You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The generated Secrets are populated with the following data:
480
+
481
+
```yaml
482
+
name: secret-created-by-appconfig-provider
483
+
type: Opaque
484
+
data:
485
+
app1-secret1: <secret value retrieved from Key Vault>
486
+
app1-secret2: <secret value retrieved from Key Vault>
487
+
```
488
+
489
+
```yaml
490
+
name: app1-certificate
491
+
type: kubernetes.io/tls
492
+
data:
493
+
tls.crt: |
494
+
<certificate data retrieved from Key Vault>
495
+
tls.key: |
496
+
<certificate key retrieved from Key Vault>
497
+
```
498
+
448
499
#### Refresh of secrets from Key Vault
449
500
450
501
Refreshing secrets from Key Vaults usually requires reloading the corresponding Key Vault references from Azure App Configuration. However, with the `spec.secret.refresh` property, you can refresh the secrets from Key Vault independently. This is especially useful for ensuring that your workload automatically picks up any updated secrets from Key Vault during secret rotation. Note that to load the latest version of a secret, the Key Vault reference must not be a versioned secret.
0 commit comments