Skip to content

Commit

Permalink
docs: fix uninstall commands in openshift
Browse files Browse the repository at this point in the history
Signed-off-by: Anish Ramasekar <anish.ramasekar@gmail.com>
  • Loading branch information
aramase committed Jun 13, 2022
1 parent cc6bb04 commit 1ccbe0b
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 5 deletions.
4 changes: 2 additions & 2 deletions website/content/en/configurations/deploy-in-openshift.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,6 @@ description: >

```bash
# Replace $target_namespace with the namespace used for helm install
oc adm policy remove-scc-to-user privileged system:serviceaccount:$target_namespace:secrets-store-csi-driver
oc adm policy remove-scc-to-user privileged system:serviceaccount:$target_namespace:csi-secrets-store-provider-azure
oc adm policy remove-scc-from-user privileged system:serviceaccount:$target_namespace:secrets-store-csi-driver
oc adm policy remove-scc-from-user privileged system:serviceaccount:$target_namespace:csi-secrets-store-provider-azure
```
2 changes: 1 addition & 1 deletion website/content/en/configurations/feature-flags.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ description: >

> Available in AKV Provider release `0.0.12+`
> This feature will be enabled by default in AKV Provider release `v0.2.0`
> This feature is enabled by default in AKV Provider release `v0.2.0`
The Azure Key Vault provider for Secrets Store CSI Driver by default fetches the chain of certificates from Keyvault and writes to the mount in the same order in which the certificate chain was uploaded. This is an experimental feature that supports reordering of the certificate chain in the following order:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -126,9 +126,8 @@ spec:
## Pros

1. Supported on both Windows and Linux.
1. Easiest option to connect to Azure Key Vault.
2. Supports Kubernetes clusters hosted in any cloud or on-premises.

## Cons

1. Service Principal credentials(client id & client secret) need to be created as a kubernetes *Secret* which is stored as plaintext in etcd.
1. The only supported way to connect to Azure Key Vault from a non Azure environment.

0 comments on commit 1ccbe0b

Please sign in to comment.