Skip to content

Commit 321f366

Browse files
Merge pull request #287447 from kgremban/m2-926-bb
OTEL Collector config
2 parents 6d310a8 + f59789a commit 321f366

File tree

3 files changed

+29
-17
lines changed

3 files changed

+29
-17
lines changed

articles/iot-operations/configure-observability-monitoring/howto-configure-observability.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: kgremban
66
ms.topic: how-to
77
ms.custom:
88
- ignite-2023
9-
ms.date: 02/27/2024
9+
ms.date: 09/26/2024
1010

1111
# CustomerIntent: As an IT admin or operator, I want to be able to monitor and visualize data on the health of my industrial assets and edge environment.
1212
---
@@ -115,6 +115,14 @@ The steps in this section install shared monitoring resources and configure your
115115
enabled: false
116116
```
117117
118+
1. In the `otel-collector-values.yaml` file, make a note of the following values that you'll use when you deploy Azure IoT Operations on the cluster:
119+
120+
* **fullnameOverride**
121+
* **grpc.endpoint**
122+
* **check_interval**
123+
124+
1. Save and close the file.
125+
118126
1. Deploy the collector by running the following commands:
119127

120128
```shell

articles/iot-operations/deploy-iot-ops/howto-deploy-iot-operations.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Cloud resources:
3838
* An Azure key vault. To create a new key vault, use the [az keyvault create](/cli/azure/keyvault#az-keyvault-create) command:
3939

4040
```azurecli
41-
az keyvault create --enable-rbac-authorization --name "<KEYVAULT_NAME>" --resource-group "<RESOURCE_GROUP>"
41+
az keyvault create --enable-rbac-authorization --name "<NEW_KEYVAULT_NAME>" --resource-group "<RESOURCE_GROUP>"
4242
```
4343

4444
* Azure access permissions. For more information, see [Deployment details > Required permissions](overview-deploy.md#required-permissions).
@@ -96,13 +96,13 @@ Azure IoT Operations requires a schema registry on your cluster. Schema registry
9696
1. Create a storage account with hierarchical namespace enabled.
9797

9898
```azurecli
99-
az storage account create --name <STORAGE_ACCOUNT_NAME> --resource-group <RESOURCE_GROUP> --enable-hierarchical-namespace
99+
az storage account create --name <NEW_STORAGE_ACCOUNT_NAME> --resource-group <RESOURCE_GROUP> --enable-hierarchical-namespace
100100
```
101101

102102
1. Create a schema registry that connects to your storage account.
103103

104104
```azurecli
105-
az iot ops schema registry create --name <SCHEMA_REGISTRY> --resource-group <RESOURCE_GROUP> --registry-namespace <SCHEMA_REGISTRY_NAMESPACE> --sa-resource-id $(az storage account show --name <STORAGE_ACCOUNT_NAME> --resource-group <RESOURCE_GROUP> -o tsv --query id)
105+
az iot ops schema registry create --name <NEW_SCHEMA_REGISTRY_NAME> --resource-group <RESOURCE_GROUP> --registry-namespace <NEW_SCHEMA_REGISTRY_NAMESPACE> --sa-resource-id $(az storage account show --name <STORAGE_ACCOUNT_NAME> --resource-group <RESOURCE_GROUP> -o tsv --query id)
106106
```
107107

108108
Use the optional parameters to customize your schema registry, including:
@@ -126,11 +126,13 @@ Azure IoT Operations requires a schema registry on your cluster. Schema registry
126126
| --------- | ----- | ----------- |
127127
| `--no-progress` | | Disables the deployment progress display in the terminal. |
128128
| `--enable-fault-tolerance` | `false`, `true` | Enables fault tolerance for Azure Arc Container Storage. At least 3 cluster nodes are required. |
129+
| `--ops-config` | `observability.metrics.openTelemetryCollectorAddress="<FULLNAMEOVERRIDE>.azure-iot-operations.svc.cluster.local:<GRPC_ENDPOINT>` | If you followed the optional prerequisites to prepare your cluster for observability, provide the otel collector address you configured in the otel-collector-values.yaml file.<br><br>The sample values used in [Configure observability](../configure-observability-monitoring/howto-configure-observability.md) are **fullnameOverride=aio-otel-collector** and **grpc.enpoint=4317**. |
130+
| `--ops-config` | `observability.metrics.exportInternalSeconds=<CHECK_INTERVAL>` | If you followed the optional prerequisites to prepare your cluster for observability, provide the **check_interval** value you configured in the otel-collector-values.yaml file.<br><br>The sample value used in [Configure observability](../configure-observability-monitoring/howto-configure-observability.md) is **check_interval=60**. |
129131

130132
1. Deploy Azure IoT Operations. This command takes several minutes to complete:
131133

132134
```azurecli
133-
az iot ops create --name <NAME> --cluster <CLUSTER_NAME> --resource-group <RESOURCE_GROUP>
135+
az iot ops create --name <NEW_INSTANCE_NAME> --cluster <CLUSTER_NAME> --resource-group <RESOURCE_GROUP>
134136
```
135137

