You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/deploy-iot-ops/howto-deploy-iot-test-operations.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ This article discusses Azure IoT Operations *deployments* and *instances*, which
24
24
* An Azure IoT Operations instance
25
25
* Arc extensions
26
26
* Custom locations
27
-
* Resources that you can configure in your Azure IoT Operations solution, like assets and asset endpoints.
27
+
* Resources that you can configure in your Azure IoT Operations solution, like namespace assets and devices.
28
28
29
29
* An Azure IoT Operations *instance* is the parent resource that bundles the suite of services that are defined in [What is Azure IoT Operations?](../overview-iot-operations.md) like MQTT broker, data flows, and connector for OPC UA.
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-autodetect-opc-ua-assets-use-akri.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ The Akri services and connector for OPC UA are a turnkey solution that lets you
16
16
17
17
To discover OPC UA assets, the assets must be compliant with the [OPC 10000-100: Devices](https://reference.opcfoundation.org/DI/v103/docs/) companion specification. The connector for OPC UA and Akri services follow the process described in [OPC 10000-110: Asset Management Basics](https://reference.opcfoundation.org/AMB/v101/docs/) to discover OPC UA assets and onboard them into Azure Device Registry.
18
18
19
-
In this article, you learn how to automatically discover and configure OPC UA devices and assets connected to your Azure IoT Operations deployment. The automatic discovery process starts when you add an asset endpoint with the **Enable discovery** option selected.
19
+
In this article, you learn how to automatically discover and configure OPC UA devices and assets connected to your Azure IoT Operations deployment. The automatic discovery process starts when you add a device with the **Enable discovery** option selected.
20
20
21
21
To learn more, see [What is asset discovery (preview)?](overview-akri.md).
22
22
@@ -72,27 +72,27 @@ Currently, discovery is only enabled in the preview version of the connector for
To create an asset endpoint with discovery enabled:
77
+
To create a device with discovery enabled:
78
78
79
79
1. Go to your Azure IoT Operations instance in the operations experience web UI.
80
80
81
-
1. Add a new asset endpoint and select the **Enable discovery** option:
81
+
1. Add a new device and select the **Enable discovery** option:
82
82
83
-
:::image type="content" source="media/howto-autodetect-opc-ua-assets-use-akri/enable-auto-discover.png" alt-text="Screenshot that shows how to create an asset endpoint with discovery enabled.":::
83
+
:::image type="content" source="media/howto-autodetect-opc-ua-assets-use-akri/enable-auto-discover.png" alt-text="Screenshot that shows how to create a device with discovery enabled.":::
84
84
85
-
1. Select **Create** to create the asset endpoint.
85
+
1. Select **Create** to create the device.
86
86
87
87
## Review the discovered assets
88
88
89
-
Azure IoT Operations uses the asset endpoint to connect to the OPC UA server and scan for assets. To view the discovered assets:
89
+
Azure IoT Operations uses the device to connect to the OPC UA server and scan for assets. To view the discovered assets:
90
90
91
91
1. Go to the **Discovery** page for your instance in the operations experience:
92
92
93
93
:::image type="content" source="media/howto-autodetect-opc-ua-assets-use-akri/discovered-assets-list.png" alt-text="Screenshot that shows how to view discovered assets.":::
94
94
95
-
1. You can filter the list by the asset endpoint name, or by keyword. The list shows the discovered assets and their status.
95
+
1. You can filter the list by the device name, or by keyword. The list shows the discovered assets and their status.
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-configure-opc-ua-authentication-options.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,11 +35,11 @@ To learn more, see [OPC UA applications - user authentication](https://reference
35
35
36
36
To configure the secrets for the *username* and *password* values in the [operations experience](https://iotoperations.azure.com) web UI:
37
37
38
-
1. Navigate to your list of asset endpoints:
38
+
1. Navigate to your list of devices:
39
39
40
-
:::image type="content" source="media/howto-configure-opc-ua-authentication-options/asset-endpoint-list.png" alt-text="Screenshot that shows the list of asset endpoints.":::
40
+
:::image type="content" source="media/howto-configure-opc-ua-authentication-options/asset-endpoint-list.png" alt-text="Screenshot that shows the list of devices.":::
41
41
42
-
1. Select **Create asset endpoint**.
42
+
1. Select **Create device**.
43
43
44
44
1. Select **Username password** as the authentication mode:
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-configure-opc-ua-certificates-infrastructure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ To use the operations experience web UI to manage the trusted certificates list,
51
51
> [!NOTE]
52
52
> The connector for OPC UA uses a Kubernetes native secret named *aio-opc-ua-broker-trust-list* to store the trusted certificates list. This secret is created when you deploy Azure IoT Operations.
