Skip to content

Commit 47d1631

Browse files
Merge pull request #276666 from tamram/tamram24-0529
fix pod name typo
2 parents 298f879 + 3e2b836 commit 47d1631

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/aks/workload-identity-deploy-cluster.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ az account set --subscription <subscription-id>
4444

4545
To help simplify steps to configure the identities required, the steps below define environment variables that are referenced in the examples in this article. Remember to replace the values shown with your own values:
4646

47-
```bash
47+
```azurecli-interactive
4848
export RESOURCE_GROUP="myResourceGroup"
4949
export LOCATION="eastus"
5050
export CLUSTER_NAME="myAKSCluster"
@@ -117,7 +117,7 @@ az aks update \
117117

118118
To get the OIDC issuer URL and save it to an environmental variable, run the following command:
119119

120-
```bash
120+
```azurecli-interactive
121121
export AKS_OIDC_ISSUER="$(az aks show --name "${CLUSTER_NAME}" \
122122
--resource-group "${RESOURCE_GROUP}" \
123123
--query "oidcIssuerProfile.issuerUrl" \
@@ -146,7 +146,7 @@ az identity create \
146146

147147
Next, create a variable for the managed identity's client ID.
148148

149-
```bash
149+
```azurecli-interactive
150150
export USER_ASSIGNED_CLIENT_ID="$(az identity show \
151151
--resource-group "${RESOURCE_GROUP}" \
152152
--name "${USER_ASSIGNED_IDENTITY_NAME}" \
@@ -164,7 +164,7 @@ az aks get-credentials --name "${CLUSTER_NAME}" --resource-group "${RESOURCE_GRO
164164

165165
Copy and paste the following multi-line input in the Azure CLI.
166166

167-
```bash
167+
```azurecli-interactive
168168
cat <<EOF | kubectl apply -f -
169169
apiVersion: v1
170170
kind: ServiceAccount
@@ -321,8 +321,8 @@ The following example shows how to use the Azure role-based access control (Azur
321321
322322
To check whether all properties are injected properly by the webhook, use the [kubectl describe][kubectl-describe] command:
323323
324-
```bash
325-
kubectl describe pod quick-start | grep "SECRET_NAME:"
324+
```azurecli-interactive
325+
kubectl describe pod sample-workload-identity-key-vault | grep "SECRET_NAME:"
326326
```
327327

328328
If successful, the output should be similar to the following:
@@ -333,8 +333,8 @@ If successful, the output should be similar to the following:
333333

334334
To verify that pod is able to get a token and access the resource, use the kubectl logs command:
335335

336-
```bash
337-
kubectl logs quick-start
336+
```azurecli-interactive
337+
kubectl logs sample-workload-identity-key-vault
338338
```
339339

340340
If successful, the output should be similar to the following:

0 commit comments

Comments
 (0)