Skip to content

Commit e566d13

Browse files
committed
update wording
1 parent 5249780 commit e566d13

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/azure-arc/kubernetes/tutorial-akv-secrets-provider.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -365,7 +365,7 @@ Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed
365365

366366
After the pod starts, the mounted content at the volume path specified in your deployment YAML is available.
367367

368-
```Bash
368+
```bash
369369
## show secrets held in secrets-store
370370
kubectl exec busybox-secrets-store-inline -- ls /mnt/secrets-store/
371371

@@ -422,10 +422,10 @@ az k8s-extension list --cluster-type connectedClusters --cluster-name $CLUSTER_N
422422

423423
If the extension was successfully removed, you won't see the Azure Key Vault Secrets Provider extension listed in the output. If you don't have any other extensions installed on your cluster, you'll see an empty array.
424424

425-
To delete the secret you created and stored in the key vault, run the following command:
425+
If you no longer need it, be sure to delete the client secret associated with the service principal from your cluster by running the following command:
426426

427-
```azurecli-interactive
428-
az keyvault secret delete --vault-name $AZUREKEYVAULT_NAME -n DemoSecret
427+
```bash
428+
kubectl delete secret <secret-name>
429429
```
430430

431431
## Reconciliation and troubleshooting

0 commit comments

Comments
 (0)