How to Mount a Sitecore License File in Kubernetes via Azure File Persistent Volume

Updated Apr 8, 2024

In this blog post, I will describe how to resolve the issue when your encoded Sitecore License is too big to be placed into the Azure DevOps variable to be consumed by Kubernetes as a secret value. In two words, we will use the Kubernetes persistent volume as an Azure File share.

As we know, the Sitecore license file is passed to the container as an environment variable (called Sitecore_License) in the encoded string form. In Kubernetes, we usually put this encoded value into a secret file; for instance:


We store and manage all Sitecore K8S specifications in source control, and the secrets are no exception. For security reasons, keeping secrets in source control is bad practice. In a project I was involved in, we used the Azure DevOps variable group to define all secrets.

Unfortunately, the Sitecore License secret is too big to be kept as an Azure DevOps variable. It says: “Length of variable `SITECORE_LICENSE` is invalid. It must be between 0 and 4096 characters.”


One solution is to store the license secret in the Azure key-vault. But I would like to introduce another solution — Kubernetes Persistent Volumes (volumes defined and created as part of the pod lifecycle only exist until you delete the pod).


Source: Microsoft  

Kubernetes supports different types of volumes and one of them is Azure File persistent volume. This means we can create the Azure File Share, put the Sitecore license file into and mount it as a Kubernetes volume. The following algorithm shows how to do that:

Step 1. Create a resource group (sugbelarus1 in my sample).

Step 1

Step 2. Create a storage account (sugbelarus in my sample).

Step 3. Create the Azure File Share (license in my sample).

Step 3

Step 4. Get the storage account key.

Step 4

All these steps could be completed via Azure CLI.

# Change these four parameters as needed for your own environment

# Create a resource group
az group create --name $AKS_PERS_RESOURCE_GROUP --location $AKS_PERS_LOCATION 

# Create a storage account
az storage account create -n $AKS_PERS_STORAGE_ACCOUNT_NAME -g $AKS_PERS_RESOURCE_GROUP -l $AKS_PERS_LOCATION --sku Standard_LRS 

# Export the connection string as an environment variable, this is used when creating the Azure file share
export AZURE_STORAGE_CONNECTION_STRING=$(az storage account show-connection-string -n $AKS_PERS_STORAGE_ACCOUNT_NAME -g $AKS_PERS_RESOURCE_GROUP -o tsv) 

# Create the file share
az storage share create -n $AKS_PERS_SHARE_NAME --connection-string $AZURE_STORAGE_CONNECTION_STRING 

# Get storage account key
STORAGE_KEY=$(az storage account keys list --resource-group $AKS_PERS_RESOURCE_GROUP --account-name $AKS_PERS_STORAGE_ACCOUNT_NAME --query "[0].value" -o tsv) 

# Echo storage account name and key
echo Storage account name: $AKS_PERS_STORAGE_ACCOUNT_NAME
echo Storage account key: $STORAGE_KEY

Step 5. Upload the Sitecore license file.

Step 5

Step 6. Create a Kubernetes secret.

Kubernetes needs credentials to access the file share created in the previous steps:

kubectl create secret generic azure-secret

Run the kubectl get secrets command to validate if a new secret was created.

Step 6

You can also validate via Visual Studio Code using the Kubernetes extension.

Step 6-1

Step 7. Configure the volume in the container specification; for instance, cm.yaml file.

  • Define the volumeMounts section:
Step 7
  • Define the Volume section.
Step 7-1
  • Define the SITECORE_LICENSE_LOCATION environment variable (from Sitecore 9.X you can use this variable to configure the license location).
Step 7-2

Step 8. Deploy updated specification (kubectl apply command) and exec the updated pod.

kubectl exec --stdin --tty cm-854986576d-l2cls

Where cm-797498f98d-lj6bz – pod name (run kubectl get pods command to get the name)

Make sure you can find the license file where you mounted it.

That’s it for today! Happy voluming, everyone!