Skip to content

Commit daca377

Browse files
authored
Merge pull request #101888 from patpishiva/patch-1
Commands are outdated & not working
2 parents 1e93d2b + 0eafaa2 commit daca377

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/update-credentials.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To check the expiration date of your service principal, use the [az ad sp creden
4141
```azurecli
4242
SP_ID=$(az aks show --resource-group myResourceGroup --name myAKSCluster \
4343
--query servicePrincipalProfile.clientId -o tsv)
44-
az ad sp credential list --id "$SP_ID" --query "[].endDateTime" -o tsv
44+
az ad app credential list --id "$SP_ID" --query "[].endDateTime" -o tsv
4545
```
4646

4747
### Reset the existing service principal credential
@@ -59,7 +59,7 @@ SP_ID=$(az aks show --resource-group myResourceGroup --name myAKSCluster \
5959
With a variable set that contains the service principal ID, now reset the credentials using [az ad sp credential reset][az-ad-sp-credential-reset]. The following example lets the Azure platform generate a new secure secret for the service principal. This new secure secret is also stored as a variable.
6060

6161
```azurecli-interactive
62-
SP_SECRET=$(az ad sp credential reset --id "$SP_ID" --query password -o tsv)
62+
SP_SECRET=$(az ad app credential reset --id "$SP_ID" --query password -o tsv)
6363
```
6464

6565
Now continue on to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials). This step is necessary for the Service Principal changes to reflect on the AKS cluster.

0 commit comments

Comments
 (0)