Skip to content

Commit 4403c52

Browse files
committed
Merge branch 'patch-7' of https://github.com/GeorgeH-MS/azure-docs-pr into v-loberner-ase-msi-changes-from-293593
2 parents 46a7449 + 3032ee1 commit 4403c52

5 files changed

+30
-1
lines changed

articles/databox-online/azure-stack-edge-alerts.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -150,6 +150,8 @@ The following alerts are for issues that occur when accessing or uploading data
150150
|Could not connect to the storage account '{0}'.<sup>*</sup> |Critical |This may be due to Internet connectivity issues. The device is not able to communicate with the storage account service. In the local web UI of the device, go to **Troubleshooting** > **Diagnostic tests** and click **Run diagnostic tests**. Resolve the reported issues. |
151151
|The device has {0} files. A maximum of {1} files are supported. |Critical |Consider deleting some files from the device. |
152152
|Low throughput to and from Azure Storage detected. |Warning |In the local web UI of the device, go to **Troubleshooting** > **Diagnostic tests** and click **Run diagnostic tests**. Resolve the reported issues. If the issue persists, [contact Microsoft Support](azure-stack-edge-contact-microsoft-support.md). |
153+
|File share creation fails with insufficient permissions for cloud storage gateway. |Critical |This could happen when the Azure Storage account does not have appropriate permissions assigned for the Azure Stack Edge managed identity for the data tiering.<br>You can manually assign the following roles to the Managed identities for Azure Stack Edge resource:<ol><li>Storage Blob Data Contributor</li><li>Storage File Data Privileged Contributor</li><li>Contributor</li></ol>For more information, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md?tabs=portal#assign-an-azure-role) |
154+
|Storage account creation fails with insufficient permissions for cloud storage gateway. |Critical |This could happen when the Azure Storage account does not have appropriate permissions assigned for the Azure Stack Edge managed identity for the data tiering.<br>You can manually assign the following roles to the Managed identities for Azure Stack Edge resource:<ol><li>Storage Blob Data Contributor</li><li>Storage File Data Privileged Contributor</li><li>Contributor</li></ol>For more information, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md?tabs=portal#assign-an-azure-role) |
153155

154156
<sup>*</sup> This alert is triggered by more than one event type, with different recommended actions.
155157

articles/databox-online/azure-stack-edge-gpu-deploy-add-shares.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,15 @@ To create a share, do the following procedure:
5555
Depending upon whether you choose SMB or NFS shares, the rest of the options vary slightly.
5656

5757
c. Provide a storage account where the share will reside.
58+
59+
> [!IMPORTANT]
60+
> Tiering data from an Azure Stack Edge Pro or Data Box Gateway device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
61+
>
62+
> * Storage Blob Data Contributor
63+
> * Storage File Data Privileged Contributor
64+
> * Contributor
65+
>
66+
> For more information, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md?tabs=portal#assign-an-azure-role).
5867
5968
d. In the **Storage service** drop-down list, select **Block Blob**, **Page Blob**, or **Files**.
6069
The type of service you select depends on which format you want the data to use in Azure. In this example, because we want to store the data as block blobs in Azure, we select **Block Blob**. If you select **Page Blob**, make sure that your data is 512 bytes aligned. For example, a VHDX is always 512 bytes aligned.

articles/databox-online/azure-stack-edge-gpu-install-update.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,13 @@ We recommend that you install updates through Azure portal. The device automatic
119119

120120
> [!NOTE]
121121
> - Make sure that the device is healthy and status shows as **Your device is running fine!** before you proceed to install the updates.
122+
> - Tiering data from an Azure Stack Edge Pro or Data Box Gateway device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
123+
>
124+
> - Storage Blob Data Contributor
125+
> - Storage File Data Privileged Contributor
126+
> - Contributor
127+
>
128+
> For more information, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md?tabs=portal#assign-an-azure-role).
122129
123130
Depending on the software version that you're running, install process might differ slightly.
124131

articles/databox-online/azure-stack-edge-gpu-manage-storage-accounts.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,9 @@ You can now select a container from this list and select **+ Delete container**
8888

8989
Each Azure Storage account has two 512-bit storage access keys that are used for authentication when the storage account is accessed. One of these two keys must be supplied when your Azure Stack Edge device accesses your cloud storage service provider (in this case, Azure).
9090

91+
> [!NOTE]
92+
> Access your Azure Storage Account with storage access keys from Azure Stack Edge Pro or Data Box Gateway device has been deprecated in 2501. Tiering data from an Azure Stack Edge Pro or Data Box Gateway device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access from 2501. For more information, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md?tabs=portal#assign-an-azure-role).
93+
9194
An Azure administrator can regenerate or change the access key by directly accessing the storage account (via the Azure Storage service). The Azure Stack Edge service and the device do not see this change automatically.
9295

9396
To inform Azure Stack Edge of the change, you will need to access the Azure Stack Edge service, access the storage account, and then synchronize the access key. The service then gets the latest key, encrypts the keys, and sends the encrypted key to the device. When the device gets the new key, it can continue to transfer data to the Azure Storage account.

includes/azure-stack-edge-gateway-add-storage-account.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,14 @@ ms.author: alkohli
1919
2. Provide an optional description for the information on the data the storage account is holding.
2020

2121
3. By default, the Edge storage account is mapped to an Azure Storage account in the cloud, and the data from the storage account is automatically pushed to the cloud. Specify the Azure storage account that your Edge storage account is mapped to.
22+
> [!IMPORTANT]
23+
> Tiering data from an Azure Stack Edge Pro or Data Box Gateway device to the mapped Azure Storage account uses Managed Service Identity to authorize the data access. Make sure that the Azure Storage account that you use has the following roles being assigned to the Managed identities for Azure Stack Edge resource:
24+
>
25+
> * Storage Blob Data Contributor
26+
> * Storage File Data Privileged Contributor
27+
> * Contributor
28+
>
29+
> For more information, see [Assign an Azure role for access to blob data](../storage/blobs/assign-azure-role-data-access.md?tabs=portal#assign-an-azure-role).
2230
2331
4. Create a new container, or select from an existing container in the Azure storage account. Any data from the device that is written to the Edge storage account is automatically uploaded to the selected storage container in the mapped Azure Storage account.
2432

@@ -30,4 +38,4 @@ ms.author: alkohli
3038

3139
![Add a storage account 2](media/azure-stack-edge-gateway-add-storage-account/add-storage-account-4.png)
3240

33-
You get the access keys by [Connecting to the device local APIs using Azure Resource Manager](../articles/databox-online/azure-stack-edge-gpu-connect-resource-manager.md).
41+
You get the access keys by [Connecting to the device local APIs using Azure Resource Manager](../articles/databox-online/azure-stack-edge-gpu-connect-resource-manager.md).

0 commit comments

Comments
 (0)