Skip to content

Commit fe2226c

Browse files
authored
Sync release-hotfixes with main
Sync release-hotfixes with main
2 parents 9cb2cb6 + 732e8e9 commit fe2226c

23 files changed

+80
-81
lines changed

AKS-Hybrid/aks-edge-howto-deploy-azure-iot.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,25 @@
11
---
22
title: Azure IoT Operations with AKS Edge Essentials
3-
description: Learn how to use Azure IoT Operations with AKS Edge Essentials.
3+
description: Learn how to run the quickstart script that creates an Arc-enabled AKS Edge Essentials Kubernetes cluster that can run Azure IoT Operations.
44
author: rcheeran
55
ms.author: rcheeran
66
ms.topic: how-to
77
ms.date: 10/23/2024
88
ms.custom: template-how-to
99
---
1010

11-
# Deploy Azure IoT Operations on AKS Edge Essentials
11+
# Create and configure an AKS Edge Essentials cluster that can run Azure IoT Operations
1212

13-
[Azure IoT Operations](/azure/iot-operations/overview-iot-operations) requires an Arc-enabled Kubernetes cluster. You can use AKS Edge Essentials to create a Microsoft-managed Kubernetes cluster and deploy Azure IoT Operations on it, as a workload. This article describes the steps to run a script that creates an AKS Edge Essentials Kubernetes cluster with the required configuration applicable for Azure IoT Operations.
13+
Azure Kubernetes Service (AKS) Edge Essentials is one of the supported cluster platforms for [Azure IoT Operations](/azure/iot-operations/overview-iot-operations). You can use AKS Edge Essentials to create a Microsoft-managed Kubernetes cluster and deploy Azure IoT Operations on it as a workload. This article describes the steps to run a script that creates an AKS Edge Essentials Kubernetes cluster with the required configurations for Azure IoT Operations and then connects that cluster to Azure Arc.
1414

1515
> [!NOTE]
16-
> Azure IoT Operations is generally available on AKS Edge Essentials when deployed on single machine clusters. Deploying clusters on multiple machines is an experimental feature.
16+
> Azure IoT Operations supports AKS Edge Essentials when deployed on single machine clusters. Deploying clusters on multiple machines is an experimental feature.
1717
1818
## Prerequisites for running the script
1919

2020
To run the script, you need the following prerequisites:
2121

22-
- An Azure subscription with either the **Owner** role or a combination of **Contributor** and **User Access Administrator** roles. You can check your access level by navigating to your subscription, selecting **Access control (IAM)** on the left-hand side of the Azure portal, and then selecting **View my access**. For more information about managing resource groups, see the [Azure Resource Manager documentation](/azure/azure-resource-manager/management/manage-resource-groups-portal). If you don't have an Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
22+
- An Azure subscription with either the **Owner** role or a combination of **Contributor** and **User Access Administrator** roles. You can check your access level by navigating to your subscription, selecting **Access control (IAM)** on the left-hand side of the Azure portal, and then selecting **View my access**. If you don't have an Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2323
- Azure CLI version 2.64.0 or newer installed on your development machine. Use `az --version` to check your version and `az upgrade` to update if necessary. For more information, see [How to install the Azure CLI](/cli/azure/install-azure-cli).
2424
- Install the latest version of the following extensions for Azure CLI:
2525