136138
Use the optional parameters to customize your instance, including:
@@ -175,7 +177,7 @@ Azure secret requires a user-assigned managed identity with access to the Azure
175177
* Adds a minimum secret provider class associated with the Azure IoT Operations instance.
176178

177179
```azurecli
178-
az iot ops secretsync enable -n <AIO_NAME> -g <RESOURCE_GROUP> --mi-user-assigned <USER_ASSIGNED_MI_RESOURCE_ID> --kv-resource-id <KEYVAULT_RESOURCE_ID>
180+
az iot ops secretsync enable --name <INSTANCE_NAME> --resource-group <RESOURCE_GROUP> --mi-user-assigned <USER_ASSIGNED_MI_RESOURCE_ID> --kv-resource-id <KEYVAULT_RESOURCE_ID>
179181
```
180182

181183
1. Create a user-assigned managed identity which can be used for cloud connections. Don't use the same identity as the one used to set up secrets management.
@@ -188,7 +190,7 @@ Azure secret requires a user-assigned managed identity with access to the Azure
188190
1. Run the following command to assign the identity to the Azure IoT Operations instance. This command also created a federated identity credential using the OIDC issuer of the indicated connected cluster and the Azure IoT Operations service account.
189191
190192
```azurecli
191-
az iot ops identity assign -n <AIO_NAME> -g <RESOURCE_GROUP> --mi-user-assigned <USER_ASSIGNED_MI_RESOURCE_ID>
193+
az iot ops identity assign --name <INSTANCE_NAME> --resource-group <RESOURCE_GROUP> --mi-user-assigned <USER_ASSIGNED_MI_RESOURCE_ID>
192194
```
193195

194196
### [Azure portal](#tab/portal)

articles/iot-operations/deploy-iot-ops/howto-prepare-cluster.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -37,14 +37,15 @@ To prepare your Azure Arc-enabled Kubernetes cluster, you need:
3737

3838
* The latest version of the Azure IoT Operations extension for Azure CLI. Use the following command to add the extension or update it to the latest version:
3939

40-
> [!NOTE]
41-
> **Special instructions for AIO Internal Bugbash**:
42-
>
43-
> Official IoT Ops CLI releases are installed via extension index like so az extension add --upgrade --name azure-iot-ops mentioned below. However for bug bashes, we will distribute one-off release candidates intended to expose functionality to exercise internally. Use this for Bug Bash 2 on 9/27 and skip the az extension command below
44-
> ``` bash
45-
> az storage blob download --auth-mode login --blob-url https://azedgecli.blob.core.windows.net/drop/azure_iot_ops-0.7.0a10-py3-none-any.whl -f ./azure_iot_ops-0.7.0a10-py3-none-any.whl
46-
> az extension add --upgrade --source ./azure_iot_ops-0.7.0a10-py3-none-any.whl
47-
> ```
40+
> [!NOTE]
41+
> **Special instructions for AIO Internal Bugbash**:
42+
>
43+
> Official IoT Ops CLI releases are installed via extension index like so az extension add --upgrade --name azure-iot-ops mentioned below. However for bug bashes, we will distribute one-off release candidates intended to expose functionality to exercise internally. Use this for Bug Bash 2 on 9/27 and skip the az extension command below
44+
>
45+
>``` bash
46+
>az storage blob download --auth-mode login --blob-url https://azedgecli.blob.core.windows.net/drop/azure_iot_ops-0.7.0a10-py3-none-any.whl -f ./azure_iot_ops-0.7.0a10-py3-none-any.whl
47+
>az extension add --upgrade --source ./azure_iot_ops-0.7.0a10-py3-none-any.whl
48+
>```
4849
4950
```bash
5051
az extension add --upgrade --name azure-iot-ops
@@ -324,10 +325,11 @@ To connect your cluster to Azure Arc:
324325
To connect your cluster to Azure Arc:
325326

326327
> [!NOTE]
327-
> **Special instructions for AIO Internal Bugbash**:
328+
> **Special instructions for AIO Internal Bugbash**:
328329
>
329330
> Official IoT Ops CLI releases are installed via extension index like so az extension add --upgrade --name azure-iot-ops mentioned below.
330-
> However for bug bashes, we will distribute one-off release candidates intended to expose functionality to exercise internally. Use this for Bug Bash 2 on 9/27
331+
> However for bug bashes, we will distribute one-off release candidates intended to expose functionality to exercise internally. Use this for Bug Bash 2 on 9/27:
332+
>
331333
> ``` bash
332334
> az storage blob download --auth-mode login --blob-url https://azedgecli.blob.core.windows.net/drop/azure_iot_ops-0.7.0a10-py3-none-any.whl -f ./azure_iot_ops-0.7.0a10-py3-none-any.whl
333335
> az extension add --upgrade --source ./azure_iot_ops-0.7.0a10-py3-none-any.whl

0 commit comments

Comments
 (0)