Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

May/June Release notes & Fixes #344

Merged
merged 10 commits into from
Jul 1, 2024
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an App S
- "Security admin" - Required for installing Cloud Defender Azure-Arc enabled Kubernetes extension and dismiss alerts
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an Azure
- "Security admin" - Required for installing Cloud Defender Azure-Arc enabled Kubernetes extension and dismiss alerts
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an App S
- "Security admin" - Required for installing Cloud Defender Azure-Arc enabled Kubernetes extension and dismiss alerts
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,9 @@

In this scenario, you will deploy a [Container Apps environment](https://learn.microsoft.com/azure/container-apps/environment) and a 3-node container app running in Azure. The app leverages [Dapr](https://learn.microsoft.com/azure/container-apps/dapr-overview?tabs=bicep1%2Cyaml) to simplify service to service invocation.

- Store - The store app is the store's frontend app, running a [Blazor Server project](https://learn.microsoft.com/dotnet/architecture/blazor-for-web-forms-developers/introduction) that reaches out to the backend APIs.

Check failure on line 21 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Microsoft.Avoid] Don't use 'backend'. See the A-Z word list for details. Raw Output: {"message": "[Microsoft.Avoid] Don't use 'backend'. See the A-Z word list for details.", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 21, "column": 206}}}, "severity": "ERROR"}
- Products API - This API is a [Swagger UI-enabled API](https://swagger.io/tools/swagger-ui/) that hands back product names and IDs to callers.
- Inventory API - A simple API that provides a random number for a given product ID string. The values of each string/integer pair are stored in a memory cache so they are consistent between API calls.

Check failure on line 23 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Microsoft.Contractions] Use 'they're' instead of 'they are'. Raw Output: {"message": "[Microsoft.Contractions] Use 'they're' instead of 'they are'.", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 23, "column": 164}}}, "severity": "ERROR"}

## Prerequisites

Expand Down Expand Up @@ -54,7 +54,7 @@

- Create Azure service principal (SP)

To be able to complete the scenario and its related automation, Azure service principal assigned with the “Contributor” role is required. To create it, login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To be able to complete the scenario and its related automation, Azure service principal assigned with the “Contributor” role is required. To create it, login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down Expand Up @@ -83,7 +83,7 @@

> **Note:** If you create multiple subsequent role assignments on the same service principal, your client secret (password) will be destroyed and recreated each time. Therefore, make sure you grab the correct password.

> **Note:** The Jumpstart scenarios are designed with as much ease of use in-mind and adhering to security-related best practices whenever possible. It is optional but highly recommended to scope the service principal to a specific [Azure subscription and resource group](https://learn.microsoft.com/cli/azure/ad/sp?view=azure-cli-latest) as well considering using a [less privileged service principal account](https://learn.microsoft.com/azure/role-based-access-control/best-practices).

Check failure on line 86 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Microsoft.Contractions] Use 'it's' instead of 'It is'. Raw Output: {"message": "[Microsoft.Contractions] Use 'it's' instead of 'It is'.", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 86, "column": 154}}}, "severity": "ERROR"}

## Automation Flow

Expand All @@ -92,9 +92,9 @@
- Main [_azuredeploy_ ARM template](https://github.com/microsoft/azure_arc/blob/main/azure_arc_app_services_jumpstart/aks/ARM/azuredeploy.json) will initiate the deployment of the linked ARM templates:

- [_VNET_](https://github.com/microsoft/azure_arc/blob/main/azure_arc_app_services_jumpstart/aks/ARM/VNET.json) - Deploys a Virtual Network with a single subnet to be used by the Client virtual machine.
- [_aks_](https://github.com/microsoft/azure_arc/blob/main/azure_arc_app_services_jumpstart/aks/ARM/aks.json) - Deploys the AKS cluster where all the Azure Container Apps on Azure Arc-enabled Kubernetes will be deployed.

Check failure on line 95 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Vale.Terms] Use 'AKS' instead of 'aks'. Raw Output: {"message": "[Vale.Terms] Use 'AKS' instead of 'aks'.", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 95, "column": 7}}}, "severity": "ERROR"}
- [_clientVm_](https://github.com/microsoft/azure_arc/blob/main/azure_arc_app_services_jumpstart/aks/ARM/clientVm.json) - Deploys the client Windows VM. This is where all user interactions with the environment are made from.
- [_logAnalytics_](https://github.com/microsoft/azure_arc/blob/main/azure_arc_app_services_jumpstart/aks/ARM/logAnalytics.json) - Deploys Azure Log Analytics workspace to to view diagnostic information of the Container Apps.

