Skip to content

Commit 479b2ab

Browse files
committed
update role detail
1 parent 74ab2fe commit 479b2ab

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/azure-arc/kubernetes/conceptual-gitops-flux2.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "GitOps Flux v2 configurations with AKS and Azure Arc-enabled Kubernetes"
33
description: "This article provides a conceptual overview of GitOps in Azure for use in Azure Arc-enabled Kubernetes and Azure Kubernetes Service (AKS) clusters."
4-
ms.date: 03/14/2023
4+
ms.date: 03/17/2023
55
ms.topic: conceptual
66
ms.custom: devx-track-azurecli, references-regions
77
---
@@ -336,7 +336,7 @@ Just like private keys, you can provide your `known_hosts` content directly or i
336336

337337
### Bucket source arguments
338338

339-
If you use a `bucket` source instead of a `git` source, here are the bucket-specific command arguments.
339+
If you use `bucket` source, here are the bucket-specific command arguments.
340340

341341
| Parameter | Format | Notes |
342342
| ------------- | ------------- | ------------- |
@@ -348,7 +348,7 @@ If you use a `bucket` source instead of a `git` source, here are the bucket-spec
348348

349349
### Azure Blob Storage Account source arguments
350350

351-
If you use a `azblob` source, here are the blob-specific command arguments.
351+
If you use `azblob` source, here are the blob-specific command arguments.
352352

353353
| Parameter | Format | Notes |
354354
| ------------- | ------------- | ------------- |
@@ -365,7 +365,7 @@ If you use a `azblob` source, here are the blob-specific command arguments.
365365
| `--mi_client_id` | String | The client ID of the managed identity for authentication with Azure Blob |
366366

367367
> [!IMPORTANT]
368-
> When using managed identity authentication for AKS clusters, the managed identity must be assigned the [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) role. Authentication using a managed identity is not yet available for Azure Arc-enabled Kubernetes clusters.
368+
> When using managed identity authentication for AKS clusters and `azblob` source, the managed identity must be assigned the [Storage Blob Data Reader](/azure/role-based-access-control/built-in-roles#storage-blob-data-reader) or [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) role. Authentication using a managed identity is not yet available for Azure Arc-enabled Kubernetes clusters.
369369
370370
### Local secret for authentication with source
371371

0 commit comments

Comments
 (0)