You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Create the UAMI(s) required for accessing the necessary resources.
33
35
34
36
For more information on creating managed identities, refer to [Manage user-assigned managed identities](https://learn.microsoft.com/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp)
35
37
36
-
## Configure the storage account
38
+
## Step 2: Configure the storage account
37
39
38
-
### Create or identify a storage account
40
+
### 2.1 Create or identify a storage account
39
41
40
42
Create a new storage account or use an existing one. Refer to [Create an Azure storage account](../storage/common/storage-account-create.md).
41
43
42
-
### Assign the required role
44
+
### 2.2 Assign the required role
43
45
44
46
Assign the **Storage Blob Data Contributor** role to the users and UAMI needing access to the **runRO** and **cable validation command output**.
45
47
46
48
For role assignment details, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md).
To limit access, configure Storage Firewalls and Virtual Networks:
51
53
52
54
- Add all required users' IP addresses to the **Virtual Networks** and/or **Firewall** lists.
53
55
54
56
- Follow instructions from [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md).
55
57
56
-
### Enable Trusted Services
58
+
### 2.4 Enable Trusted Services
57
59
58
60
Ensure the option **Allow Azure services on the trusted services list to access this storage account** under **Exceptions** is selected.
59
61
60
-
## Assign permissions to UAMI for Nexus Network Fabric Resource Provider
62
+
## Step3: Assign permissions to UAMI for Nexus Network Fabric Resource Provider
61
63
62
64
When using UAMI to access a storage account, the NNF platform requires provisioning access. Specifically, the permission **Microsoft.ManagedIdentity/userAssignedIdentities/assign/action** must be granted to the UAMI for the **Managed Network Fabric RP** in Microsoft Entra ID.
63
65
64
-
### Assign the Managed Identity Operator Role
66
+
### 3.1 Assign the Managed Identity Operator Role
65
67
66
68
1. Open the **Azure Portal** and locate the **User-Assigned Identity**.
67
69
@@ -76,13 +78,13 @@ When using UAMI to access a storage account, the NNF platform requires provision
76
78
6. Click **Review and assign**.
77
79
78
80
> [!Note]
79
-
> When using a User-Assigned Managed Identity (UAMI) to access a Storage account, it is essential to provision access to that identity for the NNF platform. Specifically, the Microsoft.ManagedIdentity/userAssignedIdentities/assign/action permission needs to be added to the User-assigned identity for the Managed Network Fabric RP Microsoft Entra ID. This permission ensures that the UAMI can be properly assigned and utilized within the NNF platform. It is a known limitation of the platform that this specific permission assignment is required. However, this limitation will be addressed in a future release (NNF 9.0).
81
+
> When using a User-Assigned Managed Identity (UAMI) to access a Storage account, it is essential to provision access to that identity for the NNF platform. Specifically, the Microsoft.ManagedIdentity/userAssignedIdentities/assign/action permission needs to be added to the User-assigned identity for the Managed Network Fabric RP Microsoft Entra ID. This permission ensures that the UAMI can be properly assigned and utilized within the NNF platform. It is a known limitation of the platform that this specific permission assignment is required. However, this limitation will be addressed in a future release.
80
82
81
-
## Update Cluster with UAMI and Storage Account configuration
83
+
## Step 4: Update Cluster with UAMI and Storage Account configuration
82
84
83
85
When creating or updating an NNF instance, both the User-Assigned Managed Identity and Storage Account must be supplied together.
84
86
85
-
### Storage account configuration format
87
+
### 4.1 Storage account configuration format
86
88
87
89
Use the `--storage-account-configuration` parameter to define the storage location for command outputs:
88
90
@@ -96,7 +98,9 @@ Use the `--storage-account-configuration` parameter to define the storage locati
96
98
}
97
99
```
98
100
99
-
## Create a new Fabric instance
101
+
## Step 5: Attaching your own storage account Fabric instance
102
+
103
+
### Attaching storage account during the creation of Fabric instance
100
104
101
105
Use the following command to create a new Fabric instance with BYO storage:
0 commit comments