Skip to content

Commit 5d2eb0a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into us370875-cli-posh-nat
2 parents a7d4fa1 + 30dd80b commit 5d2eb0a

File tree

3 files changed

+60
-32
lines changed

3 files changed

+60
-32
lines changed

articles/operator-nexus/howto-cluster-managed-identity-user-provided-resources.md

Lines changed: 58 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,8 @@ The following steps should be followed for using UAMIs with Nexus Clusters and a
9494

9595
When creating or updating a Cluster with a user assigned managed identity, use the `--mi-user-assigned` parameter along with the resource ID of the UAMI. If you wish to specify multiple UAMIs, list the UAMIs' resources IDs with a space between them. Each UAMI that's used for a Key Vault, LAW, or Storage Account must be provided in this list.
9696

97+
When creating the Cluster, you can specify the UAMIs in `--mi-user-assigned` and also define the resource settings. When updating a Cluster to change a UAMI, you should first update the Cluster to set the `--mi-user-assigned` values and then update the Cluster to modify the resource settings to use it.
98+
9799
#### Storage Account settings
98100

99101
The `--command-output-settings` data construct is used to define the Storage Account where run command output is written. It consists of the following fields:
@@ -160,41 +162,68 @@ az networkcloud cluster create --name "clusterName" -g "resourceGroupName" \
160162

161163
#### Cluster update examples
162164

163-
Updating a Cluster follows the same pattern as create. If you need to change the UAMI for a resource, you must include it in both the `--mi-user-assigned` field and corresponding `--identity-resource-id` for the Storage Account, LAW or Key Vault. If there are multiple UAMIs in use, the full list of UAMIs must be specified in the `--mi-user-assigned` field when updating.
165+
Updating a Cluster is a two step process. If you need to change the UAMI for a resource, you must first update the cluster to include it in the `--mi-user-assigned` field and then update the corresponding `--identity-resource-id` for the Storage Account, LAW, or Key Vault.
164166

165-
For LAW and Key Vault, transitioning from the existing data constructs to the new constructs that use UAMI can be done via a Cluster Update.
167+
If there are multiple UAMIs in use, the full list of UAMIs must be specified in the `--mi-user-assigned` field when updating. If a SAMI is in use on the Cluster and you're adding a UAMI, you must include `--mi-system-assigned` in the update command. Failure to include existing managed identities causes them to be removed.
166168

167-
> [!CAUTION]
168-
> Changing the LAW settings might cause a brief disruption in sending metrics to the LAW as the extensions which use the LAW might need to be reinstalled.
169+
For LAW and Key Vault, transitioning from the existing data constructs to the new constructs that use managed identities can be done via a Cluster Update.
170+
171+
_Example 1:_ Add a UAMI to a Cluster. Then assign the UAMI to the secret archive settings (Key Vault). If this Cluster had a SAMI defined, the SAMI would be removed.
169172

170-
_Example 1:_ Add user assigned identity and command output settings (Storage Account) to a Cluster.
173+
Cluster update to add the UAMI `myUAMI`.
171174

172175
```azurecli-interactive
173176
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
174-
--mi-user-assigned "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI" \
175-
--command-output-settings identity-type="UserAssignedIdentity" \
177+
--mi-user-assigned "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI" \
178+
```
179+
180+
Cluster update to assign `myUAMI` to the secret archive settings.
181+
182+
```azurecli-interactive
183+
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
184+
--secret-archive-settings identity-type="UserAssignedIdentity" \
176185
identity-resource-id="/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI" \
186+
vault-uri="https://keyvaultname.vault.azure.net/"
187+
```
188+
189+
_Example 2:_ Add UAMI `mySecondUAMI` to a Cluster that already has `myFirstUAMI` which is retained. Then update the Cluster to assign `mySecondUAMI` to the command output settings (Storage Account).
190+
191+
Cluster update to add the UAMI `mySecondUAMI` while keeping `myFirstUAMI`.
192+
193+
```azurecli-interactive
194+
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
195+
--mi-user-assigned "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myFirstUAMI" "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/mySecondUAMI" \
196+
```
197+
198+
Cluster update to assign `mySecondUAMI` to the command output settings.
199+
200+
```azurecli-interactive
201+
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
202+
--command-output-settings identity-type="UserAssignedIdentity" \
203+
identity-resource-id="/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/mySecondUAMI" \
177204
container-url="https://myaccount.blob.core.windows.net/mycontainer?restype=container"
178205
```
179206

