You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Hybrid/aks-edge-howto-deploy-azure-iot.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,25 +1,25 @@
1
1
---
2
2
title: Azure IoT Operations with AKS Edge Essentials
3
-
description: Learn how to use Azure IoT Operations with AKS Edge Essentials.
3
+
description: Learn how to run the quickstart script that creates an Arc-enabled AKS Edge Essentials Kubernetes cluster that can run Azure IoT Operations.
4
4
author: rcheeran
5
5
ms.author: rcheeran
6
6
ms.topic: how-to
7
7
ms.date: 10/23/2024
8
8
ms.custom: template-how-to
9
9
---
10
10
11
-
# Deploy Azure IoT Operations on AKS Edge Essentials
11
+
# Create and configure an AKS Edge Essentials cluster that can run Azure IoT Operations
12
12
13
-
[Azure IoT Operations](/azure/iot-operations/overview-iot-operations) requires an Arc-enabled Kubernetes cluster. You can use AKS Edge Essentials to create a Microsoft-managed Kubernetes cluster and deploy Azure IoT Operations on it, as a workload. This article describes the steps to run a script that creates an AKS Edge Essentials Kubernetes cluster with the required configuration applicable for Azure IoT Operations.
13
+
Azure Kubernetes Service (AKS) Edge Essentials is one of the supported cluster platforms for [Azure IoT Operations](/azure/iot-operations/overview-iot-operations). You can use AKS Edge Essentials to create a Microsoft-managed Kubernetes cluster and deploy Azure IoT Operations on it as a workload. This article describes the steps to run a script that creates an AKS Edge Essentials Kubernetes cluster with the required configurations for Azure IoT Operations and then connects that cluster to Azure Arc.
14
14
15
15
> [!NOTE]
16
-
> Azure IoT Operations is generally available on AKS Edge Essentials when deployed on single machine clusters. Deploying clusters on multiple machines is an experimental feature.
16
+
> Azure IoT Operations supports AKS Edge Essentials when deployed on single machine clusters. Deploying clusters on multiple machines is an experimental feature.
17
17
18
18
## Prerequisites for running the script
19
19
20
20
To run the script, you need the following prerequisites:
21
21
22
-
- An Azure subscription with either the **Owner** role or a combination of **Contributor** and **User Access Administrator** roles. You can check your access level by navigating to your subscription, selecting **Access control (IAM)** on the left-hand side of the Azure portal, and then selecting **View my access**. For more information about managing resource groups, see the [Azure Resource Manager documentation](/azure/azure-resource-manager/management/manage-resource-groups-portal). If you don't have an Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
22
+
- An Azure subscription with either the **Owner** role or a combination of **Contributor** and **User Access Administrator** roles. You can check your access level by navigating to your subscription, selecting **Access control (IAM)** on the left-hand side of the Azure portal, and then selecting **View my access**. If you don't have an Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
23
23
- Azure CLI version 2.64.0 or newer installed on your development machine. Use `az --version` to check your version and `az upgrade` to update if necessary. For more information, see [How to install the Azure CLI](/cli/azure/install-azure-cli).
24
24
- Install the latest version of the following extensions for Azure CLI:
25
25
@@ -28,17 +28,17 @@ To run the script, you need the following prerequisites:
28
28
az extension add --upgrade --name connectedk8s
29
29
```
30
30
31
-
- Hardware requirements: ensure that your machine has a minimum of 16-GB available RAM, 8 available vCPUs, and 52-GB free disk space reserved for Azure IoT Operations.
32
-
- If you deploy Azure IoT Operations to a multi-node cluster with fault tolerance enabled, review the hardware and storage requirements in [Prepare Linux for Edge Volumes](/azure/azure-arc/container-storage/prepare-linux-edge-volumes).
31
+
- Hardware requirements: ensure that your machine has a minimum of 16-GB available RAM, 4 available vCPUs, and 52-GB free disk space reserved for Azure IoT Operations.
