Azure Citadel
  • Blogs

  • ARM
  • Azure Arc
    • Overview
    • Azure Arc-enabled Servers
      • Prereqs
      • Scenario
      • Hack Overview
      • Azure Landing Zone
      • Arc Pilot resource group
      • Azure Monitoring Agent
      • Additional policy assignments
      • Access your on prem VMs
      • Create onboarding scripts
      • Onboarding using scripts
      • Inventory
      • Monitoring
      • SSH
      • Windows Admin Center
      • Governance
      • Custom Script Extension
      • Key Vault Extension
      • Managed Identity
    • Azure Arc-enabled Kubernetes
      • Prereqs
      • Background
      • Deploy Cluster
      • Connect to Arc
      • Enable GitOps
      • Deploy Application
      • Enable Azure AD
      • Enforce Policy
      • Enable Monitoring
      • Enable Azure Defender
      • Enable Data Services
      • Enable Application Delivery
    • Useful Links
  • Azure CLI
    • Install
    • Get started
    • JMESPATH queries
    • Integrate with Bash
  • Azure Landing Zones
    • Prereqs
    • Day 1
      • Azure Baristas
      • Day 1 Challenge
    • Day 2
      • Example
      • Day 2 Challenge
    • Day 3
      • Day 3 Challenge
    • Useful Links
  • Azure Policy
    • Azure Policy Basics
      • Policy Basics in the Azure Portal
      • Creating Policy via the CLI
      • Deploy If Not Exists
      • Management Groups and Initiatives
    • Creating Custom Policies
      • Customer scenario
      • Policy Aliases
      • Determine the logic
      • Create the custom policy
      • Define, assign and test
  • Azure Stack HCI
    • Overview
    • Useful Links
    • Updates from Microsoft Ignite 2022
  • Marketplace
    • Introduction
      • Terminology
      • Offer Types
    • Partner Center
    • Offer Type
    • Publish a VM Offer HOL
      • Getting Started
      • Create VM Image
      • Test VM Image
      • VM Offer with SIG
      • VM Offer with SAS
      • Publish Offer
    • Other VM Resources
    • Publish a Solution Template HOL
      • Getting Started
      • Create ARM Template
      • Validate ARM Template
      • Create UI Definition
      • Package Assets
      • Publish Offer
    • Publish a Managed App HOL
      • Getting Started
      • Create ARM Template
      • Validate ARM Template
      • Create UI Definition
      • Package Assets
      • Publish Offer
    • Managed Apps with AKS HOL
    • Other Managed App Resources
    • SaaS Offer HOLs
    • SaaS Offer Video Series
      • Video 1 - SaaS Offer Overview
      • Video 2 - Purchasing a SaaS Offer
      • Video 3 - Purchasing a Private SaaS Plan
      • Video 4 - Publishing a SaaS Offer
      • Video 5 - Publishing a Private SaaS Plan
      • Video 6 - SaaS Offer Technical Overview
      • Video 7 - Azure AD Application Registrations
      • Video 8 - Using the SaaS Offer REST Fulfillment API
      • Video 9 - The SaaS Client Library for .NET
      • Video 10 - Building a Simple SaaS Landing Page in .NET
      • Video 11 - Building a Simple SaaS Publisher Portal in .NET
      • Video 12 - SaaS Webhook Overview
      • Video 13 - Implementing a Simple SaaS Webhook in .NET
      • Video 14 - Securing a Simple SaaS Webhook in .NET
      • Video 15 - SaaS Metered Billing Overview
      • Video 16 - The SaaS Metered Billing API with REST
  • Microsoft Fabric
    • Theory
    • Prereqs
    • Fabric Capacity
    • Set up a Remote State
    • Create a repo from a GitHub template
    • Configure an app reg for development
    • Initial Terraform workflow
    • Expanding your config
    • Configure a workload identity
    • GitHub Actions for Microsoft Fabric
    • GitLab pipeline for Microsoft Fabric
  • Packer & Ansible
    • Packer
    • Ansible
    • Dynamic Inventories
    • Playbooks & Roles
    • Custom Roles
    • Shared Image Gallery
  • Partner
    • Lighthouse and Partner Admin Link
      • Microsoft Cloud Partner Program
      • Combining Lighthouse and PAL
      • Minimal Lighthouse definition
      • Using service principals
      • Privileged Identity Management
    • Useful Links
  • REST API
    • REST API theory
    • Using az rest
  • Setup
  • Terraform
    • Fundamentals
      • Initialise
      • Format
      • Validate
      • Plan
      • Apply
      • Adding resources
      • Locals and outputs
      • Managing state
      • Importing resources
      • Destroy
    • Working Environments for Terraform
      • Cloud Shell
      • macOS
      • Windows with PowerShell
      • Windows with Ubuntu in WSL2
    • Using AzAPI
      • Using the REST API
      • azapi_resource
      • Removing azapi_resource
      • azapi_update_resource
      • Data sources and outputs
      • Removing azapi_update_resource
  • Virtual Machines
    • Azure Bastion with native tools & AAD
    • Managed Identities

