storage-provision.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,10 +33,10 @@ This section provides guidance for cluster administrators who want to provision
3333
|--- | --- | --- | --- | ---
3434
|skuName | Azure Files storage account type (alias: `storageAccountType`)| `Standard_LRS`, `Standard_ZRS`, `Standard_GRS`, `Standard_RAGRS`, `Standard_RAGZRS`,`Premium_LRS`, `Premium_ZRS` | No | `StandardSSD_LRS`<br> Minimum file share size for Premium account type is 100 GB.<br> ZRS account type is supported in limited regions.<br> NFS file share only supports Premium account type.|
3535
|fsType | File System Type | `ext4`, `ext3`, `ext2`, `xfs`| Yes | `ext4` for Linux|
36-
|location | Specify Azure region where Azure storage account will be created. | `eastus`, `westus`, etc. | No | If empty, driver uses the same location name as current AKS cluster.|
36+
|location | Specify Azure region where Azure storage account will be created. | For example, `eastus`. | No | If empty, driver uses the same location name as current AKS cluster.|
3737
|resourceGroup | Specify the resource group where the Azure Disks will be created | Existing resource group name | No | If empty, driver uses the same resource group name as current AKS cluster.|
3838
|shareName | Specify Azure file share name | Existing or new Azure file share name. | No | If empty, driver generates an Azure file share name. |
39-
|shareNamePrefix | Specify Azure file share name prefix created by driver. | Share name can only contain lowercase letters, numbers, hyphens, and length should be less than 21 characters. | No |
39+
|shareNamePrefix | Specify Azure file share name prefix created by driver. | Share name can only contain lowercase letters, numbers, hyphens, and length should be fewer than 21 characters. | No |
4040
|folderName | Specify folder name in Azure file share. | Existing folder name in Azure file share. | No | If folder name does not exist in file share, mount will fail. |
4141
|shareAccessTier | [Access tier for file share][storage-tiers] | General purpose v2 account can choose between `TransactionOptimized` (default), `Hot`, and `Cool`. Premium storage account type for file shares only. | No | Empty. Use default setting for different storage account types.|
4242
|accountAccessTier | [Access tier for storage account][access-tiers-overview] | Standard account can choose `Hot` or `Cool`, and Premium account can only choose `Premium`. | No | Empty. Use default setting for different storage account types. |
@@ -45,11 +45,11 @@ This section provides guidance for cluster administrators who want to provision
4545
|allowBlobPublicAccess | Allow or disallow public access to all blobs or containers for storage account created by driver. | `true` or `false` | No | `false` |
4646
|requireInfraEncryption | Specify whether or not the service applies a secondary layer of encryption with platform managed keys for data at rest for storage account created by driver. | `true` or `false` | No | `false` |
4747
|storageEndpointSuffix | Specify Azure storage endpoint suffix. | `core.windows.net`, `core.chinacloudapi.cn`, etc. | No | If empty, driver uses default storage endpoint suffix according to cloud environment. For example, `core.windows.net`. |
48-
|tags | [tags][tag-resources] are created in newly created storage account. | Tag format: 'foo=aaa,bar=bbb' | No | "" |
48+
|tags | [tags][tag-resources] are created in new storage account. | Tag format: 'foo=aaa,bar=bbb' | No | "" |
4949
|matchTags | Match tags when driver tries to find a suitable storage account. | `true` or `false` | No | `false` |
5050
|--- | **Following parameters are only for SMB protocol** | --- | --- |
5151
|subscriptionID | Specify Azure subscription ID where Azure file share is created. | Azure subscription ID | No | If not empty, `resourceGroup` must be provided. |
52-
|storeAccountKey | Specify whether to store account key to k8s secret. | `true` or `false`<br>`false` means driver leverages kubelet identity to get account key. | No | `true` |
52+
|storeAccountKey | Specify whether to store account key to Kubernetes secret. | `true` or `false`<br>`false` means driver leverages kubelet identity to get account key. | No | `true` |
5353
|secretName | Specify secret name to store account key. | | No |
5454
|secretNamespace | Specify the namespace of secret to store account key. <br><br> **Note:** <br> If `secretNamespace` isn't specified, the secret is created in the same namespace as the pod. | `default`,`kube-system`, etc | No | Pvc namespace, for example `csi.storage.k8s.io/pvc/namespace` |
5555
|useDataPlaneAPI | Specify whether to use [data plane API][data-plane-api] for file share create/delete/resize. This could solve the SRP API throttling issue because the data plane API has almost no limit, while it would fail when there is firewall or Vnet setting on storage account. | `true` or `false` | No | `false` |
@@ -248,7 +248,7 @@ This section provides guidance for cluster administrators who want to create one
248248
|volumeAttributes.secretName | Specify a secret name that stores storage account name and key. | | No |
249249
|volumeAttributes.secretNamespace | Specify a secret namespace. | `default`,`kube-system`, etc. | No | PVC namespace (`csi.storage.k8s.io/pvc/namespace`) |
250250
|nodeStageSecretRef.name | Specify a secret name that stores storage account name and key. | Existing secret name | Yes ||
251-
|nodeStageSecretRef.namespace | Specify a secret namespace. | k8s namespace | Yes ||
251+
|nodeStageSecretRef.namespace | Specify a secret namespace. | Kubernetes namespace | Yes ||
252252
|--- | **Following parameters are only for NFS protocol** | --- | --- | --- |
253253
|volumeAttributes.fsGroupChangePolicy | Indicates how a volumes ownership is changed by the driver. Pod `securityContext.fsGroupChangePolicy` is ignored. | `OnRootMismatch` (default), `Always`, `None` | No | `OnRootMismatch` |
254254
|volumeAttributes.mountPermissions | Specify mounted folder permissions. The default is `0777` | | No ||
@@ -474,6 +474,7 @@ For associated best practices, see [Best practices for storage and backups in AK
474474
[kubernetes-persistent-volume]: https://kubernetes.io/docs/concepts/storage/persistent-volumes
475475
[kubectl-apply]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#apply
476476
[kubectl-get]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#get
477+
[data-plane-api]: https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/sdk/storage/azblob
477478

478479
<!-- LINKS - internal -->
479480
[azure-storage-account]: ../storage/common/storage-introduction.md
@@ -486,4 +487,7 @@ For associated best practices, see [Best practices for storage and backups in AK
486487
[storage-skus]: ../storage/common/storage-redundancy.md
487488
[mount-options]: #mount-options
488489
[az-aks-show]: /cli/azure/aks#az-aks-show
489-
[az-storage-share-create]: /cli/azure/storage/share#az-storage-share-create
490+
[az-storage-share-create]: /cli/azure/storage/share#az-storage-share-create
491+
[storage-tiers]: ../storage/files/storage-files-planning.md#storage-tiers
492+
[access-tiers-overview]: ../storage/blobs/access-tiers-overview.md
493+
[tag-resources]: ../azure-resource-manager/management/tag-resources.md

0 commit comments

Comments
 (0)