Skip to content

Commit ec532c6

Browse files
Merge pull request #314041 from shkalavala/patch-8
Revise production guidelines for Azure IoT Operations
2 parents 68e8dca + 1d14a39 commit ec532c6

1 file changed

Lines changed: 8 additions & 11 deletions

File tree

articles/iot-operations/deploy-iot-ops/concept-production-guidelines.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,15 @@ Decide whether you're deploying Azure IoT Operations to a single-node or multi-n
1818

1919
## Platform
2020

21-
Currently, K3s on Ubuntu 24.04 is the only generally available platform for deploying Azure IoT Operations in production.
21+
Use a [supported environment](../overview-support.md#supported-environments) for deploying Azure IoT Operations in production.
2222

2323
## Cluster setup
2424

2525
Ensure that your hardware setup is sufficient for your scenario and that you begin with a secure environment.
2626

2727
### System configuration
2828

29-
Create an Arc-enabled K3s cluster that meets the system requirements.
29+
Create an Arc-enabled cluster that meets the system requirements.
3030

3131
* Use a [supported environment for Azure IoT Operations](../overview-support.md#supported-environments).
3232
* [Configure the cluster](./howto-prepare-cluster.md) according to documentation.
@@ -88,15 +88,12 @@ In the Azure portal deployment wizard, the schema registry and its required stor
8888

8989
* The storage account must have hierarchical namespace enabled.
9090
* The schema registry's managed identity must have contributor permissions for the storage account.
91-
* The storage account is only supported with public network access enabled.
92-
93-
For production deployments, scope the storage account's public network access to allow traffic only from trusted Azure services. For example:
94-
95-
1. In the [Azure portal](https://portal.azure.com), navigate to the storage account that your schema registry uses.
96-
1. Select **Security + networking > Networking** from the navigation menu.
97-
1. For the public network access setting, select **Enabled from selected virtual networks and IP addresses**.
98-
1. In the **Exceptions** section of the networking page, ensure that the **Allow trusted Microsoft services to access this resource** option is selected.
99-
1. Select **Save** to apply the changes.
91+
* For production deployments, scope the storage account's public network access to allow traffic only from trusted Azure services. For example:
92+
1. In the [Azure portal](https://portal.azure.com), navigate to the storage account that your schema registry uses.
93+
1. Select **Security + networking > Networking** from the navigation menu.
94+
1. For the public network access setting, select **Enabled from selected virtual networks and IP addresses**.
95+
1. In the **Exceptions** section of the networking page, ensure that the **Allow trusted Microsoft services to access this resource** option is selected.
96+
1. Select **Save** to apply the changes.
10097

10198
For more information, see [Configure Azure Storage firewalls and virtual networks > Grant access to trusted Azure services](../../storage/common/storage-network-security.md#grant-access-to-trusted-azure-services).
10299

0 commit comments

Comments
 (0)