You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/conceptual-gitops-flux2.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "GitOps Flux v2 configurations with AKS and Azure Arc-enabled Kubernetes"
3
3
description: "This article provides a conceptual overview of GitOps in Azure for use in Azure Arc-enabled Kubernetes and Azure Kubernetes Service (AKS) clusters."
@@ -336,7 +336,7 @@ Just like private keys, you can provide your `known_hosts` content directly or i
336
336
337
337
### Bucket source arguments
338
338
339
-
If you use a `bucket` source instead of a `git` source, here are the bucket-specific command arguments.
339
+
If you use `bucket` source, here are the bucket-specific command arguments.
340
340
341
341
| Parameter | Format | Notes |
342
342
| ------------- | ------------- | ------------- |
@@ -348,7 +348,7 @@ If you use a `bucket` source instead of a `git` source, here are the bucket-spec
348
348
349
349
### Azure Blob Storage Account source arguments
350
350
351
-
If you use a `azblob` source, here are the blob-specific command arguments.
351
+
If you use `azblob` source, here are the blob-specific command arguments.
352
352
353
353
| Parameter | Format | Notes |
354
354
| ------------- | ------------- | ------------- |
@@ -365,7 +365,7 @@ If you use a `azblob` source, here are the blob-specific command arguments.
365
365
|`--mi_client_id`| String | The client ID of the managed identity for authentication with Azure Blob |
366
366
367
367
> [!IMPORTANT]
368
-
> When using managed identity authentication for AKS clusters, the managed identity must be assigned the [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) role. Authentication using a managed identity is not yet available for Azure Arc-enabled Kubernetes clusters.
368
+
> When using managed identity authentication for AKS clusters and `azblob` source, the managed identity must be assigned the[Storage Blob Data Reader](/azure/role-based-access-control/built-in-roles#storage-blob-data-reader) or[Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) role. Authentication using a managed identity is not yet available for Azure Arc-enabled Kubernetes clusters.
0 commit comments