You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-cluster-managed-identity-user-provided-resources.md
+58-18Lines changed: 58 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,6 +94,8 @@ The following steps should be followed for using UAMIs with Nexus Clusters and a
94
94
95
95
When creating or updating a Cluster with a user assigned managed identity, use the `--mi-user-assigned` parameter along with the resource ID of the UAMI. If you wish to specify multiple UAMIs, list the UAMIs' resources IDs with a space between them. Each UAMI that's used for a Key Vault, LAW, or Storage Account must be provided in this list.
96
96
97
+
When creating the Cluster, you can specify the UAMIs in `--mi-user-assigned` and also define the resource settings. When updating a Cluster to change a UAMI, you should first update the Cluster to set the `--mi-user-assigned` values and then update the Cluster to modify the resource settings to use it.
98
+
97
99
#### Storage Account settings
98
100
99
101
The `--command-output-settings` data construct is used to define the Storage Account where run command output is written. It consists of the following fields:
Updating a Cluster follows the same pattern as create. If you need to change the UAMI for a resource, you must include it in both the `--mi-user-assigned` field and corresponding `--identity-resource-id` for the Storage Account, LAW or Key Vault. If there are multiple UAMIs in use, the full list of UAMIs must be specified in the `--mi-user-assigned` field when updating.
165
+
Updating a Cluster is a two step process. If you need to change the UAMI for a resource, you must first update the cluster to include it in the `--mi-user-assigned` field and then update the corresponding `--identity-resource-id` for the Storage Account, LAW, or Key Vault.
164
166
165
-
For LAW and Key Vault, transitioning from the existing data constructs to the new constructs that use UAMI can be done via a Cluster Update.
167
+
If there are multiple UAMIs in use, the full list of UAMIs must be specified in the `--mi-user-assigned` field when updating. If a SAMI is in use on the Cluster and you're adding a UAMI, you must include `--mi-system-assigned` in the update command. Failure to include existing managed identities causes them to be removed.
166
168
167
-
> [!CAUTION]
168
-
> Changing the LAW settings might cause a brief disruption in sending metrics to the LAW as the extensions which use the LAW might need to be reinstalled.
169
+
For LAW and Key Vault, transitioning from the existing data constructs to the new constructs that use managed identities can be done via a Cluster Update.
170
+
171
+
_Example 1:_ Add a UAMI to a Cluster. Then assign the UAMI to the secret archive settings (Key Vault). If this Cluster had a SAMI defined, the SAMI would be removed.
169
172
170
-
_Example 1:_ Add user assigned identity and command output settings (Storage Account) to a Cluster.
173
+
Cluster update to add the UAMI `myUAMI`.
171
174
172
175
```azurecli-interactive
173
176
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
_Example 2:_ Add UAMI `mySecondUAMI` to a Cluster that already has `myFirstUAMI` which is retained. Then update the Cluster to assign `mySecondUAMI` to the command output settings (Storage Account).
190
+
191
+
Cluster update to add the UAMI `mySecondUAMI` while keeping `myFirstUAMI`.
192
+
193
+
```azurecli-interactive
194
+
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
_Example 2:_ Add user assigned identity and log analytics output settings (LAW) to a Cluster.
207
+
_Example 3:_ Update a Cluster that already has a SAMI and add a UAMI. The SAMI is retained. Then assign the UAMI to the log analytics output settings (LAW).
208
+
209
+
> [!CAUTION]
210
+
> Changing the LAW settings might cause a brief disruption in sending metrics to the LAW as the extensions which use the LAW might need to be reinstalled.
211
+
212
+
Cluster update to add the UAMI `mUAMI`.
181
213
182
214
```azurecli-interactive
183
215
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
@@ -346,6 +383,9 @@ Updating a Cluster follows the same pattern as create. If you need to change the
346
383
347
384
For LAW and Key Vault, transitioning from the existing data constructs to the new constructs that use UAMI can be done via a Cluster Update.
348
385
386
+
> [!IMPORTANT]
387
+
> When updating a Cluster with a UAMI or UAMIs in use, you must include the existing UAMIs in the `--mi-user-assigned` identity list when adding a SAMI or updating. If a SAMI is in use on the Cluster and you're adding a UAMI, you must include `--mi-system-assigned` in the update command. Failure to do so causes the respective managed identities to be removed.
388
+
349
389
_Example 1:_ Add or update the command output settings (Storage Account) for a Cluster.
