You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-adx-endpoint.md
+35-19Lines changed: 35 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,13 +50,19 @@ To send data to Azure Data Explorer in Azure IoT Operations, you can configure a
50
50
51
51
Alternatively, enable streaming ingestion on the entire cluster. See [Enable streaming ingestion on an existing cluster](/azure/data-explorer/ingest-data-streaming#enable-streaming-ingestion-on-an-existing-cluster).
52
52
53
-
1. In Azure portal, go to the Arc-connected Kubernetes cluster and select **Settings** > **Extensions**. In the extension list, find the name of your Azure IoT Operations extension. Copy the name of the extension.
53
+
## Assign permission to managed identity
54
54
55
-
1. In your Azure Data Explorer database (not cluster), under **Overview** select **Permissions** > **Add** > **Ingestor**. Search for the Azure IoT Operations extension name then add it.
55
+
To configure a dataflow endpoint for Azure Data Explorer, we recommend using either a user-assigned or system-assigned managed identity. This approach is secure and eliminates the need for managing credentials manually.
56
56
57
-
## Create an Azure Data Explorer dataflow endpoint
57
+
After the Azure Data Explorer database is created, you need to assign a role to the Azure IoT Operations managed identity that grants permission to write to the database.
58
58
59
-
Create the dataflow endpoint resource with your cluster and database information. We suggest using the managed identity of the Azure Arc-enabled Kubernetes cluster. This approach is secure and eliminates the need for secret management. Replace the placeholder values like `<ENDPOINT_NAME>` with your own.
59
+
If using system-assigned managed identity, in Azure portal, go to your Azure IoT Operations instance and select **Overview**. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*. Your system-assigned managed identity can be found using the same name of the Azure IoT Operations Arc extension.
60
+
61
+
1. In your Azure Data Explorer database (not cluster), under **Overview** select **Permissions** > **Add** and then select **Ingestor** as the role. This gives the managed identity the necessary permissions to write to the Azure Data Explorer database. To learn more, see [Role-based access control](/kusto/access-control/role-based-access-control?view=azure-data-explorer&preserve-view=true&branch=main).
62
+
1. Search for the name of your [user-assigned managed identity set up for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections) or the system-assigned managed identity. For example, *azure-iot-operations-xxxx7*.
63
+
1. Then, select **Select**.
64
+
65
+
## Create dataflow endpoint for Azure Data Explorer
60
66
61
67
<!-- TODO: use the data ingest URI for host? -->
62
68
@@ -73,10 +79,12 @@ Create the dataflow endpoint resource with your cluster and database information
| Host | The hostname of the Azure Data Explorer endpoint in the format `<cluster>.<region>.kusto.windows.net`. |
76
-
| Authentication method | The method used for authentication. Choose *System assigned managed identity* or *User assigned managed identity* |
82
+
| Authentication method | The method used for authentication. Choose [*System assigned managed identity*](#system-assigned-managed-identity) or [*User assigned managed identity*](#user-assigned-managed-identity). |
77
83
| Client ID | The client ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
78
84
| Tenant ID | The tenant ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
79
85
86
+
1. Select **Apply** to provision the endpoint.
87
+
80
88
# [Bicep](#tab/bicep)
81
89
82
90
Create a Bicep `.bicep` file with the following content.
The following authentication methods are available for Azure Data Explorer endpoints. For more information about enabling secure settings by configuring an Azure Key Vault and enabling workload identities, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
155
-
156
-
### Permissions
157
-
158
-
To use these authentication methods, the Azure IoT Operations Arc extension must be given **Ingestor** permission on the Azure Data Explorer database. For more information, see [Manage Azure Data Explorer database permissions](/azure/data-explorer/manage-database-permissions).
162
+
The following authentication methods are available for Azure Data Explorer endpoints.
159
163
160
164
### System-assigned managed identity
161
165
162
-
Using the system-assigned managed identity is the recommended authentication method for Azure IoT Operations. Azure IoT Operations creates the managed identity automatically and assigns it to the Azure Arc-enabled Kubernetes cluster. It eliminates the need for secret management and allows for seamless authentication.
166
+
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to write to the Azure Data Explorer database:
167
+
168
+
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
169
+
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
170
+
1. Go to Azure Data Explorer database (not cluster), under **Overview** select **Permissions** > **Add** and then select an appropriate role.
