Skip to content

Commit 5563235

Browse files
committed
Updated sample output
1 parent d5c672f commit 5563235

File tree

1 file changed

+11
-21
lines changed

1 file changed

+11
-21
lines changed

azure-local/deploy/deployment-arc-register-server-permissions.md

Lines changed: 11 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -158,26 +158,20 @@ Before you begin, make sure you've completed the following prerequisites:
158158
```output
159159
PS C:\Users\Administrator> Invoke-AzStackHciArcInitialization -SubscriptionID $Subscription -ResourceGroup $RG -TenantID $Tenant -Region $Region -Cloud "AzureCloud" -ArmAccessToken $ARMtoken -AccountID $id
160160
>>
161-
Starting AzStackHci ArcIntegration Initialization
162-
Constructing node config using ARM Access Token
163-
Waiting for bootstrap to complete: InProgress
161+
Configuration saved to: C:\Users\ADMINI~1\AppData\Local\Temp\bootstrap.json
162+
Triggering bootstrap on the device...
163+
Waiting for bootstrap to complete... Current Status: InProgress
164164
=========SNIPPED=========SNIPPED=============
165-
Waiting for bootstrap to complete: InProgress
166-
Waiting for bootstrap to complete: InProgress
167-
Waiting for bootstrap to complete: Succeeded
168-
169-
Log location: C:\Users\Administrator\.AzStackHci\AzStackHciArcIntegration.log
170-
Version Response
171-
------- --------
165+
Waiting for bootstrap to complete... Current Status: InProgress
166+
Waiting for bootstrap to complete... Current Status: Succeeded
167+
Bootstrap succeeded.
168+
169+
Triggering bootstrap log collection as a best effort.
170+
Version Response
171+
------- --------
172172
V1 Microsoft.Azure.Edge.Bootstrap.ServiceContract.Data.Response
173173
V1 Microsoft.Azure.Edge.Bootstrap.ServiceContract.Data.Response
174-
Successfully triggered Arc boostrap support log collection. Waiting for 600 seconds to complete.
175-
Waiting for Arc bootstrap support logs to complete on '', retry count: 0.
176-
Arc bootstrap support log collection status is InProgress. Sleep for 10 seconds.
177-
Waiting for Arc bootstrap support logs to complete on '', retry count: 1.
178-
Arc bootstrap support log collection status is InProgress. Sleep for 10 seconds.
179-
Waiting for Arc bootstrap support logs to complete on '', retry count: 2.
180-
Arc boostrap support log collection completed successfully.
174+
181175
182176
PS C:\Users\Administrator>
183177
```
@@ -198,7 +192,6 @@ Before you begin, make sure you've completed the following prerequisites:
198192
> Once an Azure Local machine is registered with Azure Arc, the only way to undo the registration is to install the operating system again on the machine.
199193
200194
201-
202195
## Assign required permissions for deployment
203196
204197
This section describes how to assign Azure permissions for deployment from the Azure portal.
@@ -223,12 +216,9 @@ This section describes how to assign Azure permissions for deployment from the A
223216
- **Key Vault Contributor**: This permission is required to create the key vault used for deployment.
224217
- **Storage Account Contributor**: This permission is required to create the storage account used for deployment.
225218
226-
<!--:::image type="content" source="media/deployment-arc-register-server-permissions/add-role-assignment-3.png" alt-text="Screenshot of the review + Create tab in Add role assignment for Azure Local deployment." lightbox="./media/deployment-arc-register-server-permissions/add-role-assignment-3.png":::-->
227219
228220
1. In the right pane, go to **Role assignments**. Verify that the deployment user has all the configured roles.
229221
230-
<!--:::image type="content" source="media/deployment-arc-register-server-permissions/add-role-assignment-4.png" alt-text="Screenshot of the Current role assignment in Access control in resource group for Azure Local deployment." lightbox="./media/deployment-arc-register-server-permissions/add-role-assignment-4.png":::-->
231-
232222
1. In the Azure portal go to **Microsoft Entra Roles and Administrators** and assign the **Cloud Application Administrator** role permission at the Microsoft Entra tenant level.
233223
234224
:::image type="content" source="media/deployment-arc-register-server-permissions/cloud-application-administrator-role-at-tenant.png" alt-text="Screenshot of the Cloud Application Administrator permission at the tenant level." lightbox="./media/deployment-arc-register-server-permissions/cloud-application-administrator-role-at-tenant.png":::

0 commit comments

Comments
 (0)