Skip to content

Commit 40a263c

Browse files
committed
Add AcrDelete role
1 parent de497d5 commit 40a263c

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

docs/setup_installation/azure/getting_started.md

+5-4
Original file line numberDiff line numberDiff line change
@@ -92,18 +92,19 @@ az role definition create --role-definition '{
9292
]
9393
}'
9494

95-
sleep 30 # give Azure some time to persist the new role
96-
97-
az role assignment create --role hopsfs-storage-permissions --assignee $UA_IDENTITY_PRINCIPAL_ID --scope $STORAGE_ID
95+
az role assignment create --role hopsfs-storage-permissions --assignee-object-id $UA_IDENTITY_PRINCIPAL_ID --assignee-principal-type ServicePrincipal --scope $STORAGE_ID
9896
```
9997

10098
### Step 1.5: Create Service Principal for Hopsworks services
10199

102100
Create a service principal to grant Hopsworks applications with access to the container registry. For example, Hopsworks uses this service principal to push new Python environments created via the Hopsworks UI.
103101

104102
```bash
105-
export SP_PASSWORD=`az ad sp create-for-rbac --name $SP_NAME --scopes $ACR_ID --role acrpush --years 1 --query "password" --output tsv`
103+
export SP_PASSWORD=`az ad sp create-for-rbac --name $SP_NAME --scopes $ACR_ID --role AcrPush --years 1 --query "password" --output tsv`
106104
export SP_USER_NAME=`az ad sp list --display-name $SP_NAME --query "[].appId" --output tsv`
105+
export SP_RESOURCE_ID=`az ad sp list --display-name $SP_NAME --query "[].id" --output tsv`
106+
107+
az role assignment create --role AcrDelete --assignee-object-id $SP_RESOURCE_ID --assignee-principal-type ServicePrincipal --scope $ACR_ID
107108
```
108109

109110
### Step 1.6: Create an AKS Kubernetes Cluster

0 commit comments

Comments
 (0)