Skip to content

Commit 0123087

Browse files
author
AbhishekMallick01
committed
AKS command updates
1 parent 3782f1d commit 0123087

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/backup/azure-kubernetes-service-cluster-manage-backups.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Manage Azure Kubernetes Service (AKS) backups using Azure Backup
33
description: This article explains how to manage Azure Kubernetes Service (AKS) backups using Azure Backup.
44
ms.topic: how-to
55
ms.service: backup
6-
ms.date: 04/21/2023
6+
ms.date: 04/26/2023
77
author: jyothisuri
88
ms.author: jsuri
99
---
@@ -82,7 +82,7 @@ This section provides the set of Azure CLI commands to perform create, update, o
8282
To install the Backup Extension, run the following command:
8383

8484
```azurecli-interactive
85-
az k8s-extension create --name azure-aks-backup --extension-type Microsoft.DataProtection.Kubernetes --scope cluster --cluster-type managedClusters --cluster-name <aksclustername> --resource-group <aksclusterrg> --release-train stable --configuration-settings blobContainer=<containername> storageAccount=<storageaccountname> storageAccountResourceGroup=<storageaccountrg> storageAccountSubscriptionId=<subscriptionid>
85+
az k8s-extension create --name azure-aks-backup --extension-type microsoft.dataprotection.kubernetes --scope cluster --cluster-type managedClusters --cluster-name <aksclustername> --resource-group <aksclusterrg> --release-train stable --configuration-settings blobContainer=<containername> storageAccount=<storageaccountname> storageAccountResourceGroup=<storageaccountrg> storageAccountSubscriptionId=<subscriptionid>
8686
```
8787

8888
### View Backup Extension installation status
@@ -127,11 +127,11 @@ To enable Trusted Access between Backup vault and AKS cluster, use the following
127127

128128
```azurecli-interactive
129129
az aks trustedaccess rolebinding create \
130-
--resource-group <backupvaultrg> \
131-
--cluster-name <aksclustername> \
132-
--name <randomRoleBindingName> \
133-
--source-resource-id /subscriptions/<subscriptionid>/resourcegroups/<backupvaultrg>/providers/Microsoft.DataProtection/BackupVaults/<backupvaultname> \
134-
--roles Microsoft.DataProtection/backupVaults/backup-operator
130+
-g $myResourceGroup \ 
131+
--cluster-name $myAKSCluster 
132+
–n <randomRoleBindingName> \ 
133+
--source-resource-id <vaultID> \ 
134+
--roles Microsoft.DataProtection/backupVaults/backup-operator
135135
```
136136

137137
Learn more about [other commands related to Trusted Access](../aks/trusted-access-feature.md#trusted-access-feature-overview).

0 commit comments

Comments
 (0)