Skip to content

Commit 9e3289d

Browse files
committed
remove reference to obsolete cacerts kubernetes secret for plugin ca feature
1 parent 87ceeb0 commit 9e3289d

File tree

1 file changed

+1
-23
lines changed

1 file changed

+1
-23
lines changed

support/azure/azure-kubernetes/extensions/istio-add-on-plug-in-ca-certificate.md

Lines changed: 1 addition & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Istio service mesh add-on plug-in CA certificate troubleshooting
33
description: Learn how to do plug-in CA certificate troubleshooting on the Istio service mesh add-on for Azure Kubernetes Service (AKS).
4-
ms.date: 03/04/2025
4+
ms.date: 03/17/2025
55
author: deveshdama
66
ms.author: ddama
77
editor: v-jsitser
@@ -65,28 +65,6 @@ For more information, see [Plug in CA certificates for Istio-based service mesh
6565

6666
As part of the add-on deployment for the plug-in certificates feature, the following resources are deployed onto the cluster:
6767

68-
- The `cacerts` Kubernetes secret is created in the `aks-istio-system` namespace at the time of the add-on deployment. This secret contains synchronized Azure Key Vault secrets:
69-
70-
```bash
71-
kubectl describe secret cacerts --namespace aks-istio-system
72-
```
73-
74-
```output
75-
Name: cacerts
76-
Namespace: aks-istio-system
77-
Labels: secrets-store.csi.k8s.io/managed=true
78-
Annotations: <none>
79-
80-
Type: opaque
81-
82-
Data
83-
====
84-
ca-cert.pem: 1968 bytes
85-
ca-key.pem: 3272 bytes
86-
cert-chain.pem: 3786 bytes
87-
root-cert.pem: 3636 bytes
88-
```
89-
9068
- The `istio-spc-asm-1-21` [SecretProviderClass object](https://azure.github.io/secrets-store-csi-driver-provider-azure/docs/getting-started/usage/#create-your-own-secretproviderclass-object) is created in the `aks-istio-system` namespace at the time of the add-on deployment. This resource contains Azure-specific parameters for the Secrets Store Container Storage Interface (CSI) driver:
9169

9270
```bash

0 commit comments

Comments
 (0)