@@ -28,17 +28,17 @@ To run the script, you need the following prerequisites:
2828
az extension add --upgrade --name connectedk8s
2929
```
3030

31-
- Hardware requirements: ensure that your machine has a minimum of 16-GB available RAM, 8 available vCPUs, and 52-GB free disk space reserved for Azure IoT Operations.
32-
- If you deploy Azure IoT Operations to a multi-node cluster with fault tolerance enabled, review the hardware and storage requirements in [Prepare Linux for Edge Volumes](/azure/azure-arc/container-storage/prepare-linux-edge-volumes).
31+
- Hardware requirements: ensure that your machine has a minimum of 16-GB available RAM, 4 available vCPUs, and 52-GB free disk space reserved for Azure IoT Operations.
3332

34-
## Create an AKS Edge Essentials cluster for Azure IoT Operations
33+
## Create an Arc-enabled cluster
3534

3635
The [AksEdgeQuickStartForAio.ps1](https://github.com/Azure/AKS-Edge/blob/main/tools/scripts/AksEdgeQuickStart/AksEdgeQuickStartForAio.ps1) script automates the process of creating and connecting a cluster, and is the recommended path for deploying Azure IoT Operations on AKS Edge Essentials. The script performs the following tasks:
3736

3837
- Downloads the latest [AKS Edge Essentials MSI from this repo](https://github.com/Azure/aks-edge).
3938
- Installs AKS Edge Essentials, and deploys and creates a single machine Kubernetes cluster on your Windows machine.
4039
- Connects to the Azure subscription, creates a resource group if it doesn't already exist, and connects the cluster to Arc to create an Arc-enabled Kubernetes cluster.
4140
- Enables the custom location feature on the Arc-enabled Kubernetes cluster.
41+
- Enables the workload identity federation feature on the Arc-enabled Kubernetes cluster.
4242
- Deploys the local path provisioning.
4343
- Configures firewall rules on the host Windows machine for the MQTT broker.
4444
- On the Linux VM, which serves as the Kubernetes control plane node:
@@ -47,7 +47,7 @@ The [AksEdgeQuickStartForAio.ps1](https://github.com/Azure/AKS-Edge/blob/main/to
4747
- `sudo iptables -A INPUT -p tcp -m state --state NEW -m tcp --dport 9110 -j ACCEPT`
4848
- `sudo iptables -A INPUT -p tcp --dport (10124, 8420, 2379, 50051) -j ACCEPT`
4949

50-
After you download the script, perform the following steps:
50+
To run the quickstart script, perform the following steps:
5151

5252
1. Open an elevated PowerShell window and change the directory to a working folder.
5353
1. Get the `objectId` of the Microsoft Entra ID application that the Azure Arc service uses in your tenant. Run the following command exactly as written, without changing the GUID value.
@@ -71,20 +71,20 @@ After you download the script, perform the following steps:
7171
|SUBSCRIPTION_ID | The ID of your Azure subscription. If you don't know your subscription ID, see [Find your Azure subscription](/azure/azure-portal/get-subscription-tenant-id#find-your-azure-subscription). |
7272
|TENANT_ID | The ID of your Microsoft Entra tenant. If you don't know your tenant ID, see [Find your Microsoft Entra tenant](/azure/azure-portal/get-subscription-tenant-id#find-your-microsoft-entra-tenant). |
7373
|RESOURCE_GROUP_NAME | The name of an existing resource group or a name for a new resource group to be created. |
74-
|LOCATION | An Azure region close to you. For the list of currently supported Azure regions, see [Supported regions](/azure/iot-operations/overview-iot-operations#supported-regions). |
74+
|LOCATION | An Azure region close to you. For the list of Azure IoT Operations's supported Azure regions, see [Supported regions](/azure/iot-operations/overview-iot-operations#supported-regions). |
7575
|CLUSTER_NAME | A name for the new cluster to be created. |
7676
|ARC_APP_OBJECT_ID | The object ID value that you retrieved in step 2. |
7777

78-
If there are issues during deployment; for example, if your machine reboots as part of this process, run the set of commands again.
78+
If there are issues during deployment, like if your machine reboots as part of this process, run the set of commands again.
7979

80-
Run the following commands to check that the deployment was successful:
80+
1. Run the following commands to check that the deployment was successful:
8181

82-
```powershell
83-
Import-Module AksEdge
84-
Get-AksEdgeDeploymentInfo
85-
```
82+
```powershell
83+
Import-Module AksEdge
84+
Get-AksEdgeDeploymentInfo
85+
```
8686

87-
In the output of the `Get-AksEdgeDeploymentInfo` command, you should see that the cluster's Arc status is **Connected**.
87+
In the output of the `Get-AksEdgeDeploymentInfo` command, you should see that the cluster's Arc status is **Connected**.
8888

8989
## Verify your cluster
9090

AKS-Hybrid/connect-to-arc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Make sure the service principal used in this command has the Owner role assigned
100100
If you want to enable custom locations on your cluster along with Azure Arc, run the following command to get the object ID of the custom location application, and then connect to Azure Arc using a service principal:
