You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Hybrid/aks-edge-howto-connect-to-arc.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,21 +4,21 @@ description: Connect your AKS Edge Essentials clusters to Arc
4
4
author: rcheeran
5
5
ms.author: rcheeran
6
6
ms.topic: how-to
7
-
ms.date: 08/21/2024
7
+
ms.date: 09/27/2024
8
8
ms.custom: template-how-to
9
9
---
10
10
11
11
# Connect your AKS Edge Essentials cluster to Arc
12
12
13
-
This article describes how to connect your AKS Edge Essentials cluster to [Azure Arc](/azure/azure-arc/kubernetes/overview) so that you can monitor the health of your cluster on the Azure portal. If your cluster is connected to a proxy, you can use the scripts provided in the GitHub repo to connect your cluster to Arc [as described here.](./aks-edge-howto-more-configs.md)
13
+
This article describes how to connect your AKS Edge Essentials cluster to [Azure Arc](/azure/azure-arc/kubernetes/overview) so that you can monitor the health of your cluster on the Azure portal. If your cluster is connected to a proxy, you can use the scripts provided in the GitHub repo to connect your cluster to Arc [as described here](./aks-edge-howto-more-configs.md).
14
14
15
15
## Prerequisites
16
16
17
-
In addition to these prerequisites, be sure to meet all [network requirements for Azure Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/network-requirements).
18
-
19
-
- You need an Azure subscription with either the **Owner** role or a combination of **Contributor** and **User Access Administrator** roles. You can check your access level by navigating to your subscription on the Azure portal, selecting **Access control (IAM)** on the left-hand side of the Azure portal, and then selecting **View my access**. See [the Azure documentation](/azure/azure-resource-manager/management/manage-resource-groups-portal)for more information about managing resource groups.
20
-
-Enable all required resource providers in the Azure subscription, such as **Microsoft.HybridCompute**, **Microsoft.GuestConfiguration**, **Microsoft.HybridConnectivity**, **Microsoft.Kubernetes**, **Microsoft.ExtendedLocation**, and **Microsoft.KubernetesConfiguration**.
21
-
-Create and verify a resource group for AKS Edge Essentials Azure resources.
17
+
- Before connecting to Arc, infrastructure administrators who are the owner or contributor role of the subscription will have to:
18
+
1. Enable all required resource providers in the Azure subscription, such as **Microsoft.HybridCompute**, **Microsoft.GuestConfiguration**, **Microsoft.HybridConnectivity**, **Microsoft.Kubernetes**, **Microsoft.ExtendedLocation**, and **Microsoft.KubernetesConfiguration**.
19
+
1. Create and verify a resource group for AKS Edge Essentials Azure resources.
20
+
-To connect to Arc, Kubernetes operators need a [**Kubernetes Cluster - Azure Arc Onboarding**](/azure/role-based-access-control/built-in-roles/containers#kubernetes-cluster---azure-arc-onboarding) role for the identity at the resource group level. To disconnect from Arc, operators need an [**Azure Kubernetes Service Arc Contributor Role**](/azure/role-based-access-control/built-in-roles/containers#azure-kubernetes-service-arc-contributor-role) role for the identity at the resource group level. To check your access level, navigate to your subscription on the Azure portal, select **Access control (IAM)** on the left-hand side, and then select **View my access**. See [the Azure documentation](/azure/azure-resource-manager/management/manage-resource-groups-portal) for more information about managing resource groups. Infrastructure administrators with owner or contributor roles can also perform actions to connect or disconnect from Arc.
21
+
-In addition to these prerequisites, make sure you meet all [network requirements for Azure Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/network-requirements).
22
22
23
23
> [!NOTE]
24
24
> You need the **Contributor** role to be able to delete the resources within the resource group. Commands to disconnect from Arc will fail without this role assignment.
@@ -29,7 +29,7 @@ In addition to these prerequisites, be sure to meet all [network requirements fo
29
29
30
30
Run the following commands in an elevated PowerShell window to install the dependencies in PowerShell:
@@ -41,21 +41,21 @@ Provide details of your Azure subscription in the [**aksedge-config.json**](http
41
41
42
42
> [!IMPORTANT]
43
43
> Client secrets are a form of password. Proper management is critical to the security of your environment.
