Skip to content

Commit 9ede365

Browse files
authored
doc: Revise README for blobfuse-mi managed identity setup
Updated instructions for managed identity roles and clientID retrieval.
1 parent 69b9d11 commit 9ede365

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

deploy/example/blobfuse-mi/README.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,25 +4,24 @@ This article demonstrates the process of utilizing blobfuse mount with user-assi
44
> you could leverage the built-in user assigned managed identity(kubelet identity) bound to the AKS agent node pool(with naming rule [`AKS Cluster Name-agentpool`](https://docs.microsoft.com/en-us/azure/aks/use-managed-identity#summary-of-managed-identities)), if you have created your own managed identity, make sure the managed identity is bound to the agent node pool.
55
66
## Before you begin
7-
- Make sure the managed identity has `Storage Blob Data Contributor` role to the storage account
8-
> here is an example that uses Azure CLI commands to assign the `Storage Blob Data Contributor` role to the managed identity for the storage account. If the storage account is created by the driver(dynamic provisioning), then you need to grant `Storage Blob Data Contributor` role to the resource group where the storage account is located
7+
- Make sure the managed identity assigned the `Storage Blob Data Contributor` role for the storage account
8+
> here is an example that uses Azure CLI commands to assign the `Storage Blob Data Contributor` role to the managed identity for the storage account. If the storage account is created by the driver(dynamic provisioning), then you need to grant `Storage Blob Data Contributor` role on the resource group where the storage account is located
99
1010
```bash
1111
mid="$(az identity list -g "$resourcegroup" --query "[?name == 'managedIdentityName'].principalId" -o tsv)"
1212
said="$(az storage account list -g "$resourcegroup" --query "[?name == '$storageaccountname'].id" -o tsv)"
1313
az role assignment create --assignee-object-id "$mid" --role "Storage Blob Data Contributor" --scope "$said"
1414
```
1515

16-
- Retrieve the clientID for `AzureStorageIdentityClientID`. If you are using kubelet identity, the identity will be named {aks-cluster-name}-agentpool and located in the node resource group.
16+
- Retrieve the clientID of managed identity.
17+
> If you are using kubelet identity, the identity will be named `{aks-cluster-name}-agentpool` and located in the node resource group.
1718
```bash
1819
AzureStorageIdentityClientID=`az identity list -g "$resourcegroup" --query "[?name == '$identityname'].clientId" -o tsv`
1920
```
2021

2122
## Dynamic Provisioning
22-
- Ensure that the system-assigned identity of your cluster control plane has the `Storage Account Contributor role` for the storage account.
23-
> if the storage account is created by the driver, then you need to grant `Storage Account Contributor` role to the resource group where the storage account is located
24-
25-
> AKS cluster control plane identity already has `Contributor` role on the node resource group by default.
23+
- Ensure that the system-assigned identity of your cluster control plane has been assigned the `Storage Blob Data Contributor` role for the storage account.
24+
> if the storage account is created by the driver, then you need to grant `Storage Blob Data Contributor` role on the resource group where the storage account is located
2625
2726
1. Create a storage class
2827
```yml

0 commit comments

Comments
 (0)