Portal Template (ARM)
Article Audience
Domain Experts: Working with OSDU services.
Data Scientists: Working with data and machine learning.
Data Engineers: Working with data and databases.
The Azure Resource Manager (ARM) custom template deployment provides a simple way to provision the solution through the Azure Portal. This method uses a pre-configured ARM template that has been transpiled from Bicep, enabling rapid deployment through a guided portal experience.
Learning Opportunity
Learn more about ARM Templates and how they work in Azure.
Warning
The template leverages complex configuration objects that are built in a way that can be integrated later with an Azure Managed Application. This can make configuration of feature flags more challenging.
Instructions
-
Create a Microsoft Entra Application Registration.
- Application Client Id (clientId)
- Application Client Secret (clientSecret)
- Enterprise Application Object Id (principalId)
-
Open the custom ARM Template deployment.
-
Provide the required values.
- Email Address:
Valid email address for the admin user
- Application Client Id:
Valid Client Id from the app registration
- Application Client Secret:
Valid Client Secret from the app registration
- Application Client Principal OID:
Valid Enterprise Application Object Id
- Email Address:
-
Modify the optional parameters as desired.
- Custom VM Size:
Set Custom VM size cluster nodes.
- Ingress Type:
Switch: Ingress type to use.
- Enable Blob Public Access:
Feature Flag: Enable Blob Storage public access.
- Enable Manage:
Feature Flag: Deploy virtual machine with bastion.
- Vm Admin Username:
Set admin username for the virtual machine.
- Enable Pod Subnet:
Feature Flag: Enhanced AKS subnet configuration.
- Vnet Configuration:
Network configuration object.
- Cluster Software:
Software configuration object.
- Experimental Software:
Experimental Software configuration object.
- Cluster Network:
Cluster network configuration object.
- Cluster Network Plugin:
Switch: Network plugin to use.
- Cluster Admin Ids:
Set cluster admin user ids to enable RBAC.
- Custom VM Size:
-
Deploy the Solution.
Warning
Deployment can exceed 1 hour. Includes both infrastructure and software deployment.
-
Configure Authentication.
- Locate the ingress IP address in the AKS service
- Add a redirect URI to your Entra application:
- Format:
https://<ingress_ip>/auth/spa/
- Platform type: Single-page application (SPA)
- Format:
-
Validate Access.
- Check Successful deployment in the resource group deployments
- Check Successful deployment in the AKS gitops status
- Navigate to
https://<ingress_ip>/auth/spa/
- Click Authorize to receive an authorization code
- Use Get Tokens to retrieve an access token
- Test the token with service swagger pages