Skip to content

Commit 4474c34

Browse files
committed
Fix terminology
1 parent c41e777 commit 4474c34

File tree

9 files changed

+29
-29
lines changed

9 files changed

+29
-29
lines changed

articles/iot-operations/deploy-iot-ops/howto-deploy-iot-test-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ This article discusses Azure IoT Operations *deployments* and *instances*, which
2424
* An Azure IoT Operations instance
2525
* Arc extensions
2626
* Custom locations
27-
* Resources that you can configure in your Azure IoT Operations solution, like assets and asset endpoints.
27+
* Resources that you can configure in your Azure IoT Operations solution, like namespace assets and devices.
2828

2929
* An Azure IoT Operations *instance* is the parent resource that bundles the suite of services that are defined in [What is Azure IoT Operations?](../overview-iot-operations.md) like MQTT broker, data flows, and connector for OPC UA.
3030

articles/iot-operations/discover-manage-assets/howto-autodetect-opc-ua-assets-use-akri.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ The Akri services and connector for OPC UA are a turnkey solution that lets you
1616

1717
To discover OPC UA assets, the assets must be compliant with the [OPC 10000-100: Devices](https://reference.opcfoundation.org/DI/v103/docs/) companion specification. The connector for OPC UA and Akri services follow the process described in [OPC 10000-110: Asset Management Basics](https://reference.opcfoundation.org/AMB/v101/docs/) to discover OPC UA assets and onboard them into Azure Device Registry.
1818

19-
In this article, you learn how to automatically discover and configure OPC UA devices and assets connected to your Azure IoT Operations deployment. The automatic discovery process starts when you add an asset endpoint with the **Enable discovery** option selected.
19+
In this article, you learn how to automatically discover and configure OPC UA devices and assets connected to your Azure IoT Operations deployment. The automatic discovery process starts when you add a device with the **Enable discovery** option selected.
2020

2121
To learn more, see [What is asset discovery (preview)?](overview-akri.md).
2222

@@ -72,27 +72,27 @@ Currently, discovery is only enabled in the preview version of the connector for
7272
7373
[!INCLUDE [deploy-preview-media-connectors](../includes/deploy-preview-media-connectors.md)]
7474
75-
## Create an asset endpoint
75+
## Create a device
7676
77-
To create an asset endpoint with discovery enabled:
77+
To create a device with discovery enabled:
7878
7979
1. Go to your Azure IoT Operations instance in the operations experience web UI.
8080
81-
1. Add a new asset endpoint and select the **Enable discovery** option:
81+
1. Add a new device and select the **Enable discovery** option:
8282
83-
:::image type="content" source="media/howto-autodetect-opc-ua-assets-use-akri/enable-auto-discover.png" alt-text="Screenshot that shows how to create an asset endpoint with discovery enabled.":::
83+
:::image type="content" source="media/howto-autodetect-opc-ua-assets-use-akri/enable-auto-discover.png" alt-text="Screenshot that shows how to create a device with discovery enabled.":::
8484
85-
1. Select **Create** to create the asset endpoint.
85+
1. Select **Create** to create the device.
8686
8787
## Review the discovered assets
8888
89-
Azure IoT Operations uses the asset endpoint to connect to the OPC UA server and scan for assets. To view the discovered assets:
89+
Azure IoT Operations uses the device to connect to the OPC UA server and scan for assets. To view the discovered assets:
9090
9191
1. Go to the **Discovery** page for your instance in the operations experience:
9292
9393
:::image type="content" source="media/howto-autodetect-opc-ua-assets-use-akri/discovered-assets-list.png" alt-text="Screenshot that shows how to view discovered assets.":::
9494
95-
1. You can filter the list by the asset endpoint name, or by keyword. The list shows the discovered assets and their status.
95+
1. You can filter the list by the device name, or by keyword. The list shows the discovered assets and their status.
9696
9797
## Import an asset from a discovered asset
9898

articles/iot-operations/discover-manage-assets/howto-configure-opc-ua-authentication-options.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,11 +35,11 @@ To learn more, see [OPC UA applications - user authentication](https://reference
3535

