You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-dataflow-profile.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,11 +17,11 @@ ms.date: 04/09/2025
17
17
18
18
Data flow profiles can be used to group data flows together so that they share the same configuration. You can create multiple data flow profiles to manage sets of different data flow configurations.
19
19
20
-
The most important setting is the instance count, which determines the number of instances that run the data flows. For example, you might have a data flow profile with a single instance for development and testing, and another profile with multiple instances for production. Or, you might use a data flow profile with low instance count for low-throughput data flows and a profile with high instance count for high-throughput data flows. Similarly, you can create a data flow profile with different diagnostic settings for debugging purposes.
20
+
The most important setting is the instance count. For a given data flow, the instance count determines the number of copies that run on your cluster. For example, you might have a data flow profile with a single instance for development and testing, and another profile with multiple instances for production. Or, you might use a data flow profile with low instance count for low-throughput data flows and a profile with high instance count for high-throughput data flows. Similarly, you can create a data flow profile with different diagnostic settings for debugging purposes.
21
21
22
22
## Default data flow profile
23
23
24
-
A data flow profile named *default* is created when Azure IoT Operations is deployed. This data flow profile has a single instance count. You can use this data flow profile to get started with Azure IoT Operations.
24
+
A data flow profile named *default* is created when Azure IoT Operations is deployed. You can use this data flow profile to get started with Azure IoT Operations.
25
25
26
26
# [Portal](#tab/portal)
27
27
@@ -122,7 +122,7 @@ spec:
122
122
123
123
## Scaling
124
124
125
-
You can scale the data flow profile to adjust the number of instances that run the data flows. Increasing the instance count can improve the throughput of the data flows by creating multiple clients to process the data. When using data flows with cloud services that have rate limits per client, increasing the instance count can help you stay within the rate limits.
125
+
You can scale the data flow profile to adjust the number of instances that run the data flows. For a given data flow, instance count is the number of copies that run on your cluster. Increasing the instance count can improve the throughput of the data flows by creating multiple clients to process the data. When using data flows with cloud services that have rate limits per client, increasing the instance count can help you stay within the rate limits.
126
126
127
127
Scaling can also improve the resiliency of the data flows by providing redundancy in case of failures.
128
128
@@ -157,7 +157,7 @@ spec:
157
157
158
158
## Diagnostic settings
159
159
160
-
You can configure other diagnostics settings for a data flow profile such as log level and metrics interval.
160
+
You can configure other diagnostics settings for a data flow profile such as log level.
161
161
162
162
In most cases, the default settings are sufficient. However, you can override the log level or other settings for debugging.
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-configure-authentication.md
+263-3Lines changed: 263 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.subservice: azure-mqtt-broker
8
8
ms.topic: how-to
9
9
ms.custom:
10
10
- ignite-2023
11
-
ms.date: 02/28/2025
11
+
ms.date: 04/10/2025
12
12
13
13
#CustomerIntent: As an operator, I want to configure authentication so that I have secure MQTT broker communications.
14
14
---
@@ -47,6 +47,14 @@ Azure IoT Operations deploys a default BrokerAuthentication resource named `defa
47
47
48
48
To add new authentication methods, select **Add method**.
49
49
50
+
# [Azure CLI](#tab/cli)
51
+
52
+
Use the [az iot ops broker authn show](/cli/azure/iot/ops/broker/authn#az-iot-ops-broker-authn-show) command to view the local MQTT broker default authentication policy.
53
+
54
+
```azurecli
55
+
az iot ops broker authn show --resource-group <ResourceGroupName> --instance <AioInstanceName> --broker default --name default
56
+
```
57
+
50
58
# [Bicep](#tab/bicep)
51
59
52
60
To edit the default endpoint, create a Bicep `.bicep` file with the following content. Update the settings as needed. Replace the placeholder values like `<AIO_INSTANCE_NAME>` with your own.
@@ -184,6 +192,81 @@ To add an authentication method to a policy:
184
192
185
193
:::image type="content" source="media/howto-configure-authentication/create-authentication-policy.png" alt-text="Screenshot that shows using the Azure portal to add an MQTT broker authentication policy method.":::
186
194
195
+
# [Azure CLI](#tab/cli)
196
+
197
+
Use the [az iot ops broker authn apply](/cli/azure/iot/ops/broker/authn#az-iot-ops-broker-authn-apply) command to create or change an MQTT broker authentication policy.
@@ -427,6 +510,37 @@ After the trusted CA certificate is imported, enable X.509 client authentication
427
510
1. Optionally, add authorization attributes for clients by using X.509 certificates. To learn more, see [Certificate attributes for authorization](#optional-certificate-attributes-for-authorization).
428
511
1. Select **Apply** to save the changes.
429
512
513
+
# [Azure CLI](#tab/cli)
514
+
515
+
Use the [az iot ops broker authn apply](/cli/azure/iot/ops/broker/authn#az-iot-ops-broker-authn-apply) command to create or change an MQTT broker authentication policy.
Replace `<TRUSTED_CA_CONFIGMAP>` with the name of the ConfigMap that contains the trusted CA certificate. For example, use `client-ca`.