53
53
54
-
1. Go to the **Asset endpoints page** in the [operations experience](https://iotoperations.azure.com) web UI.
54
+
1. Go to the **Devices page** in the [operations experience](https://iotoperations.azure.com) web UI.
55
55
56
56
1. To view the trusted certificates list, select **Manage certificates and secrets** and then **Certificates**:
57
57
@@ -163,7 +163,7 @@ To use the operations experience web UI to manage the issuer certificates list,
163
163
> [!NOTE]
164
164
> The connector for OPC UA uses a Kubernetes native secret named *aio-opc-ua-broker-issuer-list* to store the issuer certificates list. This secret is created when you deploy Azure IoT Operations.
165
165
166
-
1. Go to the **Asset endpoints page** in the [operations experience](https://iotoperations.azure.com) web UI.
166
+
1. Go to the **Devices page** in the [operations experience](https://iotoperations.azure.com) web UI.
167
167
168
168
1. To view the issuer certificates list, select **Manage certificates and secrets** and then **Certificates**:
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-configure-opc-ua.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,7 +183,7 @@ Now you can define the tags associated with the asset. To add OPC UA tags:
183
183
184
184
# [Azure CLI](#tab/cli)
185
185
186
-
Use the following commands to add a "thermostat" namespaced asset to your device by using the Azure CLI. The commands add a dataset and two tags to the asset by using the `point add` command:
186
+
Use the following commands to add a "thermostat" namespace asset to your device by using the Azure CLI. The commands add a dataset and two tags to the asset by using the `point add` command:
Copy file name to clipboardExpand all lines: articles/iot-operations/secure-iot-ops/howto-manage-certificates.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,7 +154,7 @@ For example, the connector for OPC UA uses the certificate management experience
154
154
155
155
When you [deploy Azure IoT Operations with secure settings](../deploy-iot-ops/overview-deploy.md#secure-settings-deployment), you can start adding certificates to Azure Key Vault, and sync them to the Kubernetes cluster to be used in the *Trust list* and *Issuer list* stores for OPC UA connections:
156
156
157
-
:::image type="content" source="media/howto-manage-certificates/add-new-certificate.png" lightbox="media/howto-manage-certificates/add-new-certificate.png" alt-text="Screenshot that shows the Upload certificate and Add from Azure Key Vault options when adding a new certificate to the asset endpoints page.":::
157
+
:::image type="content" source="media/howto-manage-certificates/add-new-certificate.png" lightbox="media/howto-manage-certificates/add-new-certificate.png" alt-text="Screenshot that shows the Upload certificate and Add from Azure Key Vault options when adding a new certificate to the devices page.":::
158
158
159
159
- **Upload Certificate**: Uploads a certificate which is then added as a secret to Azure Key Vault and automatically synchronized to the cluster using Secret Store extension.
160
160
@@ -174,7 +174,7 @@ When you [deploy Azure IoT Operations with secure settings](../deploy-iot-ops/ov
174
174
175
175
Using the list view you can manage the synchronized certificates. You can view all the synchronized certificates, and which certificate store it's synchronized to:
176
176
177
-
:::image type="content" source="media/howto-manage-certificates/list-certificates.png" lightbox="media/howto-manage-certificates/list-certificates.png" alt-text="Screenshot that shows the list of certificates in the asset endpoints page and how to filter by Trust List and Issuer List.":::
177
+
:::image type="content" source="media/howto-manage-certificates/list-certificates.png" lightbox="media/howto-manage-certificates/list-certificates.png" alt-text="Screenshot that shows the list of certificates in the devices page and how to filter by Trust List and Issuer List.":::
178
178
179
179
- To learn more about the *Trust list* and *Issuer list* stores, see [Configure OPC UA certificates infrastructure for the connector for OPC UA](../discover-manage-assets/howto-configure-opc-ua-certificates-infrastructure.md).
Copy file name to clipboardExpand all lines: articles/iot-operations/secure-iot-ops/howto-manage-secrets.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,35 +29,35 @@ Secrets management for Azure IoT Operations uses Secret Store extension to sync
29
29
> [!NOTE]
30
30
> Azure IoT Operations instances work with only one Azure Key Vault, multiple key vaults per instance isn't supported.
31
31
32
-
Once the [set up secrets management](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-secrets-management) steps are completed, you can start adding secrets to Azure Key Vault, and sync them to the Kubernetes cluster to be used in **Asset Endpoints** or **Data flow Endpoints** using the [operations experience](https://iotoperations.azure.com) web UI.
