Skip to content

Commit cc2b303

Browse files
authored
Update csi-secrets-store-driver.md
1 parent 0f74d08 commit cc2b303

1 file changed

Lines changed: 7 additions & 1 deletion

File tree

articles/aks/csi-secrets-store-driver.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use the Azure Key Vault provider for Secrets Store CSI
44
author: nickomang
55
ms.author: nickoman
66
ms.topic: how-to
7-
ms.date: 10/19/2023
7+
ms.date: 11/24/2023
88
ms.custom: template-how-to, devx-track-azurecli, devx-track-linux
99
---
1010

@@ -68,6 +68,9 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
6868
}
6969
```
7070
71+
> [!NOTE]
72+
> After enabling the feature, AKS creates a managed identity named "azurekeyvaultsecretsprovider-xxx" in the node resource group and assigns it to virtual machine (VM) scale set automatically. You can use this managed identity or your own managed identity to access the key vault. It's not supported to not let the identity be created.
73+
7174
## Upgrade an existing AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver support
7275
7376
* Upgrade an existing AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver capability using the [`az aks enable-addons`][az-aks-enable-addons] command and enable the `azure-keyvault-secrets-provider` add-on. The add-on creates a user-assigned managed identity you can use to authenticate to your key vault.
@@ -76,6 +79,9 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
7679
az aks enable-addons --addons azure-keyvault-secrets-provider --name myAKSCluster --resource-group myResourceGroup
7780
```
7881
82+
> [!NOTE]
83+
> After enabling the feature, AKS creates a managed identity named "azurekeyvaultsecretsprovider-xxx" in the node resource group and assigns it to virtual machine (VM) scale set automatically. You can use this managed identity or your own managed identity to access the key vault. It's not supported to not let the identity be created.
84+
7985
## Verify the Azure Key Vault provider for Secrets Store CSI Driver installation
8086
8187
1. Verify the installation is finished using the `kubectl get pods` command, which lists all pods with the `secrets-store-csi-driver` and `secrets-store-provider-azure` labels in the kube-system namespace.

0 commit comments

Comments
 (0)