101101

102102
```powershell
103-
$objectID = (Get-AzADServicePrincipal -ApplicationId "bc313c14-388c-4e7d-a58e-70017303ee3b").Id
103+
$objectID = (Get-AzADServicePrincipal -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444").Id
104104
Enable-AksHciArcConnection -name $clusterName -subscriptionId $subscriptionId -resourceGroup $resourceGroup -credential $Credential -tenantId $tenantId -location -customLocationsOid $objectID
105105
```
106106

AKS-Hybrid/deploy-load-balancer-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Microsoft.KubernetesRuntime RegistrationRequired Registered
8383
Obtain the Application ID of the Arc extension by running [az ad sp list](/cli/azure/ad/sp#az-ad-sp-list). In order to run the following command, you must be a `user` member of your Azure tenant. For more information about user and guest membership, see [default user permissions in Microsoft Entra ID](/entra/fundamentals/users-default-permissions).
8484

8585
```azurecli
86-
$objID = az ad sp list --filter "appId eq '087fca6e-4606-4d41-b3f6-5ebdf75b8b4c'" --query "[].id" --output tsv
86+
$objID = az ad sp list --filter "appId eq '00001111-aaaa-2222-bbbb-3333cccc4444'" --query "[].id" --output tsv
8787
```
8888

8989
Once you have the $objID, you can install the MetalLB Arc extension on your Kubernetes cluster. To run the below command, you need to have [**Kubernetes extension contributor**](/azure/role-based-access-control/built-in-roles/containers#kubernetes-extension-contributor) role.

AKS-Hybrid/reference/ps/set-akshciregistration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Registers AKS hybrid with Azure.
3939
### Register AKS hybrid using a subscription ID and resource group name
4040

4141
```powershell
42-
Set-AksHciRegistration -subscriptionId 57ac26cf-a9f0-4908-b300-9a4e9a0fb205 -resourceGroupName myresourcegroup
42+
Set-AksHciRegistration -subscriptionId aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -resourceGroupName myresourcegroup
4343
```
4444

4545
### Register with a device login or while running in a headless shell

azure-managed-lustre/create-file-system-resource-manager.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -187,23 +187,23 @@ This section shows example contents for a JSON template file. You can remove opt
187187
"identity": {
188188
"type": "UserAssigned",
189189
"userAssignedIdentities": {
190-
"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<identity-name>": {}
190+
"/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<identity-name>": {}
191191
}
192192
},
193193
"properties": {
194194
"encryptionSettings": {
195195
"keyEncryptionKey": {
196196
"keyUrl": "https://<keyvault-name>.vault.azure.net/keys/kvk/<key>",
197197
"sourceVault": {
198-
"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>"
198+
"id": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>"
199199
}
200200
}
201201
},
202-
"filesystemSubnet": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Network/virtualNetworks/<vnet-name>/subnets/<subnet-name>",
202+
"filesystemSubnet": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Network/virtualNetworks/<vnet-name>/subnets/<subnet-name>",
203203
"hsm": {
204204
"settings": {
205-
"container": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>",
206-
"loggingContainer": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<logging-container-name>",
205+
"container": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>",
206+
"loggingContainer": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<logging-container-name>",
207207
"importPrefixesInitial": [
208208
"/"
209209
]
@@ -247,26 +247,26 @@ resource filesystem 'Microsoft.StorageCache/amlFilesystems@2024-03-01' = {
247247
identity: {
248248
type: 'UserAssigned'
249249
userAssignedIdentities: {
250-
'/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<identity-name>': {}
250+
'/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<identity-name>': {}
251251
}
252252
}
253253
properties: {
254254
encryptionSettings: {
255255
keyEncryptionKey: {
256256
keyUrl: 'https://<keyvault-name>.vault.azure.net/keys/kvk/<key>'
257257
sourceVault: {
258-
id: '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>'
258+
id: '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>'
259259
}
260260
}
261261
}
262-
filesystemSubnet: '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Network/virtualNetworks/<vnet-name>/subnets/<subnet-name>'
262+
filesystemSubnet: '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Network/virtualNetworks/<vnet-name>/subnets/<subnet-name>'
263263
hsm: {
264264
settings: {
265-
container: '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>'
265+
container: '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>'
266266
importPrefixesInitial: [
267267
'/'
268268
]
269-
loggingContainer: '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<logging-container-name>'
269+