32
+
Once the [set up secrets management](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-secrets-management) steps are completed, you can start adding secrets to Azure Key Vault, and sync them to the Kubernetes cluster to be used in **Devices** or **Data flow endpoints** using the [operations experience](https://iotoperations.azure.com) web UI.
33
33
34
-
Secrets are used in asset endpoints and data flow endpoints for authentication. This section uses asset endpoints as an example. The same process can be applied to data flow endpoints. You have the option to directly create the secret in Azure Key Vault and have it automatically synchronized down to the cluster, or use an existing secret reference from the key vault:
34
+
Secrets are used in devices and data flow endpoints for authentication. This section uses devices as an example. The same process can be applied to data flow endpoints. You have the option to directly create the secret in Azure Key Vault and have it automatically synchronized down to the cluster, or use an existing secret reference from the key vault:
35
35
36
-
1. Go to the **Asset endpoints** page in the [operations experience](https://iotoperations.azure.com) web UI.
36
+
1. Go to the **Devices** page in the [operations experience](https://iotoperations.azure.com) web UI.
37
37
38
-
1. To add a new secret reference, select **Add reference** when creating a new asset endpoint:
38
+
1. To add a new secret reference, select **Add reference** when creating a new device:
39
39
40
40
:::image type="content" source="media/howto-manage-secrets/use-secrets.png" lightbox="media/howto-manage-secrets/use-secrets.png" alt-text="Screenshot that shows the Add from Azure Key Vault and Create new options when selecting a secret in operations experience.":::
41
41
42
42
-**Create a new secret**: creates a secret reference in the Azure Key Vault and also automatically synchronizes the secret down to the cluster using Secret Store extension. Use this option if you didn't create the secret you require for this scenario in the key vault beforehand.
43
43
44
44
-**Add from Azure Key Vault**: synchronizes an existing secret in key vault down to the cluster if it wasn't synchronized before. Selecting this option shows you the list of secret references in the selected key vault. Use this option if you created the secret in the key vault beforehand. *Only the latest version of the secret is synced to the cluster*.
45
45
46
-
1. When you add the username and password references to the asset endpoints or data flow endpoints, you then need to give the synchronized secret a name. The secret references are saved in the cluster with this given name as one secret sync resource. In the example from the screenshot below, the username and password references are saved to the cluster as *edp1secrets*.
46
+
1. When you add the username and password references to the devices or data flow endpoints, you then need to give the synchronized secret a name. The secret references are saved in the cluster with this given name as one secret sync resource. In the example from the screenshot below, the username and password references are saved to the cluster as *edp1secrets*.
47
47
48
48
:::image type="content" source="media/howto-manage-secrets/synced-secret-name.png" lightbox="media/howto-manage-secrets/synced-secret-name.png" alt-text="Screenshot that shows the synced secret name field when username password is selected for authentication mode in operations experience.":::
49
-
49
+
50
50
## Manage synced secrets
51
51
52
-
This section uses asset endpoints as an example. The same process can be applied to data flow endpoints:
52
+
This section uses devices as an example. The same process can be applied to data flow endpoints:
53
53
54
-
1. Go to the **Asset endpoints** page in the [operations experience](https://iotoperations.azure.com) web UI.
54
+
1. Go to the **Devices** page in the [operations experience](https://iotoperations.azure.com) web UI.
55
55
56
56
1. To view the secrets list, select **Manage certificates and secrets** and then **Secrets**:
57
57
58
58
:::image type="content" source="media/howto-manage-secrets/synced-secret-list.png" lightbox="media/howto-manage-secrets/synced-secret-list.png" alt-text="Screenshot that shows the synced secrets list in the operations experience secrets page.":::
59
59
60
-
You can use the **Secrets** page to view synchronized secrets in your asset endpoints and data flow endpoints. Secrets page shows the list of all current synchronized secrets at the edge for the resource you're viewing. A synced secret represents one or multiple secret references, depending on the resource using it. Any operation applied to a synced secret will be applied to all secret references contained within the synced secret.
60
+
You can use the **Secrets** page to view synchronized secrets in your devices and data flow endpoints. Secrets page shows the list of all current synchronized secrets at the edge for the resource you're viewing. A synced secret represents one or multiple secret references, depending on the resource using it. Any operation applied to a synced secret will be applied to all secret references contained within the synced secret.
61
61
62
62
You can delete synced secrets as well in the **Secrets** page. When you delete a synced secret, it only deletes the synced secret from the Kubernetes cluster, and doesn't delete the contained secret reference from Azure Key Vault. You must delete the certificate secret manually from the key vault.
0 commit comments