Skip to content

Commit 71d29a7

Browse files
Merge pull request #3699 from MicrosoftDocs/main638856902941463063sync_temp
For protected branch, push strategy should use PR and merge to target branch method to work around git push error
2 parents ed296ca + 44f14c9 commit 71d29a7

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

AKS-Arc/concepts-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Storage options for applications in AKS enabled by Azure Arc
33
description: Storage options for applications in AKS enabled by Azure Arc.
44
author: sethmanheim
55
ms.topic: conceptual
6-
ms.date: 06/24/2024
6+
ms.date: 06/16/2025
77
ms.author: sethm
88
ms.lastreviewed: 1/14/2022
99
ms.reviewer: abha
@@ -118,7 +118,7 @@ For your applications to run correctly, pods should run as a defined user or gro
118118

119119
**fsGroup** is a field within the `securityContext` of a Kubernetes pod specification. It defines a supplemental group ID that Kubernetes assigns to all processes in the pod, and recursively to the files in mounted volumes. This ensures that the pod has the correct group-level access to shared storage volumes.
120120

121-
When a volume is mounted, Kubernetes changes the ownership of the volume's contents to match the **fsGroup** value. This is particularly useful when containers run as non-root users and need write access to shared volumes.
121+
When a volume is mounted, Kubernetes changes the ownership of the volume's contents to match the **fsGroup** value. This is particularly useful when containers run as non-root users and need write access to shared volumes.
122122

123123
The following example YAML shows the **fsgroup** value:
124124

AKS-Arc/container-storage-interface-files.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Container Storage Interface (CSI) file drivers in AKS enabled by Azur
33
description: Learn how to use Container Storage Interface (CSI) drivers to manage files in AKS Arc.
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 08/20/2024
6+
ms.date: 06/16/2025
77
ms.author: sethm
88
ms.lastreviewed: 01/14/2022
99
ms.reviewer: abha
@@ -31,7 +31,7 @@ If multiple nodes need concurrent access to the same storage volumes in AKS Arc,
3131

3232
### [AKS on Azure Local](#tab/local)
3333

34-
1. Make sure the SMB driver is deployed. The SMB CSI driver is installed by default when you create a Kubernetes cluster using the `az aksarc create` command. If you create a Kubernetes cluster by using the Azure portal or using the `az aksarc create` command with `--disable-smb-driver`, you must enable the SMB driver on this cluster using the `az aksarc update` command:
34+
1. Make sure the SMB driver is deployed. The SMB CSI driver is installed by default when you create a Kubernetes cluster using the `az aksarc create` command. If you create a Kubernetes cluster by using the Azure portal, Azure Resource Manager (ARM) template, or Terraform, or by using the `az aksarc create` command with `--disable-smb-driver`, you must enable the SMB driver on this cluster using the `az aksarc update` command:
3535

3636
```azurecli
3737
az aksarc update -n $aksclustername -g $resource_group --enable-smb-driver
@@ -78,7 +78,7 @@ If multiple nodes need concurrent access to the same storage volumes in AKS Arc,
7878
7979
### [AKS on Azure Local](#tab/local)
8080
81-
1. Make sure the NFS driver is deployed. The NFS CSI driver is installed by default when you create a Kubernetes cluster using the `az aksarc create` command. If you create a Kubernetes cluster by using the Azure portal or using the `az aksarc create` command with `--disable-nfs-driver`, you must enable the the NFS driver on this cluster using the `az aksarc update` command:
81+
1. Make sure the NFS driver is deployed. The NFS CSI driver is installed by default when you create a Kubernetes cluster using the `az aksarc create` command. If you create a Kubernetes cluster by using the Azure portal, Azure Resource Manager (ARM) template, or Terraform, or by using the `az aksarc create` command with `--disable-nfs-driver`, you must enable the the NFS driver on this cluster using the `az aksarc update` command:
8282

8383
```azurecli
8484
az aksarc update -n $aksclustername -g $resource_group --enable-nfs-driver

azure-local/manage/manage-secrets-rotation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to manage internal secret rotation on Az
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 04/09/2025
7+
ms.date: 06/16/2025
88
ms.service: azure-local
99
---
1010

@@ -190,14 +190,14 @@ The exact steps for secret rotation are different depending on the software vers
190190
Start-SecretRotation
191191
```
192192
193-
### Azure Local instance running 2408.2 to 2405.3
193+
### Azure Local instance running 2408.2 or earlier
194194
195195
1. Sign in to one of the Azure Local nodes using deployment user credentials.
196196
1. Update the CA Certificate password in ECE store. Run the following PowerShell command:
197197
198198
```PowerShell
199199
$SecureSecretText = ConvertTo-SecureString -String "<Replace with a strong password>" -AsPlainText -Force
200-
$CACertCred = New-Object -Type PSCredential -ArgumentList "CACertificateCred,$SecureSecretText"
200+
$CACertCred = New-Object -Type PSCredential -ArgumentList (CACertificateCred),$SecureSecretText
201201
Set-ECEServiceSecret -ContainerName CACertificateCred -Credential $CACertCred
202202
```
203203

0 commit comments

Comments
 (0)