You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy/example/blobfuse-mi/README.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,25 +4,24 @@ This article demonstrates the process of utilizing blobfuse mount with user-assi
4
4
> you could leverage the built-in user assigned managed identity(kubelet identity) bound to the AKS agent node pool(with naming rule [`AKS Cluster Name-agentpool`](https://docs.microsoft.com/en-us/azure/aks/use-managed-identity#summary-of-managed-identities)), if you have created your own managed identity, make sure the managed identity is bound to the agent node pool.
5
5
6
6
## Before you begin
7
-
- Make sure the managed identity has `Storage Blob Data Contributor` role to the storage account
8
-
> here is an example that uses Azure CLI commands to assign the `Storage Blob Data Contributor` role to the managed identity for the storage account. If the storage account is created by the driver(dynamic provisioning), then you need to grant `Storage Blob Data Contributor` role to the resource group where the storage account is located
7
+
- Make sure the managed identity assigned the `Storage Blob Data Contributor` role for the storage account
8
+
> here is an example that uses Azure CLI commands to assign the `Storage Blob Data Contributor` role to the managed identity for the storage account. If the storage account is created by the driver(dynamic provisioning), then you need to grant `Storage Blob Data Contributor` role on the resource group where the storage account is located
az role assignment create --assignee-object-id "$mid" --role "Storage Blob Data Contributor" --scope "$said"
14
14
```
15
15
16
-
- Retrieve the clientID for `AzureStorageIdentityClientID`. If you are using kubelet identity, the identity will be named {aks-cluster-name}-agentpool and located in the node resource group.
16
+
- Retrieve the clientID of managed identity.
17
+
> If you are using kubelet identity, the identity will be named `{aks-cluster-name}-agentpool` and located in the node resource group.
- Ensure that the system-assigned identity of your cluster control plane has the `Storage Account Contributor role` for the storage account.
23
-
> if the storage account is created by the driver, then you need to grant `Storage Account Contributor` role to the resource group where the storage account is located
24
-
25
-
> AKS cluster control plane identity already has `Contributor` role on the node resource group by default.
23
+
- Ensure that the system-assigned identity of your cluster control plane has been assigned the `Storage Blob Data Contributor` role for the storage account.
24
+
> if the storage account is created by the driver, then you need to grant `Storage Blob Data Contributor` role on the resource group where the storage account is located
0 commit comments