171
+
1. Search for the name of your system-assigned managed identity. For example, *azure-iot-operations-xxxx7*.
172
+
1. Select **Select**.
163
173
164
-
In the *DataflowEndpoint* resource, specify the managed identity authentication method. In most cases, you don't need to specify other settings. This configuration creates a managed identity with the default audience `https://api.kusto.windows.net`.
174
+
Then, configure the dataflow endpoint with system-assigned managed identity settings.
165
175
166
176
# [Portal](#tab/portal)
167
177
@@ -194,7 +204,7 @@ If you need to override the system-assigned managed identity audience, you can s
194
204
195
205
# [Portal](#tab/portal)
196
206
197
-
In most cases, you don't need to specify a service audience. Not specifying an audience creates a managed identity with the default audience scoped to your storage account.
207
+
In most cases, you don't need to specify other settings. This configuration creates a managed identity with the default audience `https://api.kusto.windows.net`.
198
208
199
209
# [Bicep](#tab/bicep)
200
210
@@ -223,9 +233,15 @@ dataExplorerSettings:
223
233
224
234
### User-assigned managed identity
225
235
226
-
To use user-managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
236
+
To use user-assigned managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. Then you need to [set up a user-assigned managed identity for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections). To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
237
+
238
+
Before you configure the dataflow endpoint, assign a role to the user-assigned managed identity that grants permission to write to the Azure Data Explorer database:
239
+
240
+
1. In Azure portal, go to Azure Data Explorer database (not cluster), under **Overview** select **Permissions** > **Add** and then select an appropriate role.
241
+
1. Search for the name of your user-assigned managed identity.
242
+
1. Select **Select**.
227
243
228
-
Then, specify the user-assigned managed identity authentication method along with the client ID, tenant ID, and scope of the managed identity.
244
+
Then, configure the dataflow endpoint with user-assigned managed identity settings.
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-fabric-endpoint.md
+34-22Lines changed: 34 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,14 +28,20 @@ To send data to Microsoft Fabric OneLake in Azure IoT Operations, you can config
28
28
- If shown, ensure *Lakehouse schemas (Public Preview)* is **unchecked**.
29
29
- Make note of the workspace and lakehouse names.
30
30
31
-
## Create a Microsoft Fabric OneLake dataflow endpoint
31
+
## Assign permission to managed identity
32
32
33
-
To configure a dataflow endpoint for Microsoft Fabric OneLake, we suggest using the managed identity of the Azure Arc-enabled Kubernetes cluster. This approach is secure and eliminates the need for secret management.
33
+
To configure a dataflow endpoint for Azure Data Lake Storage Gen2, we recommend using either a user-assigned or system-assigned managed identity. This approach is secure and eliminates the need for managing credentials manually.
34
34
35
-
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
36
-
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
37
-
1. In the Microsoft Fabric workspace you created, select **Manage access** > **+ Add people or groups**. Search for the Azure IoT Operations Arc extension by its name and select it. Select **Contributor** as the role, then select **Add**.
38
-
1. Create the *DataflowEndpoint* resource and specify the managed identity authentication method.
35
+
After the Microsoft Fabric OneLake is created, you need to assign a role to the Azure IoT Operations managed identity that grants permission to write to the Fabric lakehouse.
36
+
37
+
If using system-assigned managed identity, in Azure portal, go to your Azure IoT Operations instance and select **Overview**. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*. Your system-assigned managed identity can be found using the same name of the Azure IoT Operations Arc extension.
38
+
39
+
Go to Microsoft Fabric workspace you created, select **Manage access** > **+ Add people or groups**.
40
+
41
+
1. Search for the name of your [user-assigned managed identity set up for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections) or the system-assigned managed identity. For example, *azure-iot-operations-xxxx7* .
42
+
1. Select **Contributor** as the role, then select **Add**. This gives the managed identity the necessary permissions to write to the Fabric lakehouse. To learn more, see [Roles in workspaces in Microsoft Fabric](/fabric/get-started/roles-workspaces).