33
32
34
-
## Create an AKS Edge Essentials cluster for Azure IoT Operations
33
+
## Create an Arc-enabled cluster
35
34
36
35
The [AksEdgeQuickStartForAio.ps1](https://github.com/Azure/AKS-Edge/blob/main/tools/scripts/AksEdgeQuickStart/AksEdgeQuickStartForAio.ps1) script automates the process of creating and connecting a cluster, and is the recommended path for deploying Azure IoT Operations on AKS Edge Essentials. The script performs the following tasks:
37
36
38
37
- Downloads the latest [AKS Edge Essentials MSI from this repo](https://github.com/Azure/aks-edge).
39
38
- Installs AKS Edge Essentials, and deploys and creates a single machine Kubernetes cluster on your Windows machine.
40
39
- Connects to the Azure subscription, creates a resource group if it doesn't already exist, and connects the cluster to Arc to create an Arc-enabled Kubernetes cluster.
41
40
- Enables the custom location feature on the Arc-enabled Kubernetes cluster.
41
+
- Enables the workload identity federation feature on the Arc-enabled Kubernetes cluster.
42
42
- Deploys the local path provisioning.
43
43
- Configures firewall rules on the host Windows machine for the MQTT broker.
44
44
- On the Linux VM, which serves as the Kubernetes control plane node:
@@ -47,7 +47,7 @@ The [AksEdgeQuickStartForAio.ps1](https://github.com/Azure/AKS-Edge/blob/main/to
47
47
-`sudo iptables -A INPUT -p tcp -m state --state NEW -m tcp --dport 9110 -j ACCEPT`
After you download the script, perform the following steps:
50
+
To run the quickstart script, perform the following steps:
51
51
52
52
1. Open an elevated PowerShell window and change the directory to a working folder.
53
53
1. Get the `objectId` of the Microsoft Entra ID application that the Azure Arc service uses in your tenant. Run the following command exactly as written, without changing the GUID value.
@@ -71,20 +71,20 @@ After you download the script, perform the following steps:
71
71
|SUBSCRIPTION_ID | The ID of your Azure subscription. If you don't know your subscription ID, see [Find your Azure subscription](/azure/azure-portal/get-subscription-tenant-id#find-your-azure-subscription). |
72
72
|TENANT_ID | The ID of your Microsoft Entra tenant. If you don't know your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant). |
73
73
|RESOURCE_GROUP_NAME | The name of an existing resource group or a name for a new resource group to be created. |
74
-
|LOCATION | An Azure region close to you. For the list of currently supported Azure regions, see [Supported regions](/azure/iot-operations/overview-iot-operations#supported-regions). |
74
+
|LOCATION | An Azure region close to you. For the list of Azure IoT Operations's supported Azure regions, see [Supported regions](/azure/iot-operations/overview-iot-operations#supported-regions). |
75
75
|CLUSTER_NAME | A name for the new cluster to be created. |
76
76
|ARC_APP_OBJECT_ID | The object ID value that you retrieved in step 2. |
77
77
78
-
If there are issues during deployment; for example, if your machine reboots as part of this process, run the set of commands again.
78
+
If there are issues during deployment, like if your machine reboots as part of this process, run the set of commands again.
79
79
80
-
Run the following commands to check that the deployment was successful:
80
+
1.Run the following commands to check that the deployment was successful:
81
81
82
-
```powershell
83
-
Import-Module AksEdge
84
-
Get-AksEdgeDeploymentInfo
85
-
```
82
+
```powershell
83
+
Import-Module AksEdge
84
+
Get-AksEdgeDeploymentInfo
85
+
```
86
86
87
-
In the output of the `Get-AksEdgeDeploymentInfo` command, you should see that the cluster's Arc status is **Connected**.
87
+
In the output of the `Get-AksEdgeDeploymentInfo` command, you should see that the cluster's Arc status is **Connected**.
