You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Azure Key Vault design makes sharp distinctions between keys, secrets, and certificates. The Key Vault service’s certificates features were designed to make use of its key and secret capabilities. When a key vault certificate is created, an addressable key and secret are also created with the same name. The key allows key operations, and the secret allows the retrieval of the certificate value as a secret.
@@ -208,13 +213,17 @@ A key vault certificate also contains public x509 certificate metadata. The key
208
213
209
214
* To disable autorotation, first disable the addon. Then, re-enable the addon without the `enable-secret-rotation` parameter.
210
215
211
-
```azurecli-interactive
212
-
# disable the addon
213
-
az aks addon disable -g myResourceGroup -n myAKSCluster2 -a azure-keyvault-secrets-provider
216
+
Disable the secrets provider addon:
214
217
215
-
# re-enable the addon without the `enable-secret-rotation` parameter
216
-
az aks addon enable -g myResourceGroup -n myAKSCluster2 -a azure-keyvault-secrets-provider
217
-
```
218
+
```azurecli-interactive
219
+
az aks addon disable -g myResourceGroup -n myAKSCluster2 -a azure-keyvault-secrets-provider
220
+
```
221
+
222
+
Re-enable the secrets provider addon, but without the `enable-secret-rotation` parameter:
223
+
224
+
```bash
225
+
az aks addon enable -g myResourceGroup -n myAKSCluster2 -a azure-keyvault-secrets-provider
226
+
```
218
227
219
228
### Sync mounted content with a Kubernetes secret
220
229
@@ -339,17 +348,30 @@ In this article, you learned how to use the Azure Key Vault Provider for Secrets
0 commit comments