Skip to content

Commit c8cae1a

Browse files
committed
acrolinx
1 parent 7b09bbf commit c8cae1a

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/azure-arc/kubernetes/tutorial-akv-secrets-provider.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: mayg
1212

1313
The Azure Key Vault Provider for Secrets Store CSI Driver allows for the integration of Azure Key Vault as a secrets store with a Kubernetes cluster via a [CSI volume](https://kubernetes-csi.github.io/docs/). For Azure Arc-enabled Kubernetes clusters, you can install the Azure Key Vault Secrets Provider extension to fetch secrets.
1414

15-
Benefits of the Azure Key Vault Secrets Provider extension include the following:
15+
Capabilities of the Azure Key Vault Secrets Provider extension include:
1616

1717
- Mounts secrets/keys/certs to pod using a CSI Inline volume
1818
- Supports pod portability with the SecretProviderClass CRD
@@ -33,7 +33,7 @@ Benefits of the Azure Key Vault Secrets Provider extension include the following
3333
- Elastic Kubernetes Service
3434
- Tanzu Kubernetes Grid
3535
- Azure Red Hat OpenShift
36-
- Ensure you have met the [general prerequisites for cluster extensions](extensions.md#prerequisites). You must use version 0.4.0 or newer of the `k8s-extension` Azure CLI extension.
36+
- Ensure you've met the [general prerequisites for cluster extensions](extensions.md#prerequisites). You must use version 0.4.0 or newer of the `k8s-extension` Azure CLI extension.
3737

3838
> [!TIP]
3939
> When using this extension with [AKS hybrid clusters provisioned from Azure](extensions.md#aks-hybrid-clusters-provisioned-from-azure-preview) you must set `--cluster-type` to use `provisionedClusters` and also add `--cluster-resource-provider microsoft.hybridcontainerservice` to the command. Installing Azure Arc extensions on AKS hybrid clusters provisioned from Azure is currently in preview.
@@ -73,7 +73,7 @@ You can install the Azure Key Vault Secrets Provider extension on your connected
7373
az k8s-extension create --cluster-name $CLUSTER_NAME --resource-group $RESOURCE_GROUP --cluster-type connectedClusters --extension-type Microsoft.AzureKeyVaultSecretsProvider --name akvsecretsprovider
7474
```
7575

76-
You should see output similar to the example below. Note that it may take several minutes before the secrets provider Helm chart is deployed to the cluster.
76+
You should see output similar to this example. Note that it may take several minutes before the secrets provider Helm chart is deployed to the cluster.
7777

7878
```json
7979
{
@@ -204,7 +204,7 @@ To confirm successful installation of the Azure Key Vault Secrets Provider exten
204204
az k8s-extension show --cluster-type connectedClusters --cluster-name $CLUSTER_NAME --resource-group $RESOURCE_GROUP --name akvsecretsprovider
205205
```
206206

207-
You should see output similar to the example below.
207+
You should see output similar to this example.
208208

209209
```json
210210
{
@@ -280,7 +280,7 @@ Before you move on to the next section, take note of the following properties:
280280

281281
## Provide identity to access Azure Key Vault
282282

283-
Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed through a service principal. Follow the steps below to provide an identity that can access your Key Vault.
283+
Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed through a service principal. Follow these steps to provide an identity that can access your Key Vault.
284284

285285
1. Follow the steps [to create a service principal in Azure](../../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal). Take note of the Client ID and Client Secret generated in this step.
286286
1. Provide Azure Key Vault GET permission to the created service principal by [following these steps](../../key-vault/general/assign-access-policy.md).
@@ -381,7 +381,7 @@ The following configuration settings are frequently used with the Azure Key Vaul
381381
| Configuration Setting | Default | Description |
382382
| --------- | ----------- | ----------- |
383383
| enableSecretRotation | false | Boolean type. If `true`, periodically updates the pod mount and Kubernetes Secret with the latest content from external secrets store |
384-
| rotationPollInterval | 2m | If `enableSecretRotation` is `true`, specifies the secret rotation poll interval duration. This duration can be adjusted based on how frequently the mounted contents for all pods and Kubernetes secrets need to be re-synced to the latest. |
384+
| rotationPollInterval | 2m | If `enableSecretRotation` is `true`, specifies the secret rotation poll interval duration. This duration can be adjusted based on how frequently the mounted contents for all pods and Kubernetes secrets need to be resynced to the latest. |
385385
| syncSecret.enabled | false | Boolean input. In some cases, you may want to create a Kubernetes Secret to mirror the mounted content. If `true`, `SecretProviderClass` allows the `secretObjects` field to define the desired state of the synced Kubernetes Secret objects. |
386386

387387
These settings can be specified when the extension is installed by using the `az k8s-extension create` command:
@@ -420,7 +420,7 @@ To confirm that the extension instance has been deleted, run the following comma
420420
az k8s-extension list --cluster-type connectedClusters --cluster-name $CLUSTER_NAME --resource-group $RESOURCE_GROUP
421421
```
422422

423-
If the extension was successfully removed, you won't see the the Azure Key Vault Secrets Provider extension listed in the output. If you don't have any other extensions installed on your cluster, you'll see an empty array.
423+
If the extension was successfully removed, you won't see the Azure Key Vault Secrets Provider extension listed in the output. If you don't have any other extensions installed on your cluster, you'll see an empty array.
424424

425425
## Reconciliation and troubleshooting
426426

0 commit comments

Comments
 (0)