You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/deploy-iot-ops/overview-deploy.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,6 +74,9 @@ The following table describes Azure IoT Operations deployment and management tas
74
74
| Create secrets in Key Vault |**Key Vault Secrets Officer** role at the resource level. | Only required for secure settings deployment. |
75
75
| Enable resource sync rules on an Azure IoT Operations instance |**Microsoft.Authorization/roleAssignments/write** permissions at the resource group level. | Resource sync rules are disabled by default, but can be enabled as part of the [az iot ops create](/cli/azure/iot/ops#az-iot-ops-create) command. |
76
76
77
+
> [!TIP]
78
+
> You must enable resource sync rules on the Azure IoT Operations instance to use the automatic asset discovery capabilities of the Akri services. To learn more, see [What is OPC UA asset discovery (preview)?](../discover-manage-assets/overview-akri.md).
79
+
77
80
If you use the Azure CLI to assign roles, use the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command to give permissions. For example, `az role assignment create --assignee sp_name --role "Role Based Access Control Administrator" --scope subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MyResourceGroup`
78
81
79
82
If you use the Azure portal to assign privileged admin roles to a user or principal, you're prompted to restrict access using conditions. For this scenario, select the **Allow user to assign all roles** condition in the **Add role assignment** page.
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-autodetect-opcua-assets-using-akri.md
+26-22Lines changed: 26 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,38 +16,38 @@ In this article, you learn how to automatically discover and configure OPC UA as
16
16
17
17
## Prerequisites
18
18
19
-
A deployed instance of Azure IoT Operations with resource sync rules enabled. To learn more, see [Deploy Azure IoT Operations](../deploy-iot-ops/overview-deploy.md).
19
+
-**Enable resource sync rules.**A deployed instance of Azure IoT Operations with resource sync rules enabled. To learn more, see [Deploy Azure IoT Operations](../deploy-iot-ops/overview-deploy.md).
20
20
21
-
> [!TIP]
22
-
> By default, the [deployment quickstart](../get-started-end-to-end-sample/quickstart-deploy.md) instructions do not enable resource sync rules. If resource sync rules aren't enabled on your instance, see [Enable resource sync rules on an existing instance](../troubleshoot/troubleshoot.md#you-want-to-enable-resource-sync-rules-on-an-existing-instance).
23
-
24
-
The custom location in the resource group where you deployed Azure IoT Operations must have the **Azure Kubernetes Service Arc Contributor Role** role enabled with **K8 Bridge** as a member: For example:
21
+
> [!IMPORTANT]
22
+
> By default, the [deployment quickstart](../get-started-end-to-end-sample/quickstart-deploy.md) instructions do not enable resource sync rules. If resource sync rules aren't enabled on your instance, see [Enable resource sync rules on an existing instance](../troubleshoot/troubleshoot.md#you-want-to-enable-resource-sync-rules-on-an-existing-instance).
25
23
26
-
# [Azure portal](#tab/portal)
24
+
-**Set permissions on your custom location.** The custom location in the resource group where you deployed Azure IoT Operations must have the **Azure Kubernetes Service Arc Contributor Role** role enabled with **K8 Bridge** as a member: For example:
27
25
28
-
1. Go to the custom location for your Azure IoT Operations instance in the Azure portal.
26
+
# [Azure portal](#tab/portal)
29
27
30
-
1.Select **Access control (IAM)**.
28
+
1.Go to the custom location for your Azure IoT Operations instance in the Azure portal.
31
29
32
-
1. Select **Add > Add role assignment**.
30
+
1. Select **Access control (IAM)**.
33
31
34
-
1. Search for and select the**Azure Kubernetes Service Arc Contributor Role**role. Then click **Next**.
32
+
1. Select**Add > Add role assignment**.
35
33
36
-
1. Select **Select members**. Search for and select **K8 Bridge**. Then click **Review + Assign**.
34
+
1. Search for and select the **Azure Kubernetes Service Arc Contributor Role** role. Then click **Next**.
37
35
38
-
1.To finish adding the role assignment, select **Review + assign** again.
36
+
1.Select **Select members**. Search for and select **K8 Bridge**. Then click **Review + Assign**.
39
37
40
-
# [Azure CLI](#tab/cli)
38
+
1. To finish adding the role assignment, select **Review + assign** again.
1. You can filter the list by the asset endpoint name, or by keyword. The list shows the discovered assets and their status.
79
79
@@ -87,7 +87,7 @@ From the list of discovered assets, you can import an asset into your Azure IoT
87
87
88
88
:::image type="content" source="media/howto-autodetect-opcua-assets-using-akri/add-asset-details.png" alt-text="An asset from a discovered asset.":::
89
89
90
-
1. Step through the rest of the **Create asset** pages and make any changes you want to the imported details, tags, and events:
90
+
1. Step through the rest of the **Create asset** pages and selectthe imported tags and events that you want to use:
91
91
92
92
:::image type="content" source="media/howto-autodetect-opcua-assets-using-akri/add-imported-tags.png" alt-text="Modify the tags of an imported asset.":::
> The previous commands assume that you installed your Azure IoT Operations instance in the default `azure-iot-operations` namespace. If you installed it in a different namespace, replace `azure-iot-operations` with the name of your namespace.
122
+
123
+
## Use the imported asset in your data flows
124
+
125
+
After you complete the import process fora discovered asset, you can use the imported assetin your data flows. Imported asset definitions behave in exactly the same way as manually entered asset definitions. To learn more, see [Create and manage data flows](../connect-to-cloud/howto-create-dataflow.md).
0 commit comments