About This Page
This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.
Bias Analysis
Bias Types:
⚠️
windows_first
⚠️
powershell_heavy
⚠️
windows_tools
⚠️
missing_linux_example
Summary:
The documentation demonstrates a strong Windows bias. It assumes the user is on a Windows client, prioritizes Windows PowerShell throughout, and provides only PowerShell-based command examples (including custom cmdlets and Azure PowerShell modules). There are no equivalent Linux/bash examples, and Linux/macOS client workflows are not described. Windows tools and patterns are mentioned exclusively or before any cross-platform alternatives.
Recommendations:
- Add explicit instructions and examples for Linux/macOS clients, including bash/zsh shell commands.
- Provide az CLI and kubectl command examples in bash syntax, not just PowerShell.
- Document how to connect to the device and run required commands from Linux/macOS (e.g., via SSH or az CLI).
- Clarify which steps are platform-specific and which are cross-platform.
- Where custom PowerShell cmdlets are used (e.g., Set-HcsKubernetesAzureArcAgent), state whether Linux equivalents exist or provide alternative workflows.
- Reorder sections so that cross-platform or platform-agnostic steps are presented first, and platform-specific instructions are clearly separated.
- Link to supported OS documentation more prominently and summarize Linux/macOS support in the prerequisites.
Create pull request
Flagged Code Snippets
[10.128.44.240]: PS>kubectl get deployments,pods -n azure-arc
NAME READY UP-TO-DATE AVAILABLE AGE
deployment.apps/cluster-metadata-operator 1/1 1 1 13d
deployment.apps/clusterconnect-agent 1/1 1 1 13d
deployment.apps/clusteridentityoperator 1/1 1 1 13d
deployment.apps/config-agent 1/1 1 1 13d
deployment.apps/controller-manager 1/1 1 1 13d
deployment.apps/extension-manager 1/1 1 1 13d
deployment.apps/flux-logs-agent 1/1 1 1 13d
deployment.apps/kube-aad-proxy 1/1 1 1 13d
deployment.apps/metrics-agent 1/1 1 1 13d
deployment.apps/resource-sync-agent 1/1 1 1 13d
NAME READY STATUS RESTARTS AGE
pod/cluster-metadata-operator-9568b899c-2stjn 2/2 Running 0 13d
pod/clusterconnect-agent-576758886d-vggmv 3/3 Running 0 13d
pod/clusteridentityoperator-6f59466c87-mm96j 2/2 Running 0 13d
pod/config-agent-7cbd6cb89f-9fdnt 2/2 Running 0 13d
pod/controller-manager-df6d56db5-kxmfj 2/2 Running 0 13d
pod/extension-manager-58c94c5b89-c6q72 2/2 Running 0 13d
pod/flux-logs-agent-6db9687fcb-rmxww 1/1 Running 0 13d
pod/kube-aad-proxy-67b87b9f55-bthqv 2/2 Running 0 13d
pod/metrics-agent-575c565fd9-k5j2t 2/2 Running 0 13d
pod/resource-sync-agent-6bbd8bcd86-x5bk5 2/2 Running 0 13d
[10.128.44.240]: PS>
PS /home/user> az ad sp create-for-rbac --name "https://azure-arc-for-ase-k8s"
{
"appId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"displayName": "azure-arc-for-ase-k8s",
"name": "https://azure-arc-for-ase-k8s",
"password": "<password>",
"tenant": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
}
PS /home/user>
[Device-IP]: PS> Get-AzureDataBoxEdgeApplicationId
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
[Device-IP]: PS>
// ASE resource group and resource name can be obtained from Azure portal
PS C:\> $ASEResource= GetAzResource –ResourceGroupName <resource-group-name> -ResourceName <resource-name>
PS C:\> $ASEResource.Identity.PrincipalId
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
PS C:\>
PS /home/user> az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx --scope /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1
{
"canDelegate": null,
"id": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000",
"name": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"principalId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"principalType": "ServicePrincipal",
"resourceGroup": "myaserg1",
"roleDefinitionId": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/providers/Microsoft.Authorization/roleDefinitions/34e09817-6cbe-4d01-b1a2-e0eac5743d41",
"scope": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1",
"type": "Microsoft.Authorization/roleAssignments"
}
PS /home/user>
[10.100.10.10]: PS>Set-HcsKubernetesAzureArcAgent -SubscriptionId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" -ResourceGroupName "myaserg1" -ResourceName "myasetestresarc" -Location "westeurope" -TenantId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" -ClientId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
WARNING: A script or application on the remote computer 10.126.76.0 is sending a prompt request. When you are prompted,
enter sensitive information, such as credentials or passwords, only if you trust the remote computer and the
application or script that is requesting the data.
cmdlet Set-HcsKubernetesAzureArcAgent at command pipeline position 1
Supply values for the following parameters:
ClientSecret: **********************************
[10.100.10.10]: PS>