Skip to content

Commit 89da21d

Browse files
committed
Moved k8s instructions below bicep
1 parent a886908 commit 89da21d

7 files changed

+840
-867
lines changed

articles/iot-operations/connect-to-cloud/howto-configure-adlsv2-endpoint.md

Lines changed: 73 additions & 82 deletions
Original file line numberDiff line numberDiff line change
@@ -37,31 +37,6 @@ Then, assign a role to the managed identity that grants permission to write to t
3737

3838
Finally, create the *DataflowEndpoint* resource and specify the managed identity authentication method. Replace the placeholder values like `<ENDPOINT_NAME>` with your own.
3939

40-
# [Kubernetes](#tab/kubernetes)
41-
42-
Create a Kubernetes manifest `.yaml` file with the following content.
43-
44-
```yaml
45-
apiVersion: connectivity.iotoperations.azure.com/v1beta1
46-
kind: DataflowEndpoint
47-
metadata:
48-
name: <ENDPOINT_NAME>
49-
namespace: azure-iot-operations
50-
spec:
51-
endpointType: DataLakeStorage
52-
dataLakeStorageSettings:
53-
host: https://<ACCOUNT>.blob.core.windows.net
54-
authentication:
55-
method: SystemAssignedManagedIdentity
56-
systemAssignedManagedIdentitySettings: {}
57-
```
58-
59-
Then apply the manifest file to the Kubernetes cluster.
60-
61-
```bash
62-
kubectl apply -f <FILE>.yaml
63-
```
64-
6540
# [Bicep](#tab/bicep)
6641

6742
Create a Bicep `.bicep` file with the following content.
@@ -104,16 +79,6 @@ Then, deploy via Azure CLI.
10479
az stack group create --name <DEPLOYMENT_NAME> --resource-group <RESOURCE_GROUP> --template-file <FILE>.bicep
10580
```
10681

107-
---
108-
109-
If you need to override the system-assigned managed identity audience, see the [System-assigned managed identity](#system-assigned-managed-identity) section.
110-
111-
### Use access token authentication
112-
113-
Follow the steps in the [access token](#access-token) section to get a SAS token for the storage account and store it in a Kubernetes secret.
114-
115-
Then, create the *DataflowEndpoint* resource and specify the access token authentication method. Here, replace `<SAS_SECRET_NAME>` with name of the secret containing the SAS token as well as other placeholder values.
116-
11782
# [Kubernetes](#tab/kubernetes)
11883

11984
Create a Kubernetes manifest `.yaml` file with the following content.
@@ -129,9 +94,8 @@ spec:
12994
dataLakeStorageSettings:
13095
host: https://<ACCOUNT>.blob.core.windows.net
13196
authentication:
132-
method: AccessToken
133-
accessTokenSettings:
134-
secretRef: <SAS_SECRET_NAME>
97+
method: SystemAssignedManagedIdentity
98+
systemAssignedManagedIdentitySettings: {}
13599
```
136100
137101
Then apply the manifest file to the Kubernetes cluster.
@@ -140,6 +104,16 @@ Then apply the manifest file to the Kubernetes cluster.
140104
kubectl apply -f <FILE>.yaml
141105
```
142106

107+
---
108+
109+
If you need to override the system-assigned managed identity audience, see the [System-assigned managed identity](#system-assigned-managed-identity) section.
110+
111+
### Use access token authentication
112+
113+
Follow the steps in the [access token](#access-token) section to get a SAS token for the storage account and store it in a Kubernetes secret.
114+
115+
Then, create the *DataflowEndpoint* resource and specify the access token authentication method. Here, replace `<SAS_SECRET_NAME>` with name of the secret containing the SAS token as well as other placeholder values.
116+
143117
# [Bicep](#tab/bicep)
144118

145119
Create a Bicep `.bicep` file with the following content.
@@ -183,6 +157,32 @@ Then, deploy via Azure CLI.
183157
az stack group create --name <DEPLOYMENT_NAME> --resource-group <RESOURCE_GROUP> --template-file <FILE>.bicep
184158
```
185159

160+
# [Kubernetes](#tab/kubernetes)
161+
162+
Create a Kubernetes manifest `.yaml` file with the following content.
163+
164+
```yaml
165+
apiVersion: connectivity.iotoperations.azure.com/v1beta1
166+
kind: DataflowEndpoint
167+
metadata:
168+
name: <ENDPOINT_NAME>
169+
namespace: azure-iot-operations
170+
spec:
171+
endpointType: DataLakeStorage
172+
dataLakeStorageSettings:
173+
host: https://<ACCOUNT>.blob.core.windows.net
174+
authentication:
175+
method: AccessToken
176+
accessTokenSettings:
177+
secretRef: <SAS_SECRET_NAME>
178+
```
179+
180+
Then apply the manifest file to the Kubernetes cluster.
181+
182+
```bash
183+
kubectl apply -f <FILE>.yaml
184+
```
185+
186186
---
187187

