You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/connect-to-cloud/howto-configure-data-lake.md
+23-14Lines changed: 23 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,8 @@ Configure a data lake connector to connect to Microsoft Fabric OneLake using man
53
53
54
54
1. Ensure that IoT MQ Arc extension is installed and configured with managed identity.
55
55
56
+
1. In Azure portal, go to the Arc-connected Kubernetes cluster and select **Settings** > **Extensions**. In the extension list, look for your IoT MQ extension name. The name begins with `mq-` followed by five random characters. For example, *mq-4jgjs*.
57
+
56
58
1. Get the *app ID* associated to the IoT MQ Arc extension managed identity, and note down the GUID value. The *app ID* is different than the object or principal ID. You can use the Azure CLI by finding the object ID of the managed identity and then querying the app ID of the service principal associated to the managed identity. For example:
57
59
58
60
```bash
@@ -223,7 +225,7 @@ authentication:
223
225
224
226
Configure the data lake connector to send data to an Azure Data Explorer endpoint using managed identity.
225
227
226
-
### Deploy an Azure Data Explorer cluster
228
+
1. To deploy an Azure Data Explorer cluster, follow the **Full cluster** steps in the [Quickstart: Create an Azure Data Explorer cluster and database](/azure/data-explorer/create-cluster-database-portal&tabs=full).
227
229
228
230
1. To deploy an Azure Data Explorer cluster, follow the **Full cluster** steps in the [Quickstart: Create an Azure Data Explorer cluster and database](/azure/data-explorer/create-cluster-database-portal).
229
231
@@ -232,14 +234,14 @@ Configure the data lake connector to send data to an Azure Data Explorer endpoin
232
234
1. You can create a table for given data via the Azure portal and create columns manually, or you can use [KQL](/azure/data-explorer/kusto/management/create-table-command) in the query tab.
233
235
234
236
For example:
235
-
236
-
```kql
237
237
.create table thermostat (
238
238
externalAssetId: string,
239
239
assetName: string,
240
-
currentTemperature: real,
241
-
pressure: real,
242
-
mqttTopic: string,
240
+
CurrentTemperature: real,
241
+
Pressure: real,
242
+
MqttTopic: string,
243
+
Timestamp: datetime
244
+
)
243
245
timestamp: datetime
244
246
)
245
247
```
@@ -267,7 +269,7 @@ Deploy the broker as an ARC extension so that you get managed identity support.
267
269
268
270
In order for the connector to authenticate to Azure Data Explorer, you must add the managed identity to the Azure Data Explorer cluster.
269
271
270
-
1. In Azure portal, go to the Arc-connected Kubernetes cluster and select **Settings** > **Extensions**. In the extension list, look for the name of your MQ extension. The name begins with `mq-` followed by five random characters. For example, *mq-4jgjs*. The MQ extension name is the same as the MQ managed identity name.
272
+
1. In Azure portal, go to the Arc-connected Kubernetes cluster and select **Settings** > **Extensions**. In the extension list, look for the name of your IoT MQ extension. The name begins with `mq-` followed by five random characters. For example, *mq-4jgjs*. The IoT MQ extension name is the same as the MQ managed identity name.
271
273
1. In your Azure Data Explorer database, select **Permissions** > **Add** > **Ingestor**. Search for the MQ managed identity name and add it.
272
274
273
275
For more information on adding permissions, see [Manage Azure Data Explorer cluster permissions](/azure/data-explorer/manage-cluster-permissions).
@@ -280,31 +282,38 @@ Example deployment file for the Azure Data Explorer connector. Comments that beg
0 commit comments