22create a pod with blobfuse mount on linux
33### Dynamic Provisioning (create storage account and container automatically by blobfuse driver)
44 - Create a blobfuse CSI storage class
5- ``` sh
5+ ``` console
66kubectl create -f https://raw.githubusercontent.com/csi-driver/blobfuse-csi-driver/master/deploy/example/storageclass-blobfuse-csi-mountoptions.yaml
77```
88
99 - Create a blobfuse CSI PVC
10- ``` sh
10+ ``` console
1111kubectl create -f https://raw.githubusercontent.com/csi-driver/blobfuse-csi-driver/master/deploy/example/pvc-blobfuse-csi.yaml
1212```
1313
1414### Static Provisioning(use an existing storage account)
1515#### Option #1 : use existing credentials in k8s cluster
1616 > make sure the existing credentials in k8s cluster(e.g. service principal, msi) could access the specified storage account
1717 - Download a blobfuse CSI storage class, edit ` resourceGroup ` , ` storageAccount ` , ` containerName ` in storage class
18- ``` sh
18+ ``` console
1919wget https://raw.githubusercontent.com/csi-driver/blobfuse-csi-driver/master/deploy/example/storageclass-blobfuse-csi-existing-container.yaml
2020vi storageclass-blobfuse-csi-existing-container.yaml
2121kubectl create -f storageclass-blobfuse-csi-existing-container.yaml
2222```
2323
2424 - Create a blobfuse CSI PVC
25- ``` sh
25+ ``` console
2626kubectl create -f https://raw.githubusercontent.com/csi-driver/blobfuse-csi-driver/master/deploy/example/pvc-blobfuse-csi.yaml
2727```
2828
2929#### Option #2 : provide storage account name and key(or sastoken)
3030 - Use ` kubectl create secret ` to create ` azure-secret ` with existing storage account name and key(or sastoken)
31- ```
31+ ``` console
3232kubectl create secret generic azure-secret --from-literal azurestorageaccountname=NAME --from-literal azurestorageaccountkey="KEY" --type=Opaque
3333#kubectl create secret generic azure-secret --from-literal azurestorageaccountname=NAME --from-literal azurestorageaccountsastoken
3434="sastoken" --type=Opaque
@@ -37,31 +37,31 @@ kubectl create secret generic azure-secret --from-literal azurestorageaccountnam
3737> storage account key(or sastoken) could also be stored in Azure Key Vault, check example here: [ read-from-keyvault] ( ./docs/read-from-keyvault.md )
3838
3939 - Create a blobfuse CSI PV, download ` pv-blobfuse-csi.yaml ` file and edit ` containerName ` in ` volumeAttributes `
40- ``` sh
40+ ``` console
4141wget https://raw.githubusercontent.com/csi-driver/blobfuse-csi-driver/master/deploy/example/pv-blobfuse-csi.yaml
4242vi pv-blobfuse-csi.yaml
4343kubectl create -f pv-blobfuse-csi.yaml
4444```
4545
4646 - Create a blobfuse CSI PVC which would be bound to the above PV
47- ```
47+ ``` console
4848kubectl create -f https://raw.githubusercontent.com/csi-driver/blobfuse-csi-driver/master/deploy/example/pvc-blobfuse-csi-static.yaml
4949```
5050
5151#### 2. Validate PVC status and create an nginx pod
5252 > make sure pvc is created and in ` Bound ` status
53- ```
53+ ``` console
5454watch kubectl describe pvc pvc-blobfuse
5555```
5656
5757 - create a pod with blobfuse CSI PVC
58- ```
58+ ``` console
5959kubectl create -f https://raw.githubusercontent.com/csi-driver/blobfuse-csi-driver/master/deploy/example/nginx-pod-blobfuse.yaml
6060```
6161
6262#### 3. enter the pod container to do validation
6363 - watch the status of pod until its Status changed from ` Pending ` to ` Running ` and then enter the pod container
64- ``` sh
64+ ``` console
6565$ watch kubectl describe po nginx-blobfuse
6666$ kubectl exec -it nginx-blobfuse -- bash
6767Filesystem Size Used Avail Use% Mounted on
0 commit comments