Skip to content

Commit a677615

Browse files
Merge pull request #263683 from MGoedtel/uDeployCoco
minor edits to deploy CoCo article
2 parents 98a218f + ea0d893 commit a677615

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/aks/deploy-confidential-containers-default-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ Use the following command to enable Confidential Containers (preview) by creatin
139139
* **--cluster-name**: Enter a unique name for the AKS cluster, such as *myAKSCluster*.
140140
* **--name**: Enter a unique name for your clusters node pool, such as *nodepool2*.
141141
* **--workload-runtime**: Specify *KataCcIsolation* to enable the feature on the node pool. Along with the `--workload-runtime` parameter, these other parameters shall satisfy the following requirements. Otherwise, the command fails and reports an issue with the corresponding parameter(s).
142-
* **--os-sku**: **AzureLinux*. Only the Azure Linux os-sku supports this feature in this preview release.
142+
* **--os-sku**: *AzureLinux*. Only the Azure Linux os-sku supports this feature in this preview release.
143143
* **--node-vm-size**: Any Azure VM size that is a generation 2 VM and supports nested virtualization works. For example, [Standard_DC8as_cc_v5][DC8as-series] VMs.
144144
145145
The following example adds a user node pool to *myAKSCluster* with two nodes in *nodepool2* in the *myResourceGroup*:
@@ -193,7 +193,7 @@ For this preview release, we recommend for test and evaluation purposes to eithe
193193
1. Grant the managed identity you created earlier, and your account, access to the key vault. [Assign][assign-key-vault-access-cli] both identities the **Key Vault Crypto Officer** and **Key Vault Crypto User** Azure RBAC roles.
194194
195195
>[!NOTE]
196-
>The managed identity is the value you assigned to the `USER_ASSIGNED_IDENTITY_NAME` variable.
196+
>The managed identity is the value you assign to the `USER_ASSIGNED_IDENTITY_NAME` variable.
197197
198198
>[!NOTE]
199199
>To add role assignments, you must have `Microsoft.Authorization/roleAssignments/write` and `Microsoft.Authorization/roleAssignments/delete` permissions, such as [Key Vault Data Access Administrator][key-vault-data-access-admin-rbac], [User Access Administrator][user-access-admin-rbac], or [Owner][owner-rbac].
@@ -338,7 +338,7 @@ For this preview release, we recommend for test and evaluation purposes to eithe
338338
339339
```
340340
341-
1. Prepare the RSA Encryption/Decryption key by the [bash script](https://github.com/microsoft/confidential-container-demos/raw/main/kafka/setup-key.sh) for the workload from GitHub. Save the file as `setup-key.sh`.
341+
1. Prepare the RSA Encryption/Decryption key using the [bash script](https://github.com/microsoft/confidential-container-demos/raw/main/kafka/setup-key.sh) for the workload from GitHub. Save the file as `setup-key.sh`.
342342
343343
1. Set the `MAA_ENDPOINT` environmental variable to match the value for the `SkrClientMAAEndpoint` from the `consumer.yaml` manifest file by running the following command.
344344
@@ -379,7 +379,7 @@ For this preview release, we recommend for test and evaluation purposes to eithe
379379

380380
1. Copy and paste the external IP address of the consumer service into your browser and observe the decrypted message.
381381

382-
The following resembles the output of the command:
382+
The following example resembles the output of the command:
383383

384384
```output
385385
Welcome to Confidential Containers on AKS!

0 commit comments

Comments
 (0)