loggingContainer: '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<logging-container-name>'
270270
}
271271
}
272272
maintenanceWindow: {

azure-stack/hci/manage/monitor-hci-single-23h2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ Provides health faults on a cluster.
183183
|--|--|--|--|
184184
| Fault | A short description of health faults. On clicking the link, a side panel opens with more information. | No unit | PoolCapacityThresholdExceeded |
185185
| Faulting resource type | The type of resource that encountered a fault. | No unit | StoragePool |
186-
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {1245340c-780b-4afc-af3c-f9bdc4b12f8a}: SP:{c57f23d1-d784-4a42-8b59-4edd8e70e830} |
186+
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1}: SP:{b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2} |
187187
| Severity | Severity of fault could be warning or critical. | No unit | Warning |
188188
| Initial fault time | Timestamp of when server was last updated. | Datetime | 4/9/2022, 12:15:42 PM |
189189

azure-stack/hci/manage/monitor-hci-single.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -482,7 +482,7 @@ Provides health faults on a cluster.
482482
|--|--|--|--|
483483
| Fault | A short description of health faults. On clicking the link, a side panel opens with more information. | No unit | PoolCapacityThresholdExceeded |
484484
| Faulting resource type | The type of resource that encountered a fault. | No unit | StoragePool |
485-
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {1245340c-780b-4afc-af3c-f9bdc4b12f8a}: SP:{c57f23d1-d784-4a42-8b59-4edd8e70e830} |
485+
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1}: SP:{b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2} |
486486
| Severity | Severity of fault could be warning or critical. | No unit | Warning |
487487
| Initial fault time | Timestamp of when server was last updated. | Datetime | 4/9/2022, 12:15:42 PM |
488488

azure-stack/hci/manage/troubleshoot-arc-enabled-vms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This section describes the errors related to Azure Arc VM management and their r
2222

2323
When trying to run the command to enable guest management, you see the following error:
2424

25-
**Error:** `Deployment failed. Correlation ID: 5d0c4921-78e0-4493-af16-dffee5cbf9d8. VM Spec validation failed for guest agent provisioning: Invalid managed identity. A system-assigned managed identity must be enabled in parent resource: Invalid Configuration`
25+
**Error:** `Deployment failed. Correlation ID: aaaa0000-bb11-2222-33cc-444444dddddd. VM Spec validation failed for guest agent provisioning: Invalid managed identity. A system-assigned managed identity must be enabled in parent resource: Invalid Configuration`
2626

2727
This failure is because the managed identity wasn't created for this VM. System-assigned Managed Identity is required to enable guest management.
2828

azure-stack/hci/manage/use-datacenter-firewall-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -322,7 +322,7 @@ These files contain a sequence of flow events, for example:
322322
]
323323
},
324324
"operationName":"NetworkSecurityGroupFlowEvents",
325-
"resourceId":"394f647d-2ed0-4c31-87c5-389b8c0c8132",
325+
"resourceId":"a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1",
326326
"time":"20180719:L012620622",
327327
"category":"NetworkSecurityGroupFlowEvent",
328328
"systemId":"d8b3b697-5355-40e2-84d2-1bf2f0e0dc4a"
@@ -407,4 +407,4 @@ For related information, see:
407407

408408
- [Datacenter Firewall overview](../concepts/datacenter-firewall-overview.md).
409409
- [Network Controller overview](../concepts/network-controller-overview.md).
410-
- [SDN in Azure Stack HCI and Windows Server](../concepts/software-defined-networking.md).
410+
- [SDN in Azure Stack HCI and Windows Server](../concepts/software-defined-networking.md).

azure-stack/hci/update/update-troubleshooting-23h2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To collect logs for the update failures using PowerShell, follow these steps on
5858
PS C:\Users\lcmuser> $Failure = $Update|Get-SolutionUpdateRun
5959
PS C:\Users\lcmuser> $Failure
6060
61-
ResourceId : redmond/Solution10.2303.1.7/2c21b859-e063-4f24-a4db-bc1d6be82c4e
61+
ResourceId : redmond/Solution10.2303.1.7/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1
6262
Progress : Microsoft.AzureStack.Services.Update.ResourceProvider.UpdateService.Models.Step
6363
TimeStarted : 4/21/2023 10:02:54 PM
6464
LastUpdatedTime : 4/21/2023 3:19:05 PM
@@ -78,7 +78,7 @@ To collect logs for the update failures using PowerShell, follow these steps on
7878
Here's sample output:
7979
8080
```output
81-
PS C:\Users\lcmuser> Get-ActionplanInstance -actionplaninstanceid 2c21b859-e063-4f24-a4db-bc1d6be82c4e >log.txt
81+
PS C:\Users\lcmuser> Get-ActionplanInstance -actionplaninstanceid a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1 >log.txt
8282
8383
PS C:\Users\lcmuser>notepad log.txt
8484
```

0 commit comments

Comments
 (0)