File tree Expand file tree Collapse file tree
samples/features/sql-big-data-cluster/deployment/private-aks/scripts Expand file tree Collapse file tree Original file line number Diff line number Diff line change 11#! /bin/bash
22
33# Get password as input. It is used as default for controller, SQL Server Master instance (sa account) and Knox.
4-
4+ #
55while true ; do
66 read -s -p " Create Admin username for Big Data Cluster: " bdcadmin
77 echo
@@ -30,16 +30,14 @@ azdata bdc config replace -c private-bdc-aks /bdc.json -j "$.spec.resources.gate
3030azdata bdc config replace -c private-bdc-aks /bdc.json -j " $.spec.resources.appproxy.spec.endpoints[0].serviceType=NodePort"
3131
3232# In case you're deploying BDC in HA mode ( aks-dev-test-ha profile ) please also use the following command
33- # azdata bdc config replace -c private-bdc-aks /bdc.json -j "$.spec.resources.master.spec.endpoints[1].serviceType= NodePort"
34-
35-
33+ # azdata bdc config replace -c private-bdc-aks /bdc.json -j "$.spec.resources.master.spec.endpoints[1].serviceType=NodePort"
3634export AZDATA_USERNAME=$bdcadmin
3735export AZDATA_PASSWORD=$password
3836
3937azdata bdc create --config-profile private-bdc-aks --accept-eula yes
4038
4139# Login and get endpoint list for the cluster.
42-
40+ #
4341azdata login -n mssql-cluster
4442
4543azdata bdc endpoint list --output table
Original file line number Diff line number Diff line change 11#! /bin/bash
2-
32# Get Subscription ID and service principles as input. It is used as default for controller, SQL Server Master instance (sa account) and Knox.
4-
3+ #
54while true ; do
65 read -s -p " Your Azure Subscription: " subscription
76 echo
@@ -16,7 +15,6 @@ while true; do
1615done
1716
1817# Define a set of environment variables to be used in resource creations.
19-
2018export SUBID=$subscription
2119
2220export REGION_NAME=$region
@@ -89,13 +87,11 @@ az network route-table route create -g $RESOURCE_GROUP --name $FWROUTE_NAME_INTE
8987
9088
9189# Add FW Network Rules
92-
9390az network firewall network-rule create -g $RESOURCE_GROUP -f $FWNAME --collection-name ' aksfwnr' -n ' apiudp' --protocols ' UDP' --source-addresses ' *' --destination-addresses " AzureCloud.$REGION_NAME " --destination-ports 1194 --action allow --priority 100
9491az network firewall network-rule create -g $RESOURCE_GROUP -f $FWNAME --collection-name ' aksfwnr' -n ' apitcp' --protocols ' TCP' --source-addresses ' *' --destination-addresses " AzureCloud.$REGION_NAME " --destination-ports 9000
9592az network firewall network-rule create -g $RESOURCE_GROUP -f $FWNAME --collection-name ' aksfwnr' -n ' time' --protocols ' UDP' --source-addresses ' *' --destination-fqdns ' ntp.ubuntu.com' --destination-ports 123
9693
9794# Add FW Application Rules
98-
9995az network firewall application-rule create -g $RESOURCE_GROUP -f $FWNAME --collection-name ' aksfwar' -n ' fqdn' --source-addresses ' *' --protocols ' http=80' ' https=443' --fqdn-tags " AzureKubernetesService" --action allow --priority 100
10096
10197# Associate User defined route table (UDR) to AKS cluster where deployed BDC previsouly
@@ -106,7 +102,6 @@ az network vnet subnet update -g $RESOURCE_GROUP --vnet-name $VNET_NAME --name $
106102
107103
108104# Create SP and Assign Permission to Virtual Network
109-
110105az ad sp create-for-rbac -n " bdcaks-sp" --skip-assignment
111106
112107export APPID=$sp_id
Original file line number Diff line number Diff line change 11#! /bin/bash
2-
32# Define a set of environment variables to be used in resource creations.
4-
3+ #
54export REGION_NAME=northeurope
65export RESOURCE_GROUP=private-bdc-aks-rg
76export SUBNET_NAME=aks-subnet
You can’t perform that action at this time.
0 commit comments