parameter names are case-insensitive
Name | Meaning | Example | Mandatory | Default value |
---|---|---|---|---|
skuName | Azure storage account type (alias: storageAccountType ) |
Standard_LRS , Premium_LRS , Standard_GRS , Standard_RAGRS |
No | Standard_LRS |
location | Azure location | eastus , westus , etc. |
No | if empty, driver will use the same location name as current k8s cluster |
resourceGroup | Azure resource group name | existing resource group name | No | if empty, driver will use the same resource group name as current k8s cluster |
storageAccount | specify Azure storage account name | STORAGE_ACCOUNT_NAME | No | If the driver is not provided with a specific storage account name, it will search for a suitable storage account that matches the account settings within the same resource group. If it cannot find a matching storage account, it will create a new one. However, if a storage account name is specified, the storage account must already exist. |
protocol | specify blobfuse, blobfuse2 or NFSv3 mount (blobfuse2 is still in Preview) | fuse , fuse2 , nfs |
No | fuse |
networkEndpointType | specify network endpoint type for the storage account created by driver. If privateEndpoint is specified, a private endpoint will be created for the storage account. For other cases, a service endpoint will be created for NFS protocol. |
"",privateEndpoint |
No | `` for AKS cluster, make sure cluster Control plane identity (that is, your AKS cluster name) is added to the Contributor role in the resource group hosting the VNet |
storageEndpointSuffix | specify Azure storage endpoint suffix | core.windows.net , core.chinacloudapi.cn , etc |
No | if empty, driver will use default storage endpoint suffix according to cloud environment, e.g. core.windows.net |
containerName | specify the existing container(directory) name | existing container name | No | if empty, driver will create a new container name, starting with pvc-fuse for blobfuse or pvc-nfs for NFSv3 |
containerNamePrefix | specify Azure storage directory prefix created by driver | can only contain lowercase letters, numbers, hyphens, and length should be less than 21 | No | |
server | specify Azure storage account server address | existing server address, e.g. accountname.privatelink.blob.core.windows.net |
No | if empty, driver will use default accountname.blob.core.windows.net or other sovereign cloud account address |
accessTier | Access tier for storage account | Standard account can choose Hot or Cool , and Premium account can only choose Premium |
No | empty(use default setting for different storage account types) |
allowBlobPublicAccess | Allow or disallow public access to all blobs or containers for storage account created by driver | true ,false |
No | false |
requireInfraEncryption | specify whether or not the service applies a secondary layer of encryption with platform managed keys for data at rest for storage account created by driver | true ,false |
No | false |
storageEndpointSuffix | specify Azure storage endpoint suffix | core.windows.net , core.chinacloudapi.cn , etc |
No | if empty, driver will use default storage endpoint suffix according to cloud environment |
tags | tags would be created in newly created storage account | tag format: 'foo=aaa,bar=bbb' | No | "" |
matchTags | whether matching tags when driver tries to find a suitable storage account | true ,false |
No | false |
useDataPlaneAPI | specify whether use data plane API for blob container create/delete, this could solve the SRP API throltting issue since data plane API has almost no limit, while it would fail when there is firewall or vnet setting on storage account | true ,false |
No | false |
--- | Following parameters are only for blobfuse | --- | --- | |
subscriptionID | specify Azure subscription ID in which blob storage directory will be created | Azure subscription ID | No | if not empty, resourceGroup must be provided |
storeAccountKey | whether store account key to k8s secret Note: false means driver would leverage kubelet identity to get account key |
true ,false |
No | true |
secretName | specify secret name to store account key | No | ||
secretNamespace | specify the namespace of secret to store account key | default ,kube-system , etc |
No | pvc namespace |
isHnsEnabled | enable Hierarchical namespace for Azure DataLake storage account |
true ,false |
No | false |
--- | Following parameters are only for NFS protocol | --- | --- | |
mountPermissions | mounted folder permissions. The default is 0777 , if set as 0 , driver will not perform chmod after mount |
0777 |
No | |
vnetResourceGroup | specify vnet resource group where virtual network is | existing resource group name | No | if empty, driver will use the vnetResourceGroup value in azure cloud config file |
vnetName | virtual network name | existing virtual network name | No | if empty, driver will use the vnetName value in azure cloud config file |
subnetName | subnet name | existing subnet name of the agent node | No | if empty, driver will use the subnetName value in azure cloud config file |
softDeleteBlobs | Enable soft delete for blobs, specify the days to retain deleted blobs | "7" | No | Soft Delete Blobs is disabled if empty |
softDeleteContainers | Enable soft delete for containers, specify the days to retain deleted containers | "7" | No | Soft Delete Containers is disabled if empty |
enableBlobVersioning | Enable blob versioning, can't enabled when protocol is nfs or isHnsEnabled is true |
true ,false |
No | versioning for blobs is disabled if empty |
fsGroup
securityContext setting
Blobfuse driver does not honor fsGroup
securityContext setting, instead user could use -o gid=1000
in mountOptions
to set ownership, check here for more mountoptions.
-
Regarding the support for Azure DataLake storage account when using blobfuse mount
- To create an ADLS account using the driver in dynamic provisioning, you need to specify
isHnsEnabled: "true"
in the storage class parameters. - To enable blobfuse access to an ADLS account in static provisioning, you need to specify the mount option
--use-adls=true
in the persistent volume.
