sevco.io

Azure Arc Hybrid Compute

About

Azure Arc's Hybrid Compute capability allows organizations to manage the full scope of their device environments by extending Azure's management capabilities to cover on-premise, multi-cloud, and edge environments. As a result, organizations are able to monitor, update, and enforce policies on servers and virtual machines like they would native Azure resources.

Why You Should Integrate

Using Sevco's Hybrid Compute integration will provide insight into your hybrid compute resources being managed by Azure Arc.

How Does the Integration Work

This integration works by pulling information about hybrid compute resources from your instance of Azure Arc using its REST API.

This data is only used internally; we do not share it with any parties outside of Sevco. Refer to our privacy policy for details.

⚠️

If you haven't already, please review our instructions for configuring the integration before proceeding with the instructions below.

Configuration Options

No additional configuration options needed.

External Documentation

Creating credentials

See platform documentation for details on creating an application Microsoft Azure - Creating credentials

Required Permissions

To access Azure Arc's Hybrid Compute resources in your subscription, you must assign a role to the application. When assigning a role you can utilize a built-in role or create a custom role with only the specific permissions required to access Azure Arc Hybrid Compute resources.

Built-in Role

The account used to configure this integration must belong to a user that has been assigned the following role:

  • Reader

Follow the link for steps on how to assign a role to the application

Custom Role

If you choose to use an account with a custom role, the account used must have the following read permissions:

  • Microsoft.HybridCompute/machines/read
  • Microsoft.Resources/subscriptions/resourceGroups/read
  • Microsoft.Compute/virtualMachines/read

After creating the application in the Microsoft Azure - Creating credentials steps, you will need to Create or update Azure custom roles using the Azure portal. Use the following example for assigning the appropriate permissions.

{
    "id": "<role definition ID>",
    "properties": {
        "roleName": "<Role Name>",
        "description": "",
        "assignableScopes": [
            "<Subscription ID>"
        ],
        "permissions": [
            {
                "actions": [
                    "Microsoft.HybridCompute/machines/read",
                    "Microsoft.Resources/subscriptions/resourceGroups/read",
                    "Microsoft.Compute/virtualMachines/read"
                ],
                "notActions": [],
                "dataActions": [],
                "notDataActions": []
            }
        ]
    }
}

Once the custom role is created you can then follow the link for steps on how to assign a role to the application.

API Documentation

Machines-GET

Contact Us

If you're having problems configuring an Integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the Suggest Edits link located in the upper right hand corner of the documentation.

Tags: cloud