-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Epic Blob-CSI] Fix ~~Blob-CSI access via Azure RBAC~~ Azure Subnet Issue (Need to add AKS node pool subnet to allow list for storage accounts) #1033
Comments
This is a sample PV + PVC for testing. Once you bind a pod to this PVC (e.g. by creating a notebook that mounts it) the errors show up on the blob-csi pods. apiVersion: v1
kind: PersistentVolume
metadata:
labels:
data.statcan.gc.ca/classification: unclassified
profile: blair-drummond
name: blair-drummond-standard
spec:
accessModes:
- ReadWriteMany
capacity:
storage: 100G
claimRef:
apiVersion: v1
kind: PersistentVolumeClaim
name: standard
namespace: blair-drummond
csi:
driver: blob.csi.azure.com
nodeStageSecretRef:
name: aawdevcc00samgstandard
namespace: azure-blob-csi-system
volumeAttributes:
containerName: blair-drummond
volumeHandle: blair-drummond-standard
mountOptions:
- -o allow_other
persistentVolumeReclaimPolicy: Retain
volumeMode: Filesystem
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
labels:
blob.aaw.statcan.gc.ca/automount: "true"
data.statcan.gc.ca/classification: unclassified
name: standard
namespace: blair-drummond
spec:
accessModes:
- ReadWriteMany
resources:
requests:
storage: 100G
storageClassName: ""
volumeMode: Filesystem
volumeName: blair-drummond-standard |
As per conversation with @zachomedia , ideally this will be accessible from all user workloads, both Unclassified and Protected-B. We have both Protected-B ( Unclassified Storage accounts will be accessed by Protected-B storage accounts will only be accessed by Protected-B nodes. Let me know if I can provide anything else @zachomedia ! |
Per the conversation on Slack, I have temporarily granted |
Resolved! The issue had nothing to do with RBAC, it was that permission had not been granted to the unclassified subnet in the storage accounts. Resolved by modifying the storage account terraform. |
Context: this comment is for documentation purposes - it will be moved to a separate location in the future.
Important Concept: there is an asymmetry with subnet access for the storage accounts:
|
The text was updated successfully, but these errors were encountered: