Skip to content

Commit fadc6de

Browse files
committed
refresh topic and image
1 parent b7eb80a commit fadc6de

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/azure-arc/kubernetes/conceptual-custom-locations.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Custom Locations - Azure Arc-enabled Kubernetes"
3-
ms.date: 07/21/2022
3+
ms.date: 03/26/2024
44
ms.topic: conceptual
55
description: "This article provides a conceptual overview of the custom locations capability of Azure Arc-enabled Kubernetes"
66
---
@@ -11,25 +11,25 @@ As an extension of the Azure location construct, the *custom locations* feature
1111

1212
Similar to Azure locations, end users within the tenant who have access to Custom Locations can deploy resources there using their company's private compute.
1313

14-
[ ![Arc platform layers](./media/conceptual-arc-platform-layers.png) ](./media/conceptual-arc-platform-layers.png#lightbox)
14+
:::image type="content" source="media/conceptual-arc-platform-layers.png" alt-text="Diagram showing the Arc platform layers.":::
1515

16-
You can visualize custom locations as an abstraction layer on top of Azure Arc-enabled Kubernetes cluster, cluster connect, and cluster extensions. Custom locations create the granular [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) necessary for other Azure services to access the cluster. These other Azure services require cluster access to manage resources that the customer wants to deploy on their clusters.
16+
You can visualize custom locations as an abstraction layer on top of Azure Arc-enabled Kubernetes clusters, cluster connect, and cluster extensions. Custom locations create the granular [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) necessary for other Azure services to access the cluster. These other Azure services require cluster access to manage deployed resources.
1717

1818
## Architecture
1919

20-
When the admin [enables the custom locations feature on the cluster](custom-locations.md), a ClusterRoleBinding is created on the cluster, authorizing the Microsoft Entra application used by the custom locations resource provider. Once authorized, the custom locations resource provider can create ClusterRoleBindings or RoleBindings needed by other Azure resource providers to create custom resources on this cluster. The cluster extensions installed on the cluster determine the list of resource providers to authorize.
20+
When the admin [enables the custom locations feature on the cluster](custom-locations.md), a `ClusterRoleBinding` is created on the cluster, authorizing the Microsoft Entra application used by the custom locations resource provider. Once authorized, the custom locations resource provider can create `ClusterRoleBinding` or `RoleBinding` objects that are needed by other Azure resource providers to create custom resources on this cluster. The cluster extensions installed on the cluster determine the list of resource providers to authorize.
2121

22-
[ ![Use custom locations](./media/conceptual-custom-locations-usage.png) ](./media/conceptual-custom-locations-usage.png#lightbox)
22+
:::image type="content" source="media/conceptual-custom-locations-usage.png" alt-text="Diagram of custom locations architecture, using Arc-enabled data services as an example." lightbox="media/conceptual-custom-locations-usage.png":::
2323

2424
When the user creates a data service instance on the cluster:
2525

2626
1. The PUT request is sent to Azure Resource Manager.
27-
1. The PUT request is forwarded to the Azure Arc-enabled Data Services RP.
27+
1. The PUT request is forwarded to the Azure Arc-enabled data services resource provider.
2828
1. The RP fetches the `kubeconfig` file associated with the Azure Arc-enabled Kubernetes cluster on which the custom location exists.
2929
* Custom location is referenced as `extendedLocation` in the original PUT request.
30-
1. The Azure Arc-enabled Data Services resource provider uses the `kubeconfig` to communicate with the cluster to create a custom resource of the Azure Arc-enabled Data Services type on the namespace mapped to the custom location.
31-
* The Azure Arc-enabled Data Services operator was deployed via cluster extension creation before the custom location existed.
32-
1. The Azure Arc-enabled Data Services operator reads the new custom resource created on the cluster and creates the data controller, translating into realization of the desired state on the cluster.
30+
1. The Azure Arc-enabled data services resource provider uses the `kubeconfig` to communicate with the cluster to create a custom resource of the Azure Arc-enabled data services type on the namespace mapped to the custom location.
31+
* The Azure Arc-enabled data services operator was deployed via cluster extension creation before the custom location existed.
32+
1. The Azure Arc-enabled data services operator reads the new custom resource created on the cluster and creates the data controller, translating into realization of the desired state on the cluster.
3333

3434
The sequence of steps to create the SQL managed instance and PostgreSQL instance are identical to the sequence of steps described above.
3535

-392 KB
Loading

0 commit comments

Comments
 (0)