You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/deploy-iot-ops/howto-manage-secrets.md
+16-11Lines changed: 16 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,13 +27,13 @@ For more information, see [Deploy Azure IoT Operations extensions](./howto-deplo
27
27
28
28
## Configure service principal and Azure Key Vault upfront
29
29
30
-
If the Azure account executing the `az iot ops init` command does not have permissions to query the Microsoft Graph and create service principals, you can prepare these upfront and use extra arguments when running the CLI command as described in [Deploy Azure IoT Operations extensions](./howto-deploy-iot-operations.md?tabs=cli).
30
+
If the Azure account executing the `az iot ops init` command doesn't have permissions to query the Microsoft Graph and create service principals, you can prepare these upfront and use extra arguments when running the CLI command as described in [Deploy Azure IoT Operations extensions](./howto-deploy-iot-operations.md?tabs=cli).
31
31
32
32
### Configure service principal for interacting with Azure Key Vault via Microsoft Entra ID
33
33
34
34
Follow these steps to create a new Application Registration that will be used by the AIO application to authenticate to Key Vault.
35
35
36
-
First, register an application with Microsoft Entra ID.
36
+
First, register an application with Microsoft Entra ID:
37
37
38
38
1. In the Azure portal search bar, search for and select **Microsoft Entra ID**.
39
39
@@ -51,11 +51,11 @@ First, register an application with Microsoft Entra ID.
51
51
52
52
1. Select **Register**.
53
53
54
-
When your application is created, you are directed to its resource page.
54
+
When your application is created, you're directed to its resource page.
55
55
56
56
1. Copy the **Application (client) ID** from the app registration overview page. You'll use this value as an argument when running Azure IoT Operations deployment with the `az iot ops init` command.
57
57
58
-
Next, give your application permissions for key vault.
58
+
Next, give your application permissions for key vault:
59
59
60
60
1. On the resource page for your app, select **API permissions** from the **Manage** section of the app menu.
61
61
@@ -69,7 +69,7 @@ Next, give your application permissions for key vault.
69
69
70
70
1. Select **Add permissions**.
71
71
72
-
Create a client secret that will be added to your Kubernetes cluster to authenticate to your key vault.
72
+
Create a client secret that will be added to your Kubernetes cluster to authenticate to your key vault:
73
73
74
74
1. On the resource page for your app, select **Certificates & secrets** from the **Manage** section of the app menu.
75
75
@@ -79,9 +79,9 @@ Create a client secret that will be added to your Kubernetes cluster to authenti
79
79
80
80
1. Copy the **Value** from your new secret. You'll use this value later when you run `az iot ops init`.
81
81
82
-
Retrieve the service principal Object Id
82
+
Retrieve the service principal Object ID:
83
83
84
-
1. On the **Overview** page for your app, under the section **Essentials**, click on the **Application name** link under **Managed application in local directory**. This opens the Enterprise Application properties. Copy the Object Id to use when you run `az iot ops init`.
84
+
1. On the **Overview** page for your app, under the section **Essentials**, click on the **Application name** link under **Managed application in local directory**. This opens the Enterprise Application properties. Copy the Object ID to use when you run `az iot ops init`.
85
85
86
86
### Create an Azure Key Vault
87
87
@@ -95,13 +95,13 @@ If you have an existing key vault, you can change the permission model by execut
95
95
```bash
96
96
az keyvault update --name "<your unique key vault name>" --resource-group "<the name of the resource group>" --enable-rbac-authorization false
97
97
```
98
-
You will need the Key Vault resource ID when you run `az iot ops init`. To retrieve the resource ID, run:
98
+
You'll need the Key Vault resource ID when you run `az iot ops init`. To retrieve the resource ID, run:
99
99
100
100
```bash
101
101
az keyvault show --name "<your unique key vault name>" --resource-group "<the name of the resource group>" --query id -o tsv
102
102
```
103
103
104
-
### Set service principal access policy in Azue Key Vault
104
+
### Set service principal access policy in Azure Key Vault
105
105
106
106
The newly created service principal needs **Secret**`list` and `get` access policy for the Azure IoT Operations to work with the secret store.
### Pass service principal and Key Vault arguments to Azure IoT Operations deployment
115
115
116
-
When following the guide [Deploy Azure IoT Operations extensions](./howto-deploy-iot-operations.md?tabs=cli), you will need to pass in additional flags to the `az iot ops init` command in order to use the pre-configured service principal and key vault.
