Skip to content

Commit 8a73180

Browse files
committed
Addressing GH issues
1 parent 5200213 commit 8a73180

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/aks/csi-secrets-store-driver.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -214,20 +214,20 @@ A key vault certificate also contains public x509 certificate metadata. The key
214214
215215
```azurecli-interactive
216216
# disable the addon
217-
az aks addon disable -g myResourceGroup -n myAKSCluster2 -a azure-keyvault-secrets-provider --enable-secret-rotation
217+
az aks addon disable -g myResourceGroup -n myAKSCluster2 -a azure-keyvault-secrets-provider
218218
219219
# re-enable the addon without the `enable-secret-rotation` parameter
220220
az aks addon enable -g myResourceGroup -n myAKSCluster2 -a azure-keyvault-secrets-provider
221221
```
222222
223223
### Sync mounted content with a Kubernetes secret
224224
225-
You might want to create a Kubernetes secret to mirror the mounted content. When you create a `SecretProviderClass`, use the `secretObjects` field to define the desired state of the Kubernetes secret, as shown in the following example.
226-
227225
> [!NOTE]
228226
> The YAML examples here are incomplete. You'll need to modify them to support your chosen method of access to your key vault identity. For details, see [Provide an identity to access the Azure Key Vault Provider for Secrets Store CSI Driver][identity-access-methods].
229227
230-
The secrets will sync only after you start a pod to mount them. Relying only on syncing with the Kubernetes secrets feature doesn't work. When the pods that consume the secret are deleted, the Kubernetes secret is also deleted.
228+
You might want to create a Kubernetes secret to mirror your mounted secrets content. Your secrets will sync after you start a pod to mount them. When you delete the pods that consume the secrets, your Kubernetes secret will also be deleted.
229+
230+
To sync mounted content with a Kubernetes secret, use the `secretObjects` field when creating a `SecretProviderClass` to define the desired state of the Kubernetes secret, as shown in the following example.
231231
232232
```yml
233233
apiVersion: secrets-store.csi.x-k8s.io/v1

0 commit comments

Comments
 (0)