Skip to content

Commit be5cd62

Browse files
committed
Updated with SME changes for ASE 2503.
1 parent 5b2b691 commit be5cd62

File tree

1 file changed

+30
-8
lines changed

1 file changed

+30
-8
lines changed

articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md

Lines changed: 30 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: alkohli
66

77
ms.service: azure-stack-edge
88
ms.topic: how-to
9-
ms.date: 02/17/2022
9+
ms.date: 03/10/2025
1010
ms.author: alkohli
1111
---
1212

@@ -106,7 +106,28 @@ You can also register resource providers via the `az cli`. For more information,
106106
107107
1. Make a note of the `appID`, `name`, `password`, and `tenantID` as you'll use these values as input to the next command.
108108
109-
1. After creating the new service principal, assign the `Kubernetes Cluster - Azure Arc Onboarding` role to the newly created principal. This is a built-in Azure role (use the role ID in the command) with limited permissions. Use the following command:
109+
Note that there are several ways to obtain ‘appId’. If you use one of the following methods, you can skip steps 1, 2, and 3 from the previous section and move directly to the following step 4.
110+
111+
- Use Minishell to run the following PowerShell cmdlet:
112+
113+
```powershell
114+
Get-AzureDataBoxEdgeApplicationId
115+
```
116+
117+
- In Azure portal, navigate to your Azure Stack Edge device **Overview** and then at top right, select **JSON view**. You see **Resource JSON** details for your device. Make note of the `principalId` for your device.
118+
119+
<Include new screenshot from portal>
120+
![View JSON details for your Azure Stack Edge device](media/azure-stack-edge-gpu-connect-powershell-interface/view-json-details.png)
121+
122+
- Use non-Azure Stack Edge PowerShell on a client machine to run the following:
123+
124+
```powershell
125+
$ASEResource= GetAzResource –ResourceGroupName <resource-group-name> -ResourceName <resource-name>
126+
127+
$ASEResource.Identity.PrincipalId
128+
```
129+
130+
1. After you create the new service principal or create it using one of these methods, assign the `Kubernetes Cluster - Azure Arc Onboarding` role to the newly created principal. This is a built-in Azure role (use the role ID in the command) with limited permissions. Use the following command:
110131

111132
`az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee <appId-from-service-principal> --scope /subscriptions/<SubscriptionID>/resourceGroups/<Resource-group-name>`
112133

@@ -128,7 +149,6 @@ You can also register resource providers via the `az cli`. For more information,
128149
PS /home/user>
129150
```
130151
131-
132152
## Enable Arc on Kubernetes cluster
133153
134154
Follow these steps to configure the Kubernetes cluster for Azure Arc management:
@@ -139,14 +159,16 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
139159
140160
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
141161
142-
When this command is run, there's a follow-up prompt to enter the `ClientSecret`. Provide the service principal password.
162+
After you run this command, you see a follow-up prompt to specify `ClientSecret`. Provide the service principal password at the prompt.
143163
144164
Add the `CloudEnvironment` parameter if you're using a cloud other than Azure public. You can set this parameter to `AZUREPUBLICCLOUD`, `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, and `AZUREUSGOVERNMENTCLOUD`.
145165
146-
> [!NOTE]
147-
> - To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
148-
> - Use the `az account list-locations` command to figure out the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
149-
> - `ClientId` and `ClientSecret` are required.
166+
**Usage considerations**
167+
168+
- To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
169+
- Use the `az account list-locations` command to determine the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
170+
- `ClientId`, `TenantId`, and `ClientSecret` are optional.
171+
- If you assign a role to `appId`, do not specify `ClientId`, `TenantId`, and `ClientSecret`.
150172
151173
Here's an example:
152174

0 commit comments

Comments
 (0)