44
-
> * When you create the client secret, set a very short expiration time, based on the registration timing and scope for your deployment.
45
-
> * Be sure to protect the client secret value and the configuration file from general access.
46
-
> * Consider that if a cluster's configuration file is backed up while it has the client secret stored, the client secret is available to anyone with access to the backup.
47
-
> * Once you register a cluster, remove the client secret from the configuration file for that cluster.
48
-
> * Once you register all clusters in scope for your task, you should rotate the client secret and/or delete the service principal from your Microsoft Entra ID environment.
44
+
> - When you create the client secret, set a very short expiration time, based on the registration timing and scope for your deployment.
45
+
> - Be sure to protect the client secret value and the configuration file from general access.
46
+
> - Consider that if a cluster's configuration file is backed up while it has the client secret stored, the client secret is available to anyone with access to the backup.
47
+
> - Once you register a cluster, remove the client secret from the configuration file for that cluster.
48
+
> - Once you register all clusters in scope for your task, you should rotate the client secret and/or delete the service principal from your Microsoft Entra ID environment.
49
49
50
50
| Attribute | Value type | Description |
51
51
| :------------ |:-----------|:--------|
52
-
|`ClusterName`| string |Provide a name for your cluster. The default value is `hostname_cluster`. |
52
+
|`ClusterName`| string |The name of your cluster. The default value is `hostname_cluster`. |
53
53
|`Location`| string | The location of your resource group. Choose the location closest to your deployment. |
54
54
|`SubscriptionId`| GUID | Your subscription ID. In the Azure portal, select the subscription you're using and copy/paste the subscription ID string into the JSON. |
55
-
|`TenantId`| GUID | Your tenant ID. In the Azure portal, search Microsoft Entra ID, which should take you to the **Default Directory** page. From here, you can copy/paste the tenant ID string into the JSON. |
55
+
|`TenantId`| GUID | Your tenant ID. In the Azure portal, search **Microsoft Entra ID**, which should take you to the **Default Directory** page. From here, you can copy/paste the tenant ID string into the JSON. |
56
56
|`ResourceGroupName`| string | The name of the Azure resource group to host your Azure resources for AKS Edge Essentials. You can use an existing resource group, or if you add a new name, the system creates one for you. |
57
-
|`ClientId`| GUID | Provide the application ID of the Azure service principal to use as credentials. AKS Edge Essentials uses this service principal to connect your cluster to Arc. You can use the **App Registrations** page in the Microsoft Entra resource page on the Azure portal, to list and manage the service principals in a tenant. Be aware that the service principal requires the **Kubernetes Cluster - Azure Arc Onboarding** role at either the subscription or resource group level. For more information, see [Microsoft Entra identity requirements for service principals](/azure/azure-arc/kubernetes/system-requirements#microsoft-entra-identity-requirements). |
58
-
|`ClientSecret`| string |Provide the password for the service principal. |
57
+
|`ClientId`| GUID | Provide the application ID of the Azure service principal to use as credentials. AKS Edge Essentials uses this service principal to connect your cluster to Arc. You can use the **App Registrations** page in the Microsoft Entra resource page on the Azure portal to list and manage the service principals in a tenant. Be aware that the service principal requires the **Kubernetes Cluster - Azure Arc Onboarding** role at either the subscription or resource group level. For more information, see [Microsoft Entra identity requirements for service principals](/azure/azure-arc/kubernetes/system-requirements#microsoft-entra-identity-requirements). |
58
+
|`ClientSecret`| string |The password for the service principal. |
59
59
60
60
> [!NOTE]
61
61
> You only need to perform this configuration once per Azure subscription. You don't need to repeat the procedure for each Kubernetes cluster.
> This step can take up to 10 minutes and PowerShell may become stuck on **Establishing Azure Connected Kubernetes for `your cluster name`**. PowerShell outputs `True` and returns to the prompt when the process is complete.
