Skip to content

Commit d617b37

Browse files
Resolve comments
1 parent fef7fa4 commit d617b37

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/azure-app-configuration/quickstart-azure-kubernetes-service.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ If you already have an application that is consuming environment variables as co
7676
7777
## Containerize the application
7878
If you already have an application, you can containerize it in a way that depends on your application. We just show you how to build the `MyWebApp` project to an image.
79-
1. Run the (dotnet publish)[/dotnet/core/tools/dotnet-publish] command to build the app in release mode and create the assets in the published folder.
79+
1. Run the [dotnet publish](/dotnet/core/tools/dotnet-publish) command to build the app in release mode and create the assets in the published folder.
8080
``` dotnetcli
8181
dotnet publish -c Release -o published
8282
```
@@ -132,11 +132,11 @@ If you already have an application, you can containerize it in a way that depend
132132
|Settings__FontColor|*Red*|
133133
|Settings__Message|*Hello from Azure App Configuration*|
134134
135-
2. Enable System Assigned Managed Identity of AKS NodePool
135+
1. Enable System Assigned Managed Identity of AKS NodePool
136136
137137
Go to the corresponding Virtual Machine Scale Sets resource of AKS, and enable system-assigned managed identity on the Virtual Machine Scale Sets by following this [doc](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vmss#enable-system-assigned-managed-identity-on-an-existing-virtual-machine-scale-set).
138138
139-
3. Assign Data Reader role to the System Assigned Managed Identity
139+
1. Assign Data Reader role to the System Assigned Managed Identity
140140
141141
Once the system-assigned managed identity has been enabled, you need to grant it read access to Azure AppConfiguration. You can do it by following the instructions in this [doc](/azure/azure-app-configuration/howto-integrate-azure-managed-service-identity?tabs=core5x&pivots=framework-dotnet#grant-access-to-app-configuration).
142142
@@ -146,15 +146,15 @@ If you already have an application, you can containerize it in a way that depend
146146
```bash
147147
az aks get-credentials --name my_aks --resource-group my_aks_resource_group
148148
```
149-
2. Install Azure App Configuration Kubernetes Provider to your AKS cluster using `helm`:
149+
1. Install Azure App Configuration Kubernetes Provider to your AKS cluster using `helm`:
150150
``` bash
151151
helm install azureappconfiguration.kubernetesprovider oci://mcr.microsoft.com/azure-app-configuration/helmchart/kubernetes-provider --version 1.0.0-alpha --namespace azappconfig-system --create-namespace
152152
```
153153
154154
## Create and deploy Kubernetes resources
155155
156156
1. Create a *AKS-AppConfiguration-Demo* directory in the root directory of your project.
157-
2. Create *appConfigurationProvider.yaml* in the *AKS-AppConfiguration-Demo* directory with the following YAML content. Replace the value of the `endpoint` field with the endpoint of your Azure AppConfiguration store.
157+
1. Create *appConfigurationProvider.yaml* in the *AKS-AppConfiguration-Demo* directory with the following YAML content. Replace the value of the `endpoint` field with the endpoint of your Azure AppConfiguration store.
158158
``` yaml
159159
apiVersion: azconfig.io/v1beta1
160160
kind: AzureAppConfigurationProvider
@@ -165,7 +165,7 @@ If you already have an application, you can containerize it in a way that depend
165165
target:
166166
configMapName: demo-configmap
167167
```
168-
3. Create *deployment.yaml* in the *AKS-AppConfiguration-Demo* directory with the following YAML content. Replace the value of `template.containers.image` with the image you created in the previous step.
168+
1. Create *deployment.yaml* in the *AKS-AppConfiguration-Demo* directory with the following YAML content. Replace the value of `template.spec.containers.image` with the image you created in the previous step.
169169
``` yaml
170170
apiVersion: apps/v1
171171
kind: Deployment
@@ -192,7 +192,7 @@ If you already have an application, you can containerize it in a way that depend
192192
- configMapRef:
193193
name: demo-configmap
194194
```
195-
4. Create *service.yaml* in the *AKS-AppConfiguration-Demo* with the following YAML content.
195+
1. Create *service.yaml* in the *AKS-AppConfiguration-Demo* with the following YAML content.
196196
``` yaml
197197
apiVersion: v1
198198
kind: Service
@@ -205,7 +205,7 @@ If you already have an application, you can containerize it in a way that depend
205205
selector:
206206
app: configmap-demo-app
207207
```
208-
5. Apply the YAML files to the AKS cluster
208+
1. Apply the YAML files to the AKS cluster
209209
``` bash
210210
kubectl create namespace quickstart-appconfig
211211
kubectl apply -f ./AKS-AppConfiguration-Demo -n quickstart-appconfig
@@ -236,12 +236,12 @@ kubectl get service configmap-demo-service -n quickstart-appconfig
236236
```
237237

238238
## Clean up resources
239-
1. Remove the resources deployed to AKS
239+
1. Remove the resources that have been deployed to AKS
240240
``` bash
241241
kubectl delete -f ./AKS-AppConfiguration-Demo -n quickstart-appconfig
242242
kubectl delete namespace quickstart-appconfig
243243
```
244-
2. Uninstall the Azure App Configuration Kubernetes Provider
244+
1. Uninstall the Azure App Configuration Kubernetes Provider
245245
``` bash
246246
helm uninstall azureappconfiguration.kubernetesprovider --namespace azappconfig-system
247247
```

0 commit comments

Comments
 (0)