Skip to content

Commit 14d4d12

Browse files
committed
Address feedback
1 parent 8b36e44 commit 14d4d12

File tree

2 files changed

+29
-22
lines changed

2 files changed

+29
-22
lines changed

articles/iot-operations/deploy-iot-ops/overview-deploy.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,9 @@ The following table describes Azure IoT Operations deployment and management tas
7474
| Create secrets in Key Vault | **Key Vault Secrets Officer** role at the resource level. | Only required for secure settings deployment. |
7575
| Enable resource sync rules on an Azure IoT Operations instance | **Microsoft.Authorization/roleAssignments/write** permissions at the resource group level. | Resource sync rules are disabled by default, but can be enabled as part of the [az iot ops create](/cli/azure/iot/ops#az-iot-ops-create) command. |
7676

77+
> [!TIP]
78+
> You must enable resource sync rules on the Azure IoT Operations instance to use the automatic asset discovery capabilities of the Akri services. To learn more, see [What is OPC UA asset discovery (preview)?](../discover-manage-assets/overview-akri.md).
79+
7780
If you use the Azure CLI to assign roles, use the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command to give permissions. For example, `az role assignment create --assignee sp_name --role "Role Based Access Control Administrator" --scope subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/MyResourceGroup`
7881

7982
If you use the Azure portal to assign privileged admin roles to a user or principal, you're prompted to restrict access using conditions. For this scenario, select the **Allow user to assign all roles** condition in the **Add role assignment** page.

articles/iot-operations/discover-manage-assets/howto-autodetect-opcua-assets-using-akri.md

Lines changed: 26 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -16,38 +16,38 @@ In this article, you learn how to automatically discover and configure OPC UA as
1616

1717
## Prerequisites
1818

19-
A deployed instance of Azure IoT Operations with resource sync rules enabled. To learn more, see [Deploy Azure IoT Operations](../deploy-iot-ops/overview-deploy.md).
19+
- **Enable resource sync rules.** A deployed instance of Azure IoT Operations with resource sync rules enabled. To learn more, see [Deploy Azure IoT Operations](../deploy-iot-ops/overview-deploy.md).
2020

21-
> [!TIP]
22-
> By default, the [deployment quickstart](../get-started-end-to-end-sample/quickstart-deploy.md) instructions do not enable resource sync rules. If resource sync rules aren't enabled on your instance, see [Enable resource sync rules on an existing instance](../troubleshoot/troubleshoot.md#you-want-to-enable-resource-sync-rules-on-an-existing-instance).
23-
24-
The custom location in the resource group where you deployed Azure IoT Operations must have the **Azure Kubernetes Service Arc Contributor Role** role enabled with **K8 Bridge** as a member: For example:
21+
> [!IMPORTANT]
22+
> By default, the [deployment quickstart](../get-started-end-to-end-sample/quickstart-deploy.md) instructions do not enable resource sync rules. If resource sync rules aren't enabled on your instance, see [Enable resource sync rules on an existing instance](../troubleshoot/troubleshoot.md#you-want-to-enable-resource-sync-rules-on-an-existing-instance).
2523
26-
# [Azure portal](#tab/portal)
24+
- **Set permissions on your custom location.** The custom location in the resource group where you deployed Azure IoT Operations must have the **Azure Kubernetes Service Arc Contributor Role** role enabled with **K8 Bridge** as a member: For example:
2725

28-
1. Go to the custom location for your Azure IoT Operations instance in the Azure portal.
26+
# [Azure portal](#tab/portal)
2927

30-
1. Select **Access control (IAM)**.
28+
1. Go to the custom location for your Azure IoT Operations instance in the Azure portal.
3129

32-
1. Select **Add > Add role assignment**.
30+
1. Select **Access control (IAM)**.
3331

34-
1. Search for and select the **Azure Kubernetes Service Arc Contributor Role** role. Then click **Next**.
32+
1. Select **Add > Add role assignment**.
3533

36-
1. Select **Select members**. Search for and select **K8 Bridge**. Then click **Review + Assign**.
34+
1. Search for and select the **Azure Kubernetes Service Arc Contributor Role** role. Then click **Next**.
3735

38-
1. To finish adding the role assignment, select **Review + assign** again.
36+
1. Select **Select members**. Search for and select **K8 Bridge**. Then click **Review + Assign**.
3937

40-
# [Azure CLI](#tab/cli)
38+
1. To finish adding the role assignment, select **Review + assign** again.
4139

42-
```bash
43-
CUSTOM_LOCATION_NAME=$(az iot ops list -g <YOUR RESOURCE GROUP> --query "[0].extendedLocation.name" -o tsv)
40+
# [Azure CLI](#tab/cli)
4441

45-
ASSIGNEE=$(az ad sp list --display-name "K8 Bridge" --query "[0].appId" -o tsv)
42+
```bash
43+
CUSTOM_LOCATION_NAME=$(az iot ops list -g <YOUR RESOURCE GROUP> --query "[0].extendedLocation.name" -o tsv)
44+
45+
ASSIGNEE=$(az ad sp list --display-name "K8 Bridge" --query "[0].appId" -o tsv)
46+
47+
az role assignment create --role "Azure Kubernetes Service Arc Contributor Role" --assignee $ASSIGNEE --scope $CUSTOM_LOCATION_NAME
48+
```
4649

47-
az role assignment create --role "Azure Kubernetes Service Arc Contributor Role" --assignee $ASSIGNEE --scope $CUSTOM_LOCATION_NAME
48-
```
49-
50-
---
50+
---
5151

5252
## Deploy the preview connectors
5353

@@ -73,7 +73,7 @@ Azure IoT Operations uses the asset endpoint to connect to the OPC UA server and
7373

7474
1. Go to the **Discovery** page for your instance in the operations experience:
7575

76-
:::image type="content" source="media/howto-autodetect-opcua-assets-using-akri/discovered-assets-list.png" alt-text="View discovered assets.":::
76+
:::image type="content" source="media/howto-autodetect-opcua-assets-using-akri/discovered-assets-list.png" alt-text="View discovered assets.":::
7777

7878
1. You can filter the list by the asset endpoint name, or by keyword. The list shows the discovered assets and their status.
7979

@@ -87,7 +87,7 @@ From the list of discovered assets, you can import an asset into your Azure IoT
8787

8888
:::image type="content" source="media/howto-autodetect-opcua-assets-using-akri/add-asset-details.png" alt-text="An asset from a discovered asset.":::
8989

90-
1. Step through the rest of the **Create asset** pages and make any changes you want to the imported details, tags, and events:
90+
1. Step through the rest of the **Create asset** pages and select the imported tags and events that you want to use:
9191

9292
:::image type="content" source="media/howto-autodetect-opcua-assets-using-akri/add-imported-tags.png" alt-text="Modify the tags of an imported asset.":::
9393

@@ -119,3 +119,7 @@ kubectl describe discoveredasset <name> -n azure-iot-operations
119119

120120
> [!TIP]
121121
> The previous commands assume that you installed your Azure IoT Operations instance in the default `azure-iot-operations` namespace. If you installed it in a different namespace, replace `azure-iot-operations` with the name of your namespace.
122+
123+
## Use the imported asset in your data flows
124+
125+
After you complete the import process for a discovered asset, you can use the imported asset in your data flows. Imported asset definitions behave in exactly the same way as manually entered asset definitions. To learn more, see [Create and manage data flows](../connect-to-cloud/howto-create-dataflow.md).

0 commit comments

Comments
 (0)