Skip to content

Commit b311fbc

Browse files
Merge pull request #252786 from bwren/docs-editor/container-insights-enable-arc-1695681036
Update container-insights-enable-arc-enabled-clusters.md
2 parents f902910 + 610edcf commit b311fbc

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/azure-monitor/containers/container-insights-enable-arc-enabled-clusters.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ ms.reviewer: aul
2727
- Pre-requisites listed under the [generic cluster extensions documentation](../../azure-arc/kubernetes/extensions.md#prerequisites).
2828
- Log Analytics workspace. Azure Monitor Container Insights supports a Log Analytics workspace in the regions listed under Azure [products by region page](https://azure.microsoft.com/global-infrastructure/services/?regions=all&products=monitor). You can create your own workspace using [Azure Resource Manager](../logs/resource-manager-workspace.md), [PowerShell](../logs/powershell-workspace-configuration.md), or [Azure portal](../logs/quick-create-workspace.md).
2929
- [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role assignment on the Azure subscription containing the Azure Arc-enabled Kubernetes resource. If the Log Analytics workspace is in a different subscription, then [Log Analytics Contributor](../logs/manage-access.md#azure-rbac) role assignment is needed on the resource group containing the Log Analytics Workspace
30-
- To view the monitoring data, you need to have [Log Analytics Reader](../logs/manage-access.md#azure-rbac) role assignment on the Log Analytics workspace.
30+
- To view the monitoring data, you need to have [Monitoring Reader](../roles-permissions-security.md#monitoring-reader) or [Monitoring Contributor](../roles-permissions-security.md#monitoring-contributor) role.
3131
- The following endpoints need to be enabled for outbound access in addition to the [Azure Arc-enabled Kubernetes network requirements](../../azure-arc/kubernetes/network-requirements.md).
3232

3333
**Azure public cloud**
@@ -229,6 +229,7 @@ az k8s-extension create --name azuremonitor-containers --cluster-name <cluster-n
229229
az deployment group create --resource-group <resource-group> --template-file ./arc-k8s-azmon-extension-arm-template.json --parameters @./arc-k8s-azmon-extension-arm-template-params.json
230230
```
231231

232+
232233
---
233234

234235
## Verify extension installation status
@@ -244,6 +245,7 @@ Run the following command to show the latest status of the `Microsoft.AzureMonit
244245
az k8s-extension show --name azuremonitor-containers --cluster-name <cluster-name> --resource-group <resource-group> --cluster-type connectedClusters -n azuremonitor-containers
245246
```
246247

248+
247249
---
248250

249251
## Migrate to managed identity authentication
@@ -268,6 +270,7 @@ az k8s-extension create --name azuremonitor-containers --cluster-name \<cluster-
268270
## [Resource Manager](#tab/migrate-arm)
269271

270272

273+
271274
1. Download the template at [https://aka.ms/arc-k8s-azmon-extension-msi-arm-template](https://aka.ms/arc-k8s-azmon-extension-msi-arm-template) and save it as **arc-k8s-azmon-extension-msi-arm-template.json**.
272275

273276
2. Download the parameter file at [https://aka.ms/arc-k8s-azmon-extension-msi-arm-template-params](https://aka.ms/arc-k8s-azmon-extension-msi-arm-template) and save it as **arc-k8s-azmon-extension-msi-arm-template-params.json**.
@@ -285,6 +288,7 @@ az account set --subscription "Subscription Name"
285288
az deployment group create --resource-group <resource-group> --template-file ./arc-k8s-azmon-extension-msi-arm-template.json --parameters @./arc-k8s-azmon-extension-msi-arm-template-params.json
286289
```
287290

291+
288292
---
289293

290294
## Delete extension instance

0 commit comments

Comments
 (0)