You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md
+30-8Lines changed: 30 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: alkohli
6
6
7
7
ms.service: azure-stack-edge
8
8
ms.topic: how-to
9
-
ms.date: 02/17/2022
9
+
ms.date: 03/10/2025
10
10
ms.author: alkohli
11
11
---
12
12
@@ -106,7 +106,28 @@ You can also register resource providers via the `az cli`. For more information,
106
106
107
107
1. Make a note of the `appID`, `name`, `password`, and `tenantID` as you'll use these values as input to the next command.
108
108
109
-
1. After creating the new service principal, assign the `Kubernetes Cluster - Azure Arc Onboarding` role to the newly created principal. This is a built-in Azure role (use the role ID in the command) with limited permissions. Use the following command:
109
+
Note that there are several ways to obtain ‘appId’. If you use one of the following methods, you can skip steps 1, 2, and 3 from the previous section and move directly to the following step 4.
110
+
111
+
- Use Minishell to run the following PowerShell cmdlet:
112
+
113
+
```powershell
114
+
Get-AzureDataBoxEdgeApplicationId
115
+
```
116
+
117
+
- In Azure portal, navigate to your Azure Stack Edge device **Overview** and then at top right, select **JSON view**. You see **Resource JSON** details for your device. Make note of the `principalId` for your device.
118
+
119
+
<Includenewscreenshotfromportal>
120
+

121
+
122
+
- Use non-Azure Stack Edge PowerShell on a client machine to run the following:
1. After you create the new service principal or create it using one of these methods, assign the `Kubernetes Cluster - Azure Arc Onboarding` role to the newly created principal. This is a built-in Azure role (use the role ID in the command) with limited permissions. Use the following command:
110
131
111
132
`az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee <appId-from-service-principal> --scope /subscriptions/<SubscriptionID>/resourceGroups/<Resource-group-name>`
112
133
@@ -128,7 +149,6 @@ You can also register resource providers via the `az cli`. For more information,
128
149
PS /home/user>
129
150
```
130
151
131
-
132
152
## Enable Arc on Kubernetes cluster
133
153
134
154
Follow these steps to configure the Kubernetes cluster for Azure Arc management:
@@ -139,14 +159,16 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
139
159
140
160
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
141
161
142
-
When this command is run, there's a follow-up prompt to enter the `ClientSecret`. Provide the service principal password.
162
+
After you run this command, you see a follow-up prompt to specify `ClientSecret`. Provide the service principal password at the prompt.
143
163
144
164
Add the `CloudEnvironment` parameter if you're using a cloud other than Azure public. You can set this parameter to `AZUREPUBLICCLOUD`, `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, and `AZUREUSGOVERNMENTCLOUD`.
145
165
146
-
> [!NOTE]
147
-
> - To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
148
-
> - Use the `az account list-locations` command to figure out the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
149
-
> - `ClientId` and `ClientSecret` are required.
166
+
**Usage considerations**
167
+
168
+
- To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
169
+
- Use the `az account list-locations` command to determine the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
170
+
- `ClientId`, `TenantId`, and `ClientSecret` are optional.
171
+
- If you assign a role to `appId`, do not specify `ClientId`, `TenantId`, and `ClientSecret`.
0 commit comments