Copy file name to clipboardExpand all lines: articles/storage/common/redundancy-migration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -371,7 +371,7 @@ The following table provides an overview of redundancy options available for sto
371
371
| ZRS Classic<sup>4</sup><br /><sub>(available in standard general purpose v1 accounts)</sub> |✅|||||
372
372
373
373
374
-
<sup>1</sup> Customer-initiated conversion for premium file shares can be undertaken using either [PowerShell](redundancy-migration.md?tabs=powershell#customer-initiated-conversion) or the [Azure CLI](redundancy-migration.md?tabs=azure-cli#customer-initiated-conversion). You can also [open a support request](#support-initiated-conversion).<br />
374
+
<sup>1</sup> Customer-initiated conversion for premium file shares can be undertaken using the [Azure Portal](../common/redundancy-migration.md?tabs=portal#customer-initiated-conversion), [PowerShell](redundancy-migration.md?tabs=powershell#customer-initiated-conversion), or the [Azure CLI](redundancy-migration.md?tabs=azure-cli#customer-initiated-conversion). You can also [open a support request](#support-initiated-conversion).<br />
375
375
<sup>2</sup> Managed disks are available for LRS and ZRS, though ZRS disks have some [limitations](/azure/virtual-machines/disks-redundancy#limitations). If an LRS disk is regional (no zone specified), it can be converted by [changing the SKU](/azure/virtual-machines/disks-convert-types). If an LRS disk is zonal, then it can only be manually migrated by following the process in [Migrate your managed disks](../../reliability/migrate-vm.md#migrate-your-managed-disks). You can store snapshots and images for standard SSD managed disks on standard HDD storage and [choose between LRS and ZRS options](https://azure.microsoft.com/pricing/details/managed-disks/). For information about integration with availability sets, see [Introduction to Azure managed disks](/azure/virtual-machines/managed-disks-overview#integration-with-availability-sets).<br />
376
376
<sup>3</sup> If your storage account is v1, you need to upgrade it to v2 before performing a conversion. To learn how to upgrade your v1 account, see [Upgrade to a general-purpose v2 storage account](storage-account-upgrade.md).<br />
377
377
<sup>4</sup> ZRS Classic storage accounts are deprecated. For information about converting ZRS Classic accounts, see [Converting ZRS Classic accounts](#converting-zrs-classic-accounts).<br />
@@ -436,7 +436,7 @@ You can't convert storage accounts to zone-redundancy (ZRS, GZRS, or RA-GZRS) if
436
436
- NFSv3 protocol support is enabled for Azure Blob Storage
437
437
- The storage account contains Azure Files NFSv4.1 shares with public endpoint access enabled
438
438
439
-
Converting NFSv4.1 shares with public endpoints enabled isn't supported. To change redundancy for NFS shares with public endpoints, follow these steps in order:
439
+
**Converting NFSv4.1 shares with public endpoints enabled isn't supported.** To change redundancy for NFS shares with public endpoints, follow these steps in order:
440
440
441
441
1.[Disable access](../files/storage-files-networking-endpoints.md#restrict-public-endpoint-access) to the storage account's public endpoint.
442
442
1. Submit the conversion request to change redundancy of the given storage account.
Copy file name to clipboardExpand all lines: articles/storage/common/storage-redundancy.md
-12Lines changed: 0 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,18 +85,6 @@ The archive tier for Blob Storage isn't currently supported for ZRS, GZRS, or RA
85
85
86
86
For more information about which regions support ZRS, see [Azure regions with availability zones](../../reliability/availability-zones-region-support.md).
87
87
88
-
#### Premium file share accounts
89
-
90
-
ZRS is supported for premium file shares (Azure Files) through the `FileStorage` storage account kind.
91
-
92
-
For a list of regions that support zone-redundant storage (ZRS) for premium file share accounts, see [Azure Files zone-redundant storage for premium file shares](../files/redundancy-premium-file-shares.md).
93
-
94
-
#### Managed disks
95
-
96
-
ZRS is supported for managed disks with the following [limitations](/azure/virtual-machines/disks-redundancy#limitations).
97
-
98
-
For a list of regions that support zone-redundant storage (ZRS) for managed disks, see [regional availability](/azure/virtual-machines/disks-redundancy#regional-availability).
99
-
100
88
## Redundancy in a secondary region
101
89
102
90
Redundancy options can help provide high durability for your applications. In many regions, you can copy the data within your storage account to a secondary region located hundreds of miles away from the primary region. Copying your storage account to a secondary region ensures that your data remains durable during a complete regional outage or a disaster in which the primary region isn't recoverable.
0 commit comments