Skip to content

Commit 9e4b85d

Browse files
authored
Merge pull request #178341 from MikeRayMSFT/release-arc-data
Stage release notes
2 parents 67b4ea2 + c98c35c commit 9e4b85d

6 files changed

+180
-217
lines changed

articles/azure-arc/data/create-data-controller-direct-cli.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,6 @@ kubectl get pods -n arc
132132

133133
The managed identity that gets created during Arc data services extension create needs to be assigned certain roles for usage and/or metrics to be uploaded automatically.
134134

135-
136135
### (1) Retrieve managed identity of the Arc data controller extension
137136

138137
```powershell

articles/azure-arc/data/create-data-controller-using-kubernetes-native-tools.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: azure-arc-data
77
author: twright-msft
88
ms.author: twright
99
ms.reviewer: mikeray
10-
ms.date: 07/30/2021
10+
ms.date: 11/03/2021
1111
ms.topic: how-to
1212
---
1313

@@ -48,11 +48,13 @@ kubectl delete clusterrole arcdataservices-extension
4848
kubectl delete clusterrole arc:cr-arc-metricsdc-reader
4949
kubectl delete clusterrole arc:cr-arc-dc-watch
5050
kubectl delete clusterrole cr-arc-webhook-job
51-
52-
# Substitute the name of the namespace the data controller was deployed in into {namespace}. If unsure, get the name of the mutatingwebhookconfiguration using 'kubectl get clusterrolebinding'
51+
kubectl delete clusterrole {namespace}:cr-upgrade-worker
5352
kubectl delete clusterrolebinding {namespace}:crb-arc-metricsdc-reader
5453
kubectl delete clusterrolebinding {namespace}:crb-arc-dc-watch
5554
kubectl delete clusterrolebinding crb-arc-webhook-job
55+
kubectl delete clusterrolebinding {namespace}:crb-upgrade-worker
56+
57+
# Substitute the name of the namespace the data controller was deployed in into {namespace}. If unsure, get the name of the mutatingwebhookconfiguration using 'kubectl get clusterrolebinding'
5658

5759
# API services
5860
# Up to May 2021 release
@@ -148,13 +150,13 @@ The example below assumes that you created a image pull secret name `arc-private
148150
- name: arc-private-registry #Create this image pull secret if you are using a private container registry
149151
containers:
150152
- name: bootstrapper
151-
image: mcr.microsoft.com/arcdata/arc-bootstrapper:v1.0.0_2021-07-30 #Change this registry location if you are using a private container registry.
153+
image: mcr.microsoft.com/arcdata/arc-bootstrapper:v1.1.0_2021-11-02 #Change this registry location if you are using a private container registry.
152154
imagePullPolicy: Always
153155
```
154156
155-
## Create a secret for the Kibana/Grafana dashboards
157+
## Create secrets for the metrics and logs dashboards
156158
157-
The username and password is used to authenticate to the Kibana and Grafana dashboards as an administrator. Choose a secure password and share it with only those that need to have these privileges.
159+
You can specify a user name and password that is used to authenticate to the metrics and logs dashboards as an administrator. Choose a secure password and share it with only those that need to have these privileges.
158160
159161
A Kubernetes secret is stored as a base64 encoded string - one for the username and one for the password.
160162
@@ -179,7 +181,7 @@ echo -n '<your string to encode here>' | base64
179181
# echo -n 'example' | base64
180182
```
181183

182-
Once you have encoded the username and password you can create a file based on the [template file](https://raw.githubusercontent.com/microsoft/azure_arc/main/arc_data_services/deploy/yaml/controller-login-secret.yaml) and replace the username and password values with your own.
184+
Once you have encoded the usernames and passwords you can create a file based on the [template file](https://raw.githubusercontent.com/microsoft/azure_arc/main/arc_data_services/deploy/yaml/controller-login-secret.yaml) and replace the usernames and passwords with your own.
183185

184186
Then run the following command to create the secret.
185187

@@ -259,7 +261,7 @@ spec:
259261
serviceAccount: sa-arc-controller
260262
docker:
261263
imagePullPolicy: Always
262-
imageTag: v1.0.0_2021-07-30
264+
imageTag: v1.1.0_2021-11-02
263265
registry: mcr.microsoft.com
264266
repository: arcdata
265267
infrastructure: other #Must be a value in the array [alibaba, aws, azure, gcp, onpremises, other]

0 commit comments

Comments
 (0)