Skip to content

Commit 6f698b8

Browse files
committed
Updated with Acrolinx.
1 parent 4098a64 commit 6f698b8

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: alkohli
66

77
ms.service: azure-stack-edge
88
ms.topic: how-to
9-
ms.date: 03/10/2025
9+
ms.date: 03/11/2025
1010
ms.author: alkohli
1111
---
1212

@@ -16,10 +16,10 @@ ms.author: alkohli
1616

1717
This article shows you how to enable Azure Arc on an existing Kubernetes cluster on your Azure Stack Edge Pro device.
1818

19-
This procedure assumes that you have read and understood the following articles:
19+
This procedure assumes that you've read and understood the following articles:
2020

21-
- [Kubernetes workloads on Azure Stack Edge Pro device](azure-stack-edge-gpu-kubernetes-workload-management.md)
22-
- [What is Azure Arc-enabled Kubernetes (Preview)?](/azure/azure-arc/kubernetes/overview)
21+
- [Kubernetes workloads on Azure Stack Edge Pro device](azure-stack-edge-gpu-kubernetes-workload-management.md).
22+
- [What is Azure Arc-enabled Kubernetes (Preview)?](/azure/azure-arc/kubernetes/overview).
2323

2424
## Prerequisites
2525

@@ -31,7 +31,7 @@ Make sure that you've completed the following prerequisites on your Azure Stack
3131
1. The device is activated. See [Activate the device](azure-stack-edge-gpu-deploy-activate.md).
3232
1. The device has the compute role configured via Azure portal and has a Kubernetes cluster. See [Configure compute](azure-stack-edge-gpu-deploy-configure-compute.md).
3333

34-
1. You've owner access to the subscription. You would need this access during the role assignment step for your service principal.
34+
1. You have owner access to the subscription. You would need this access during the role assignment step for your service principal.
3535

3636

3737
### For client accessing the device
@@ -106,7 +106,7 @@ You can also register resource providers via the `az cli`. For more information,
106106
107107
1. Make a note of the `appId`, `name`, `password`, and `tenantID` as you'll use these values as input to the next command.
108108
109-
Note that there are several ways to obtain appId. If you use one of the following methods, you can skip steps 1, 2, and 3 from the previous section and move directly to the following step 4.
109+
There are several ways to obtain `appId`. If you use one of the following methods, you can skip steps 1, 2, and 3 from the previous section and move directly to the following step 4.
110110
111111
- Use Minishell to run the following PowerShell cmdlet:
112112
@@ -119,7 +119,7 @@ You can also register resource providers via the `az cli`. For more information,
119119
<Include new screenshot from portal>
120120
![View JSON details for your Azure Stack Edge device](media/azure-stack-edge-gpu-connect-powershell-interface/view-json-details.png)
121121
122-
- Use non-Azure Stack Edge PowerShell on a client machine to run the following:
122+
- Use non-Azure Stack Edge PowerShell on a client machine to run the following command:
123123
124124
```powershell
125125
$ASEResource= GetAzResource –ResourceGroupName <resource-group-name> -ResourceName <resource-name>
@@ -155,40 +155,40 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
155155
156156
1. [Connect to the PowerShell interface](azure-stack-edge-gpu-connect-powershell-interface.md#connect-to-the-powershell-interface) of your device.
157157
158-
1. Type:
158+
1. Run the following command:
159159
160160
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
161161
162162
After you run this command, you see a follow-up prompt to specify `ClientSecret`. Provide the service principal password at the prompt.
163163
164164
Add the `CloudEnvironment` parameter if you're using a cloud other than Azure public. You can set this parameter to `AZUREPUBLICCLOUD`, `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, and `AZUREUSGOVERNMENTCLOUD`.
165165
166-
**Usage considerations**
166+
**Usage considerations**
167167
168-
- To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
169-
- Use the `az account list-locations` command to determine the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
170-
- Specifying `ClientId`, `TenantId`, and `ClientSecret` is optional.
171-
- If you assign a role to `appId`, do not specify `ClientId`, `TenantId`, and `ClientSecret`.
168+
- To deploy Azure Arc on your device, make sure that you're using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
169+
- Use the `az account list-locations` command to determine the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
170+
- Specifying `ClientId`, `TenantId`, and `ClientSecret` is optional.
171+
- If you assign a role to `appId`, don't specify `ClientId`, `TenantId`, and `ClientSecret`.
172172
173-
Here's an example:
173+
Here's an example:
174174
175-
```powershell
176-
[10.100.10.10]: PS>Set-HcsKubernetesAzureArcAgent -SubscriptionId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" -ResourceGroupName "myaserg1" -ResourceName "myasetestresarc" -Location "westeurope" -TenantId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" -ClientId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
175+
```powershell
176+
[10.100.10.10]: PS>Set-HcsKubernetesAzureArcAgent -SubscriptionId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" -ResourceGroupName "myaserg1" -ResourceName "myasetestresarc" -Location "westeurope" -TenantId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" -ClientId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
177177
178-
WARNING: A script or application on the remote computer 10.126.76.0 is sending a prompt request. When you are prompted,
179-
enter sensitive information, such as credentials or passwords, only if you trust the remote computer and the
180-
application or script that is requesting the data.
178+
WARNING: A script or application on the remote computer 10.126.76.0 is sending a prompt request. When you are prompted,
179+
enter sensitive information, such as credentials or passwords, only if you trust the remote computer and the
180+
application or script that is requesting the data.
181181
182-
cmdlet Set-HcsKubernetesAzureArcAgent at command pipeline position 1
182+
cmdlet Set-HcsKubernetesAzureArcAgent at command pipeline position 1
183183
184-
Supply values for the following parameters:
185-
ClientSecret: **********************************
186-
[10.100.10.10]: PS>
187-
```
184+
Supply values for the following parameters:
185+
ClientSecret: **********************************
186+
[10.100.10.10]: PS>
187+
```
188188

189-
In the Azure portal, a resource should be created with the name you provided in the preceding command.
189+
In the Azure portal, a resource should be created with the name you provided in the preceding command.
190190

191-
![Go to Azure Arc resource](media/azure-stack-edge-gpu-connect-powershell-interface/verify-azure-arc-enabled-1.png)
191+
![Go to Azure Arc resource](media/azure-stack-edge-gpu-connect-powershell-interface/verify-azure-arc-enabled-1.png)
192192

193193
1. To verify that Azure Arc is enabled successfully, run the following command from PowerShell interface:
194194

@@ -237,7 +237,7 @@ To remove the Azure Arc management, follow these steps:
237237
238238
239239
> [!NOTE]
240-
> By default, when resource `yamls` are deleted from the Git repository, the corresponding resources are not deleted from the Kubernetes cluster. You need to set `--sync-garbage-collection` in Arc OperatorParams to allow the deletion of resources when deleted from git repository. For more information, see [Delete a configuration](/azure/azure-arc/kubernetes/tutorial-use-gitops-connected-cluster#additional-parameters)
240+
> By default, when resource `yamls` are deleted from the Git repository, the corresponding resources aren't deleted from the Kubernetes cluster. You need to set `--sync-garbage-collection` in Arc OperatorParams to allow the deletion of resources when deleted from git repository. For more information, see [Delete a configuration](/azure/azure-arc/kubernetes/tutorial-use-gitops-connected-cluster#additional-parameters)
241241
242242
## Next steps
243243

0 commit comments

Comments
 (0)