You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/get-started/quickstart-add-assets.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,10 +84,12 @@ To add an asset endpoint:
84
84
85
85
These quickstarts use the **OPC PLC simulator** to generate sample data. To enable the quickstart scenario, you need to configure the OPC UA Broker to accept untrusted server certificates and your asset endpoint to connect without mutual trust established. This configuration is not recommended for production or pre-production environments. For more information, see [Deploy the OPC PLC simulator](../manage-devices-assets/howto-configure-opc-plc-simulator.md):
86
86
87
+
Run the following commands in your Codespaces terminal, which has all of your environment variables configures.
88
+
87
89
1. To configure the simulator for the quickstart scenario, run the following command:
Copy file name to clipboardExpand all lines: articles/iot-operations/get-started/quickstart-deploy.md
+5-14Lines changed: 5 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,30 +83,21 @@ This helper command checks connectivity to Azure Resource Manager and Microsoft
83
83
84
84
In this section, you use the [az iot ops init](/cli/azure/iot/ops#az-iot-ops-init) command to configure your cluster so that it can communicate securely with your Azure IoT Operations components and key vault, then deploy Azure IoT Operations.
85
85
86
-
1. Create a key vault. Replace the placeholder parameters with your own information.
86
+
Run the following CLI commands in your Codespaces terminal.
87
87
88
-
| Placeholder | Value |
89
-
| ----------- | ----- |
90
-
|**RESOURCE_GROUP**| The name of your resource group that contains the connected cluster. |
91
-
|**KEYVAULT_NAME**| A name for a new key vault. |
88
+
1. Create a key vault. For this scenario, use the same name and resource group as your cluster.
92
89
93
90
```azurecli
94
-
az keyvault create --enable-rbac-authorization false --name $KEYVAULT_NAME --resource-group $RESOURCE_GROUP
91
+
az keyvault create --enable-rbac-authorization false --name $CLUSTER_NAME --resource-group $RESOURCE_GROUP
95
92
```
96
93
97
94
>[!TIP]
98
95
> You can use an existing key vault for your secrets, but verify that the **Permission model** is set to **Vault access policy**. You can check this setting in the Azure portal in the **Access configuration** section of an existing key vault. Or use the [az keyvault show](/cli/azure/keyvault#az-keyvault-show) command to check that `enableRbacAuthorization` is false.
99
96
100
-
1. Run the following CLI command on your development machine or in your codespace terminal. Replace the placeholder parameters with your own information.
101
-
102
-
| Placeholder | Value |
103
-
| ----------- | ----- |
104
-
|**CLUSTER_NAME**| The name of your connected cluster. |
105
-
|**RESOURCE_GROUP**| The name of your resource group that contains the connected cluster. |
106
-
|**KEYVAULT_NAME**| The name of your key vault. |
97
+
1. Deploy Azure IoT Operations.
107
98
108
99
```azurecli
109
-
az iot ops init --simulate-plc --cluster <CLUSTER_NAME> --resource-group <RESOURCE_GROUP> --kv-id $(az keyvault show --name <KEYVAULT_NAME> -o tsv --query id)
100
+
az iot ops init --simulate-plc --cluster $CLUSTER_NAME --resource-group $RESOURCE_GROUP --kv-id $(az keyvault show --name $CLUSTER_NAME -o tsv --query id)
110
101
```
111
102
112
103
If you get an error that says *Your device is required to be managed to access your resource*, run `az login` again and make sure that you sign in interactively with a browser.
Copy file name to clipboardExpand all lines: articles/iot-operations/includes/connect-cluster-codespaces.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,6 +67,6 @@ To connect your cluster to Azure Arc:
67
67
68
68
1. Use the [az connectedk8s enable-features](/cli/azure/connectedk8s#az-connectedk8s-enable-features) command to enable custom location support on your cluster. This command uses the `objectId` of the Microsoft Entra ID application that the Azure Arc service uses.
Copy file name to clipboardExpand all lines: articles/iot-operations/includes/prepare-codespaces.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,9 @@ To get started with your codespace:
35
35
| LOCATION | An Azure region close to you. The following regions are supported in public preview: eastus, eastus2, westus, westus2, westus3, westeurope, or northeurope. |
36
36
37
37
>[!TIP]
38
-
> The values you provide as secrets in this step get saved on your GitHub account to be used in this and future codespaces. They're also automatically added as environment variables in the codespace terminal, and you can use those environment variables in the CLI commands in the next section.
38
+
>The values you provide as secrets in this step get saved on your GitHub account to be used in this and future codespaces. They're also automatically added as environment variables in the codespace terminal, and you can use those environment variables in the CLI commands in the next section.
39
+
>
40
+
>Additionally, this codespace automatically creates a `CLUSTER_NAME` environment variable which is set with the codespace name.
0 commit comments