You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure Container Apps allows your application to securely store sensitive configuration values. Once secrets are defined at the application level, secured values are available to revisions in your container apps. Additionally, you can reference secured values inside scale rules. For information on using secrets with Dapr, refer to [Dapr integration](./dapr-overview.md).
16
16
17
17
- Secrets are scoped to an application, outside of any specific revision of an application.
18
-
-Adding, removing, or changing secrets doesn't generate new revisions.
18
+
-New revisions don't get generated through adding, removing, or changing secrets.
19
19
- Each application revision can reference one or more secrets.
20
20
- Multiple revisions can reference the same secret(s).
21
21
@@ -80,7 +80,7 @@ Here, a connection string to a queue storage account is declared in the `secrets
80
80
When you create a container app, secrets are defined using the `--secrets` parameter.
81
81
82
82
- The parameter accepts a space-delimited set of name/value pairs.
83
-
- Each pair is delimited by an equals sign (`=`).
83
+
- An equals sign (`=`) delimits each pair.
84
84
85
85
```azurecli-interactive
86
86
az containerapp create \
@@ -181,7 +181,7 @@ Replace `<KEY-VAULT-SECRET-URI>` with the URI of your secret in Key Vault.
181
181
When you create a container app, secrets are defined using the `--secrets` parameter.
182
182
183
183
- The parameter accepts a space-delimited set of name/value pairs.
184
-
- Each pair is delimited by an equals sign (`=`).
184
+
- An equals sign (`=`) delimits each pair.
185
185
- To specify a Key Vault reference, use the format `<SECRET_NAME>=keyvaultref:<KEY_VAULT_SECRET_URI>,identityref:<MANAGED_IDENTITY_ID>`. For example, `queue-connection-string=keyvaultref:https://mykeyvault.vault.azure.net/secrets/queuereader,identityref:/subscriptions/ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0/resourcegroups/my-resource-group/providers/Microsoft.ManagedIdentity/userAssignedIdentities/my-identity`.
186
186
187
187
```azurecli-interactive
@@ -282,7 +282,7 @@ Here, the environment variable named `connection-string` gets its value from the
282
282
283
283
Secrets Key Vault references aren't supported in PowerShell.
284
284
285
-
In this example, you create a container using Azure PowerShell with a secret that's referenced in an environment variable. To reference the secret in an environment variable in PowerShell, set its value to `secretref:`, followed by the name of the secret.
285
+
In this example, you create a container using Azure PowerShell with a secret that referenced in an environment variable. To reference the secret in an environment variable in PowerShell, set its value to `secretref:`, followed by the name of the secret.
0 commit comments