3636
To configure the secrets for the *username* and *password* values in the [operations experience](https://iotoperations.azure.com) web UI:
3737

38-
1. Navigate to your list of asset endpoints:
38+
1. Navigate to your list of devices:
3939

40-
:::image type="content" source="media/howto-configure-opc-ua-authentication-options/asset-endpoint-list.png" alt-text="Screenshot that shows the list of asset endpoints.":::
40+
:::image type="content" source="media/howto-configure-opc-ua-authentication-options/asset-endpoint-list.png" alt-text="Screenshot that shows the list of devices.":::
4141

42-
1. Select **Create asset endpoint**.
42+
1. Select **Create device**.
4343

4444
1. Select **Username password** as the authentication mode:
4545

articles/iot-operations/discover-manage-assets/howto-configure-opc-ua-certificates-infrastructure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ To use the operations experience web UI to manage the trusted certificates list,
5151
> [!NOTE]
5252
> The connector for OPC UA uses a Kubernetes native secret named *aio-opc-ua-broker-trust-list* to store the trusted certificates list. This secret is created when you deploy Azure IoT Operations.
5353
54-
1. Go to the **Asset endpoints page** in the [operations experience](https://iotoperations.azure.com) web UI.
54+
1. Go to the **Devices page** in the [operations experience](https://iotoperations.azure.com) web UI.
5555

5656
1. To view the trusted certificates list, select **Manage certificates and secrets** and then **Certificates**:
5757

@@ -163,7 +163,7 @@ To use the operations experience web UI to manage the issuer certificates list,
163163
> [!NOTE]
164164
> The connector for OPC UA uses a Kubernetes native secret named *aio-opc-ua-broker-issuer-list* to store the issuer certificates list. This secret is created when you deploy Azure IoT Operations.
165165
166-
1. Go to the **Asset endpoints page** in the [operations experience](https://iotoperations.azure.com) web UI.
166+
1. Go to the **Devices page** in the [operations experience](https://iotoperations.azure.com) web UI.
167167
168168
1. To view the issuer certificates list, select **Manage certificates and secrets** and then **Certificates**:
169169

