Skip to content

Commit 7e4c729

Browse files
committed
cleanup
1 parent af4614b commit 7e4c729

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/azure-arc/kubernetes/custom-locations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ description: "Use custom locations to deploy Azure PaaS services on Azure Arc-en
99

1010
# Create and manage custom locations on Azure Arc-enabled Kubernetes
1111

12-
The *Custom locations* feature provides a way for tenant or cluster administrators to configure their Azure Arc-enabled Kubernetes clusters as target locations for deploying instances of Azure offerings. Examples of Azure offerings that can be deployed on top of custom locations include databases, such as Azure Arc-enabled SQL Managed Instance and Azure Arc-enabled PostgreSQL Hyperscale, or application instances, such as App Services, Functions, Event Grid, Logic Apps, and API Management.
12+
The *custom locations* feature provides a way for tenant or cluster administrators to configure their Azure Arc-enabled Kubernetes clusters as target locations for deploying instances of Azure offerings. Examples of Azure offerings that can be deployed on top of custom locations include databases, such as Azure Arc-enabled SQL Managed Instance and Azure Arc-enabled PostgreSQL Hyperscale, or application instances, such as App Services, Functions, Event Grid, Logic Apps, and API Management.
1313

14-
A custom location has a one-to-one mapping to a namespace within the Azure Arc-enabled Kubernetes cluster. The custom location Azure resource combined with Azure RBAC can be used to grant granular permissions to application developers or database admins, enabling them to deploy resources such as databases or application instances on top of Arc-enabled Kubernetes clusters in a multi-tenant manner.
14+
A custom location has a one-to-one mapping to a namespace within the Azure Arc-enabled Kubernetes cluster. The custom location Azure resource combined with Azure role-based access control (Azure RBAC) can be used to grant granular permissions to application developers or database admins, enabling them to deploy resources such as databases or application instances on top of Arc-enabled Kubernetes clusters in a multi-tenant manner.
1515

1616
A conceptual overview of this feature is available in [Custom locations - Azure Arc-enabled Kubernetes](conceptual-custom-locations.md).
1717

@@ -35,7 +35,7 @@ In this article, you learn how to:
3535
az extension add --name customlocation
3636
```
3737
38-
If you have already installed the `connectedk8s`, `k8s-extension`, and `customlocation` extensions, update to the **latest version** using the following command:
38+
If you have already installed the `connectedk8s`, `k8s-extension`, and `customlocation` extensions, update to the **latest version** by using the following command:
3939
4040
```azurecli
4141
az extension update --name connectedk8s
@@ -63,7 +63,7 @@ In this article, you learn how to:
6363
6464
## Enable custom locations on your cluster
6565
66-
If you are signed in to Azure CLI as an Azure AD user, to enable this feature on your cluster, execute the following command:
66+
If you are signed in to Azure CLI as an Azure Active Directory (Azure AD) user, to enable this feature on your cluster, execute the following command:
6767
6868
```azurecli
6969
az connectedk8s enable-features -n <clusterName> -g <resourceGroupName> --features cluster-connect custom-locations
@@ -91,7 +91,7 @@ This is because a service principal doesn't have permissions to get information
9191
az ad sp show --id bc313c14-388c-4e7d-a58e-70017303ee3b --query id -o tsv
9292
```
9393

94-
1. Sign in to Azure CLI using the service principal. Use the `<objectId>` or `id` value from above step to enable custom locations feature on the cluster:
94+
1. Sign in to Azure CLI using the service principal. Use the `<objectId>` or `id` value from the previous step to enable custom locations on the cluster:
9595

9696
```azurecli
9797
az connectedk8s enable-features -n <cluster-name> -g <resource-group-name> --custom-locations-oid <objectId/id> --features cluster-connect custom-locations

0 commit comments

Comments
 (0)