mirror of
https://github.com/rancher/rancher-docs.git
synced 2026-05-05 04:33:18 +00:00
3a4b7e73c0
* gerundify Configuration for Storage Classes in Azure * gerundify Authentication Config * gerundify Bootstrap Password * gerundify and disambiguate manage-PSP * gerundify and disambiguate create-PSP * syncing? Syncing what? * updating label for Configure OpenLDAP * updating label for authentication config * updating label for configuring microsoft ad and shibboleth (saml) * updating label for configuring microsoft ad and shibboleth (saml) in sidebars (last commit covered versioned docs) * label + title for one of several sets of pages entitled role-based access control * gerundify Upgrade a Hardened Custom/Imported Cluster to Kubernetes v1.25 * re-order title of Certificate Troubleshooting so verb comes first * added 'about' to title because the page is about drivers that provision, not how to provision a driver * template enforcement > enforcing templates * update label to match title - deploy > deploying * updated label to matach title - manage clusters > cluster administration * gerundify set up in infrastructure setup section * typo fix - spacing * matching label to title - launch > launching * label matching title - set up part 2 * label matching title - windows clusters * how to configure > configuring * using > launching (partially matches label to title) * ingress config > configging an ingress * match label to title - project administration * match label to title - project resource quotas * match title to label - monitoring/alerting guides * matching label to title - enabling * gerundify allow unsupported storage drivers * Update openapi/swagger.json * lost metadata syntax re-applied * Apply suggestions from code review
1.5 KiB
1.5 KiB
title
| title |
|---|
| Configuring Storage Classes in Azure |
If you are using Azure VMs for your nodes, you can use Azure files as a StorageClass for the cluster.
In order to have the Azure platform create the required storage resources, follow these steps:
-
Configure
kubectlto connect to your cluster. -
Copy the
ClusterRoleandClusterRoleBindingmanifest for the service account:--- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: system:azure-cloud-provider rules: - apiGroups: [''] resources: ['secrets'] verbs: ['get','create'] --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: system:azure-cloud-provider roleRef: kind: ClusterRole apiGroup: rbac.authorization.k8s.io name: system:azure-cloud-provider subjects: - kind: ServiceAccount name: persistent-volume-binder namespace: kube-system -
Create these in your cluster using one of the follow command.
# kubectl create -f <MANIFEST>