180-
_Example 2:_ Add user assigned identity and log analytics output settings (LAW) to a Cluster.
207+
_Example 3:_ Update a Cluster that already has a SAMI and add a UAMI. The SAMI is retained. Then assign the UAMI to the log analytics output settings (LAW).
208+
209+
> [!CAUTION]
210+
> Changing the LAW settings might cause a brief disruption in sending metrics to the LAW as the extensions which use the LAW might need to be reinstalled.
211+
212+
Cluster update to add the UAMI `mUAMI`.
181213

182214
```azurecli-interactive
183215
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
184-
--mi-user-assigned "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI" \
185-
--analytics-output-settings analytics-workspace-id="/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/microsoft.operationalInsights/workspaces/logAnalyticsWorkspaceName" \
186-
identity-type="UserAssignedIdentity" \
187-
identity-resource-id="/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI"
216+
--mi-user-assigned "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI" \
217+
--mi-system-assigned
188218
```
189219

190-
_Example 3:_ Add user assigned identity and secret archive settings (Key Vault) to a Cluster.
220+
Cluster update to assign `myUAMI` to the log analysis output settings.
191221

192222
```azurecli-interactive
193223
az networkcloud cluster update --name "clusterName" --resource-group "resourceGroupName" \
194-
--mi-user-assigned "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI" \
195-
--secret-archive-settings identity-type="UserAssignedIdentity" \
196-
identity-resource-id="/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI" \
197-
vault-uri="https://keyvaultname.vault.azure.net/"
224+
--analytics-output-settings analytics-workspace-id="/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/microsoft.operationalInsights/workspaces/logAnalyticsWorkspaceName" \
225+
identity-type="UserAssignedIdentity" \
226+
identity-resource-id="/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI"
198227
```
199228

200229
### View the principal ID for the User Assigned Managed Identity
@@ -257,10 +286,18 @@ az networkcloud cluster create --name "clusterName" -g "resourceGroupName" \
257286
--mi-system-assigned
258287
```
259288

260-
_Example 2:_ This example updates a Cluster to specify a SAMI.
289+
_Example 2:_ This example updates a Cluster to add a SAMI. Any UAMIs defined on the Cluster are removed.
290+
291+
```azurecli-interactive
292+
az networkcloud cluster update --name "clusterName" -g "resourceGroupName" \
293+
--mi-system-assigned
294+
```
295+
296+
_Example 3:_ This example updates a Cluster to add a SAMI and keeps the existing UAMI, `myUAMI`.
261297

262298
```azurecli-interactive
263299
az networkcloud cluster update --name "clusterName" -g "resourceGroupName" \
300+
--mi-user-assigned "/subscriptions/subscriptionId/resourceGroups/resourceGroupName/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myUAMI" \
264301
--mi-system-assigned
265302
```
266303

@@ -346,6 +383,9 @@ Updating a Cluster follows the same pattern as create. If you need to change the
346383

347384
For LAW and Key Vault, transitioning from the existing data constructs to the new constructs that use UAMI can be done via a Cluster Update.
348385

386+
> [!IMPORTANT]
387+
> When updating a Cluster with a UAMI or UAMIs in use, you must include the existing UAMIs in the `--mi-user-assigned` identity list when adding a SAMI or updating. If a SAMI is in use on the Cluster and you're adding a UAMI, you must include `--mi-system-assigned` in the update command. Failure to do so causes the respective managed identities to be removed.
388+
349389
_Example 1:_ Add or update the command output settings (Storage Account) for a Cluster.
350390

351391
```azurecli-interactive

articles/storage/common/redundancy-migration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -371,7 +371,7 @@ The following table provides an overview of redundancy options available for sto
371371
| ZRS Classic<sup>4</sup><br /><sub>(available in standard general purpose v1 accounts)</sub> | &#x2705; | | | | |
372372

