You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure Arc enabled Kubernetes consists of a few agents (operators) that run in your cluster deployed to the `azure-arc` namespace.
196
196
197
-
*`deploy/config-agent`: watches the connected cluster for source control configuration resources applied on the cluster and updates compliance state
198
-
*`deploy/controller-manager`: is an operator of operators and orchestrates interactions between Azure Arc components
197
+
*`deployment.apps/config-agent`: watches the connected cluster for source control configuration resources applied on the cluster and updates compliance state
198
+
*`deployment.apps/controller-manager`: is an operator of operators and orchestrates interactions between Azure Arc components
199
+
*`deployment.apps/metrics-agent`: collects metrics of other Arc agents to ensure that these agents are exhibiting optimal performance
200
+
*`deployment.apps/cluster-metadata-operator`: gathers cluster metadata - cluster version, node count and Arc agent version
201
+
*`deployment.apps/resource-sync-agent`: syncs the above mentioned cluster metadata to Azure
202
+
*`deployment.apps/clusteridentityoperator`: maintains the managed service identity (MSI) certificate used by other agents for communication with Azure
203
+
*`deployment.apps/flux-logs-agent`: collects logs from the flux operators deployed as a part of source control configuration
When a cluster is onboarded to Azure, the agents running in your cluster must authenticate to Azure Resource Manager as part of registration. The `connectedk8s` Azure CLI extension has automated Service Principal creation. However, there may be a few scenarios where the CLI automation does not work:
18
+
It is possible to use service principals having a role assignment with limited privileges for onboarding Kubernetes clusters to Azure Arc. This is useful in continuous integration and continuous deployment (CI/CD) pipelines like Azure Pipelines and GitHub Actions.
19
19
20
-
* Your organization generally restricts the creation of Service Principals
21
-
* The user onboarding the cluster does not have sufficient permissions to create Service Principals
22
-
23
-
Instead, let's create the Service Principal out of band, and then pass the principal to the Azure CLI extension.
20
+
The following steps provide a walkthrough on using service principals for onboarding Kubernetes clusters to Azure Arc.
24
21
25
22
## Create a new Service Principal
26
23
@@ -59,7 +56,7 @@ Permissions may be further limited by passing in the appropriate `--scope` argum
59
56
az role assignment create \
60
57
--role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 \ # this is the id for the built-in role
61
58
--assignee 22cc2695-54b9-49c1-9a73-2269592103d8 \ # use the appId from the new SP
62
-
--scope /subscriptions/<<SUBSCRIPTION_ID>> # apply the apropriate scope
59
+
--scope /subscriptions/<<SUBSCRIPTION_ID>> # apply the appropriate scope
All Pods should show `STATUS` as `Running` and `READY` should be either `2/2` or `1/1`. Fetch logs and describe pods that are returning `Error` or `CrashLoopBackOff`.
68
+
All Pods should show `STATUS` as `Running` and `READY` should be either `3/3` or `2/2`. Fetch logs and describe pods that are returning `Error` or `CrashLoopBackOff`.
63
69
64
70
## Unable to connect my Kubernetes cluster to Azure
65
71
@@ -93,54 +99,6 @@ This operation might take a while...
93
99
There was a problem with connect-agent deployment. Please run 'kubectl -n azure-arc logs -l app.kubernetes.io/component=connect-agent -c connect-agent' to debug the error.
Connect agent logs all errors communicating with Azure and the local Kubernetes API server as standard pod logs. Fetch the logs using `kubectl` to debug.
Copy file name to clipboardExpand all lines: articles/cosmos-db/policy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Use Azure Policy to implement governance and controls for Azure Cosmos DB resources
3
-
description: Learn how to use Azure Policy to implement governance and controls for Cosmos DB resources.
3
+
description: Learn how to use Azure Policy to implement governance and controls for Azure Cosmos DB resources.
4
4
author: plzm
5
5
ms.author: paelaz
6
6
ms.service: cosmos-db
@@ -28,7 +28,7 @@ At the step to select a policy definition, enter `Cosmos DB` in the Search field
28
28
> [!TIP]
29
29
> You can also use the built-in policy definition names shown in the **Available Definitions** pane with Azure PowerShell, Azure CLI, or ARM templates to create policy assignments.
30
30
31
-
:::image type="content" source="./media/policy/available-definitions.png" alt-text="Search for Cosmos DB built-in policy definitions":::
31
+
:::image type="content" source="./media/policy/available-definitions.png" alt-text="Search for Azure Cosmos DB built-in policy definitions":::
32
32
33
33
## Create a custom policy definition
34
34
@@ -111,7 +111,7 @@ The screenshot shows the following compliance evaluation results:
111
111
- Zero out of one Azure Cosmos DB accounts in the specified scope are compliant with the policy assignment to check that resources were deployed to allowed regions.
112
112
- One out of two Azure Cosmos DB database or collection resources in the specified scope are compliant with the policy assignment to check for provisioned throughput exceeding the specified maximum limit.
113
113
114
-
:::image type="content" source="./media/policy/compliance.png" alt-text="Search for Cosmos DB built-in policy definitions":::
114
+
:::image type="content" source="./media/policy/compliance.png" alt-text="Search for Azure Cosmos DB built-in policy definitions":::
115
115
116
116
To remediate the non-compliant resources, see the [remediated with Azure Policy](../governance/policy/how-to/remediate-resources.md) article.
Copy file name to clipboardExpand all lines: articles/synapse-analytics/overview-faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ A: Azure Synapse is an integrated data platform for BI, AI, and continuous intel
31
31
### Q: How do I get started with Azure Synapse Analytics
32
32
33
33
A: To start using Azure Synapse Analytics, [register Azure Synapse resource provider](https://docs.microsoft.com/azure/azure-resource-manager/management/resource-providers-and-types) by selecting *Microsoft.Synapse* from the list of resource providers. Then create a [Synapse workspace](https://portal.azure.com) (it's free!) and create the resources that you want under that workspace. You can follow one of our quickstart tutorials, such as [Create a Synapse SQL pool](quickstart-create-sql-pool-portal.md) or [Create a workspace](quickstart-create-workspace.md), that will walk you through simple use case.
34
-
You can also find sample notebooks and SQL scripts in our [repository](https://github.com/Azure/azure-synapse-analytics/tree/master/samples). If you need to connect to a public dataset, create a new linked service with the following attributes:
34
+
You can also find sample notebooks and SQL scripts in our [repository](https://github.com/Azure-Samples/Synapse). If you need to connect to a public dataset, create a new linked service with the following attributes:
0 commit comments