Skip to content

Commit 3eee881

Browse files
authored
Merge pull request #157262 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/azure-docs (branch master)
2 parents ed22cb9 + b23ad96 commit 3eee881

11 files changed

+154
-102
lines changed

articles/aks/csi-secrets-store-driver.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -89,10 +89,10 @@ az aks enable-addons --addons azure-keyvault-secrets-provider --name myAKSCluste
8989

9090
## Verify Secrets Store CSI Driver installation
9191

92-
These commands will install the Secrets Store CSI Driver and the Azure Key Vault provider on your nodes. Verify by listing all pods from all namespaces and ensuring your output looks similar to the following:
92+
These commands will install the Secrets Store CSI Driver and the Azure Key Vault provider on your nodes. Verify by listing all pods with the secrets-store-csi-driver and secrets-store-provider-azure labels in the kube-system namespace and ensuring your output looks similar to the following:
9393

9494
```bash
95-
kubectl get pods -n kube-system
95+
kubectl get pods -n kube-system -l 'app in (secrets-store-csi-driver, secrets-store-provider-azure)'
9696

9797
NAMESPACE NAME READY STATUS RESTARTS AGE
9898
kube-system aks-secrets-store-csi-driver-4vpkj 3/3 Running 2 4m25s
@@ -141,6 +141,15 @@ Take note of the following properties for use in the next section:
141141
- Name of Key Vault resource
142142
- Azure Tenant ID the Subscription belongs to
143143

144+
## Provide identity to access Azure Key Vault
145+
146+
The example in this article uses a Service Principal, but the Azure Key Vault provider offers four methods of access. Review them and choose the one that best fits your use case. Be aware additional steps may be required depending on the chosen method, such as granting the Service Principal permissions to get secrets from key vault.
147+
148+
- [Service Principal][service-principal-access]
149+
- [Pod Identity][pod-identity-access]
150+
- [User-assigned Managed Identity][ua-mi-access]
151+
- [System-assigned Managed Identity][sa-mi-access]
152+
144153
## Create and apply your own SecretProviderClass object
145154

146155
To use and configure the Secrets Store CSI driver for your AKS cluster, create a SecretProviderClass custom resource.
@@ -173,15 +182,6 @@ spec:
173182
174183
For more information, see [Create your own SecretProviderClass Object][sample-secret-provider-class]. Be sure to use the values you took note of above.
175184
176-
## Provide identity to access Azure Key Vault
177-
178-
The example in this article uses a Service Principal, but the Azure Key Vault provider offers four methods of access. Review them and choose the one that best fits your use case. Be aware additional steps may be required depending on the chosen method, such as granting the Service Principal permissions to get secrets from key vault.
179-
180-
- [Service Principal][service-principal-access]
181-
- [Pod Identity][pod-identity-access]
182-
- [User-assigned Managed Identity][ua-mi-access]
183-
- [System-assigned Managed Identity][sa-mi-access]
184-
185185
### Apply the SecretProviderClass to your cluster
186186
187187
Next, deploy the SecretProviderClass you created. For example:

articles/azure-app-configuration/concept-enable-rbac.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,5 +33,8 @@ Azure provides the following Azure built-in roles for authorizing access to App
3333
- **Contributor**: Use this role to manage the App Configuration resource. While the App Configuration data can be accessed using access keys, this role does not grant direct access to the data using Azure AD.
3434
- **Reader**: Use this role to give read access to the App Configuration resource. This does not grant access to the resource's access keys, nor to the data stored in App Configuration.
3535

36+
> [!NOTE]
37+
> After a role assignment is made for an identity, allow up to 15 minutes for the permission to propagate before accessing data stored in App Configuration using this identity.
38+
3639
## Next steps
3740
Learn more about using [managed identities](howto-integrate-azure-managed-service-identity.md) to administer your App Configuration service.

articles/azure-cache-for-redis/cache-web-app-arm-with-redis-cache-provision.md

Lines changed: 41 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The template creates the cache in the same location as the resource group.
7878
```
7979

