Skip to content

Commit f5cceae

Browse files
authored
Fix formatting and improve clarity in documentation
1 parent d0529f7 commit f5cceae

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

AKS-Arc/delete-cluster-pdb.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,15 @@ When you delete an AKS Arc cluster that has [PodDisruptionBudget](https://kubern
1919

2020
Before you delete the AKS Arc cluster, access the AKS Arc cluster's **kubeconfig** and delete all PDBs:
2121

22-
1. Access the AKS Arc cluster according to its connectivity state
23-
- When the AKS Arc cluster is in a **Connected** state, run the `[az connectedk8s proxy](/cli/azure/connectedk8s#az-connectedk8s-proxy)` command
22+
1. Access the AKS Arc cluster according to its connectivity state:
23+
24+
- When the AKS Arc cluster is in a **Connected** state, run the [`az connectedk8s proxy`](/cli/azure/connectedk8s#az-connectedk8s-proxy) command
2425

2526
```azurecli
2627
az connectedk8s proxy -n $aks_cluster_name -g $resource_group_name
2728
```
2829

29-
- When the AKS Arc cluster is in a **disconnected** state. You will need to run the `[az aksarc get-credentials](/cli/azure/aksarc#az-aksarc-get-credentials)` command with the permission to perform **Microsoft.HybridContainerService/provisionedClusterInstances/listAdminKubeconfig/action**, which is included in the **Azure Kubernetes Service Arc Cluster Admin** role permission. To learn more, refer to [Retrieve certificate-based admin kubeconfig in AKS Arc](/aks/aksarc/retrieve-admin-kubeconfig#retrieve-the-certificate-based-admin-kubeconfig-using-az-cli)
30+
- When the AKS Arc cluster is in a **disconnected** state, run the [`az aksarc get-credentials`](/cli/azure/aksarc#az-aksarc-get-credentials) command with permission to perform the **Microsoft.HybridContainerService/provisionedClusterInstances/listAdminKubeconfig/action** action, which is included in the **Azure Kubernetes Service Arc Cluster Admin** role permission. For more information, see [Retrieve certificate-based admin kubeconfig in AKS Arc](/aks/aksarc/retrieve-admin-kubeconfig#retrieve-the-certificate-based-admin-kubeconfig-using-az-cli)
3031

3132
```azurecli
3233
az aksarc get-credentials -n $aks_cluster_name -g $resource_group_name --admin
@@ -38,27 +39,27 @@ Before you delete the AKS Arc cluster, access the AKS Arc cluster's **kubeconfig
3839
kubectl get pdb -A
3940
```
4041

41-
1. Delete all PDBs. Here's an example of deleting a PDB generated from workload identity enablement:
42+
1. Delete all PDBs. The following command is an example of deleting a PDB generated from workload identity enablement:
4243

43-
```bash
44-
kubectl delete pdb azure-wi-webhook-controller-manager -n arc-workload-identity
45-
```
44+
```bash
45+
kubectl delete pdb azure-wi-webhook-controller-manager -n arc-workload-identity
46+
```
4647

4748
### [AKS on Azure Local](#tab/aks-on-azure-local)
4849

4950
4. Delete the AKS Arc cluster:
5051

51-
```azurecli
52-
az aksarc delete -n $aks_cluster_name -g $resource_group_name
53-
```
52+
```azurecli
53+
az aksarc delete -n $aks_cluster_name -g $resource_group_name
54+
```
5455

5556
### [AKS Edge Essentials](#tab/aks-edge-essentials)
5657

5758
4. Delete the AKS Arc cluster:
5859

59-
```azurecli
60-
az connectedk8s delete -n <cluster_name> -g <resource_group>
61-
```
60+
```azurecli
61+
az connectedk8s delete -n <cluster_name> -g <resource_group>
62+
```
6263

6364
---
6465

0 commit comments

Comments
 (0)