Skip to content

Commit 460377c

Browse files
authored
Merge pull request #277026 from JnHs/jh-arck8-akvimage
update images and review topic
2 parents 4a541bf + 75082c4 commit 460377c

File tree

5 files changed

+4
-4
lines changed

5 files changed

+4
-4
lines changed
52.4 KB
Loading
30.5 KB
Loading

articles/azure-arc/kubernetes/tutorial-akv-secrets-provider.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Use Azure Key Vault Secrets Provider extension to fetch secrets into Azure Arc-enabled Kubernetes clusters
33
description: Learn how to set up the Azure Key Vault Provider for Secrets Store CSI Driver interface as an extension on Azure Arc enabled Kubernetes cluster
44
ms.custom: devx-track-azurecli
5-
ms.date: 02/09/2024
5+
ms.date: 06/03/2024
66
ms.topic: how-to
77
---
88

@@ -47,11 +47,11 @@ Only one instance of the extension can be deployed on each Azure Arc-enabled Kub
4747
1. In the [Azure portal](https://portal.azure.com/#home), navigate to **Kubernetes - Azure Arc** and select your cluster.
4848
1. Select **Extensions** (under **Settings**), and then select **+ Add**.
4949

50-
[![Screenshot showing the Extensions page for an Arc-enabled Kubernetes cluster in the Azure portal.](media/tutorial-akv-secrets-provider/extension-install-add-button.jpg)](media/tutorial-akv-secrets-provider/extension-install-add-button.jpg#lightbox)
50+
:::image type="content" source="media/tutorial-akv-secrets-provider/extension-install-add-button.png" lightbox="media/tutorial-akv-secrets-provider/extension-install-add-button.png" alt-text="Screenshot showing the Extensions pane for an Arc-enabled Kubernetes cluster in the Azure portal.":::
5151

5252
1. From the list of available extensions, select **Azure Key Vault Secrets Provider** to deploy the latest version of the extension.
5353

54-
[![Screenshot of the Azure Key Vault Secrets Provider extension in the Azure portal.](media/tutorial-akv-secrets-provider/extension-install-new-resource.jpg)](media/tutorial-akv-secrets-provider/extension-install-new-resource.jpg)
54+
:::image type="content" source="media/tutorial-akv-secrets-provider/extension-install-new-resource.png" alt-text="Screenshot showing the Azure Key Vault Secrets Provider extension in the Azure portal.":::
5555

5656
1. Follow the prompts to deploy the extension. If needed, customize the installation by changing the default options on the **Configuration** tab.
5757

@@ -279,7 +279,7 @@ Before you move on to the next section, take note of the following properties:
279279

280280
Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed through a service principal. Follow these steps to provide an identity that can access your Key Vault.
281281

282-
1. Follow the steps [to create a service principal in Azure](../../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal). Take note of the Client ID and Client Secret generated in this step.
282+
1. Follow the steps [to create a service principal in Azure](/entra/identity-platform/howto-create-service-principal-portal). Take note of the Client ID and Client Secret generated in this step.
283283
1. Next, [ensure Azure Key Vault has GET permission to the created service principal](../../key-vault/general/assign-access-policy.md#assign-an-access-policy).
284284
1. Use the client ID and Client Secret from the first step to create a Kubernetes secret on the connected cluster:
285285

0 commit comments

Comments
 (0)