Skip to content

Commit 50fd8f1

Browse files
committed
update role info
1 parent 479b2ab commit 50fd8f1

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/azure-arc/kubernetes/conceptual-gitops-flux2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "GitOps Flux v2 configurations with AKS and Azure Arc-enabled Kubernetes"
33
description: "This article provides a conceptual overview of GitOps in Azure for use in Azure Arc-enabled Kubernetes and Azure Kubernetes Service (AKS) clusters."
4-
ms.date: 03/17/2023
4+
ms.date: 03/20/2023
55
ms.topic: conceptual
66
ms.custom: devx-track-azurecli, references-regions
77
---
@@ -365,7 +365,7 @@ If you use `azblob` source, here are the blob-specific command arguments.
365365
| `--mi_client_id` | String | The client ID of the managed identity for authentication with Azure Blob |
366366

367367
> [!IMPORTANT]
368-
> When using managed identity authentication for AKS clusters and `azblob` source, the managed identity must be assigned the [Storage Blob Data Reader](/azure/role-based-access-control/built-in-roles#storage-blob-data-reader) or [Storage Blob Data Contributor](/azure/role-based-access-control/built-in-roles#storage-blob-data-contributor) role. Authentication using a managed identity is not yet available for Azure Arc-enabled Kubernetes clusters.
368+
> When using managed identity authentication for AKS clusters and `azblob` source, the managed identity must be assigned at minimum the [Storage Blob Data Reader](/azure/role-based-access-control/built-in-roles#storage-blob-data-reader) role. Authentication using a managed identity is not yet available for Azure Arc-enabled Kubernetes clusters.
369369
370370
### Local secret for authentication with source
371371

0 commit comments

Comments
 (0)