Copy file name to clipboardExpand all lines: AKS-Hybrid/connect-to-arc.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,7 @@ Make sure the service principal used in this command has the Owner role assigned
100
100
If you want to enable custom locations on your cluster along with Azure Arc, run the following command to get the object ID of the custom location application, and then connect to Azure Arc using a service principal:
Obtain the Application ID of the Arc extension by running [az ad sp list](/cli/azure/ad/sp#az-ad-sp-list). In order to run the following command, you must be a `user` member of your Azure tenant. For more information about user and guest membership, see [default user permissions in Microsoft Entra ID](/entra/fundamentals/users-default-permissions).
84
84
85
85
```azurecli
86
-
$objID = az ad sp list --filter "appId eq '087fca6e-4606-4d41-b3f6-5ebdf75b8b4c'" --query "[].id" --output tsv
86
+
$objID = az ad sp list --filter "appId eq '00001111-aaaa-2222-bbbb-3333cccc4444'" --query "[].id" --output tsv
87
87
```
88
88
89
89
Once you have the $objID, you can install the MetalLB Arc extension on your Kubernetes cluster. To run the below command, you need to have [**Kubernetes extension contributor**](/azure/role-based-access-control/built-in-roles/containers#kubernetes-extension-contributor) role.
Copy file name to clipboardExpand all lines: azure-stack/hci/manage/monitor-hci-single-23h2.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,7 +183,7 @@ Provides health faults on a cluster.
183
183
|--|--|--|--|
184
184
| Fault | A short description of health faults. On clicking the link, a side panel opens with more information. | No unit | PoolCapacityThresholdExceeded |
185
185
| Faulting resource type | The type of resource that encountered a fault. | No unit | StoragePool |
186
-
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {1245340c-780b-4afc-af3c-f9bdc4b12f8a}: SP:{c57f23d1-d784-4a42-8b59-4edd8e70e830} |
186
+
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1}: SP:{b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2} |
187
187
| Severity | Severity of fault could be warning or critical. | No unit | Warning |
188
188
| Initial fault time | Timestamp of when server was last updated. | Datetime | 4/9/2022, 12:15:42 PM |
Copy file name to clipboardExpand all lines: azure-stack/hci/manage/monitor-hci-single.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -482,7 +482,7 @@ Provides health faults on a cluster.
482
482
|--|--|--|--|
483
483
| Fault | A short description of health faults. On clicking the link, a side panel opens with more information. | No unit | PoolCapacityThresholdExceeded |
484
484
| Faulting resource type | The type of resource that encountered a fault. | No unit | StoragePool |
485
-
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {1245340c-780b-4afc-af3c-f9bdc4b12f8a}: SP:{c57f23d1-d784-4a42-8b59-4edd8e70e830} |
485
+
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1}: SP:{b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2} |
486
486
| Severity | Severity of fault could be warning or critical. | No unit | Warning |
487
487
| Initial fault time | Timestamp of when server was last updated. | Datetime | 4/9/2022, 12:15:42 PM |
Copy file name to clipboardExpand all lines: azure-stack/hci/manage/troubleshoot-arc-enabled-vms.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ This section describes the errors related to Azure Arc VM management and their r
22
22
23
23
When trying to run the command to enable guest management, you see the following error:
24
24
25
-
**Error:**`Deployment failed. Correlation ID: 5d0c4921-78e0-4493-af16-dffee5cbf9d8. VM Spec validation failed for guest agent provisioning: Invalid managed identity. A system-assigned managed identity must be enabled in parent resource: Invalid Configuration`
25
+
**Error:**`Deployment failed. Correlation ID: aaaa0000-bb11-2222-33cc-444444dddddd. VM Spec validation failed for guest agent provisioning: Invalid managed identity. A system-assigned managed identity must be enabled in parent resource: Invalid Configuration`
26
26
27
27
This failure is because the managed identity wasn't created for this VM. System-assigned Managed Identity is required to enable guest management.
0 commit comments