Azure Arc Hybrid Compute
About
Azure Arc's Hybrid Compute capability allows organizations to manage the full scope of their device environments by extending Azure's management capabilities to cover on-premise, multi-cloud, and edge environments. As a result, organizations are able to monitor, update, and enforce policies on servers and virtual machines like they would native Azure resources.
Why You Should Integrate
Using Sevco's Hybrid Compute integration will provide insight into your hybrid compute resources being managed by Azure Arc.
How Does the Integration Work
This integration works by pulling information about hybrid compute resources from your instance of Azure Arc using its REST API.
This data is only used internally; we do not share it with any parties outside of Sevco. Refer to our privacy policy for details.
If you haven't already, please review our instructions for configuring the integration before proceeding with the instructions below.
Configuration Options
No additional configuration options needed.
External Documentation
Creating credentials
See platform documentation for details on creating an application Microsoft Azure - Creating credentials
Required Permissions
To access Azure Arc's Hybrid Compute resources in your subscription, you must assign a role to the application. When assigning a role you can utilize a built-in role or create a custom role with only the specific permissions required to access Azure Arc Hybrid Compute resources.
Built-in Role
The account used to configure this integration must belong to a user that has been assigned the following role:
Reader
Follow the link for steps on how to assign a role to the application
Custom Role
If you choose to use an account with a custom role, the account used must have the following read
permissions:
Microsoft.HybridCompute/machines/read
Microsoft.Resources/subscriptions/resourceGroups/read
Microsoft.Compute/virtualMachines/read
After creating the application in the Microsoft Azure - Creating credentials steps, you will need to Create or update Azure custom roles using the Azure portal. Use the following example for assigning the appropriate permissions.
{
"id": "<role definition ID>",
"properties": {
"roleName": "<Role Name>",
"description": "",
"assignableScopes": [
"<Subscription ID>"
],
"permissions": [
{
"actions": [
"Microsoft.HybridCompute/machines/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Compute/virtualMachines/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
]
}
}
Once the custom role is created you can then follow the link for steps on how to assign a role to the application.
API Documentation
Contact Us
If you're having problems configuring an Integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the Suggest Edits
link located in the upper right hand corner of the documentation.
Tags: cloud
Updated 7 days ago