From e45e42ba2aab5d202288f89a372282b522f7848b Mon Sep 17 00:00:00 2001 From: Donovan Brown Date: Thu, 8 Apr 2021 10:30:37 -0500 Subject: [PATCH] Changing you to your in multiple places In many places 'you' should be 'your'. --- .../azure-keyvault-managed-identity.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/daprdocs/content/en/operations/components/setup-secret-store/supported-secret-stores/azure-keyvault-managed-identity.md b/daprdocs/content/en/operations/components/setup-secret-store/supported-secret-stores/azure-keyvault-managed-identity.md index fa1e015fe..bc792e139 100644 --- a/daprdocs/content/en/operations/components/setup-secret-store/supported-secret-stores/azure-keyvault-managed-identity.md +++ b/daprdocs/content/en/operations/components/setup-secret-store/supported-secret-stores/azure-keyvault-managed-identity.md @@ -70,7 +70,7 @@ The above example uses secrets as plain strings. It is recommended to use a loca This step is required only if the AKS Cluster is provisoned without the flag "--enable-managed-identity". If the cluster is provisioned with manahed identity, than is suggested to use the autogenerated managed identity that is associated to the Resource Group MC_*. ```bash - $identity = az identity create -g [your resource group] -n [you managed identity name] -o json | ConvertFrom-Json + $identity = az identity create -g [your resource group] -n [your managed identity name] -o json | ConvertFrom-Json ``` Below the command to retrieve the managed identity in the autogenerated scenario: @@ -134,19 +134,19 @@ The above example uses secrets as plain strings. It is recommended to use a loca apiVersion: "aadpodidentity.k8s.io/v1" kind: AzureIdentity metadata: - name: [you managed identity name] + name: [your managed identity name] spec: type: 0 - resourceID: [you managed identity id] - clientID: [you managed identity Client ID] + resourceID: [your managed identity id] + clientID: [your managed identity Client ID] --- apiVersion: "aadpodidentity.k8s.io/v1" kind: AzureIdentityBinding metadata: - name: [you managed identity name]-identity-binding + name: [your managed identity name]-identity-binding spec: - azureIdentity: [you managed identity name] - selector: [you managed identity selector] + azureIdentity: [your managed identity name] + selector: [your managed identity selector] ``` 10. Deploy the azure-identity-config.yaml: