Skip to content

Commit 629692a

Browse files
authored
Update howto-enable-secure-settings.md
Update arc agent release tag
1 parent 6d310a8 commit 629692a

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

articles/iot-operations/deploy-iot-ops/howto-enable-secure-settings.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,11 @@ az connectedk8s show --name <CLUSTER_NAME> --resource-group <RESOURCE_GROUP> --q
4444

4545
Use the following steps to enable workload identity on an existing connected K3s cluster:
4646

47-
1. Download the `connectedk8s` cli version 1.10.0 whl file from GitHub: [connectedk8s-1.10.0](https://github.com/AzureArcForKubernetes/azure-cli-extensions/blob/connectedk8s/public/cli-extensions/connectedk8s-1.10.0-py2.py3-none-any.whl).
47+
1. Download and install a preview version of the `connectedk8s` extension for Azure CLI. GitHub: [connectedk8s-1.10.0](https://github.com/AzureArcForKubernetes/azure-cli-extensions/blob/connectedk8s/public/cli-extensions/connectedk8s-1.10.0-py2.py3-none-any.whl).
48+
49+
```azurecli
50+
curl -L -o connectedk8s-1.10.0-py2.py3-none-any.whl https://github.com/AzureArcForKubernetes/azure-cli-extensions/raw/refs/heads/connectedk8s/public/cli-extensions/connectedk8s-1.10.0-py2.py3-none-any.whl
51+
```
4852

4953
1. Remove the existing connectedk8s cli extension if you already installed it.
5054

@@ -60,12 +64,11 @@ Use the following steps to enable workload identity on an existing connected K3s
6064
az extension add --source <PATH_TO_WHL_FILE>
6165
```
6266

63-
1. Export environment variables, and set the release tag to `0.1.15392-private`.
67+
1. Export environment variables that the `az connectedk8s upgrade` command requires.
6468

6569
```bash
66-
export KUBECONFIG=/etc/rancher/k3s/k3s.yaml
67-
tag="0.1.15392-private"
68-
export HELMREGISTRY=azurearcfork8sdev.azurecr.io/merge/private/azure-arc-k8sagents:${tag}
70+
export KUBECONFIG=/etc/rancher/k3s/k3s.yaml
71+
export HELMREGISTRY=azurearcfork8s.azurecr.io/public/azurearck8s/canary/stable/azure-arc-k8sagents:1.20.1
6972
```
7073

7174
1. Upgrade the Arc agent version to the private build that supports the workload identity feature.
@@ -76,7 +79,7 @@ Use the following steps to enable workload identity on an existing connected K3s
7679
# Variable block
7780
RESOURCE_GROUP="<RESOURCE_GROUP>"
7881
CLUSTER_NAME="<CLUSTER_NAME>"
79-
RELEASE_TAG="0.1.15392-private"
82+
RELEASE_TAG="1.20.1"
8083
8184
# Update the Arc agent version
8285
az connectedk8s upgrade --resource-group $RESOURCE_GROUP \
@@ -123,7 +126,6 @@ Use the following steps to enable workload identity on an existing connected K3s
123126

124127
```yml
125128
kube-apiserver-arg: 'service-account-issuer=<SERVICE_ACCOUNT_ISSUER>'
126-
kube-apiserver-arg: 'service-account-max-token-expiration=24h'
127129
```
128130
129131
1. Save and exit the file editor.
@@ -384,4 +386,4 @@ Some Azure IoT Operations components like dataflow endpoints use user-assigned m
384386
385387
---
386388
387-
Now, you can use this managed identity in dataflow endpoints for cloud connections.
389+
Now, you can use this managed identity in dataflow endpoints for cloud connections.

0 commit comments

Comments
 (0)