  • About
  • Archive
  1. Home
  2. Azure Arc
  3. Azure Arc-enabled Servers
  4. Arc Pilot resource group

Table of Contents

  • Introduction
  • Resource group
  • Azure Arc Admins
  • Tag inheritance
  • Success criteria
  • Resources
  • Next

Arc Pilot resource group

Create a target resource group, plus a few resources and tag inheritance policies.

Introduction

In this preparation lab you will create the arc_pilot resource group. You will be onboarding your on prem VMs into this resource group later in the hack.

You’ll also add some tagging inheritance policies and a couple of (optional) security groups in Azure Active Directory.

The Azure Connected Machine Onboarding role allows Microsoft.HybridCompute and Microsoft.GuestConfiguration guest actions. See Azure built-in roles for more information.

The last section covers

Resource group

  1. Create a resource group called arc_pilot for onboarding

    Include tag values for datacentre and city.

    az group create --name arc_pilot --location westeurope --tags datacentre="Azure Citadel" city=Reading
    

Azure Arc Admins

  1. Create a security group called Azure Arc Admins

  2. Add all of the users in your team

  3. Assign with a role to the resource group that is suitable for administering Azure Arc-enabled Server resources

    💡 Hint: Azure Arc-enabled Servers are sometimes called Azure Connected Machines…

Tag inheritance

The pilot evaluation team have decided to initially use a couple of tags at the resource group level that they want the resources to inherit.

The tag inheritance policies may be deployed at a higher scope in production, e.g. at the subscription scope for a subscription dedicated for hybrid machines, as one component of a wider tagging strategy.

Tag Value Source
datacentre Azure Citadel Inherited from resource group
city Reading Inherited from resource group
platform azcmagent
cluster azcmagent

⚠️The values for the platform and cluster tags will be configured when using the azcmagent to onboard the hybrid VMs.

  1. Grab the resource group ID

    rgId=$(az group show --name arc_pilot --query id --output tsv)
    
  2. Assign the tag inheritance for datacentre

    az policy assignment create --name "inherit_tag_datacentre" \
      --display-name "Inherit datacentre tag from the resource group" \
      --scope $rgId \
      --policy cd3aa116-8754-49c9-a813-ad46512ece54 \
      --mi-system-assigned --location westeurope \
      --params '{"tagName": {"value": "datacentre"}}'
    
  3. Add a non-compliance message for the datacentre tag policy

    az policy assignment non-compliance-message create \
    --name inherit_tag_datacentre \
    --resource-group arc_pilot \
    --message "Resource has not inherited the datacentre tag"
    
  4. Assign the tag inheritance for city

    az policy assignment create --name "inherit_tag_city" \
    --display-name "Inherit city tag from the resource group" \
    --scope $rgId \
    --policy cd3aa116-8754-49c9-a813-ad46512ece54 \
    --mi-system-assigned --location westeurope \
    --params '{"tagName": {"value": "city"}}'
    
  5. Add a non-compliance message for the city tag inheritance policy

    az policy assignment non-compliance-message create \
    --name inherit_tag_city \
    --resource-group arc_pilot \
    --message "Resource has not inherited the city tag"
    

Success criteria

Show the proctor:

  1. the resource group name, location, tags and resources
  2. the RBAC assignment for Azure Arc Admins
  3. your tag inheritance policy assignments

Resources

  • https://learn.microsoft.com/azure/role-based-access-control/built-in-roles
  • https://learn.microsoft.com/azure/azure-arc/servers/onboard-service-principal
  • https://learn.microsoft.com/azure/templates/microsoft.authorization/policyassignments?pivots=deployment-language-bicep
  • https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/management_group_policy_assignment

Next

In this lab you assigned a few more resources and policies. A combination of the Azure portal and CLI were used, but you could automate using Bicep or Terraform. Remember that policy initiatives were previously named policy sets.

In the next lab you will look at the Azure Monitor Agent and enable VM Insights via policy.

Azure Landing Zone Arc Pilot resource group Azure Monitoring Agent