You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-kafka-endpoint.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ If using system-assigned managed identity, in Azure portal, go to your Azure IoT
42
42
43
43
Then, go to the Event Hubs namespace > **Access control (IAM)** > **Add role assignment**.
44
44
45
-
1. On the **Role** tab select an appropriate role like `Azure Event Hubs Data Sender` or `Azure Event Hubs Data Receiver`. This gives the managed identity the necessary permissions to send or receive messages for all event hubs in the namespace. To learn more, see [Authenticate an application with Microsoft Entra ID to access Event Hubs resources](../../event-hubs/authenticate-application.md#built-in-roles-for-azure-event-hubs).
45
+
1. On the **Role** tab, select an appropriate role like `Azure Event Hubs Data Sender` or `Azure Event Hubs Data Receiver`. This gives the managed identity the necessary permissions to send or receive messages for all event hubs in the namespace. To learn more, see [Authenticate an application with Microsoft Entra ID to access Event Hubs resources](../../event-hubs/authenticate-application.md#built-in-roles-for-azure-event-hubs).
46
46
1. On the **Members** tab:
47
47
1. If using system-assigned managed identity, for **Assign access to**, select **User, group, or service principal** option, then select **+ Select members** and search for the name of the Azure IoT Operations Arc extension.
48
48
1. If using user-assigned managed identity, for **Assign access to**, select **Managed identity** option, then select **+ Select members** and search for your [user-assigned managed identity set up for cloud connections](../deploy-iot-ops/howto-enable-secure-settings.md#set-up-a-user-assigned-managed-identity-for-cloud-connections).
@@ -317,7 +317,7 @@ Before you configure the data flow endpoint, assign a role to the Azure IoT Oper
317
317
1. In Azure portal, go to your Azure IoT Operations instance and select **Overview**.
318
318
1. Copy the name of the extension listed after **Azure IoT Operations Arc extension**. For example, *azure-iot-operations-xxxx7*.
319
319
1. Go to the cloud resource you need to grant permissions. For example, go to the Event Hubs namespace > **Access control (IAM)** > **Add role assignment**.
320
-
1. On the **Role** tab select an appropriate role.
320
+
1. On the **Role** tab, select an appropriate role.
321
321
1. On the **Members** tab, for **Assign access to**, select **User, group, or service principal** option, then select **+ Select members** and search for the Azure IoT Operations managed identity. For example, *azure-iot-operations-xxxx7*.
322
322
323
323
Then, configure the data flow endpoint with system-assigned managed identity settings.
@@ -387,7 +387,7 @@ To use user-assigned managed identity for authentication, you must first deploy
387
387
Before you configure the data flow endpoint, assign a role to the user-assigned managed identity that grants permission to connect to the Kafka broker:
388
388
389
389
1. In Azure portal, go to the cloud resource you need to grant permissions. For example, go to the Event Grid namespace > **Access control (IAM)** > **Add role assignment**.
390
-
1. On the **Role** tab select an appropriate role.
390
+
1. On the **Role** tab, select an appropriate role.
391
391
1. On the **Members** tab, for **Assign access to**, select **Managed identity** option, then select **+ Select members** and search for your user-assigned managed identity.
392
392
393
393
Then, configure the data flow endpoint with user-assigned managed identity settings.
@@ -406,7 +406,7 @@ kafkaSettings: {
406
406
clientId: '<CLIENT_ID>'
407
407
tenantId: '<TENANT_ID>'
408
408
// Optional, defaults to https://<NAMESPACE>.servicebus.windows.net/.default
409
-
// Matching the Event Hub namespace you configured as host
409
+
// Matching the Event Hubs namespace you configured as host
410
410
// scope: 'https://<SCOPE_URL>'
411
411
}
412
412
}
@@ -424,7 +424,7 @@ kafkaSettings:
424
424
clientId: <CLIENT_ID>
425
425
tenantId: <TENANT_ID>
426
426
# Optional, defaults to https://<NAMESPACE>.servicebus.windows.net/.default
427
-
# Matching the Event Hub namespace you configured as host
427
+
# Matching the Event Hubs namespace you configured as host
428
428
# scope: https://<SCOPE_URL>
429
429
```
430
430
@@ -909,7 +909,7 @@ Examples:
909
909
#### Kafka endpoint is a data flow source
910
910
911
911
> [!NOTE]
912
-
> There's a known issue when using Event Hubs endpoint as a data flow source where Kafka header gets corrupted as its translated to MQTT. This only happens if using Event Hub though the Event Hub client which uses AMQP under the covers. For for instance "foo"="bar", the "foo" is translated, but the value becomes"\xa1\x03bar".
912
+
> There's a known issue when using Event Hubs endpoint as a data flow source where Kafka header gets corrupted as its translated to MQTT. This only happens if using Event Hubs through the Event Hubs client which uses AMQP under the covers. For for instance "foo"="bar", the "foo" is translated, but the value becomes"\xa1\x03bar".
913
913
914
914
When a Kafka endpoint is a data flow source, Kafka user headers are translated to MQTT v5 properties. The following table describes how Kafka user headers are translated to MQTT v5 properties.
0 commit comments