Check failure on line 97 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Vale.Repetition] 'to' is repeated! Raw Output: {"message": "[Vale.Repetition] 'to' is repeated!", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 97, "column": 171}}}, "severity": "ERROR"}

- User remotes into client Windows VM, which automatically kicks off the [_ContainerAppsLogonScript_](https://github.com/microsoft/azure_arc/blob/main/azure_arc_app_services_jumpstart/aks/ARM/artifacts/ContainerAppsLogonScript.ps1) PowerShell script that deploys the AKS cluster, configures Azure Container Apps environment and deploy the Container Apps on the AKS cluster.

Expand All @@ -114,7 +114,7 @@
- _`deployContainerApps`_ - Boolean that sets whether or not to deploy Azure Container Apps environment and a Web App. For this scenario, we leave it set to *`true`*.
- _`deployAppService`_ - Boolean that sets whether or not to deploy App Service plan and a Web App. For this scenario, we leave it set to *`false`*.
- _`deployFunction`_ - Boolean that sets whether or not to deploy App Service plan and an Azure Function application. For this scenario, we leave it set to *`false`*.
- _`deployAPIMgmt`_ - Boolean that sets whether or not to deploy a self-hosted Azure API Management gateway. For this scenario, we leave it set to *`false`*.

Check failure on line 117 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Microsoft.Spacing] 'y. F' should have one space. Raw Output: {"message": "[Microsoft.Spacing] 'y. F' should have one space.", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 117, "column": 109}}}, "severity": "ERROR"}
- _`deployLogicApp`_ - Boolean that sets whether or not to deploy App Service plan and an Azure Logic App. For this scenario, we leave it set to *`false`*.
- _`templateBaseUrl`_ - GitHub URL to the deployment template - filled in by default to point to [Microsoft/Azure Arc](https://aka.ms/JumpstartGitHubCode) repository, but you can point this to your forked repo as well.
- _`adminEmail`_ - an email address that will be used on the Azure API Management deployment to receive all system notifications.
Expand Down Expand Up @@ -149,7 +149,7 @@

> **Note:** Since Azure Container App on Azure Arc-enabled Kubernetes is [currently in preview](https://learn.microsoft.com/azure/container-apps/azure-arc-overview#public-preview-limitations), deployment regions availability is limited to East US, East Asia and West Europe.

> **Note:** If you receive an error message stating that the requested VM size is not available in the desired location (as an example: 'Standard_D8s_v3'), it means that there is currently a capacity restriction for that specific VM size in that particular region. Capacity restrictions can occur due to various reasons, such as high demand or maintenance activities. Microsoft Azure periodically adjusts the available capacity in each region based on usage patterns and resource availability. To continue deploying this scenario, please try to re-run the deployment using another region.

Check failure on line 152 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Microsoft.Contractions] Use 'isn't' instead of 'is not'. Raw Output: {"message": "[Microsoft.Contractions] Use 'isn't' instead of 'is not'.", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 152, "column": 84}}}, "severity": "ERROR"}

- Once Azure resources has been provisioned, you will be able to see it in Azure portal.

Expand All @@ -166,7 +166,7 @@

### Connecting directly with RDP

By design, port 3389 is not allowed on the network security group. Therefore, you must create an NSG rule to allow inbound 3389.

Check failure on line 169 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Microsoft.Contractions] Use 'isn't' instead of 'is not'. Raw Output: {"message": "[Microsoft.Contractions] Use 'isn't' instead of 'is not'.", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 169, "column": 22}}}, "severity": "ERROR"}

- Open the _Arc-App-Client-NSG_ resource in Azure portal and click "Add" to add a new rule.

Expand All @@ -188,7 +188,7 @@

![Screenshot showing connecting to the VM using Bastion](./08.png)

> **Note:** When using Azure Bastion, the desktop background image is not visible. Therefore some screenshots in this guide may not exactly match your experience if you are connecting with Azure Bastion.