articles/iot-operations/discover-manage-assets/howto-configure-opc-ua.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ Now you can define the tags associated with the asset. To add OPC UA tags:
183183
184184
# [Azure CLI](#tab/cli)
185185
186-
Use the following commands to add a "thermostat" namespaced asset to your device by using the Azure CLI. The commands add a dataset and two tags to the asset by using the `point add` command:
186+
Use the following commands to add a "thermostat" namespace asset to your device by using the Azure CLI. The commands add a dataset and two tags to the asset by using the `point add` command:
187187
188188
```azurecli
189189
# Create the asset

articles/iot-operations/get-started-end-to-end-sample/quickstart-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,8 @@ $CLUSTER_NAME = "<kubernetes-cluster-name>"
8787

8888
Run the following commands to download and run the Bicep file that configures your Azure IoT Operations instance. The Bicep file:
8989

90-
- Adds an asset endpoint that connects to the OPC PLC simulator.
91-
- Adds an asset that represents the oven and defines the data points that the oven exposes.
90+
- Adds a device that connects to the OPC PLC simulator.
91+
- Adds a namespace asset that represents the oven and defines the data points that the oven exposes.
9292
- Adds a data flow that manipulates the messages from the simulated oven.
9393
- Creates an Azure Event Hubs instance to receive the data.
9494

articles/iot-operations/secure-iot-ops/howto-manage-certificates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ For example, the connector for OPC UA uses the certificate management experience
154154

155155
When you [deploy Azure IoT Operations with secure settings](../deploy-iot-ops/overview-deploy.md#secure-settings-deployment), you can start adding certificates to Azure Key Vault, and sync them to the Kubernetes cluster to be used in the *Trust list* and *Issuer list* stores for OPC UA connections:
156156

157-
:::image type="content" source="media/howto-manage-certificates/add-new-certificate.png" lightbox="media/howto-manage-certificates/add-new-certificate.png" alt-text="Screenshot that shows the Upload certificate and Add from Azure Key Vault options when adding a new certificate to the asset endpoints page.":::
157+
:::image type="content" source="media/howto-manage-certificates/add-new-certificate.png" lightbox="media/howto-manage-certificates/add-new-certificate.png" alt-text="Screenshot that shows the Upload certificate and Add from Azure Key Vault options when adding a new certificate to the devices page.":::
158158

159159
- **Upload Certificate**: Uploads a certificate which is then added as a secret to Azure Key Vault and automatically synchronized to the cluster using Secret Store extension.
160160

@@ -174,7 +174,7 @@ When you [deploy Azure IoT Operations with secure settings](../deploy-iot-ops/ov
174174

175175
Using the list view you can manage the synchronized certificates. You can view all the synchronized certificates, and which certificate store it's synchronized to:
176176
177-
:::image type="content" source="media/howto-manage-certificates/list-certificates.png" lightbox="media/howto-manage-certificates/list-certificates.png" alt-text="Screenshot that shows the list of certificates in the asset endpoints page and how to filter by Trust List and Issuer List.":::
177+
:::image type="content" source="media/howto-manage-certificates/list-certificates.png" lightbox="media/howto-manage-certificates/list-certificates.png" alt-text="Screenshot that shows the list of certificates in the devices page and how to filter by Trust List and Issuer List.":::
178178
179179
- To learn more about the *Trust list* and *Issuer list* stores, see [Configure OPC UA certificates infrastructure for the connector for OPC UA](../discover-manage-assets/howto-configure-opc-ua-certificates-infrastructure.md).
180180

articles/iot-operations/secure-iot-ops/howto-manage-secrets.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -29,35 +29,35 @@ Secrets management for Azure IoT Operations uses Secret Store extension to sync
2929
> [!NOTE]
3030
> Azure IoT Operations instances work with only one Azure Key Vault, multiple key vaults per instance isn't supported.
3131
32-
Once the [set up secrets management](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-secrets-management) steps are completed, you can start adding secrets to Azure Key Vault, and sync them to the Kubernetes cluster to be used in **Asset Endpoints** or **Data flow Endpoints** using the [operations experience](https://iotoperations.azure.com) web UI.
32+
Once the [set up secrets management](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-secrets-management) steps are completed, you can start adding secrets to Azure Key Vault, and sync them to the Kubernetes cluster to be used in **Devices** or **Data flow endpoints** using the [operations experience](https://iotoperations.azure.com) web UI.
3333

34-
Secrets are used in asset endpoints and data flow endpoints for authentication. This section uses asset endpoints as an example. The same process can be applied to data flow endpoints. You have the option to directly create the secret in Azure Key Vault and have it automatically synchronized down to the cluster, or use an existing secret reference from the key vault:
34+