- To create an ADLS account using the driver in dynamic provisioning, you need to specify
-
account tags format created by dynamic provisioning
k8s-azure-created-by: azure
- file share name format created by dynamic provisioning(example)
pvc-92a4d7f2-f23b-4904-bad4-2cbfcff6e388
- VolumeID(
volumeHandle
) is the identifier for the volume handled by the driver, format of VolumeID:rg#accountName#containerName#uuid#secretNamespace#subscriptionID
uuid
,secretNamespace
,subscriptionID
are optional
blobfuse read account key or SAS token from key vault example
blobfuse Managed Identity and Service Principal Name auth example
Name | Meaning | Available Value | Mandatory | Default value |
---|---|---|---|---|
volumeHandle | Specify a value the driver can use to uniquely identify the storage blob container in the cluster. | A recommended way to produce a unique value is to combine the globally unique storage account name and container name: {account-name}_{container-name}. Note: the # character is reserved for internal use. | Yes | |
volumeAttributes.resourceGroup | Azure resource group name | existing resource group name | No | if empty, driver will use the same resource group name as current k8s cluster |
volumeAttributes.storageAccount | existing storage account name | existing storage account name | Yes | |
volumeAttributes.containerName | existing container name | existing container name | Yes | |
volumeAttributes.protocol | specify blobfuse, blobfuse2 or NFSv3 mount (blobfuse2 is still in Preview) | fuse , fuse2 , nfs |
No | fuse |
--- | Following parameters are only for blobfuse | --- | --- | |
volumeAttributes.secretName | secret name that stores storage account name and key(only applies for SMB) | No | ||
volumeAttributes.secretNamespace | secret namespace | default ,kube-system , etc |
No | pvc namespace |
nodeStageSecretRef.name | secret name that stores(check below examples):azurestorageaccountkey azurestorageaccountsastoken msisecret azurestoragespnclientsecret |
existing Kubernetes secret name | No | |
nodeStageSecretRef.namespace | secret namespace | k8s namespace | Yes | |
--- | Following parameters are only for NFS protocol | --- | --- | |
volumeAttributes.mountPermissions | mounted folder permissions | 0777 |
No | |
--- | Following parameters are only for feature: blobfuse Managed Identity and Service Principal Name auth | --- | --- | |
volumeAttributes.AzureStorageAuthType | Authentication Type | Key , SAS , MSI , SPN |
No | Key |
volumeAttributes.AzureStorageIdentityClientID | Identity Client ID | No | ||
volumeAttributes.AzureStorageIdentityObjectID | Identity Object ID | No | ||
volumeAttributes.AzureStorageIdentityResourceID | Identity Resource ID | No | ||
volumeAttributes.MSIEndpoint | MSI Endpoint | No | ||
volumeAttributes.AzureStorageSPNClientID | SPN Client ID | No | ||
volumeAttributes.AzureStorageSPNTenantID | SPN Tenant ID | No | ||
volumeAttributes.AzureStorageAADEndpoint | AADEndpoint | No | ||
--- | Following parameters are only for feature: blobfuse read account key or SAS token from key vault | --- | --- | |
volumeAttributes.keyVaultURL | Azure Key Vault DNS name | existing Azure Key Vault DNS name | No | |
volumeAttributes.keyVaultSecretName | Azure Key Vault secret name | existing Azure Key Vault secret name | No | |
volumeAttributes.keyVaultSecretVersion | Azure Key Vault secret version | existing version | No | if empty, driver will use current version |
- create a Kubernetes secret for
nodeStageSecretRef.name
kubectl create secret generic azure-secret --from-literal=azurestorageaccountname="xxx" --from-literal azurestorageaccountkey="xxx" --type=Opaque
kubectl create secret generic azure-secret --from-literal=azurestorageaccountname="xxx" --from-literal azurestorageaccountsastoken="xxx" --type=Opaque
kubectl create secret generic azure-secret --from-literal msisecret="xxx" --type=Opaque
# azurestoragespnclientid, azurestoragespntenantid field setting in secret is only supported from v1.21.3
kubectl create secret generic azure-secret --from-literal azurestoragespnclientsecret="xxx" azurestoragespnclientid="xxx" azurestoragespntenantid="xxx" --type=Opaque
- mounting blobfuse requires account key, if
nodeStageSecretRef
field is not provided in PV config, azure file driver would try to getazure-storage-account-{accountname}-secret
in the pod namespace first, if that secret does not exist, it would get account key by Azure storage account API directly using kubelet identity (make sure kubelet identity has reader access to the storage account). - mounting blob storage NFSv3 does not need account key, NFS mount access is configured by following setting:
Firewalls and virtual networks
: selectEnabled from selected virtual networks and IP addresses
with same vnet as agent node
- blobfuse cache(
--tmp-path
mount option)- blobfuse cache is on
/mnt
directory by default,/mnt
is mounted on temp disk if VM sku provides temp disk,/mnt
is mounted on os disk if VM sku does not provide temp disk - with blobfuse-proxy deployment (default on AKS), user could set
--tmp-path=
mount option to specify a different cache directory
- blobfuse cache is on
- Mount an azure blob storage with a dedicated user-assigned managed identity
- Blobfuse Performance and caching
- Blobfuse CLI Flag Options v1 & v2
if
containerName
value contains following strings, it would be converted into corresponding pv/pvc name or namespace
${pvc.metadata.name}
${pvc.metadata.namespace}
${pv.metadata.name}