You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md
+27-27Lines changed: 27 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: alkohli
6
6
7
7
ms.service: azure-stack-edge
8
8
ms.topic: how-to
9
-
ms.date: 03/10/2025
9
+
ms.date: 03/11/2025
10
10
ms.author: alkohli
11
11
---
12
12
@@ -16,10 +16,10 @@ ms.author: alkohli
16
16
17
17
This article shows you how to enable Azure Arc on an existing Kubernetes cluster on your Azure Stack Edge Pro device.
18
18
19
-
This procedure assumes that you have read and understood the following articles:
19
+
This procedure assumes that you've read and understood the following articles:
20
20
21
-
-[Kubernetes workloads on Azure Stack Edge Pro device](azure-stack-edge-gpu-kubernetes-workload-management.md)
22
-
-[What is Azure Arc-enabled Kubernetes (Preview)?](/azure/azure-arc/kubernetes/overview)
21
+
-[Kubernetes workloads on Azure Stack Edge Pro device](azure-stack-edge-gpu-kubernetes-workload-management.md).
22
+
-[What is Azure Arc-enabled Kubernetes (Preview)?](/azure/azure-arc/kubernetes/overview).
23
23
24
24
## Prerequisites
25
25
@@ -31,7 +31,7 @@ Make sure that you've completed the following prerequisites on your Azure Stack
31
31
1. The device is activated. See [Activate the device](azure-stack-edge-gpu-deploy-activate.md).
32
32
1. The device has the compute role configured via Azure portal and has a Kubernetes cluster. See [Configure compute](azure-stack-edge-gpu-deploy-configure-compute.md).
33
33
34
-
1. You've owner access to the subscription. You would need this access during the role assignment step for your service principal.
34
+
1. You have owner access to the subscription. You would need this access during the role assignment step for your service principal.
35
35
36
36
37
37
### For client accessing the device
@@ -106,7 +106,7 @@ You can also register resource providers via the `az cli`. For more information,
106
106
107
107
1. Make a note of the `appId`, `name`, `password`, and `tenantID` as you'll use these values as input to the next command.
108
108
109
-
Note that there are several ways to obtain ‘appId’. If you use one of the following methods, you can skip steps 1, 2, and 3 from the previous section and move directly to the following step 4.
109
+
There are several ways to obtain `appId`. If you use one of the following methods, you can skip steps 1, 2, and 3 from the previous section and move directly to the following step 4.
110
110
111
111
- Use Minishell to run the following PowerShell cmdlet:
112
112
@@ -119,7 +119,7 @@ You can also register resource providers via the `az cli`. For more information,
119
119
<Include new screenshot from portal>
120
120

121
121
122
-
- Use non-Azure Stack Edge PowerShell on a client machine to run the following:
122
+
- Use non-Azure Stack Edge PowerShell on a client machine to run the following command:
@@ -155,40 +155,40 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
155
155
156
156
1. [Connect to the PowerShell interface](azure-stack-edge-gpu-connect-powershell-interface.md#connect-to-the-powershell-interface) of your device.
157
157
158
-
1. Type:
158
+
1. Run the following command:
159
159
160
160
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
161
161
162
162
After you run this command, you see a follow-up prompt to specify `ClientSecret`. Provide the service principal password at the prompt.
163
163
164
164
Add the `CloudEnvironment` parameter if you're using a cloud other than Azure public. You can set this parameter to `AZUREPUBLICCLOUD`, `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, and `AZUREUSGOVERNMENTCLOUD`.
165
165
166
-
**Usage considerations**
166
+
**Usage considerations**
167
167
168
-
- To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
169
-
- Use the `az account list-locations` command to determine the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
170
-
- Specifying `ClientId`, `TenantId`, and `ClientSecret` is optional.
171
-
- If you assign a role to `appId`, do not specify `ClientId`, `TenantId`, and `ClientSecret`.
168
+
- To deploy Azure Arc on your device, make sure that you're using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
169
+
- Use the `az account list-locations` command to determine the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
170
+
- Specifying `ClientId`, `TenantId`, and `ClientSecret` is optional.
171
+
- If you assign a role to `appId`, don't specify `ClientId`, `TenantId`, and `ClientSecret`.
WARNING: A script or application on the remote computer 10.126.76.0 is sending a prompt request. When you are prompted,
179
-
enter sensitive information, such as credentials or passwords, only if you trust the remote computer and the
180
-
application or script that is requesting the data.
178
+
WARNING: A script or application on the remote computer 10.126.76.0 is sending a prompt request. When you are prompted,
179
+
enter sensitive information, such as credentials or passwords, only if you trust the remote computer and the
180
+
application or script that is requesting the data.
181
181
182
-
cmdlet Set-HcsKubernetesAzureArcAgent at command pipeline position 1
182
+
cmdlet Set-HcsKubernetesAzureArcAgent at command pipeline position 1
183
183
184
-
Supply values for the following parameters:
185
-
ClientSecret: **********************************
186
-
[10.100.10.10]: PS>
187
-
```
184
+
Supply values for the following parameters:
185
+
ClientSecret: **********************************
186
+
[10.100.10.10]: PS>
187
+
```
188
188
189
-
In the Azure portal, a resource should be created with the name you provided in the preceding command.
189
+
In the Azure portal, a resource should be created with the name you provided in the preceding command.
190
190
191
-

191
+

192
192
193
193
1. To verify that Azure Arc is enabled successfully, run the following command from PowerShell interface:
194
194
@@ -237,7 +237,7 @@ To remove the Azure Arc management, follow these steps:
237
237
238
238
239
239
> [!NOTE]
240
-
> By default, when resource `yamls` are deleted from the Git repository, the corresponding resources are not deleted from the Kubernetes cluster. You need to set `--sync-garbage-collection` in Arc OperatorParams to allow the deletion of resources when deleted from git repository. For more information, see [Delete a configuration](/azure/azure-arc/kubernetes/tutorial-use-gitops-connected-cluster#additional-parameters)
240
+
> By default, when resource `yamls` are deleted from the Git repository, the corresponding resources aren't deleted from the Kubernetes cluster. You need to set `--sync-garbage-collection` in Arc OperatorParams to allow the deletion of resources when deleted from git repository. For more information, see [Delete a configuration](/azure/azure-arc/kubernetes/tutorial-use-gitops-connected-cluster#additional-parameters)
0 commit comments