You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -30,6 +30,9 @@ Before you delete a secret, deploy a new revision that no longer references the
30
30
31
31
Secrets are defined as a set of name/value pairs. The value of each secret is specified directly or as a reference to a secret stored in Azure Key Vault.
32
32
33
+
> [!NOTE]
34
+
> You should not specify the value of a secret directly in a production environment. Instead, use a reference to a secret stored in Azure Key Vault, as described in the [next section](#reference-secret-from-key-vault).
35
+
33
36
### Store secret value in Container Apps
34
37
35
38
When you define secrets through the portal, or via different command line options.
@@ -252,7 +255,7 @@ After you've [defined a secret](#defining-secrets) in your container app, you ca
252
255
253
256
In this example, the application connection string is declared as `queue-connection-string` and becomes available elsewhere in the configuration sections.
Here, the environment variable named `connection-string` gets its value from the application-level `queue-connection-string` secret. Also, the Azure Queue Storage scale rule's authentication configuration uses the `queue-connection-string` secret as to define its connection.
Here, the environment variable named `connection-string` gets its value from the application-level `queue-connection-string` secret.
276
280
277
281
# [PowerShell](#tab/powershell)
278
282
283
+
Secrets Key Vault references aren't supported in PowerShell.
284
+
279
285
In this example, you create a container using Azure PowerShell with a secret that's referenced in an environment variable. To reference the secret in an environment variable in PowerShell, set its value to `secretref:`, followed by the name of the secret.
0 commit comments