Skip to content

Commit 4383fc7

Browse files
authored
Update csi-secrets-store-driver.md
1 parent cc2b303 commit 4383fc7

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

articles/aks/csi-secrets-store-driver.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use the Azure Key Vault provider for Secrets Store CSI
44
author: nickomang
55
ms.author: nickoman
66
ms.topic: how-to
7-
ms.date: 11/24/2023
7+
ms.date: 12/06/2023
88
ms.custom: template-how-to, devx-track-azurecli, devx-track-linux
99
---
1010

@@ -69,7 +69,7 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
6969
```
7070
7171
> [!NOTE]
72-
> After enabling the feature, AKS creates a managed identity named "azurekeyvaultsecretsprovider-xxx" in the node resource group and assigns it to virtual machine (VM) scale set automatically. You can use this managed identity or your own managed identity to access the key vault. It's not supported to not let the identity be created.
72+
> After you enable this feature, AKS creates a managed `identity named azurekeyvaultsecretsprovider-xxx` in the node resource group and assigns it to the Virtual Machine Scale Sets (VMSS) automatically. You can use this managed identity or your own managed identity to access the key vault. It's not supported to prevent creation of the identity.
7373
7474
## Upgrade an existing AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver support
7575
@@ -80,7 +80,7 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
8080
```
8181
8282
> [!NOTE]
83-
> After enabling the feature, AKS creates a managed identity named "azurekeyvaultsecretsprovider-xxx" in the node resource group and assigns it to virtual machine (VM) scale set automatically. You can use this managed identity or your own managed identity to access the key vault. It's not supported to not let the identity be created.
83+
> After you enable this feature, AKS creates a managed `identity named azurekeyvaultsecretsprovider-xxx` in the node resource group and assigns it to the Virtual Machine Scale Sets (VMSS) automatically. You can use this managed identity or your own managed identity to access the key vault. It's not supported to prevent creation of the identity.
8484
8585
## Verify the Azure Key Vault provider for Secrets Store CSI Driver installation
8686

0 commit comments

Comments
 (0)