8080

81-
### Web app
81+
### Web app (Azure Cache for Redis)
8282
Creates the web app with name specified in the **webSiteName** variable.
8383

8484
Notice that the web app is configured with app setting properties that enable it to work with the Azure Cache for Redis. These app settings are dynamically created based on values provided during deployment.
@@ -90,8 +90,7 @@ Notice that the web app is configured with app setting properties that enable it
9090
"type": "Microsoft.Web/sites",
9191
"location": "[resourceGroup().location]",
9292
"dependsOn": [
93-
"[concat('Microsoft.Web/serverFarms/', variables('hostingPlanName'))]",
94-
"[concat('Microsoft.Cache/Redis/', variables('cacheName'))]"
93+
"[concat('Microsoft.Web/serverFarms/', variables('hostingPlanName'))]"
9594
],
9695
"tags": {
9796
"[concat('hidden-related:', resourceGroup().id, '/providers/Microsoft.Web/serverfarms/', variables('hostingPlanName'))]": "empty",
@@ -111,7 +110,45 @@ Notice that the web app is configured with app setting properties that enable it
111110
"[concat('Microsoft.Cache/Redis/', variables('cacheName'))]"
112111
],
113112
"properties": {
114-
"CacheConnection": "[concat(variables('cacheName'),'.redis.cache.windows.net,abortConnect=false,ssl=true,password=', listKeys(resourceId('Microsoft.Cache/Redis', variables('cacheName')), '2015-08-01').primaryKey)]"
113+
"CacheConnection": "[concat(variables('cacheHostName'),'.redis.cache.windows.net,abortConnect=false,ssl=true,password=', listKeys(resourceId('Microsoft.Cache/Redis', variables('cacheName')), '2015-08-01').primaryKey)]"
114+
}
115+
}
116+
]
117+
}
118+
```
119+
120+
121+
### Web app (RedisEnterprise)
122+
For RedisEnterprise, because the resource types are slightly different, the way to do **listKeys** is different:
123+
124+
```json
125+
{
126+
"apiVersion": "2015-08-01",
127+
"name": "[variables('webSiteName')]",
128+
"type": "Microsoft.Web/sites",
129+
"location": "[resourceGroup().location]",
130+
"dependsOn": [
131+
"[concat('Microsoft.Web/serverFarms/', variables('hostingPlanName'))]"
132+
],
133+
"tags": {
134+
"[concat('hidden-related:', resourceGroup().id, '/providers/Microsoft.Web/serverfarms/', variables('hostingPlanName'))]": "empty",
135+
"displayName": "Website"
136+
},
137+
"properties": {
138+
"name": "[variables('webSiteName')]",
139+
"serverFarmId": "[resourceId('Microsoft.Web/serverfarms', variables('hostingPlanName'))]"
140+
},
141+
"resources": [
142+
{
143+
"apiVersion": "2015-08-01",
144+
"type": "config",
145+
"name": "appsettings",
146+
"dependsOn": [
147+
"[concat('Microsoft.Web/Sites/', variables('webSiteName'))]",
148+
"[concat('Microsoft.Cache/RedisEnterprise/databases/', variables('cacheName'), "/default")]",
149+
],
150+
"properties": {
151+
"CacheConnection": "[concat(variables('cacheHostName'),abortConnect=false,ssl=true,password=', listKeys(resourceId('Microsoft.Cache/RedisEnterprise', variables('cacheName'), 'default'), '2020-03-01').primaryKey)]"
115152
}
116153
}
117154
]

articles/container-instances/container-instances-liveness-probe.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Azure Container Instances also supports [readiness probes](container-instances-r
1717
1818
## YAML deployment
1919

20-
Create a `liveness-probe.yaml` file with the following snippet. This file defines a container group that consists of an NGNIX container that eventually becomes unhealthy.
20+
Create a `liveness-probe.yaml` file with the following snippet. This file defines a container group that consists of an NGINX container that eventually becomes unhealthy.
2121

2222
```yaml
2323
apiVersion: 2019-12-01

0 commit comments

Comments
 (0)