Skip to content

Commit 4170125

Browse files
Merge pull request #311608 from dominicbetts/aio-secret-cli
AIO: Remove secrets CLI section
2 parents 6f0239f + 7120ce3 commit 4170125

1 file changed

Lines changed: 0 additions & 12 deletions

File tree

articles/iot-operations/secure-iot-ops/howto-manage-secrets.md

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -66,18 +66,6 @@ You can delete synced secrets from the **Secrets** page. When you delete a synce
6666
>
6767
> Before deleting a synced secret, make sure that all references to the secret from Azure IoT Operations components are removed.
6868
69-
## Use CLI commands to create secrets
70-
71-
The previous sections explained how to manage secrets using the operations experience web UI and the Azure portal. You can also use the Azure CLI and `kubectl` command to create and synchronize secrets for your device inbound endpoints and data flow endpoints:
72-
73-
1. Ensure that *secure settings* are enabled for your Azure IoT Operations instance. These settings configure the Azure Key Vault secret store extension to sync secrets from the selected key vault to the Kubernetes cluster. To learn more, see [Enable secure settings for your Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
74-
75-
1. Use `az keyvault secret set` to add a secret to Azure Key Vault.
76-
77-
1. Use `kubectl` to create an `AKVSync` custom resource to configure the synchronization of a secret from Azure Key Vault to the Kubernetes cluster.
78-
79-
1. Use `az iot ops ns device endpoint inbound add` to configure an endpoint that references the synced secrets.
80-
8169
## Add secrets to Azure Key Vault
8270

8371
If you use the operations experience to select existing secrets that were previously added to Azure Key Vault, make sure that the secrets are in a format and encoding that's supported by Azure IoT Operations.

0 commit comments

Comments
 (0)