You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-adlsv2-endpoint.md
+73-82Lines changed: 73 additions & 82 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,31 +37,6 @@ Then, assign a role to the managed identity that grants permission to write to t
37
37
38
38
Finally, create the *DataflowEndpoint* resource and specify the managed identity authentication method. Replace the placeholder values like `<ENDPOINT_NAME>` with your own.
39
39
40
-
# [Kubernetes](#tab/kubernetes)
41
-
42
-
Create a Kubernetes manifest `.yaml` file with the following content.
Then apply the manifest file to the Kubernetes cluster.
60
-
61
-
```bash
62
-
kubectl apply -f <FILE>.yaml
63
-
```
64
-
65
40
# [Bicep](#tab/bicep)
66
41
67
42
Create a Bicep `.bicep` file with the following content.
@@ -104,16 +79,6 @@ Then, deploy via Azure CLI.
104
79
az stack group create --name <DEPLOYMENT_NAME> --resource-group <RESOURCE_GROUP> --template-file <FILE>.bicep
105
80
```
106
81
107
-
---
108
-
109
-
If you need to override the system-assigned managed identity audience, see the [System-assigned managed identity](#system-assigned-managed-identity) section.
110
-
111
-
### Use access token authentication
112
-
113
-
Follow the steps in the [access token](#access-token) section to get a SAS token for the storage account and store it in a Kubernetes secret.
114
-
115
-
Then, create the *DataflowEndpoint* resource and specify the access token authentication method. Here, replace `<SAS_SECRET_NAME>` with name of the secret containing the SAS token as well as other placeholder values.
116
-
117
82
# [Kubernetes](#tab/kubernetes)
118
83
119
84
Create a Kubernetes manifest `.yaml` file with the following content.
@@ -129,9 +94,8 @@ spec:
129
94
dataLakeStorageSettings:
130
95
host: https://<ACCOUNT>.blob.core.windows.net
131
96
authentication:
132
-
method: AccessToken
133
-
accessTokenSettings:
134
-
secretRef: <SAS_SECRET_NAME>
97
+
method: SystemAssignedManagedIdentity
98
+
systemAssignedManagedIdentitySettings: {}
135
99
```
136
100
137
101
Then apply the manifest file to the Kubernetes cluster.
@@ -140,6 +104,16 @@ Then apply the manifest file to the Kubernetes cluster.
140
104
kubectl apply -f <FILE>.yaml
141
105
```
142
106
107
+
---
108
+
109
+
If you need to override the system-assigned managed identity audience, see the [System-assigned managed identity](#system-assigned-managed-identity) section.
110
+
111
+
### Use access token authentication
112
+
113
+
Follow the steps in the [access token](#access-token) section to get a SAS token for the storage account and store it in a Kubernetes secret.
114
+
115
+
Then, create the *DataflowEndpoint* resource and specify the access token authentication method. Here, replace `<SAS_SECRET_NAME>` with name of the secret containing the SAS token as well as other placeholder values.
116
+
143
117
# [Bicep](#tab/bicep)
144
118
145
119
Create a Bicep `.bicep` file with the following content.
@@ -183,6 +157,32 @@ Then, deploy via Azure CLI.
183
157
az stack group create --name <DEPLOYMENT_NAME> --resource-group <RESOURCE_GROUP> --template-file <FILE>.bicep
184
158
```
185
159
160
+
# [Kubernetes](#tab/kubernetes)
161
+
162
+
Create a Kubernetes manifest `.yaml` file with the following content.
Then apply the manifest file to the Kubernetes cluster.
181
+
182
+
```bash
183
+
kubectl apply -f <FILE>.yaml
184
+
```
185
+
186
186
---
187
187
188
188
### Available authentication methods
@@ -199,15 +199,6 @@ Before creating the dataflow endpoint, assign a role to the managed identity tha
199
199
200
200
To use system-assigned managed identity, specify the managed identity authentication method in the *DataflowEndpoint* resource. In most cases, you don't need to specify other settings. Not specifying an audience creates a managed identity with the default audience scoped to your storage account.
