Skip to content

Commit 6e5c2cc

Browse files
Verified the article, reviewed the content, and fixed all editorial issues. Updated ms.date w.r.t freshness pass.
1 parent 81d8d7a commit 6e5c2cc

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/container-apps/manage-secrets.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: how-to
8-
ms.date: 09/18/2024
8+
ms.date: 12/05/2024
99
ms.author: cshoe
1010
ms.custom: devx-track-azurecli, devx-track-azurepowershell, build-2023
1111
---
@@ -15,7 +15,7 @@ ms.custom: devx-track-azurecli, devx-track-azurepowershell, build-2023
1515
Azure Container Apps allows your application to securely store sensitive configuration values. Once secrets are defined at the application level, secured values are available to revisions in your container apps. Additionally, you can reference secured values inside scale rules. For information on using secrets with Dapr, refer to [Dapr integration](./dapr-overview.md).
1616

1717
- Secrets are scoped to an application, outside of any specific revision of an application.
18-
- Adding, removing, or changing secrets doesn't generate new revisions.
18+
- New revisions don't get generated through adding, removing, or changing secrets.
1919
- Each application revision can reference one or more secrets.
2020
- Multiple revisions can reference the same secret(s).
2121

@@ -80,7 +80,7 @@ Here, a connection string to a queue storage account is declared in the `secrets
8080
When you create a container app, secrets are defined using the `--secrets` parameter.
8181

8282
- The parameter accepts a space-delimited set of name/value pairs.
83-
- Each pair is delimited by an equals sign (`=`).
83+
- An equals sign (`=`) delimits each pair.
8484

8585
```azurecli-interactive
8686
az containerapp create \
@@ -181,7 +181,7 @@ Replace `<KEY-VAULT-SECRET-URI>` with the URI of your secret in Key Vault.
181181
When you create a container app, secrets are defined using the `--secrets` parameter.
182182

183183
- The parameter accepts a space-delimited set of name/value pairs.
184-
- Each pair is delimited by an equals sign (`=`).
184+
- An equals sign (`=`) delimits each pair.
185185
- To specify a Key Vault reference, use the format `<SECRET_NAME>=keyvaultref:<KEY_VAULT_SECRET_URI>,identityref:<MANAGED_IDENTITY_ID>`. For example, `queue-connection-string=keyvaultref:https://mykeyvault.vault.azure.net/secrets/queuereader,identityref:/subscriptions/ffffffff-eeee-dddd-cccc-bbbbbbbbbbb0/resourcegroups/my-resource-group/providers/Microsoft.ManagedIdentity/userAssignedIdentities/my-identity`.
186186

187187
```azurecli-interactive
@@ -282,7 +282,7 @@ Here, the environment variable named `connection-string` gets its value from the
282282

283283
Secrets Key Vault references aren't supported in PowerShell.
284284

285-
In this example, you create a container using Azure PowerShell with a secret that's referenced in an environment variable. To reference the secret in an environment variable in PowerShell, set its value to `secretref:`, followed by the name of the secret.
285+
In this example, you create a container using Azure PowerShell with a secret that referenced in an environment variable. To reference the secret in an environment variable in PowerShell, set its value to `secretref:`, followed by the name of the secret.
286286

287287
```azurepowershell-interactive
288288
$EnvId = (Get-AzContainerAppManagedEnv -ResourceGroupName my-resource-group -EnvName my-environment-name).Id
@@ -494,7 +494,7 @@ To load specific secrets and specify their paths within the mounted volume, defi
494494

495495
# [PowerShell](#tab/powershell)
496496

497-
Mounting secrets as a volume is not supported in PowerShell.
497+
Mounting secrets as a volume isn't supported in PowerShell.
498498

499499
---
500500

0 commit comments

Comments
 (0)