Skip to content

Commit 4e1aead

Browse files
committed
adx updates
1 parent 3c20d5e commit 4e1aead

File tree

2 files changed

+36
-20
lines changed

2 files changed

+36
-20
lines changed

articles/iot-operations/connect-to-cloud/howto-configure-adx-endpoint.md

Lines changed: 35 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -50,13 +50,19 @@ To send data to Azure Data Explorer in Azure IoT Operations, you can configure a
5050
5151
Alternatively, enable streaming ingestion on the entire cluster. See [Enable streaming ingestion on an existing cluster](/azure/data-explorer/ingest-data-streaming#enable-streaming-ingestion-on-an-existing-cluster).
5252
53-
1. In Azure portal, go to the Arc-connected Kubernetes cluster and select **Settings** > **Extensions**. In the extension list, find the name of your Azure IoT Operations extension. Copy the name of the extension.
53+
## Assign permission to managed identity
5454
55-
1. In your Azure Data Explorer database (not cluster), under **Overview** select **Permissions** > **Add** > **Ingestor**. Search for the Azure IoT Operations extension name then add it.
55+
To configure a dataflow endpoint for Azure Data Explorer, we recommend using either a user-assigned or system-assigned managed identity. This approach is secure and eliminates the need for managing credentials manually.
5656
57-
## Create an Azure Data Explorer dataflow endpoint
57+
After the Azure Data Explorer database is created, you need to assign a role to the Azure IoT Operations managed identity that grants permission to write to the database.
5858
59-
Create the dataflow endpoint resource with your cluster and database information. We suggest using the managed identity of the Azure Arc-enabled Kubernetes cluster. This approach is secure and eliminates the need for secret management. Replace the placeholder values like `<ENDPOINT_NAME>` with your own.
59+
If using system-assigned managed identity, in Azure portal, go to your Azure IoT Operations instance and select **Overview**. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*. Your system-assigned managed identity can be found using the same name of the Azure IoT Operations Arc extension.
60+
61+
1. In your Azure Data Explorer database (not cluster), under **Overview** select **Permissions** > **Add** and then select **Ingestor** as the role. This gives the managed identity the necessary permissions to write to the Azure Data Explorer database. To learn more, see [Role-based access control](/kusto/access-control/role-based-access-control?view=azure-data-explorer&preserve-view=true&branch=main).
62+
1. Search for the name of your [user-assigned managed identity set up for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections) or the system-assigned managed identity. For example, *azure-iot-operations-xxxx7*.
63+
1. Then, select **Select**.
64+
65+
## Create dataflow endpoint for Azure Data Explorer
6066
6167
<!-- TODO: use the data ingest URI for host? -->
6268
@@ -73,10 +79,12 @@ Create the dataflow endpoint resource with your cluster and database information
7379
| --------------------- | ------------------------------------------------------------------------------------------------- |
7480
| Name | The name of the dataflow endpoint. |
7581
| Host | The hostname of the Azure Data Explorer endpoint in the format `<cluster>.<region>.kusto.windows.net`. |
76-
| Authentication method | The method used for authentication. Choose *System assigned managed identity* or *User assigned managed identity* |
82+
| Authentication method | The method used for authentication. Choose [*System assigned managed identity*](#system-assigned-managed-identity) or [*User assigned managed identity*](#user-assigned-managed-identity). |
7783
| Client ID | The client ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
7884
| Tenant ID | The tenant ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
7985
86+
1. Select **Apply** to provision the endpoint.
87+
8088
# [Bicep](#tab/bicep)
8189
8290
Create a Bicep `.bicep` file with the following content.
@@ -107,8 +115,8 @@ resource adxEndpoint 'Microsoft.IoTOperations/instances/dataflowEndpoints@2024-1
107115
host: hostName
108116
database: databaseName
109117
authentication: {
110-
method: 'SystemAssignedManagedIdentity'
111-
systemAssignedManagedIdentitySettings: {}
118+
// See available authentication methods section for method types
119+
// method: <METHOD_TYPE>
112120
}
113121
}
114122
}
@@ -137,8 +145,8 @@ spec:
137145
host: 'https://<CLUSTER>.<region>.kusto.windows.net'
138146
database: <DATABASE_NAME>
139147
authentication:
140-