116
+
When following the guide [Deploy Azure IoT Operations extensions](./howto-deploy-iot-operations.md?tabs=cli), you'll need to pass in additional flags to the `az iot ops init` command in order to use the pre-configured service principal and key vault.
117
117
118
118
The following example shows how to prepare the cluster for Azure IoT Operations without fully deploying it by using `--no-deploy` flag. You can also run the command without this argument for a default Azure IoT Operations deployment.
119
119
@@ -156,7 +156,12 @@ Once you have the secret store set up on your cluster, you can create and add Az
156
156
157
157
1. Save your changes and apply them to your cluster. If you use k9s, your changes are automatically applied.
158
158
159
-
The CSI driver updates secrets according to a polling interval, so a new secret won't be updated on the pods until the next polling interval. If you want the secrets to be updated immediately, update the pods for that component. For example, for the Azure IoT Data Processor component, update the `aio-dp-reader-worker-0` and `aio-dp-runner-worker-0` pods.
159
+
The CSI driver updates secrets by using a polling interval, therefore the new secret isn't available to the pod until the next polling interval. To update a component immediately, restart the pods for the component. For example, to restart the Data Processor component, run the following commands:
160
+
161
+
```console
162
+
kubectl delete pod aio-dp-reader-worker-0 -n azure-iot-operations
163
+
kubectl delete pod aio-dp-runner-worker-0 -n azure-iot-operations
Copy file name to clipboardExpand all lines: articles/iot-operations/get-started/quickstart-process-telemetry.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,6 +50,8 @@ Before you send data to the cloud for storage and analysis, you might want to pr
50
50
51
51
## Add a secret to your cluster
52
52
53
+
To access the lakehouse from a Data Processor pipeline, you need to enable your cluster to access the service principal details you created earlier. You need to configure your Azure Key Vault with the service principal details so that the cluster can retrieve them.
Copy file name to clipboardExpand all lines: articles/iot-operations/includes/add-cluster-secret.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,12 +3,10 @@ title: include file
3
3
description: include file
4
4
author: dominicbetts
5
5
ms.topic: include
6
-
ms.date: 12/18/2023
6
+
ms.date: 02/29/2024
7
7
ms.author: dobett
8
8
---
9
9
10
-
To access the lakehouse from a Data Processor pipeline, you need to enable your cluster to access the service principal details you created earlier. You need to configure your Azure Key Vault with the service principal details so that the cluster can retrieve them.
11
-
12
10
Use the following command to add a secret to your Azure Key Vault that contains the client secret you made a note of when you created the service principal. You created the Azure Key Vault in the [Deploy Azure IoT Operations to an Arc-enabled Kubernetes cluster](../get-started/quickstart-deploy.md) quickstart:
13
11
14
12
```azurecli
@@ -59,7 +57,7 @@ To add the secret reference to your Kubernetes cluster, edit the **aio-default-s
59
57
60
58
1. Save the changes and exit from the editor.
61
59
62
-
The CSI driver updates secrets by using a polling interval, therefore the new secret isn't available to the pod until the polling interval is reached. To update the pod immediately, restart the pods for the component. To restart Data Processor, run the following commands:
60
+
The CSI driver updates secrets by using a polling interval, therefore the new secret isn't available to the pod until the next polling interval. To update a component immediately, restart the pods for the component. For example, to restart the Data Processor component, run the following commands:
63
61
64
62
```console
65
63
kubectl delete pod aio-dp-reader-worker-0 -n azure-iot-operations
Copy file name to clipboardExpand all lines: articles/iot-operations/view-analyze-data/tutorial-anomaly-detection.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,6 +79,8 @@ To add a table to the `bakery_ops` database to store the anomaly data, navigate
79
79
80
80
### Add a secret to your cluster
81
81
82
+
To access the Azure Data Explorer database from a Data Processor pipeline, you need to enable your cluster to access the service principal details you created earlier. You need to configure your Azure Key Vault with the service principal details so that the cluster can retrieve them.
Copy file name to clipboardExpand all lines: articles/iot-operations/view-analyze-data/tutorial-overall-equipment-effectiveness.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,6 +58,8 @@ Make a note of your workspace ID and lakehouse ID, you need them later. You can
58
58
59
59
### Add a secret to your cluster
60
60
61
+
To access the lakehouse from a Data Processor pipeline, you need to enable your cluster to access the service principal details you created earlier. You need to configure your Azure Key Vault with the service principal details so that the cluster can retrieve them.
0 commit comments