Skip to content

Commit 15ec0b2

Browse files
committed
update
1 parent ef36ad5 commit 15ec0b2

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/azure-app-configuration/howto-geo-replication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ You can specify one or more endpoints of a geo-replication-enabled App Configura
179179

180180
The automatically discovered replicas will be selected and used randomly. If you have a preference for specific replicas, you can explicitly specify their endpoints. This feature is enabled by default, but you can refer to the following sample code to disable it.
181181

182-
### [.NET](#tab/Dotnet)
182+
### [.NET](#tab/dotnet)
183183

184184
Edit the call to the `AddAzureAppConfiguration` method, which is often found in the `program.cs` file of your application.
185185

@@ -216,7 +216,7 @@ spec:
216216
```
217217
218218
> [!NOTE]
219-
> The automatic replica discovery and failover support is available if you use version **1.3.0** or later of [Azure App Configuration Kubernetes Provider](https://mcr.microsoft.com/product/azure-app-configuration/kubernetes-provider/about).
219+
> The automatic replica discovery and failover support is available if you use version **1.3.0** or later of [Azure App Configuration Kubernetes Provider](./quickstart-azure-kubernetes-service.md).
220220
221221
---
222222

articles/azure-app-configuration/reference-kubernetes-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -426,7 +426,7 @@ Two Kubernetes built-in [types of Secrets](https://kubernetes.io/docs/concepts/c
426426
|---|---|
427427
|.kubernetes.secret.type|kubernetes.io/tls|
428428

429-
### Refresh of secrets from Key Vault
429+
#### Refresh of secrets from Key Vault
430430

431431
Refreshing secrets from Key Vaults usually requires reloading the corresponding Key Vault references from Azure App Configuration. However, with the `spec.secret.refresh` property, you can refresh the secrets from Key Vault independently. This is especially useful for ensuring that your workload automatically picks up any updated secrets from Key Vault during secret rotation. Note that to load the latest version of a secret, the Key Vault reference must not be a versioned secret.
432432

0 commit comments

Comments
 (0)