Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions drops/arc_video_indexer.json
Original file line number Diff line number Diff line change
Expand Up @@ -30,8 +30,8 @@
"Video Indexer",
"Azure Container Storage enabled by Azure Arc"
],
"LastModified": "2024-08-08T12:10:43.511Z",
"CreatedDate": "2024-08-08T12:10:43.511Z",
"LastModified": "2025-07-03T12:10:43.511Z",
"CreatedDate": "2024-07-03T12:10:43.511Z",
"Topics": [
"VI",
"AI",
Expand Down
2 changes: 1 addition & 1 deletion drops/azure_edge_extensions_aio_iac_terraform.json
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@
"Link": "https://github.com/bindsi"
}
],
"Source": "https://github.com/Azure-Samples/azure-edge-extensions-aio-iac-terraform",
"Source": "https://github.com/Azure-Samples/azure-edge-extensions-aio-iac-terraform/blob/main",
"Type": "script_automation",
"Difficulty": "Medium",
"ProgrammingLanguage": [
Expand Down
2 changes: 1 addition & 1 deletion drops/azure_edge_extensions_polyglotnotebook_aio.json
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@
"Link": "https://github.com/bindsi"
}
],
"Source": "https://github.com/Azure-Samples/azure-edge-extensions-polyglotnotebook-aio",
"Source": "https://github.com/Azure-Samples/azure-edge-extensions-polyglotnotebook-aio/blob/main",
"Type": "sample_app",
"Difficulty": "Medium",
"ProgrammingLanguage": [
Expand Down
2 changes: 1 addition & 1 deletion drops/nvidia_omniverse_azure_operations_twin.json
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@
"Link": "https://www.linkedin.com/in/rajesh-vasireddy-73551217/"
}
],
"Source": "https://github.com/microsoft/NVIDIA-Omniverse-Azure-Operations-Twin",
"Source": "https://github.com/microsoft/NVIDIA-Omniverse-Azure-Operations-Twin/blob/main",
"Type": "sample_app",
"Difficulty": "Medium",
"ProgrammingLanguage": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,18 +29,18 @@ Use the following table to determine the values to be used in the export block b

|Variable | Required Parameter | Example |
|----------------|----------------------------------------------------------------|-----------------|
|YOUR-REGION | Azure Region you wish to deploy in | eastus |
|YOUR-RESOURCE-GROUP | The Resource Group you created with the storage account in it | myResourceGroup |
|YOUR-SUBSCRIPTION | The Azure Subscription ID you are using | nnnn-nnnnnnn-nnn|
|YOUR-CLUSTER-NAME | The name you would like your ARC cluster to be called in Azure | myArcClusterName|
|YOUR-STORAGEACCOUNT | The name of the storage account you created | myStorageAccount|
|REGION | Azure Region you wish to deploy in | eastus |
|RESOURCE_GROUP | The Resource Group you created with the storage account in it | myResourceGroup |
|SUBSCRIPTION | The Azure Subscription ID you are using | nnnn-nnnnnnn-nnn|
|ARCNAME | The name you would like your ARC cluster to be called in Azure | myArcClusterName|
|STORAGEACCOUNT | The name of the storage account you created | myStorageAccount|

```bash
export YOUR-REGION="eastus"
export YOUR-RESOURCE-GROUP="myResourceGroup"
export YOUR-SUBSCRIPTION="your-subscription-id-here"
export YOUR-CLUSTER-NAME="myArcClusterName"
export YOUR-STORAGEACCOUNT="myStorageAccountName"
export REGION="eastus"
export RESOURCE_GROUP="myResourceGroup"
export SUBSCRIPTION="your-subscription-id-here"
export ARCNAME="myArcClusterName"
export STORAGEACCOUNT="myStorageAccountName"
```

### Apply inotify.max_user_instance increase
Expand All @@ -55,26 +55,26 @@ sudo sysctl -p
### Arc Connect Kubernetes

```bash
az connectedk8s connect -n ${YOUR-CLUSTER-NAME} -l ${YOUR-REGION} -g ${YOUR-RESOURCE-GROUP} --subscription ${YOUR-SUBSCRIPTION}
az connectedk8s connect -n ${ARCNAME} -l ${REGION} -g ${RESOURCE_GROUP} --subscription ${SUBSCRIPTION}
```

