Skip to content

Commit 90a67c8

Browse files
author
Andrew
committed
Fixed redirect & updated title headings where not sentence case
1 parent cbf4526 commit 90a67c8

File tree

2 files changed

+17
-17
lines changed

2 files changed

+17
-17
lines changed

articles/operator-nexus/.openpublishing.redirection.operator-nexus.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@
6767
},
6868
{
6969
"source_path": "howto-create-cluster-with-user-assigned-managed-identity.md",
70-
"redirect_url": "howto-cluster-managed-identity-user-provided-resources.md",
70+
"redirect_url": "howto-cluster-managed-identity-user-provided-resources",
7171
"redirect_document_id": false
7272
}
7373
]

articles/operator-nexus/howto-cluster-managed-identity-user-provided-resources.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Azure Operator Nexus Cluster Support for Managed Identities and User Provided Resources"
2+
title: "Azure Operator Nexus Cluster Support for managed identities and user provided resources"
33
description: Azure Operator Nexus Cluster support for managed identities and user provided resources.
44
author: eak13
55
ms.author: ekarandjeff
@@ -33,7 +33,7 @@ Once added, the Identity can only be removed via the API call at this time. For
3333
> [!NOTE]
3434
> The managed identity functionality for Log Analytics Workspace and Key Vault exists with the 2024-10-01-preview API and will be available with the 2025-02-01 GA API.
3535
36-
## Operator Nexus Clusters with User Assigned Managed Identities
36+
## Operator Nexus Clusters with User Assigned Managed Identities (UAMI)
3737

3838
It's a best practice to first define all of the user provided resources (Storage Account, LAW, and Key Vault), the managed identities associated with those resources and then assign the managed identity the appropriate access to the resource. If these steps aren't done before Cluster creation, the steps need to be completed before Cluster deployment.
3939

@@ -57,18 +57,18 @@ The following steps should be followed for using UAMIs with Nexus Clusters and a
5757

5858
### Create the resources and assign the UAMI to the resources
5959

60-
#### Storage Accounts
60+
#### Storage Accounts setup
6161

6262
1. Create a storage account, or identify an existing storage account that you want to use. See [Create an Azure storage account](/azure/storage/common/storage-account-create?tabs=azure-portal).
6363
1. Create a blob storage container in the storage account. See [Create a container](/azure/storage/blobs/storage-quickstart-blobs-portal#create-a-container).
6464
1. Assign the `Storage Blob Data Contributor` role to users and the UAMI which need access to the run-\* command output. See [Assign an Azure role for access to blob data](/azure/storage/blobs/assign-azure-role-data-access?tabs=portal).
6565

66-
#### Log Analytics Workspaces
66+
#### Log Analytics Workspaces setup
6767

6868
1. Create a Log Analytics Workspace (LAW), or identify an existing LAW that you want to use. See [Create a Log Analytics Workspace](/azure/azure-monitor/logs/quick-create-workspace).
6969
1. Assign the `Log Analytics Contributor` role to the UAMI for the log analytics workspace. See [Manage access to Log Analytics workspaces](/azure/azure-monitor/logs/manage-access?tabs=portal).
7070

71-
#### Key Vault
71+
#### Key Vault setup
7272

7373
1. Create a Key Vault, or identify an existing Key Vault that you want to use. See [Create a Key Vault](/azure/key-vault/general/quick-create-cli).
7474
1. Enable the Key Vault for Role Based Access Control (RBAC). See [Enable Azure RBAC permissions on Key Vault](/azure/key-vault/general/rbac-guide?tabs=azure-cli#enable-azure-rbac-permissions-on-key-vault).
@@ -82,29 +82,29 @@ The following steps should be followed for using UAMIs with Nexus Clusters and a
8282
1. Select **Member**: AFOI-NC-MGMT-PME-PROD application.
8383
1. Review and assign.
8484

85-
### Create or update the Cluster to use User Assigned Managed Identities and user provided resources
85+
### Create or update the Nexus Cluster to use User Assigned Managed Identities and user provided resources
8686

8787
#### Define the UAMI(S) on the Cluster
8888

8989
When creating or updating a Cluster with a user assigned managed identity, use the `--mi-user-assigned` parameter along with the resource ID of the UAMI. If you wish to specify multiple UAMIs, list the UAMIs' resources IDs with a space between them. Each UAMI that's used for a Key Vault, LAW, or Storage Account must be provided in this list.
9090

91-
#### Storage Account Settings
91+
#### Storage Account settings
9292

9393
The `--command-output-settings` data construct is used to define the Storage Account where run command output is written. It consists of the following fields:
9494

