Skip to content

Commit e38083d

Browse files
authored
Merge pull request #204915 from Nickomang/main
Fixed unclear and redundant notes; clarified access methods
2 parents fcfbd2c + 13d5330 commit e38083d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/csi-secrets-store-driver.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ You might sometimes want to create a Kubernetes secret to mirror the mounted con
205205
When you create a `SecretProviderClass`, use the `secretObjects` field to define the desired state of the Kubernetes secret, as shown in the following example.
206206

207207
> [!NOTE]
208-
> The example here is incomplete. You'll need to modify it to support your chosen method of access to your key vault identity.
208+
> The YAML examples here are incomplete. You'll need to modify them to support your chosen method of access to your key vault identity. For details, see [Provide an identity to access the Azure Key Vault Provider for Secrets Store CSI Driver][identity-access-methods].
209209

210210
The secrets will sync only after you start a pod to mount them. To rely solely on syncing with the Kubernetes secrets feature doesn't work. When all the pods that consume the secret are deleted, the Kubernetes secret is also deleted.
211211

@@ -232,7 +232,7 @@ spec:
232232
After you've created the Kubernetes secret, you can reference it by setting an environment variable in your pod, as shown in the following example code:
233233

234234
> [!NOTE]
235-
> The example here is incomplete. You'll need to modify it to support the Azure key vault identity access that you've chosen.
235+
> The example here demonstrates access to a secret through env variables and through volume/volumeMount. This is for illustrative purposes. These two methods can exist independently from the other.
236236

237237
```yml
238238
kind: Pod

0 commit comments

Comments
 (0)