Skip to content

Commit 646929b

Browse files
Merge pull request #296473 from bishal41/manage-secrets
Move secrets related content to Manage Secret page
2 parents a0b87e2 + 4f9f63b commit 646929b

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/iot-operations/secure-iot-ops/howto-manage-secrets.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,5 +49,7 @@ You can use **Manage secrets** for asset endpoints and data flow endpoints to ma
4949

5050
You can delete synced secrets as well in manage secrets. When you delete a synced secret, it only deletes the synced secret from the edge, and doesn't delete the contained secret reference from key vault.
5151

52-
> [!NOTE]
53-
> Before deleting a synced secret, make sure that all references to the secret from Azure IoT Operations components are removed.
52+
> [!WARNING]
53+
> Directly editing **SecretProviderClass** and **SecretSync** custom resources in your Kubernetes cluster can break the secrets flow in Azure IoT Operations. For any operations related to secrets, use the operations experience UI.
54+
>
55+
> Before deleting a synced secret, make sure that all references to the secret from Azure IoT Operations components are removed.

articles/iot-operations/troubleshoot/known-issues.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,6 @@ This article lists the known issues for Azure IoT Operations.
1717

1818
- If you prefer to have no updates made to your cluster without giving explicit consent, you should disable Arc updates when you enable the cluster. This is due to the fact that some system extensions are automatically updated by the Arc agent. To disable updates, include the `--disable-auto-upgrade` flag as part of the `az connectedk8s connect` command.
1919

20-
- Directly editing **SecretProviderClass** and **SecretSync** custom resources in your Kubernetes cluster can break the secrets flow in Azure IoT Operations. For any operations related to secrets, use the operations experience UI.
21-
2220
- During and after deploying Azure IoT Operations, you might see warnings about `Unable to retrieve some image pull secrets (regcred)` in the logs and Kubernetes events. These warnings are expected and don't affect the deployment and use of Azure IoT Operations.
2321

2422
- If your deployment fails with the message `Error occurred while creating custom resources needed by system extensions`, you have encountered a known sporadic failure that will be fixed in a future release. As a workaround, use the [az iot ops delete](/cli/azure/iot/ops#az-iot-ops-delete) command with the `--include-deps` flag to delete Azure IoT Operations from your cluster. When Azure IoT Operations and its dependencies are deleted from your cluster, retry the deployment.

0 commit comments

Comments
 (0)