k3s/examples/azure_file
David McMahon dae84f5306 Update the latestReleaseBranch to release-1.2 in the munger. 2016-03-08 18:59:28 -08:00
..
secret
README.md Update the latestReleaseBranch to release-1.2 in the munger. 2016-03-08 18:59:28 -08:00
azure.yaml

README.md

WARNING WARNING WARNING WARNING WARNING

PLEASE NOTE: This document applies to the HEAD of the source tree

If you are using a released version of Kubernetes, you should refer to the docs that go with that version.

The latest release of this document can be found [here](http://releases.k8s.io/release-1.2/examples/azure_file/README.md).

Documentation for other releases can be found at releases.k8s.io.

How to Use it?

Install cifs-utils on the Kubernetes host. For example, on Fedora based Linux

# yum -y install cifs-utils

Note, as explained in Azure File Storage for Linux, the Linux hosts and the file share must be in the same Azure region.

Obtain an Microsoft Azure storage account and create a secret that contains the base64 encoded Azure Storage account name and key. In the secret file, base64-encode Azure Storage account name and pair it with name azurestorageaccountname, and base64-encode Azure Storage access key and pair it with name azurestorageaccountkey.

Then create a Pod using the volume spec based on azure.

In the pod, you need to provide the following information:

  • secretName: the name of the secret that contains both Azure storage account name and key.
  • shareName: The share name to be used.
  • readOnly: Whether the filesystem is used as readOnly.

Create the secret:

    # kubectl create -f examples/azure_file/secret/azure-secret.yaml

You should see the account name and key from kubectl get secret

Then create the Pod:

    # kubectl create -f examples/azure_file/azure.yaml

Analytics