73
+
> This step can take up to 10 minutes and PowerShell might become stuck on **Establishing Azure Connected Kubernetes for `your cluster name`**. PowerShell outputs `True` and returns to the prompt when the process is complete.
74
74
75
75
:::image type="content" source="media/aks-edge/aks-edge-ps-arc-connection.png" alt-text="Screenshot showing PowerShell prompt while connecting to Arc." lightbox="media/aks-edge/aks-edge-ps-arc-connection.png":::
Copy file name to clipboardExpand all lines: azure-stack/hci/update/azure-update-manager-23h2.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,9 +39,9 @@ For Azure Stack HCI, Azure Update Manager is supported only in the regions where
39
39
To browse for available cluster updates using Azure Update Manager, follow these steps:
40
40
41
41
1. Sign into [the Azure portal](https://portal.azure.com) and go to **Azure Update Manager**.
42
-
2. Under Manage Azure Stack HCI, select **Azure Stack HCI**.
43
-
- Filter by Subscription, Resource group, Location, Status, Update readiness, Current OS version, and/or Tags to view a list of clusters.
44
-
3. In the cluster list, view the clusters update status, update readiness, current OS version, and the date and time of the last successful update.
42
+
2. Under the **Resources** dropdown, select **Azure Stack HCI**.
43
+
- Filter by Subscription, Resource group, Location, Status, Update readiness, Current version, and/or Tags to view a list of clusters.
44
+
3. In the cluster list, view the clusters update Status, Update readiness, Current version, and the date and time of the Last successful update.
45
45
46
46
[](media/azure-update-manager/main-link.png#lightbox)
47
47
@@ -50,7 +50,7 @@ To browse for available cluster updates using Azure Update Manager, follow these
50
50
To install cluster updates using Azure Update Manager, follow these steps:
51
51
52
52
1. Sign into [the Azure portal](https://portal.azure.com) and go to **Azure Update Manager**.
53
-
2. Under Manage Azure Stack HCI, select **Azure Stack HCI**.
53
+
2. Under the **Resources** dropdown, select **Azure Stack HCI**.
54
54
3. Select one or more clusters from the list, then select **One-time Update**.
55
55
56
56
[](media/azure-update-manager/install-update.png#lightbox)
@@ -87,7 +87,7 @@ When you install cluster updates via Azure Update Manager, you can check the pro
87
87
To view the progress of your clusters, update installation, and completion results, follow these steps:
88
88
89
89
1. Sign into [the Azure portal](https://portal.azure.com) and go to **Azure Update Manager**.
90
-
2. Under Manage Azure Stack HCI, select **History**.
90
+
2. Under the **Manage** dropdown, select **History**.
91
91
3. Select an update run from the list with a status of **In Progress**.
92
92
93
93
[](media/azure-update-manager/update-in-progress.png#lightbox)
@@ -103,7 +103,7 @@ To view the progress of your clusters, update installation, and completion resul
103
103
To browse for your clusters update history, follow these steps:
104
104
105
105
1. Sign into [the Azure portal](https://portal.azure.com) and go to **Azure Update Manager**.
106
-
2. Under Manage Azure Stack HCI, select **History**.
106
+
2. Under the **Manage** dropdown, select **History**.
107
107
3. Select an update run with a status of “**Failed to update**” or “**Successfully updated**”.
108
108
109
109
[](media/azure-update-manager/update-history-progress.png#lightbox)
@@ -121,7 +121,7 @@ In addition to using Azure Update Manager, you can update individual Azure Stack
121
121
To install updates on a single cluster from the Azure Stack HCI cluster resource page, follow these steps:
122
122
123
123
1. Sign into [the Azure portal](https://portal.azure.com) and go to **Azure Update Manager**.
124
-
2. Under Manage Azure Stack HCI, select **Azure Stack HCI**.
124
+
2. Under the **Resources** dropdown, select **Azure Stack HCI**.
125
125
3. Select the cluster name from the list.
126
126
4. Select the update and then select **One-time update**.
0 commit comments