Skip to content

Commit bd8146c

Browse files
committed
updates
1 parent 55e9730 commit bd8146c

File tree

1 file changed

+24
-0
lines changed

1 file changed

+24
-0
lines changed

articles/aks/azure-disk-customer-managed-keys.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,30 @@ You can also encrypt the AKS data disks with your own keys. Replace myResourceG
115115

116116
Ensure you have the proper AKS credentials. The Service principal will need to have contributor access to the resource group where the diskencryptionset is present. Otherwise, you will get an error suggesting that the service principal does not have permissions.
117117

118+
```azurecli-interactive
119+
# Retrieve your Azure Subscription Id using the following command, and use the id property
120+
az account list
121+
```
122+
123+
```
124+
someuser@Azure:~$ az account list
125+
[
126+
{
127+
"cloudName": "AzureCloud",
128+
"id": "666e66d8-1e43-4136-be25-f25bb5de5893",
129+
"isDefault": true,
130+
"name": "MyAzureSubscription",
131+
"state": "Enabled",
132+
"tenantId": "3ebbdf90-2069-4529-a1ab-7bdcb24df7cd",
133+
"user": {
134+
"cloudShellID": true,
135+
"name": "[email protected]",
136+
"type": "user"
137+
}
138+
}
139+
]
140+
```
141+
118142
Create a file called **byok-azure-disk.yaml** that contains the following information. Replace myAzureSubscriptionId, myResourceGroup, and myDiskEncrptionSetName with your values.
119143

120144
```

0 commit comments

Comments
 (0)