@@ -534,7 +647,59 @@ In the Azure portal, when you configure the X.509 authentication method, add the
534
647
}
535
648
}
536
649
```
537
-
650
+
651
+
# [Azure CLI](#tab/cli)
652
+
653
+
Use the [az iot ops broker authn apply](/cli/azure/iot/ops/broker/authn#az-iot-ops-broker-authn-apply) command to create or change an MQTT broker authentication policy.
The `--config-file` parameter is the path and file name of a JSON configuration file containing the resource properties.
660
+
661
+
In this example, assume a configuration file named `my-authn-policy.json` with an X.509 method and certificate properties is stored in the user's home directory
662
+
663
+
```json
664
+
{
665
+
"authenticationMethods": [
666
+
{
667
+
"method": "X509",
668
+
"x509Settings": {
669
+
"authorizationAttributes": {
670
+
"intermediate": {
671
+
"attributes": {
672
+
"city": "seattle",
673
+
"foo": "bar"
674
+
},
675
+
"subject": "CN = Contoso Intermediate CA"
676
+
},
677
+
"root": {
678
+
"attributes": {
679
+
"organization": "contoso"
680
+
},
681
+
"subject": "CN = Contoso Root CA Cert, OU = Engineering, C = US"
682
+
},
683
+
"smartfan": {
684
+
"attributes": {
685
+
"building": "17"
686
+
},
687
+
"subject": "CN = smart-fan"
688
+
}
689
+
},
690
+
"trustedClientCaCert": "client-ca"
691
+
}
692
+
}
693
+
]
694
+
}
695
+
```
696
+
697
+
An example command to create a new authentication policy named `my-policy` is as follows:
@@ -708,6 +873,39 @@ Modify the `authenticationMethods` setting in a BrokerAuthentication resource to
708
873
709
874
:::image type="content" source="media/howto-configure-authentication/sat-method.png" alt-text="Screenshot that shows using the Azure portal to set the MQTT broker SAT authentication method.":::
710
875
876
+
# [Azure CLI](#tab/cli)
877
+
878
+
Use the [az iot ops broker authn apply](/cli/azure/iot/ops/broker/authn#az-iot-ops-broker-authn-apply) command to create or change an MQTT broker authentication policy.
@@ -838,6 +1036,54 @@ Modify the **Authentication methods** setting in a BrokerAuthentication resource
838
1036
839
1037
:::image type="content" source="media/howto-configure-authentication/custom-method.png" alt-text="Screenshot that shows using the Azure portal to set the MQTT broker Custom authentication method.":::
840
1038
1039
+
# [Azure CLI](#tab/cli)
1040
+
1041
+
Use the [az iot ops broker authn apply](/cli/azure/iot/ops/broker/authn#az-iot-ops-broker-authn-apply) command to create or change an MQTT broker authentication policy.
@@ -930,6 +1176,20 @@ For testing, you can disable authentication for a broker listener port. We don't
930
1176
1. Select the broker listener you want to edit from the list.
931
1177
1. On the port where you want to disable authentication, select **None** in the authentication dropdown.
932
1178
1179
+
# [Azure CLI](#tab/cli)
1180
+
1181
+
Use the [az iot ops broker listener port add](/cli/azure/iot/ops/broker/listener#az-iot-ops-broker-listener-port-add) command to disable authentication for a port. To disable authentication, don't include the `--authn-ref` parameter.
1182
+
1183
+
```azurecli
1184
+
az iot ops broker listener port add --resource-group <ResourceGroupName> --instance <AioInstanceName> --broker default --name <ListenerName> --port <ListenerServicePort>
1185
+
```
1186
+
1187
+
The following example disables authentication for port 8884 to the listener named `aio-broker-loadbalancer`:
1188
+
1189
+
```azurecli
1190
+
az iot ops broker listener port add --resource-group myResourceGroupName --instance myAioInstanceName --broker default --name aio-broker-loadbalancer --port 8884
1191
+
```
1192
+
933
1193
# [Bicep](#tab/bicep)
934
1194
935
1195
To disable authentication, omit `authenticationRef` in the `ports` setting of your BrokerListener resource.
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -620,7 +620,7 @@ The following example is a BrokerListener resource that enables TLS on port 8884
620
620
621
621
# [Azure CLI](#tab/cli)
622
622
623
-
Use the [az iot ops broker listener port add](/cli/azure/iot/ops/broker/listener#az-iot-ops-broker-listener-port-add) command to add or change a TCP port configuration to an MQTT broker listener service.
623
+
Use the [az iot ops broker listener port add](/cli/azure/iot/ops/broker/listener#az-iot-ops-broker-listener-port-add) command to add or change a TCP port configuration to an MQTT broker listener service. If the listener exists, the command updates the existing listener. If the listener doesn't exist, the command creates a new listener.
@@ -838,7 +838,7 @@ The following example shows a BrokerListener resource that enables TLS on port 8
838
838
839
839
# [Azure CLI](#tab/cli)
840
840
841
-
Use the [az iot ops broker listener port add](/cli/azure/iot/ops/broker/listener#az-iot-ops-broker-listener-port-add) command to add or change the port configuration for an MQTT broker listener service.
841
+
Use the [az iot ops broker listener port add](/cli/azure/iot/ops/broker/listener#az-iot-ops-broker-listener-port-add) command to add or change a TCP port configuration to an MQTT broker listener service. If the listener exists, the command updates the existing listener. If the listener doesn't exist, the command creates a new listener.
0 commit comments