You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md
+29-21Lines changed: 29 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: alkohli
6
6
7
7
ms.service: azure-stack-edge
8
8
ms.topic: how-to
9
-
ms.date: 03/11/2025
9
+
ms.date: 03/14/2025
10
10
ms.author: alkohli
11
11
---
12
12
@@ -50,7 +50,7 @@ Make sure that you've completed the following prerequisites on your Azure Stack
50
50
- Use `kubectl version` to check the version of kubectl running on the client. Make a note of the full version.
51
51
- In the local UI of your Azure Stack Edge Pro device, go to **Software update** and note the Kubernetes server version number.
52
52
53
-

53
+

54
54
55
55
- Verify these two versions are compatible.
56
56
@@ -62,27 +62,27 @@ Before you enable Azure Arc on the Kubernetes cluster, you need to enable and re
62
62
1. To enable a resource provider, in the Azure portal, go to the subscription that you're planning to use for the deployment. Go to **Resource Providers**.
63
63
1. In the right-pane, search for the providers you want to add. In this example, `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration`.
You can also register resource providers via the `az cli`. For more information, see [Register the two providers for Azure Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/quickstart-connect-cluster#register-providers-for-azure-arc-enabled-kubernetes).
76
76
77
77
## Create service principal, assign role
78
78
79
79
1. Make sure that you have `Subscription ID` and the name of the resource group you used for the resource deployment for your Azure Stack Edge service. To get the subscription ID, go to your Azure Stack Edge resource in the Azure portal. Navigate to **Overview > Essentials**.
To get the resource group name, go to **Properties**.
84
84
85
-

85
+

86
86
87
87
1. To create a service principal, use the following command via the `az cli`.
88
88
@@ -106,28 +106,37 @@ You can also register resource providers via the `az cli`. For more information,
106
106
107
107
1. Make a note of the `appId`, `name`, `password`, and `tenantID` as you'll use these values as input to the next command.
108
108
109
-
There are several ways to obtain `appId`. If you use one of the following methods, you can skip steps 1, 2, and 3 from the previous section and move directly to the following step 4.
109
+
There are several ways to obtain `appId`. The following three options are the preferred methods. If you use one of the following options, you can skip steps 1, 2, and 3 from the previous section and move directly to the following step 4.
110
110
111
-
- Use Minishell to run the following PowerShell cmdlet:
111
+
- Option 1 - Use Minishell to run the following PowerShell cmdlet:
- In Azure portal, navigate to your Azure Stack Edge device **Overview** and then at top right, select **JSON view**. You see **Resource JSON** details for your device. Make note of the `principalId` for your device.
119
+
- Option 2 - e the following steps to view JSON details for your device In Azure portal:
120
+
121
+
1. Navigate to your Azure Stack Edge device **Overview** and then select **JSON view** at top right.
122
+
123
+

118
124
119
-
<Include new screenshot from portal>
120
-

125
+
1. You see **Resource JSON** details for your device. Make note of the `principalId` for your device.
121
126
122
-
- Use non-Azure Stack Edge PowerShell on a client machine to run the following command:
127
+

1. After you create the new service principal or retrieve it using one of these methods, assign the `Kubernetes Cluster - Azure Arc Onboarding` role to the newly created principal. This is a built-in Azure role (use the role ID in the command) with limited permissions. Use the following command:
139
+
1. After you create the new service principal, or after you retrieve it using one of these options, assign the `Kubernetes Cluster - Azure Arc Onboarding` role to the newly created principal. This is a built-in Azure role (use the role ID in the command) with limited permissions. Use the following command:
131
140
132
141
`az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee <appId-from-service-principal> --scope /subscriptions/<SubscriptionID>/resourceGroups/<Resource-group-name>`
133
142
@@ -167,8 +176,7 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
167
176
168
177
- To deploy Azure Arc on your device, make sure that you're using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
169
178
- Use the `az account list-locations` command to determine the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
170
-
- Specifying `ClientId`, `TenantId`, and `ClientSecret` is optional.
171
-
- If you assign a role to `appId`, don't specify `ClientId`, `TenantId`, or `ClientSecret`.
179
+
- **Important:** If you obtain the `Id` instead of creating a new service principle using the older method, then do not specify `ClientId`, `TenantId`, or `ClientSecret`.
172
180
173
181
Here's an example:
174
182
@@ -188,7 +196,7 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
188
196
189
197
In the Azure portal, a resource should be created with the name you provided in the preceding command.
190
198
191
-

199
+

192
200
193
201
1. To verify that Azure Arc is enabled successfully, run the following command from PowerShell interface:
0 commit comments