373373

374-
<sup>1</sup> Customer-initiated conversion for premium file shares can be undertaken using either [PowerShell](redundancy-migration.md?tabs=powershell#customer-initiated-conversion) or the [Azure CLI](redundancy-migration.md?tabs=azure-cli#customer-initiated-conversion). You can also [open a support request](#support-initiated-conversion).<br />
374+
<sup>1</sup> Customer-initiated conversion for premium file shares can be undertaken using the [Azure Portal](../common/redundancy-migration.md?tabs=portal#customer-initiated-conversion), [PowerShell](redundancy-migration.md?tabs=powershell#customer-initiated-conversion), or the [Azure CLI](redundancy-migration.md?tabs=azure-cli#customer-initiated-conversion). You can also [open a support request](#support-initiated-conversion).<br />
375375
<sup>2</sup> Managed disks are available for LRS and ZRS, though ZRS disks have some [limitations](/azure/virtual-machines/disks-redundancy#limitations). If an LRS disk is regional (no zone specified), it can be converted by [changing the SKU](/azure/virtual-machines/disks-convert-types). If an LRS disk is zonal, then it can only be manually migrated by following the process in [Migrate your managed disks](../../reliability/migrate-vm.md#migrate-your-managed-disks). You can store snapshots and images for standard SSD managed disks on standard HDD storage and [choose between LRS and ZRS options](https://azure.microsoft.com/pricing/details/managed-disks/). For information about integration with availability sets, see [Introduction to Azure managed disks](/azure/virtual-machines/managed-disks-overview#integration-with-availability-sets).<br />
376376
<sup>3</sup> If your storage account is v1, you need to upgrade it to v2 before performing a conversion. To learn how to upgrade your v1 account, see [Upgrade to a general-purpose v2 storage account](storage-account-upgrade.md).<br />
377377
<sup>4</sup> ZRS Classic storage accounts are deprecated. For information about converting ZRS Classic accounts, see [Converting ZRS Classic accounts](#converting-zrs-classic-accounts).<br />
@@ -436,7 +436,7 @@ You can't convert storage accounts to zone-redundancy (ZRS, GZRS, or RA-GZRS) if
436436
- NFSv3 protocol support is enabled for Azure Blob Storage
437437
- The storage account contains Azure Files NFSv4.1 shares with public endpoint access enabled
438438

439-
Converting NFSv4.1 shares with public endpoints enabled isn't supported. To change redundancy for NFS shares with public endpoints, follow these steps in order:
439+
**Converting NFSv4.1 shares with public endpoints enabled isn't supported.** To change redundancy for NFS shares with public endpoints, follow these steps in order:
440440

441441
1. [Disable access](../files/storage-files-networking-endpoints.md#restrict-public-endpoint-access) to the storage account's public endpoint.
442442
1. Submit the conversion request to change redundancy of the given storage account.

articles/storage/common/storage-redundancy.md

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -85,18 +85,6 @@ The archive tier for Blob Storage isn't currently supported for ZRS, GZRS, or RA
8585

8686
For more information about which regions support ZRS, see [Azure regions with availability zones](../../reliability/availability-zones-region-support.md).
8787

88-
#### Premium file share accounts
89-
90-
ZRS is supported for premium file shares (Azure Files) through the `FileStorage` storage account kind.
91-
92-
For a list of regions that support zone-redundant storage (ZRS) for premium file share accounts, see [Azure Files zone-redundant storage for premium file shares](../files/redundancy-premium-file-shares.md).
93-
94-
#### Managed disks
95-
96-
ZRS is supported for managed disks with the following [limitations](/azure/virtual-machines/disks-redundancy#limitations).
97-
98-
For a list of regions that support zone-redundant storage (ZRS) for managed disks, see [regional availability](/azure/virtual-machines/disks-redundancy#regional-availability).
99-
10088
## Redundancy in a secondary region
10189

10290
Redundancy options can help provide high durability for your applications. In many regions, you can copy the data within your storage account to a secondary region located hundreds of miles away from the primary region. Copying your storage account to a secondary region ensures that your data remains durable during a complete regional outage or a disaster in which the primary region isn't recoverable.

0 commit comments

Comments
 (0)