You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/csi-secrets-store-driver.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,10 +89,10 @@ az aks enable-addons --addons azure-keyvault-secrets-provider --name myAKSCluste
89
89
90
90
## Verify Secrets Store CSI Driver installation
91
91
92
-
These commands will install the Secrets Store CSI Driver and the Azure Key Vault provider on your nodes. Verify by listing all pods from all namespaces and ensuring your output looks similar to the following:
92
+
These commands will install the Secrets Store CSI Driver and the Azure Key Vault provider on your nodes. Verify by listing all pods with the secrets-store-csi-driver and secrets-store-provider-azure labels in the kube-system namespace and ensuring your output looks similar to the following:
93
93
94
94
```bash
95
-
kubectl get pods -n kube-system
95
+
kubectl get pods -n kube-system -l 'app in (secrets-store-csi-driver, secrets-store-provider-azure)'
@@ -141,6 +141,15 @@ Take note of the following properties for use in the next section:
141
141
- Name of Key Vault resource
142
142
- Azure Tenant ID the Subscription belongs to
143
143
144
+
## Provide identity to access Azure Key Vault
145
+
146
+
The example in this article uses a Service Principal, but the Azure Key Vault provider offers four methods of access. Review them and choose the one that best fits your use case. Be aware additional steps may be required depending on the chosen method, such as granting the Service Principal permissions to get secrets from key vault.
147
+
148
+
-[Service Principal][service-principal-access]
149
+
-[Pod Identity][pod-identity-access]
150
+
-[User-assigned Managed Identity][ua-mi-access]
151
+
-[System-assigned Managed Identity][sa-mi-access]
152
+
144
153
## Create and apply your own SecretProviderClass object
145
154
146
155
To use and configure the Secrets Store CSI driver for your AKS cluster, create a SecretProviderClass custom resource.
@@ -173,15 +182,6 @@ spec:
173
182
174
183
For more information, see [Create your own SecretProviderClass Object][sample-secret-provider-class]. Be sure to use the values you took note of above.
175
184
176
-
## Provide identity to access Azure Key Vault
177
-
178
-
The example in this article uses a Service Principal, but the Azure Key Vault provider offers four methods of access. Review them and choose the one that best fits your use case. Be aware additional steps may be required depending on the chosen method, such as granting the Service Principal permissions to get secrets from key vault.
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/concept-enable-rbac.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,5 +33,8 @@ Azure provides the following Azure built-in roles for authorizing access to App
33
33
-**Contributor**: Use this role to manage the App Configuration resource. While the App Configuration data can be accessed using access keys, this role does not grant direct access to the data using Azure AD.
34
34
-**Reader**: Use this role to give read access to the App Configuration resource. This does not grant access to the resource's access keys, nor to the data stored in App Configuration.
35
35
36
+
> [!NOTE]
37
+
> After a role assignment is made for an identity, allow up to 15 minutes for the permission to propagate before accessing data stored in App Configuration using this identity.
38
+
36
39
## Next steps
37
40
Learn more about using [managed identities](howto-integrate-azure-managed-service-identity.md) to administer your App Configuration service.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-web-app-arm-with-redis-cache-provision.md
+41-4Lines changed: 41 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ The template creates the cache in the same location as the resource group.
78
78
```
79
79
80
80
81
-
### Web app
81
+
### Web app (Azure Cache for Redis)
82
82
Creates the web app with name specified in the **webSiteName** variable.
83
83
84
84
Notice that the web app is configured with app setting properties that enable it to work with the Azure Cache for Redis. These app settings are dynamically created based on values provided during deployment.
@@ -90,8 +90,7 @@ Notice that the web app is configured with app setting properties that enable it
Create a `liveness-probe.yaml` file with the following snippet. This file defines a container group that consists of an NGNIX container that eventually becomes unhealthy.
20
+
Create a `liveness-probe.yaml` file with the following snippet. This file defines a container group that consists of an NGINX container that eventually becomes unhealthy.
0 commit comments