You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: "Use custom locations to deploy Azure PaaS services on Azure Arc-enabled Kubernetes clusters"
8
8
---
9
9
10
10
# Create and manage custom locations on Azure Arc-enabled Kubernetes
11
11
12
-
The *Custom locations* feature provides a way for tenant or cluster administrators to configure their Azure Arc-enabled Kubernetes clusters as target locations for deploying instances of Azure offerings. Examples of Azure offerings that can be deployed on top of custom locations include databases, such as Azure Arc-enabled SQL Managed Instance and Azure Arc-enabled PostgreSQL Hyperscale, or application instances, such as App Services, Functions, Event Grid, Logic Apps, and API Management.
12
+
The *custom locations* feature provides a way for tenant or cluster administrators to configure their Azure Arc-enabled Kubernetes clusters as target locations for deploying instances of Azure offerings. Examples of Azure offerings that can be deployed on top of custom locations include databases, such as Azure Arc-enabled SQL Managed Instance and Azure Arc-enabled PostgreSQL Hyperscale, or application instances, such as App Services, Functions, Event Grid, Logic Apps, and API Management.
13
13
14
-
A custom location has a one-to-one mapping to a namespace within the Azure Arc-enabled Kubernetes cluster. The custom location Azure resource combined with Azure RBAC can be used to grant granular permissions to application developers or database admins, enabling them to deploy resources such as databases or application instances on top of Arc-enabled Kubernetes clusters in a multi-tenant manner.
14
+
A custom location has a one-to-one mapping to a namespace within the Azure Arc-enabled Kubernetes cluster. The custom location Azure resource combined with Azure role-based access control (Azure RBAC) can be used to grant granular permissions to application developers or database admins, enabling them to deploy resources such as databases or application instances on top of Arc-enabled Kubernetes clusters in a multi-tenant manner.
15
15
16
16
A conceptual overview of this feature is available in [Custom locations - Azure Arc-enabled Kubernetes](conceptual-custom-locations.md).
17
17
@@ -27,15 +27,15 @@ In this article, you learn how to:
27
27
- Install the following Azure CLI extensions:
28
28
-`connectedk8s` (version 1.2.0 or later)
29
29
-`k8s-extension` (version 1.0.0 or later)
30
-
-`customlocation` (version 0.1.3 or later)
30
+
-`customlocation` (version 0.1.3 or later)
31
31
32
32
```azurecli
33
33
az extension add --name connectedk8s
34
34
az extension add --name k8s-extension
35
35
az extension add --name customlocation
36
36
```
37
37
38
-
If you have already installed the `connectedk8s`, `k8s-extension`, and `customlocation` extensions, update to the **latest version** using the following command:
38
+
If you have already installed the `connectedk8s`, `k8s-extension`, and `customlocation` extensions, update to the **latest version** by using the following command:
39
39
40
40
```azurecli
41
41
az extension update --name connectedk8s
@@ -63,7 +63,7 @@ In this article, you learn how to:
63
63
64
64
## Enable custom locations on your cluster
65
65
66
-
If you are signed in to Azure CLI as an Azure AD user, to enable this feature on your cluster, execute the following command:
66
+
If you are signed in to Azure CLI as an Azure Active Directory (Azure AD) user, to enable this feature on your cluster, execute the following command:
67
67
68
68
```azurecli
69
69
az connectedk8s enable-features -n <clusterName> -g <resourceGroupName> --features cluster-connect custom-locations
@@ -75,18 +75,26 @@ If you run the above command while signed in to Azure CLI using a service princi
75
75
Unable to fetch oid of 'custom-locations' app. Proceeding without enabling the feature. Insufficient privileges to complete the operation.
76
76
```
77
77
78
-
This is because a service principal doesn't have permissions to get information of the application used by the Azure Arc service. To avoid this error, execute the following steps:
78
+
This is because a service principal doesn't have permissions to get information about the application used by the Azure Arc service. To avoid this error, complete the following steps:
79
79
80
-
1. Sign in to Azure CLI using your user account. Fetch the Object ID of the Azure AD application used by Azure Arc service:
80
+
1. Sign in to Azure CLI using your user account. Fetch the `objectId` or `id`of the Azure AD application used by Azure Arc service. The command you use depends on your version of Azure CLI.
81
81
82
-
```azurecli
83
-
az ad sp show --id bc313c14-388c-4e7d-a58e-70017303ee3b --query objectId -o tsv
84
-
```
82
+
If you're using an Azure CLI version lower than 2.37.0, use the following command:
83
+
84
+
```azurecli
85
+
az ad sp show --id bc313c14-388c-4e7d-a58e-70017303ee3b --query objectId -o tsv
86
+
```
87
+
88
+
If you're using Azure CLI version 2.37.0 or higher, use the following command instead:
89
+
90
+
```azurecli
91
+
az ad sp show --id bc313c14-388c-4e7d-a58e-70017303ee3b --query id -o tsv
92
+
```
85
93
86
-
1. Sign in to Azure CLI using the service principal. Use the `<objectId>` value from above step to enable custom locations feature on the cluster:
94
+
1. Sign in to Azure CLI using the service principal. Use the `<objectId>`or `id`value from the previous step to enable custom locations on the cluster:
0 commit comments