From 40b13ca3cfafa202ad6d75b75984166d86c66794 Mon Sep 17 00:00:00 2001 From: deveshdama <87668846+deveshdama@users.noreply.github.com> Date: Wed, 30 Aug 2023 19:20:58 -0700 Subject: [PATCH] enrich ASM examples (#25598) --- ...anagedClustersCreate_AzureServiceMesh.json | 28 ++++++++++++++++++- .../2023-08-02-preview/managedClusters.json | 2 +- 2 files changed, 28 insertions(+), 2 deletions(-) diff --git a/specification/containerservice/resource-manager/Microsoft.ContainerService/aks/preview/2023-08-02-preview/examples/ManagedClustersCreate_AzureServiceMesh.json b/specification/containerservice/resource-manager/Microsoft.ContainerService/aks/preview/2023-08-02-preview/examples/ManagedClustersCreate_AzureServiceMesh.json index dc15a484b152..391fcf4823a8 100644 --- a/specification/containerservice/resource-manager/Microsoft.ContainerService/aks/preview/2023-08-02-preview/examples/ManagedClustersCreate_AzureServiceMesh.json +++ b/specification/containerservice/resource-manager/Microsoft.ContainerService/aks/preview/2023-08-02-preview/examples/ManagedClustersCreate_AzureServiceMesh.json @@ -89,7 +89,15 @@ } } }, - "addonProfiles": {}, + "addonProfiles": { + "azureKeyvaultSecretsProvider": { + "enabled": true, + "config": { + "enableSecretRotation": "true", + "rotationPollInterval": "2m" + } + } + }, "enableRBAC": true, "diskEncryptionSetID": "/subscriptions/subid1/resourceGroups/rg1/providers/Microsoft.Compute/diskEncryptionSets/des", "enablePodSecurityPolicy": true @@ -144,6 +152,15 @@ "servicePrincipalProfile": { "clientId": "clientid" }, + "addonProfiles": { + "azureKeyvaultSecretsProvider": { + "enabled": true, + "config": { + "enableSecretRotation": "true", + "rotationPollInterval": "2m" + } + } + }, "nodeResourceGroup": "MC_rg1_clustername1_location1", "enableRBAC": true, "diskEncryptionSetID": "/subscriptions/subid1/resourceGroups/rg1/providers/Microsoft.Compute/diskEncryptionSets/des", @@ -258,6 +275,15 @@ "servicePrincipalProfile": { "clientId": "clientid" }, + "addonProfiles": { + "azureKeyvaultSecretsProvider": { + "enabled": true, + "config": { + "enableSecretRotation": "true", + "rotationPollInterval": "2m" + } + } + }, "nodeResourceGroup": "MC_rg1_clustername1_location1", "enableRBAC": true, "diskEncryptionSetID": "/subscriptions/subid1/resourceGroups/rg1/providers/Microsoft.Compute/diskEncryptionSets/des", diff --git a/specification/containerservice/resource-manager/Microsoft.ContainerService/aks/preview/2023-08-02-preview/managedClusters.json b/specification/containerservice/resource-manager/Microsoft.ContainerService/aks/preview/2023-08-02-preview/managedClusters.json index 8b53a8ca3f76..66cf73e31422 100644 --- a/specification/containerservice/resource-manager/Microsoft.ContainerService/aks/preview/2023-08-02-preview/managedClusters.json +++ b/specification/containerservice/resource-manager/Microsoft.ContainerService/aks/preview/2023-08-02-preview/managedClusters.json @@ -604,7 +604,7 @@ "Create Managed Cluster with Azure Key Vault Secrets Provider Addon": { "$ref": "./examples/ManagedClustersCreate_AzureKeyvaultSecretsProvider.json" }, - "Create Managed Cluster with Azure Service Mesh": { + "Create/Update Managed Cluster with Azure Service Mesh": { "$ref": "./examples/ManagedClustersCreate_AzureServiceMesh.json" }, "Create Managed Cluster with FIPS enabled OS": {