Skip to content

Commit 0666bdd

Browse files
qiancaiOreoxmt
andauthored
Apply suggestions from code review
Co-authored-by: Aolin <aolinz@outlook.com>
1 parent 59b047b commit 0666bdd

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

br/backup-and-restore-storages.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,7 @@ You can configure the account used to access GCS by specifying the access key. I
211211

212212
- **System-assigned managed identity**:
213213

214-
When using a system-assigned managed identity, there is no need to configure any Azure-related environment variables. You can simply run the BR backup command.
214+
When using a system-assigned managed identity, there is no need to configure any Azure-related environment variables. You can run the BR backup command directly.
215215

216216
```shell
217217
tiup br backup full -u "${PD_IP}:2379" \
@@ -220,23 +220,23 @@ You can configure the account used to access GCS by specifying the access key. I
220220

221221
> **Note:**
222222
>
223-
> Ensure that the `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, or `AZURE_CLIENT_SECRET` environment variables do **not** exist in the running environment. Otherwise, the Azure SDK might prioritize other authentication methods, preventing the managed identity from taking effect.
223+
> Ensure that the `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_CLIENT_SECRET` environment variables are **not** set in the runtime environment. Otherwise, the Azure SDK might prioritize other authentication methods, preventing the managed identity from taking effect.
224224

225225
- **User-assigned managed identity**:
226226

227-
When using a user-assigned managed identity, you need to configure the `AZURE_CLIENT_ID` environment variable in the running environment of TiKV and BR, set its value to the client ID of the managed identity, and then run the BR backup command. The detailed steps are as follows:
227+
When using a user-assigned managed identity, you need to configure the `AZURE_CLIENT_ID` environment variable in the runtime environment of TiKV and BR, set its value to the client ID of the managed identity, and then run the BR backup command. The detailed steps are as follows:
228228

229229
1. Configure the client ID for TiKV when starting with TiUP:
230230

231231
The following steps use the TiKV port `24000` and the systemd service name `tikv-24000` as an example:
232232

233-
1. Open the service configuration editor by running the following command:
233+
1. Open the systemd service editor by running the following command:
234234

235235
```shell
236236
systemctl edit tikv-24000
237237
```
238238

239-
2. Configure the `AZURE_CLIENT_ID` environment variable using your client ID:
239+
2. Set the `AZURE_CLIENT_ID` environment variable to your managed identity client ID:
240240

241241
```ini
242242
[Service]

0 commit comments

Comments
 (0)