### Install package for certificate management

```bash
az k8s-extension create --cluster-name "${YOUR-CLUSTER-NAME}" --name "${YOUR-CLUSTER-NAME}-certmgr" --resource-group "${YOUR-RESOURCE-GROUP}" --cluster-type connectedClusters --release-train preview --extension-type microsoft.iotoperations.platform --scope cluster --release-namespace cert-manager
az k8s-extension create --cluster-name "${ARCNAME}" --name "${ARCNAME}-certmgr" --resource-group "${RESOURCE_GROUP}" --cluster-type connectedClusters --release-train preview --extension-type microsoft.iotoperations.platform --scope cluster --release-namespace cert-manager
```

### Install Azure Container Storage enabled by Azure Arc Extension with Config CRD creation

```bash
az k8s-extension create --resource-group "${YOUR-RESOURCE-GROUP}" --cluster-name "${YOUR-CLUSTER-NAME}" --cluster-type connectedClusters --name "acsa-`mktemp -u XXXXXX`" --extension-type microsoft.arc.containerstorage --config feature.diskStorageClass="default,local-path" --config edgeStorageConfiguration.create=true
az k8s-extension create --resource-group "${RESOURCE_GROUP}" --cluster-name "${ARCNAME}" --cluster-type connectedClusters --name "acsa-`mktemp -u XXXXXX`" --extension-type microsoft.arc.containerstorage --config feature.diskStorageClass="default,local-path" --config edgeStorageConfiguration.create=true
```

### Assign role to storage account

```bash
export pid=`az k8s-extension list --cluster-name "${YOUR-CLUSTER-NAME}" --resource-group "${YOUR-RESOURCE-GROUP}" --cluster-type connectedClusters | jq --arg extType "microsoft.arc.containerstorage" 'map(select(.extensionType == $extType)) | .[] | .identity.principalId' -r`
az role assignment create --assignee $pid --role "Storage Blob Data Owner" --scope "/subscriptions/${YOUR-SUBSCRIPTION}/resourceGroups/${YOUR-RESOURCE-GROUP}/providers/Microsoft.Storage/storageAccounts/${YOUR-STORAGEACCOUNT}"
export pid=`az k8s-extension list --cluster-name "${ARCNAME}" --resource-group "${RESOURCE_GROUP}" --cluster-type connectedClusters | jq --arg extType "microsoft.arc.containerstorage" 'map(select(.extensionType == $extType)) | .[] | .identity.principalId' -r`
az role assignment create --assignee $pid --role "Storage Blob Data Owner" --scope "/subscriptions/${SUBSCRIPTION}/resourceGroups/${RESOURCE_GROUP}/providers/Microsoft.Storage/storageAccounts/${STORAGEACCOUNT}"
```

### Configure ACSA with an SFTP Front End
Expand Down Expand Up @@ -122,4 +122,4 @@ You'll have to enter your password here.
### Confirm your file is uploaded

Finally, we can go to the Azure Portal and check our specified storage account container in our specified storage account. Our testfile1.txt should be there.
Note: Please keep in mind that we have set up this system with the default Ingest Policy, which waits 5 minutes after a file is written before it will upload it to the cloud. So if you don't see your file right away, just wait a few minutes. Policies can also be altered according to [these instructions](https://learn.microsoft.com/azure/azure-arc/container-storage/cloud-ingest-edge-volume-configuration?tabs=portal#optional-modify-the-ingestpolicy-from-the-default).
Note: Please keep in mind that we have set up this system with the default Ingest Policy, which waits 5 minutes after a file is written before it will upload it to the cloud. So if you don't see your file right away, just wait a few minutes. Policies can also be altered according to [these instructions](https://learn.microsoft.com/azure/azure-arc/container-storage/cloud-ingest-edge-volume-configuration?tabs=portal#optional-modify-the-ingestpolicy-from-the-default).
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.