You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/data/create-data-controller-direct-cli.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,7 +132,6 @@ kubectl get pods -n arc
132
132
133
133
The managed identity that gets created during Arc data services extension create needs to be assigned certain roles for usage and/or metrics to be uploaded automatically.
134
134
135
-
136
135
### (1) Retrieve managed identity of the Arc data controller extension
# Substitute the name of the namespace the data controller was deployed in into {namespace}. If unsure, get the name of the mutatingwebhookconfiguration using 'kubectl get clusterrolebinding'
# Substitute the name of the namespace the data controller was deployed in into {namespace}. If unsure, get the name of the mutatingwebhookconfiguration using 'kubectl get clusterrolebinding'
56
58
57
59
# API services
58
60
# Up to May 2021 release
@@ -148,13 +150,13 @@ The example below assumes that you created a image pull secret name `arc-private
148
150
- name: arc-private-registry #Create this image pull secret if you are using a private container registry
149
151
containers:
150
152
- name: bootstrapper
151
-
image: mcr.microsoft.com/arcdata/arc-bootstrapper:v1.0.0_2021-07-30#Change this registry location if you are using a private container registry.
153
+
image: mcr.microsoft.com/arcdata/arc-bootstrapper:v1.1.0_2021-11-02#Change this registry location if you are using a private container registry.
152
154
imagePullPolicy: Always
153
155
```
154
156
155
-
## Create a secret for the Kibana/Grafana dashboards
157
+
## Create secrets for the metrics and logs dashboards
156
158
157
-
The username and password is used to authenticate to the Kibana and Grafana dashboards as an administrator. Choose a secure password and share it with only those that need to have these privileges.
159
+
You can specify a user name and password that is used to authenticate to the metrics and logs dashboards as an administrator. Choose a secure password and share it with only those that need to have these privileges.
158
160
159
161
A Kubernetes secret is stored as a base64 encoded string - one for the username and one for the password.
Once you have encoded the username and password you can create a file based on the [template file](https://raw.githubusercontent.com/microsoft/azure_arc/main/arc_data_services/deploy/yaml/controller-login-secret.yaml) and replace the username and password values with your own.
184
+
Once you have encoded the usernames and passwords you can create a file based on the [template file](https://raw.githubusercontent.com/microsoft/azure_arc/main/arc_data_services/deploy/yaml/controller-login-secret.yaml) and replace the usernames and passwords with your own.
183
185
184
186
Then run the following command to create the secret.
185
187
@@ -259,7 +261,7 @@ spec:
259
261
serviceAccount: sa-arc-controller
260
262
docker:
261
263
imagePullPolicy: Always
262
-
imageTag: v1.0.0_2021-07-30
264
+
imageTag: v1.1.0_2021-11-02
263
265
registry: mcr.microsoft.com
264
266
repository: arcdata
265
267
infrastructure: other #Must be a value in the array [alibaba, aws, azure, gcp, onpremises, other]
0 commit comments