9595
- `container-url`: The URL of the storage account container that is to be used by the specified identities.
9696
- `identity-resource-id`: The user assigned managed identity resource ID to use. Mutually exclusive with a system assigned identity type.
9797
- `identity-type`: The type of managed identity that is being selected. Use `UserAssignedIdentity`.
9898

99-
#### Log Analytics Workspace
99+
#### Log Analytics Workspace settings
100100

101101
The `--analytics-output-settings` data construct is used to define the LAW where metrics are sent. It consists of the following fields:
102102

103103
- `analytics-workspace-id`: The resource ID of the analytics workspace that is to be used by the specified identity.
104104
- `identity-resource-id`: The user assigned managed identity resource ID to use. Mutually exclusive with a system assigned identity type
105105
- `identity-type`: The type of managed identity that is being selected. Use `UserAssignedIdentity`.
106106

107-
#### Key Vault Settings
107+
#### Key Vault settings
108108

109109
The `--secret-archive-settings` data construct is used to define the Key Vault where rotated credentials are written. It consists of the following fields:
110110

@@ -284,18 +284,18 @@ System-assigned identity example:
284284

285285
### Create the resources and assign the SAMI to the resources
286286

287-
#### Storage Accounts
287+
#### Storage Accounts setup
288288

289289
1. Create a storage account, or identify an existing storage account that you want to use. See [Create an Azure storage account](/azure/storage/common/storage-account-create?tabs=azure-portal).
290290
1. Create a blob storage container in the storage account. See [Create a container](/azure/storage/blobs/storage-quickstart-blobs-portal#create-a-container).
291291
1. Assign the `Storage Blob Data Contributor` role to users and the SAMI which need access to the run-\* command output. See [Assign an Azure role for access to blob data](/azure/storage/blobs/assign-azure-role-data-access?tabs=portal).
292292

293-
#### Log Analytics Workspaces
293+
#### Log Analytics Workspaces setup
294294

295295
1. Create a Log Analytics Workspace (LAW), or identify an existing LAW that you want to use. See [Create a Log Analytics Workspace](/azure/azure-monitor/logs/quick-create-workspace).
296296
1. Assign the `Log Analytics Contributor` role to the SAMI for the log analytics workspace. See [Manage access to Log Analytics workspaces](/azure/azure-monitor/logs/manage-access?tabs=portal).
297297

298-
#### Key Vault
298+
#### Key Vault setup
299299

300300
1. Create a Key Vault, or identify an existing Key Vault that you want to use. See [Create a Key Vault](/azure/key-vault/general/quick-create-cli).
301301
1. Enable the Key Vault for Role Based Access Control (RBAC). See [Enable Azure RBAC permissions on Key Vault](/azure/key-vault/general/rbac-guide?tabs=azure-cli#enable-azure-rbac-permissions-on-key-vault).
@@ -304,23 +304,23 @@ System-assigned identity example:
304304

305305
### Update the Cluster with the user provided resources information
306306

307-
#### Storage Account Settings
307+
#### Storage Account settings
308308

309309
The `--command-output-settings` data construct is used to define the Storage Account where run command output is written. It consists of the following fields:
310310

311311
- `container-url`: The URL of the storage account container that is to be used by the specified identities.
312312
- `identity-resource-id`: Not required when using a SAMI
313313
- `identity-type`: The type of managed identity that is being selected. Use `SystemAssignedIdentity`.
314314

315-
#### Log Analytics Workspace
315+
#### Log Analytics Workspace settings
316316

317317
The `--analytics-output-settings` data construct is used to define the LAW where metrics are sent. It consists of the following fields:
318318

319319
- `analytics-workspace-id`: The resource ID of the analytics workspace that is to be used by the specified identity.
320320
- `identity-resource-id`: Not required when using a SAMI
321321
- `identity-type`: The type of managed identity that is being selected. Use `SystemAssignedIdentity`.
322322

323-
#### Key Vault Settings
323+
#### Key Vault settings
324324

325325
The `--secret-archive-settings` data construct is used to define the Key Vault where rotated credentials are written. It consists of the following fields:
326326

@@ -373,7 +373,7 @@ az networkcloud cluster update --name "clusterName" --resource-group "resourceGr
373373
vault-uri="https://keyvaultname.vault.azure.net/"
374374
```
375375

376-
## Update Cluster Identities via APIs
376+
## Update Cluster identities via APIs
377377

378378
Cluster managed identities can be assigned via CLI. The unassignment of the identities can be done via API calls.
379379
Note, `<APIVersion>` is the API version 2024-07-01 or newer.

0 commit comments

Comments
 (0)