Check failure on line 191 in docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md

View workflow job for this annotation

GitHub Actions / lint

[vale] reported by reviewdog 🐶 [Microsoft.Contractions] Use 'isn't' instead of 'is not'. Raw Output: {"message": "[Microsoft.Contractions] Use 'isn't' instead of 'is not'.", "location": {"path": "docs/azure_arc_jumpstart/azure_arc_app_svc/aks/aks_container_apps_arm_template/_index.md", "range": {"start": {"line": 191, "column": 70}}}, "severity": "ERROR"}

### Connect using just-in-time access (JIT)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an App S
- "Security admin" - Required for installing Cloud Defender Azure-Arc enabled Kubernetes extension and dismiss alerts
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ By the end of this scenario, you will have a CAPI Kubernetes cluster deployed wi
- "Security admin" - Required for installing Cloud Defender Azure-Arc enabled Kubernetes extension and dismiss alerts
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ By the end of this scenario, you will have a CAPI Kubernetes cluster deployed wi
- "Security admin" - Required for installing Cloud Defender Azure-Arc enabled Kubernetes extension and dismiss alerts
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ By the end of this scenario, you will have a CAPI Kubernetes cluster deployed wi
- "Security admin" - Required for installing Cloud Defender Azure-Arc enabled Kubernetes extension and dismiss alerts
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ By the end of this scenario, you will have an ARO cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ By the end of this scenario, you will have an ARO cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ By the end of this scenario, you will have an ARO cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ By the end of this scenario, you will have a CAPI Kubernetes cluster deployed wi
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ By the end of this scenario, you will have a CAPI Kubernetes cluster deployed wi
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ By the end of this scenario, you will have a CAPI Kubernetes cluster deployed wi
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ By the end of this scenario, you will have an Azure DevOps Release pipeline to d

- Create Azure service principal (SP)

To be able to complete the scenario and its related automation, Azure service principal assigned with the “Contributor” role is required. To create it, login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To be able to complete the scenario and its related automation, Azure service principal assigned with the “Contributor” role is required. To create it, login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ By the end of this guide, you will have two Azure Kubernetes Service (AKS) clust
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ By the end of this scenario, you will have an AKS cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ By the end of this scenario, you will have an Azure DevOps Release pipeline to d

- Create Azure service principal (SP)

To be able to complete the scenario and its related automation, Azure service principal assigned with the “Contributor” role is required. To create it, login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To be able to complete the scenario and its related automation, Azure service principal assigned with the “Contributor” role is required. To create it, login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ By the end of this scenario, you will have an EKS cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ By the end of this scenario, you will have an EKS cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ By the end of this scenario, you will have an EKS cluster deployed with an Azure
- "Security reader" - Required for being able to view Azure-Arc enabled Kubernetes Cloud Defender extension findings
- "Monitoring Metrics Publisher" - Required for being Azure Arc-enabled data services billing, monitoring metrics, and logs management

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ By the end of this scenario, you will have a GKE cluster deployed with an Azure

- "Owner" - Required for provisioning Azure resources, interact with Azure Arc-enabled data services billing, monitoring metrics, and logs management and creating role assignment for the Monitoring Metrics Publisher role.

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ By the end of this scenario, you will have a GKE cluster deployed with an Azure

- "Owner" - Required for provisioning Azure resources, interact with Azure Arc-enabled data services billing, monitoring metrics, and logs management and creating role assignment for the Monitoring Metrics Publisher role.

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ By the end of this scenario, you will have a GKE cluster deployed with an Azure

- "Owner" - Required for provisioning Azure resources, interact with Azure Arc-enabled data services billing, monitoring metrics, and logs management and creating role assignment for the Monitoring Metrics Publisher role.

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ By the end of this scenario, you will have a Kubeadm Kubernetes cluster deployed

- "Owner" - Required for provisioning Azure resources, interact with Azure Arc-enabled data services billing, monitoring metrics, and logs management and creating role assignment for the Monitoring Metrics Publisher role.

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ By the end of this scenario, you will have a Kubeadm Kubernetes cluster deployed

- "Owner" - Required for provisioning Azure resources, interact with Azure Arc-enabled data services billing, monitoring metrics, and logs management and creating role assignment for the Monitoring Metrics Publisher role.

To create it login to your Azure account run the below command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/).
To create it login to your Azure account run the below Bash shell command (this can also be done in [Azure Cloud Shell](https://shell.azure.com/)).

```shell
az login
Expand Down
Loading
Loading