method: SystemAssignedManagedIdentity
141-
systemAssignedManagedIdentitySettings: {}
148+
# See available authentication methods section for method types
149+
# method: <METHOD_TYPE>
142150
```
143151

144152
Then apply the manifest file to the Kubernetes cluster.
@@ -151,17 +159,19 @@ kubectl apply -f <FILE>.yaml
151159

152160
## Available authentication methods
153161

154-
The following authentication methods are available for Azure Data Explorer endpoints. For more information about enabling secure settings by configuring an Azure Key Vault and enabling workload identities, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
155-
156-
### Permissions
157-
158-
To use these authentication methods, the Azure IoT Operations Arc extension must be given **Ingestor** permission on the Azure Data Explorer database. For more information, see [Manage Azure Data Explorer database permissions](/azure/data-explorer/manage-database-permissions).
162+
The following authentication methods are available for Azure Data Explorer endpoints.
159163

160164
### System-assigned managed identity
161165

162-
Using the system-assigned managed identity is the recommended authentication method for Azure IoT Operations. Azure IoT Operations creates the managed identity automatically and assigns it to the Azure Arc-enabled Kubernetes cluster. It eliminates the need for secret management and allows for seamless authentication.
166+
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to write to the Azure Data Explorer database:
167+
168+
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
169+
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
170+
1. Go to Azure Data Explorer database (not cluster), under **Overview** select **Permissions** > **Add** and then select an appropriate role.
171+
1. Search for the name of your system-assigned managed identity. For example, *azure-iot-operations-xxxx7*.
172+
1. Select **Select**.
163173

164-
In the *DataflowEndpoint* resource, specify the managed identity authentication method. In most cases, you don't need to specify other settings. This configuration creates a managed identity with the default audience `https://api.kusto.windows.net`.
174+
Then, configure the dataflow endpoint with system-assigned managed identity settings.
165175

166176
# [Portal](#tab/portal)
167177

@@ -194,7 +204,7 @@ If you need to override the system-assigned managed identity audience, you can s
194204

195205
# [Portal](#tab/portal)
196206

197-
In most cases, you don't need to specify a service audience. Not specifying an audience creates a managed identity with the default audience scoped to your storage account.
207+
In most cases, you don't need to specify other settings. This configuration creates a managed identity with the default audience `https://api.kusto.windows.net`.
198208

199209
# [Bicep](#tab/bicep)
200210

@@ -223,9 +233,15 @@ dataExplorerSettings:
223233

224234
### User-assigned managed identity
225235

226-
To use user-managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
236+
To use user-assigned managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. Then you need to [set up a user-assigned managed identity for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections). To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
237+
238+
Before you configure the dataflow endpoint, assign a role to the user-assigned managed identity that grants permission to write to the Azure Data Explorer database:
239+
240+
1. In Azure portal, go to Azure Data Explorer database (not cluster), under **Overview** select **Permissions** > **Add** and then select an appropriate role.
241+
1. Search for the name of your user-assigned managed identity.
242+
1. Select **Select**.
227243

228-
Then, specify the user-assigned managed identity authentication method along with the client ID, tenant ID, and scope of the managed identity.
244+
Then, configure the dataflow endpoint with user-assigned managed identity settings.
229245

230246
# [Portal](#tab/portal)
231247

articles/iot-operations/connect-to-cloud/howto-configure-fabric-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ The following authentication methods are available for Microsoft Fabric OneLake
176176
177177
### System-assigned managed identity
178178
179-
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to write to the Fabric lakehouse.:
179+
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to write to the Fabric lakehouse:
180180
181181
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
182182
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.

0 commit comments

Comments
 (0)