You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/quickstart-azure-kubernetes-service.md
+2-26Lines changed: 2 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -245,30 +245,6 @@ Add following key-values to the App Configuration store and leave **Label** and
245
245
> [!TIP]
246
246
> The App Configuration Kubernetes Provider is also available as an AKS extension. This integration allows for seamless installation and management via the Azure CLI, ARM templates, or Bicep templates. Utilizing the AKS extension facilitates automatic minor/patch version updates, ensuring your system is always up-to-date. For detailed installation instructions, please refer to the [Azure App Configuration extension for Azure Kubernetes Service](/azure/aks/azure-app-configuration).
247
247
248
-
1. Follow the step 1-4 in [using workload identity](./reference-kubernetes-provider.md#use-workload-identity) and note down the client ID, tenant ID, resource group and name of the managed identity, the OIDC issuer URL of the AKS cluster, you will use them in the following steps.
249
-
250
-
1. Add a *serviceaccount.yaml* file to the *Deployment* directory with the following content to create a service account for the application.
Replace the value of the `azure.workload.identity/client-id` and `azure.workload.identity/tenant-id` fields with the client ID and tenant ID of the managed identity you created in the previous step.
263
-
264
-
1. Create federated credentials for the service account by running the following command:
Replace the value of the `identity-name`, `resource-group` fields with the name, resource group of your managed identity created in the previous step. Replace the value of the `OIDC-issuer` field with the OIDC issuer URL of your AKS cluster.
271
-
272
248
1. Add an *appConfigurationProvider.yaml* file to the *Deployment* directory with the following content to create an `AzureAppConfigurationProvider` resource. `AzureAppConfigurationProvider` is a custom resource that defines what data to download from an Azure App Configuration store and creates a ConfigMap.
273
249
274
250
```yaml
@@ -332,13 +308,13 @@ Add following key-values to the App Configuration store and leave **Label** and
332
308
name: configmap-created-by-appconfig-provider
333
309
```
334
310
335
-
4. Run the following command to deploy the changes. Replace the namespace if you are using your existing AKS application.
311
+
1. Run the following command to deploy the changes. Replace the namespace if you are using your existing AKS application.
336
312
337
313
```console
338
314
kubectl apply -f ./Deployment -n appconfig-demo
339
315
```
340
316
341
-
5. Refresh the browser. The page shows updated content.
317
+
1. Refresh the browser. The page shows updated content.
342
318
343
319

Copy file name to clipboardExpand all lines: articles/azure-app-configuration/reference-kubernetes-provider.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,7 +163,6 @@ The `spec.featureFlag.refresh` property has the following child properties.
163
163
164
164
Use the following `helm install` command to install the Azure App Configuration Kubernetes Provider. See [helm-values.yaml](https://github.com/Azure/AppConfiguration-KubernetesProvider/blob/main/deploy/parameter/helm-values.yaml) for the complete list of parameters and their default values. You can override the default values by passing the `--set` flag to the command.
0 commit comments