File tree Expand file tree Collapse file tree 1 file changed +5
-5
lines changed Expand file tree Collapse file tree 1 file changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -159,8 +159,8 @@ export AZ_TENANT_ID=$(az account show -o tsv --query tenantId)
159
159
160
160
```
161
161
az keyvault set-policy -n ${KEYVAULT_NAME} \
162
- --secret-permissions get \
163
- --spn ${SERVICE_PRINCIPAL_CLIENT_ID}
162
+ --secret-permissions get \
163
+ --spn ${SERVICE_PRINCIPAL_CLIENT_ID}
164
164
```
165
165
166
166
1. Create and label a secret for Kubernetes to use to access the key vault.
@@ -170,7 +170,7 @@ export AZ_TENANT_ID=$(az account show -o tsv --query tenantId)
170
170
-n my-application \
171
171
--from-literal clientid=${SERVICE_PRINCIPAL_CLIENT_ID} \
172
172
--from-literal clientsecret=${SERVICE_PRINCIPAL_CLIENT_SECRET}
173
- kubectl -n my-application label secret \
173
+ kubectl -n my-application label secret \
174
174
secrets-store-creds secrets-store.csi.k8s.io/used=true
175
175
```
176
176
@@ -199,7 +199,7 @@ export AZ_TENANT_ID=$(az account show -o tsv --query tenantId)
199
199
objectType: secret
200
200
objectVersion: ""
201
201
tenantId: "${AZ_TENANT_ID}"
202
- EOF
202
+ EOF
203
203
```
204
204
205
205
1. Create a pod that uses the `SecretProviderClass` created in the previous step:
@@ -231,7 +231,7 @@ export AZ_TENANT_ID=$(az account show -o tsv --query tenantId)
231
231
secretProviderClass: "azure-kvname"
232
232
nodePublishSecretRef:
233
233
name: secrets-store-creds
234
- EOF
234
+ EOF
235
235
```
236
236
237
237
1. Check that the secret is mounted:
You can’t perform that action at this time.
0 commit comments