201
201
202
-
# [Kubernetes](#tab/kubernetes)
203
-
204
-
```yaml
205
-
dataLakeStorageSettings:
206
-
authentication:
207
-
method: SystemAssignedManagedIdentity
208
-
systemAssignedManagedIdentitySettings: {}
209
-
```
210
-
211
202
# [Bicep](#tab/bicep)
212
203
213
204
```bicep
@@ -219,20 +210,19 @@ dataLakeStorageSettings: {
219
210
}
220
211
```
221
212
222
-
---
223
-
224
-
If you need to override the system-assigned managed identity audience, you can specify the `audience` setting.
225
-
226
213
# [Kubernetes](#tab/kubernetes)
227
214
228
215
```yaml
229
216
dataLakeStorageSettings:
230
217
authentication:
231
218
method: SystemAssignedManagedIdentity
232
-
systemAssignedManagedIdentitySettings:
233
-
audience: https://<ACCOUNT>.blob.core.windows.net
219
+
systemAssignedManagedIdentitySettings: {}
234
220
```
235
221
222
+
---
223
+
224
+
If you need to override the system-assigned managed identity audience, you can specify the `audience` setting.
225
+
236
226
# [Bicep](#tab/bicep)
237
227
238
228
```bicep
@@ -246,6 +236,16 @@ dataLakeStorageSettings: {
246
236
}
247
237
```
248
238
239
+
# [Kubernetes](#tab/kubernetes)
240
+
241
+
```yaml
242
+
dataLakeStorageSettings:
243
+
authentication:
244
+
method: SystemAssignedManagedIdentity
245
+
systemAssignedManagedIdentitySettings:
246
+
audience: https://<ACCOUNT>.blob.core.windows.net
247
+
```
248
+
249
249
---
250
250
251
251
#### Access token
@@ -274,16 +274,6 @@ You can also use the IoT Operations portal to create and manage the secret. To l
274
274
275
275
Finally, create the *DataflowEndpoint* resource with the secret reference.
276
276
277
-
# [Kubernetes](#tab/kubernetes)
278
-
279
-
```yaml
280
-
dataLakeStorageSettings:
281
-
authentication:
282
-
method: AccessToken
283
-
accessTokenSettings:
284
-
secretRef: <SAS_SECRET_NAME>
285
-
```
286
-
287
277
# [Bicep](#tab/bicep)
288
278
289
279
```bicep
@@ -297,23 +287,22 @@ dataLakeStorageSettings: {
297
287
}
298
288
```
299
289
300
-
---
301
-
302
-
#### User-assigned managed identity
303
-
304
-
To use a user-assigned managed identity, specify the `UserAssignedManagedIdentity` authentication method and provide the `clientId` and `tenantId` of the managed identity.
305
-
306
290
# [Kubernetes](#tab/kubernetes)
307
291
308
292
```yaml
309
293
dataLakeStorageSettings:
310
294
authentication:
311
-
method: UserAssignedManagedIdentity
312
-
userAssignedManagedIdentitySettings:
313
-
clientId: <ID>
314
-
tenantId: <ID>
295
+
method: AccessToken
296
+
accessTokenSettings:
297
+
secretRef: <SAS_SECRET_NAME>
315
298
```
316
299
300
+
---
301
+
302
+
#### User-assigned managed identity
303
+
304
+
To use a user-assigned managed identity, specify the `UserAssignedManagedIdentity` authentication method and provide the `clientId` and `tenantId` of the managed identity.
305
+
317
306
# [Bicep](#tab/bicep)
318
307
319
308
```bicep
@@ -328,6 +317,17 @@ dataLakeStorageSettings: {
328
317
}
329
318
```
330
319
320
+
# [Kubernetes](#tab/kubernetes)
321
+
322
+
```yaml
323
+
dataLakeStorageSettings:
324
+
authentication:
325
+
method: UserAssignedManagedIdentity
326
+
userAssignedManagedIdentitySettings:
327
+
clientId: <ID>
328
+
tenantId: <ID>
329
+
```
330
+
331
331
---
332
332
333
333
## Advanced settings
@@ -343,15 +343,6 @@ Use the `batching` settings to configure the maximum number of messages and the
343
343
344
344
For example, to configure the maximum number of messages to 1000 and the maximum latency to 100 seconds, use the following settings:
0 commit comments