Secrets are used in devices and data flow endpoints for authentication. This section uses devices as an example. The same process can be applied to data flow endpoints. You have the option to directly create the secret in Azure Key Vault and have it automatically synchronized down to the cluster, or use an existing secret reference from the key vault:
3535

36-
1. Go to the **Asset endpoints** page in the [operations experience](https://iotoperations.azure.com) web UI.
36+
1. Go to the **Devices** page in the [operations experience](https://iotoperations.azure.com) web UI.
3737

38-
1. To add a new secret reference, select **Add reference** when creating a new asset endpoint:
38+
1. To add a new secret reference, select **Add reference** when creating a new device:
3939

4040
:::image type="content" source="media/howto-manage-secrets/use-secrets.png" lightbox="media/howto-manage-secrets/use-secrets.png" alt-text="Screenshot that shows the Add from Azure Key Vault and Create new options when selecting a secret in operations experience.":::
4141

4242
- **Create a new secret**: creates a secret reference in the Azure Key Vault and also automatically synchronizes the secret down to the cluster using Secret Store extension. Use this option if you didn't create the secret you require for this scenario in the key vault beforehand.
4343

4444
- **Add from Azure Key Vault**: synchronizes an existing secret in key vault down to the cluster if it wasn't synchronized before. Selecting this option shows you the list of secret references in the selected key vault. Use this option if you created the secret in the key vault beforehand. *Only the latest version of the secret is synced to the cluster*.
4545

46-
1. When you add the username and password references to the asset endpoints or data flow endpoints, you then need to give the synchronized secret a name. The secret references are saved in the cluster with this given name as one secret sync resource. In the example from the screenshot below, the username and password references are saved to the cluster as *edp1secrets*.
46+
1. When you add the username and password references to the devices or data flow endpoints, you then need to give the synchronized secret a name. The secret references are saved in the cluster with this given name as one secret sync resource. In the example from the screenshot below, the username and password references are saved to the cluster as *edp1secrets*.
4747

4848
:::image type="content" source="media/howto-manage-secrets/synced-secret-name.png" lightbox="media/howto-manage-secrets/synced-secret-name.png" alt-text="Screenshot that shows the synced secret name field when username password is selected for authentication mode in operations experience.":::
49-
49+
5050
## Manage synced secrets
5151

52-
This section uses asset endpoints as an example. The same process can be applied to data flow endpoints:
52+
This section uses devices as an example. The same process can be applied to data flow endpoints:
5353

54-
1. Go to the **Asset endpoints** page in the [operations experience](https://iotoperations.azure.com) web UI.
54+
1. Go to the **Devices** page in the [operations experience](https://iotoperations.azure.com) web UI.
5555

5656
1. To view the secrets list, select **Manage certificates and secrets** and then **Secrets**:
5757

5858
:::image type="content" source="media/howto-manage-secrets/synced-secret-list.png" lightbox="media/howto-manage-secrets/synced-secret-list.png" alt-text="Screenshot that shows the synced secrets list in the operations experience secrets page.":::
5959

60-
You can use the **Secrets** page to view synchronized secrets in your asset endpoints and data flow endpoints. Secrets page shows the list of all current synchronized secrets at the edge for the resource you're viewing. A synced secret represents one or multiple secret references, depending on the resource using it. Any operation applied to a synced secret will be applied to all secret references contained within the synced secret.
60+
You can use the **Secrets** page to view synchronized secrets in your devices and data flow endpoints. Secrets page shows the list of all current synchronized secrets at the edge for the resource you're viewing. A synced secret represents one or multiple secret references, depending on the resource using it. Any operation applied to a synced secret will be applied to all secret references contained within the synced secret.
6161

6262
You can delete synced secrets as well in the **Secrets** page. When you delete a synced secret, it only deletes the synced secret from the Kubernetes cluster, and doesn't delete the contained secret reference from Azure Key Vault. You must delete the certificate secret manually from the key vault.
6363

articles/iot-operations/troubleshoot/tips-tools.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ The following table describes some of the custom resource types you might work w
214214

215215
| Custom resource type | Description |
216216
|----------------------|-------------|
217-
| `assetendpointprofiles` | Represents the configuration for an asset endpoint. |
217+
| `devices` | Represents the configuration for a device. |
218218
| `assets` | Represents the configuration for an asset. |
219219
| `brokers`, `brokerlisters`, `brokerauthentications`, `brokerauthorizations` | Represent the configuration for an MQTT broker. |
220220
| `dataflows`, `dataflowendpoints`, `dataflowprofiles` | Represent the configuration for a data flow. |

0 commit comments

Comments
 (0)