You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/setup_installation/azure/getting_started.md
+116-44
Original file line number
Diff line number
Diff line change
@@ -24,78 +24,137 @@ To run all the commands on this page the user needs to have at least the followi
24
24
25
25
You will also need to have a role such as *Application Administrator* on the Azure Active Directory to be able to create the hopsworks.ai service principal.
26
26
27
-
## Step 1: Azure AKS Setup
27
+
## Step 1: Azure Kubernetes Service (AKS) Setup
28
28
29
29
### Step 1.1: Create an Azure Blob Storage Account
30
30
31
31
Create a storage account to host project data. Ensure that the storage account is in the same region as the AKS cluster for performance and cost reasons:
32
32
33
33
```bash
34
-
az storage account create --name $storage_account_name --resource-group $resource_group --location $region
34
+
az storage account create --name $STORAGE_ACCOUNT_NAME --resource-group $RESOURCE_GROUP --location $REGION
35
35
```
36
36
37
-
Also create a corresponding container:
37
+
Also, create the corresponding container:
38
38
39
39
```bash
40
-
az storage container create --account-name $storage_account_name --name $container_name
40
+
az storage container create --account-name $STORAGE_ACCOUNT_NAME --name $CONTAINER_NAME
41
41
```
42
42
43
-
44
43
### Step 1.2: Create an Azure Container Registry (ACR)
45
44
46
45
Create an ACR to store the images used by Hopsworks:
az role assignment create --assignee $UA_IDENTITY_PRINCIPAL_ID --role AcrPull --scope $ACR_ID
104
+
az role assignment create --assignee $UA_IDENTITY_PRINCIPAL_ID --role "AcrPush" --scope $ACR_ID
105
+
az role assignment create --assignee $UA_IDENTITY_PRINCIPAL_ID --role "AcrDelete" --scope $ACR_ID
70
106
```
71
107
72
-
### Step 1.5: Assign Roles to Managed Identity
108
+
### Step 1.5: Create Service Principal for Hopsworks services
73
109
74
-
```bash
75
-
az role assignment create --assignee $managed_id --role "Storage Blob Data Contributor" --scope $storage_id
110
+
Create a service principal to grant Hopsworks applications with access to the container registry. For example, Hopsworks uses this service principal to push new Python environments created via the Hopsworks UI.
76
111
77
-
az role assignment create --assignee $managed_id --role AcrPull --scope $acr_id
78
-
az role assignment create --assignee $managed_id --role "AcrPush" --scope $acr_id
79
-
az role assignment create --assignee $managed_id --role "AcrDelete" --scope $acr_id
0 commit comments