43
+
44
+
## Create dataflow endpoint for Microsoft Fabric OneLake
39
45
40
46
# [Portal](#tab/portal)
41
47
@@ -52,7 +58,7 @@ To configure a dataflow endpoint for Microsoft Fabric OneLake, we suggest using
52
58
| Lakehouse name | The name of the lakehouse where the data should be stored. |
53
59
| Workspace name | The name of the workspace associated with the lakehouse. |
54
60
| OneLake path type | The type of path used in OneLake. Select *Files* or *Tables*. |
55
-
| Authentication method | The method used for authentication. Choose *System assigned managed identity* or *User assigned managed identity*|
61
+
| Authentication method | The method used for authentication. Choose [*System assigned managed identity*](#system-assigned-managed-identity) or [*User assigned managed identity*](#user-assigned-managed-identity).|
56
62
| Client ID | The client ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
57
63
| Tenant ID | The tenant ID of the user-assigned managed identity. Required if using *User assigned managed identity*. |
// The default Fabric OneLake host URL in most cases
89
95
host: 'https://onelake.dfs.fabric.microsoft.com'
90
96
authentication: {
91
-
method: 'SystemAssignedManagedIdentity'
92
-
systemAssignedManagedIdentitySettings: {}
97
+
// See available authentication methods section for method types
98
+
// method: <METHOD_TYPE>
93
99
}
94
100
oneLakePathType: 'Tables'
95
101
names: {
@@ -123,8 +129,8 @@ spec:
123
129
# The default Fabric OneLake host URL in most cases
124
130
host: https://onelake.dfs.fabric.microsoft.com
125
131
authentication:
126
-
method: SystemAssignedManagedIdentity
127
-
systemAssignedManagedIdentitySettings: {}
132
+
# See available authentication methods section for method types
133
+
# method: <METHOD_TYPE>
128
134
oneLakePathType: Tables
129
135
names:
130
136
workspaceName: <WORKSPACE_NAME>
@@ -166,19 +172,19 @@ fabricOneLakeSettings:
166
172
167
173
## Available authentication methods
168
174
169
-
The following authentication methods are available for Microsoft Fabric OneLake dataflow endpoints. For more information about enabling secure settings by configuring an Azure Key Vault and enabling workload identities, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
170
-
171
-
Before you create the dataflow endpoint, assign workspace *Contributor* role to the IoT Operations extension that grants permission to write to the Fabric lakehouse.
172
-
173
-

174
-
175
-
To learn more, see [Give access to a workspace](/fabric/get-started/give-access-workspaces).
175
+
The following authentication methods are available for Microsoft Fabric OneLake dataflow endpoints.
176
176
177
177
### System-assigned managed identity
178
178
179
-
Using the system-assigned managed identity is the recommended authentication method for Azure IoT Operations. Azure IoT Operations creates the managed identity automatically and assigns it to the Azure Arc-enabled Kubernetes cluster. It eliminates the need for secret management and allows for seamless authentication.
179
+
Before you configure the dataflow endpoint, assign a role to the Azure IoT Operations managed identity that grants permission to write to the Fabric lakehouse:
180
180
181
-
In the *DataflowEndpoint* resource, specify the managed identity authentication method. In most cases, you don't need to specify other settings. This configuration creates a managed identity with the default audience.
181
+
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
182
+
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
183
+
1. Go to Microsoft Fabric workspace, select **Manage access** > **+ Add people or groups**.
184
+
1. Search for the name of your system-assigned managed identity. For example, *azure-iot-operations-xxxx7* .
185
+
1. Select an appropriate role, then select **Add**.
186
+
187
+
Then, configure the dataflow endpoint with system-assigned managed identity settings.
182
188
183
189
# [Portal](#tab/portal)
184
190
@@ -240,9 +246,15 @@ fabricOneLakeSettings:
240
246
241
247
### User-assigned managed identity
242
248
243
-
To use user-managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
249
+
To use user-assigned managed identity for authentication, you must first deploy Azure IoT Operations with secure settings enabled. Then you need to [set up a user-assigned managed identity for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections). To learn more, see [Enable secure settings in Azure IoT Operations deployment](../deploy-iot-ops/howto-enable-secure-settings.md).
250
+
251
+
Before you configure the dataflow endpoint, assign a role to the user-assigned managed identity that grants permission to write to the Fabric lakehouse.:
252
+
253
+
1. Go to Microsoft Fabric workspace, select **Manage access** > **+ Add people or groups**.
254
+
1. Search for the name of your user-assigned managed identity.
255
+
1. Select an appropriate role, then select **Add**.
244
256
245
-
Then, specify the user-assigned managed identity authentication method along with the client ID, tenant ID, and scope of the managed identity.
257
+
Then, configure the dataflow endpoint with user-assigned managed identity settings.
0 commit comments