You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/csi-secrets-store-driver.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,25 +39,25 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
39
39
1. Create an Azure resource group using the [`az group create`][az-group-create] command.
40
40
41
41
```azurecli-interactive
42
-
az group create -n myResourceGroup -l eastus2
42
+
az group create --name myResourceGroup --location eastus2
43
43
```
44
44
45
-
2. Create an AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver capability using the [`az aks create`][az-aks-create] command and enablethe `azure-keyvault-secrets-provider` add-on.
45
+
2. Create an AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver capability using the [`az aks create`][az-aks-create] command with the --enable-managed-identity parameter and the `--enable-addons azure-keyvault-secrets-provider` parameter. The add-on creates a user-assigned managed identity you can use to authenticate to your key vault. The following example creates an AKS cluster with the Azure Key Vault provider for Secrets Store CSI Driver enabled.
46
46
47
47
> [!NOTE]
48
48
> If you want to use Microsoft Entra Workload ID, you must also use the `--enable-oidc-issuer` and `--enable-workload-identity` parameters, such as in the following example:
49
49
>
50
50
> ```azurecli-interactive
51
-
> az aks create -n myAKSCluster -g myResourceGroup --enable-addons azure-keyvault-secrets-provider --enable-oidc-issuer --enable-workload-identity
51
+
> az aks create --name myAKSCluster --resource-group myResourceGroup --enable-addons azure-keyvault-secrets-provider --enable-oidc-issuer --enable-workload-identity
52
52
> ```
53
53
54
54
```azurecli-interactive
55
-
az aks create -n myAKSCluster -g myResourceGroup --enable-addons azure-keyvault-secrets-provider
55
+
az aks create --name myAKSCluster --resource-group myResourceGroup --enable-managed-identity --enable-addons azure-keyvault-secrets-provider
56
56
```
57
57
58
-
3. The add-on creates a user-assigned managed identity, `azureKeyvaultSecretsProvider`, to access Azure resources. The following example uses this identity to connect to the key vault that stores the secrets, but you can also use other [identity access methods][identity-access-methods]. Take note of the identity's `clientId` in the output.
58
+
3. The previous command creates a user-assigned managed identity, `azureKeyvaultSecretsProvider`, to access Azure resources. The following example uses this identity to connect to the key vault that stores the secrets, but you can also use other [identity access methods][identity-access-methods]. Take note of the identity's `clientId` in the output.
59
59
60
-
```json
60
+
```output
61
61
...,
62
62
"addonProfiles": {
63
63
"azureKeyvaultSecretsProvider": {
@@ -112,16 +112,16 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
112
112
113
113
```azurecli-interactive
114
114
## Create a new Azure key vault
115
-
az keyvault create -n <keyvault-name> -g myResourceGroup -l eastus2 --enable-rbac-authorization
115
+
az keyvault create --name <keyvault-name> --resource-group myResourceGroup --location eastus2 --enable-rbac-authorization
116
116
117
117
## Update an existing Azure key vault
118
-
az keyvault update -n <keyvault-name> -g myResourceGroup -l eastus2 --enable-rbac-authorization
118
+
az keyvault update --name <keyvault-name> --resource-group myResourceGroup --location eastus2 --enable-rbac-authorization
119
119
```
120
120
121
121
2. Your key vault can store keys, secrets, and certificates. In this example, use the [`az keyvault secret set`][az-keyvault-secret-set] command to set a plain-text secret called `ExampleSecret`.
122
122
123
123
```azurecli-interactive
124
-
az keyvault secret set --vault-name <keyvault-name> -n ExampleSecret --value MyAKSExampleSecret
124
+
az keyvault secret set --vault-name <keyvault-name> --name ExampleSecret --value MyAKSExampleSecret
125
125
```
126
126
127
127
3. Take note of the following properties for future use:
0 commit comments