188188
### Available authentication methods
@@ -199,15 +199,6 @@ Before creating the dataflow endpoint, assign a role to the managed identity tha
199199

200200
To use system-assigned managed identity, specify the managed identity authentication method in the *DataflowEndpoint* resource. In most cases, you don't need to specify other settings. Not specifying an audience creates a managed identity with the default audience scoped to your storage account.
201201

202-
# [Kubernetes](#tab/kubernetes)
203-
204-
```yaml
205-
dataLakeStorageSettings:
206-
authentication:
207-
method: SystemAssignedManagedIdentity
208-
systemAssignedManagedIdentitySettings: {}
209-
```
210-
211202
# [Bicep](#tab/bicep)
212203

213204
```bicep
@@ -219,20 +210,19 @@ dataLakeStorageSettings: {
219210
}
220211
```
221212

222-
---
223-
224-
If you need to override the system-assigned managed identity audience, you can specify the `audience` setting.
225-
226213
# [Kubernetes](#tab/kubernetes)
227214

228215
```yaml
229216
dataLakeStorageSettings:
230217
authentication:
231218
method: SystemAssignedManagedIdentity
232-
systemAssignedManagedIdentitySettings:
233-
audience: https://<ACCOUNT>.blob.core.windows.net
219+
systemAssignedManagedIdentitySettings: {}
234220
```
235221
222+
---
223+
224+
If you need to override the system-assigned managed identity audience, you can specify the `audience` setting.
225+
236226
# [Bicep](#tab/bicep)
237227

238228
```bicep
@@ -246,6 +236,16 @@ dataLakeStorageSettings: {
246236
}
247237
```
248238

239+
# [Kubernetes](#tab/kubernetes)
240+
241+
```yaml
242+
dataLakeStorageSettings:
243+
authentication:
244+
method: SystemAssignedManagedIdentity
245+
systemAssignedManagedIdentitySettings:
246+
audience: https://<ACCOUNT>.blob.core.windows.net
247+
```
248+
249249
---
250250

251251
#### Access token
@@ -274,16 +274,6 @@ You can also use the IoT Operations portal to create and manage the secret. To l
274274

275275
Finally, create the *DataflowEndpoint* resource with the secret reference.
276276

277-
# [Kubernetes](#tab/kubernetes)
278-
279-
```yaml
280-
dataLakeStorageSettings:
281-
authentication:
282-
method: AccessToken
283-
accessTokenSettings:
284-
secretRef: <SAS_SECRET_NAME>
285-
```
286-
287277
# [Bicep](#tab/bicep)
288278

289279
```bicep
@@ -297,23 +287,22 @@ dataLakeStorageSettings: {
297287
}
298288
```
299289

300-
---
301-
302-
#### User-assigned managed identity
303-
304-
To use a user-assigned managed identity, specify the `UserAssignedManagedIdentity` authentication method and provide the `clientId` and `tenantId` of the managed identity.
305-
306290
# [Kubernetes](#tab/kubernetes)
307291

308292
```yaml
309293
dataLakeStorageSettings:
310294
authentication:
311-
method: UserAssignedManagedIdentity
312-
userAssignedManagedIdentitySettings:
313-
clientId: <ID>
314-
tenantId: <ID>
295+
method: AccessToken
296+
accessTokenSettings:
297+
secretRef: <SAS_SECRET_NAME>
315298
```
316299

300+
---
301+
302+
#### User-assigned managed identity
303+
304+
To use a user-assigned managed identity, specify the `UserAssignedManagedIdentity` authentication method and provide the `clientId` and `tenantId` of the managed identity.
305+
317306
# [Bicep](#tab/bicep)
318307

319308
```bicep
@@ -328,6 +317,17 @@ dataLakeStorageSettings: {
328317
}
329318
```
330319

320+
# [Kubernetes](#tab/kubernetes)
321+
322+
```yaml
323+
dataLakeStorageSettings:
324+
authentication:
325+
method: UserAssignedManagedIdentity
326+
userAssignedManagedIdentitySettings:
327+
clientId: <ID>
328+
tenantId: <ID>
329+
```
330+
331331
---
332332

333333
## Advanced settings
@@ -343,15 +343,6 @@ Use the `batching` settings to configure the maximum number of messages and the
343343

344344
For example, to configure the maximum number of messages to 1000 and the maximum latency to 100 seconds, use the following settings:
345345

346-
# [Kubernetes](#tab/kubernetes)
347-
348-
```yaml
349-
dataLakeStorageSettings:
350-
batching:
351-
latencySeconds: 100
352-
maxMessages: 1000
353-
```
354-
355346
# [Bicep](#tab/bicep)
356347

357348
```bicep

0 commit comments

Comments
 (0)