Skip to content

Commit dec18e1

Browse files
committed
more acrolinx edits
1 parent 512657e commit dec18e1

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/aks/use-kms-etcd-encryption.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,9 @@ az provider register --namespace Microsoft.ContainerService
6262
The following limitations apply when you integrate KMS etcd encryption with AKS:
6363

6464
* Disabling of the KMS etcd encryption feature.
65-
* Changing of key Id, including key name and key version.
65+
* Changing of key ID, including key name and key version.
6666
* Deletion of the key, Key Vault, or the associated identity.
67-
* KMS etcd encryption does not work with System-Assigned Managed Identity. The keyvault access-policy is required to be set before the feature is enabled. In addition, System-Assigned Managed Identity is not available until cluster creation, thus there is a cycle dependency.
67+
* KMS etcd encryption doesn't work with System-Assigned Managed Identity. The keyvault access-policy is required to be set before the feature is enabled. In addition, System-Assigned Managed Identity isn't available until cluster creation, thus there's a cycle dependency.
6868
* Using Azure Key Vault with PrivateLink enabled.
6969
* Using more than 2000 secrets in a cluster.
7070
* Managed HSM Support
@@ -107,23 +107,23 @@ Use `az identity create` to create a User-assigned managed identity.
107107
az identity create --name MyIdentity --resource-group MyResourceGroup
108108
```
109109

110-
Use `az identity show` to get Identity Object Id.
110+
Use `az identity show` to get Identity Object ID.
111111

112112
```azurecli
113113
IDENTITY_OBJECT_ID=$(az identity show --name MyIdentity --resource-group MyResourceGroup --query 'principalId' -o tsv)
114114
echo $IDENTITY_OBJECT_ID
115115
```
116116

117-
The above example stores the value of the Identity Object Id in *IDENTITY_OBJECT_ID*.
117+
The above example stores the value of the Identity Object ID in *IDENTITY_OBJECT_ID*.
118118

119-
Use `az identity show` to get Identity Resource Id.
119+
Use `az identity show` to get Identity Resource ID.
120120

121121
```azurecli
122122
IDENTITY_RESOURCE_ID=$(az identity show --name MyIdentity --resource-group MyResourceGroup --query 'id' -o tsv)
123123
echo $IDENTITY_RESOURCE_ID
124124
```
125125

126-
The above example stores the value of the Identity Resource Id in *IDENTITY_RESOURCE_ID*.
126+
The above example stores the value of the Identity Resource ID in *IDENTITY_RESOURCE_ID*.
127127

128128
## Assign permissions (decrypt and encrypt) to access key vault
129129

@@ -149,7 +149,7 @@ Use [az aks update][az-aks-update] with the `--enable-azure-keyvault-kms` and `-
149149
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $KEY_ID
150150
```
151151

152-
Use below command to update all secrets. Otherwise, the old secrets are not encrypted.
152+
Use below command to update all secrets. Otherwise, the old secrets aren't encrypted.
153153

154154
```azurecli-interactive
155155
kubectl get secrets --all-namespaces -o json | kubectl replace -f -

0 commit comments

Comments
 (0)