Skip to content

Commit 65b1cd7

Browse files
Merge pull request #274525 from jjaygbay1/arc-deploy
Updated article to reflcect Hetal's input
2 parents 2797252 + f36d183 commit 65b1cd7

File tree

1 file changed

+40
-29
lines changed

1 file changed

+40
-29
lines changed

articles/azure-vmware/deploy-arc-for-azure-vmware-solution.md

Lines changed: 40 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -17,39 +17,33 @@ In this article, learn how to deploy Arc-enabled VMware vSphere for Azure VMware
1717
- Install the Arc-connected machine agent to [govern, protect, configure, and monitor](/azure/azure-arc/servers/overview#supported-cloud-operations) them.
1818
- Browse your VMware vSphere resources (vms, templates, networks, and storage) in Azure
1919

20-
21-
## Deployment Considerations
20+
## Deployment considerations
2221

2322
When you run software in Azure VMware Solution, as a private cloud in Azure, there are benefits not realized by operating your environment outside of Azure. For software running in a virtual machine (VM) like, SQL Server and Windows Server, running in Azure VMware Solution provides more value such as free Extended Security Updates (ESUs).
2423

25-
To take advantage of the benefits when you're running in an Azure VMware Solution, use this article to enable Arc and fully integrate the experience with the Azure VMware Solution private cloud. Alternatively, Arc-enabling VMs through the following mechanisms won't create the necessary attributes to register the VM and software as part of Azure VMware Solution and will result in billing for SQL Server ESUs for:
24+
To take advantage of the benefits of running in an Azure VMware Solution, use this article to enable Arc and fully integrate the experience with the Azure VMware Solution private cloud. Alternatively, Arc-enabling VMs through the following mechanisms won't create the necessary attributes to register the VM and software as part of Azure VMware Solution and will result in billing for SQL Server ESUs for:
2625

2726
- Arc-enabled servers
2827
- Arc-enabled VMware vSphere
2928
- SQL Server enabled by Azure Arc
3029

31-
## How to manually integrate an Arc-enabled VM into Azure VMware Solutions
32-
33-
When a VM in Azure VMware Solution private cloud is Arc-enabled using a method distinct from the one outlined in this document, the following steps are provided to refresh the integration between the Arc-enabled VMs and Azure VMware Solution
34-
35-
These steps change the VM machine type from _Machine – Azure Arc_ to type _Machine – Azure Arc (AVS),_ which has the necessary integrations with Azure VMware Solution. 
36-
37-
There are two ways to refresh the integration between the Arc-enabled VMs and Azure VMware Solution:  
38-
39-
1. In the Azure VMware Solution private cloud, navigate to the vCenter Server inventory and Virtual Machines section within the portal. Locate the virtual machine that requires updating and follow the process to 'Enable in Azure'. If the option is grayed out, you must first **Remove from Azure** and then proceed to **Enable in Azure**
40-
41-
2. Run the [az connectedvmware vm create](/cli/azure/connectedvmware/vm?view=azure-cli-latest%22%20\l%20%22az-connectedvmware-vm-create&preserve-view=true) Azure CLI command on the VM in Azure VMware Solution to update the machine type. 
42-
43-
44-
```azurecli
45-
az connectedvmware vm create --subscription <subscription-id> --location <Azure region of the machine> --resource-group <resource-group-name> --custom-location /providers/microsoft.extendedlocation/customlocations/<custom-location-name> --name <machine-name> --inventory-item /subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.ConnectedVMwarevSphere/VCenters/<vcenter-name>/InventoryItems/<machine-name>
46-
```
47-
4830
## Deploy Arc
4931

50-
The following requirements must be met in order to use Azure Arc-enabled Azure VMware Solutions.
32+
The following requirements must be met in order to use Azure Arc-enabled Azure VMware Solution.
5133

5234
### Prerequisites
35+
The following Register features are for provider registration using Azure CLI.
36+
37+
```dotnetcli
38+
az provider register --namespace Microsoft.ConnectedVMwarevSphere
39+
az provider register --namespace Microsoft.ExtendedLocation
40+
az provider register --namespace Microsoft.KubernetesConfiguration
41+
az provider register --namespace Microsoft.ResourceConnector
42+
az provider register --namespace Microsoft.AVS
43+
```
44+
Alternately, you can sign in to your Subscription and follow these steps.
45+
1. Navigate to the Resource providers tab.
46+
1. Register the resource providers mentioned above.
5347

5448
> [!IMPORTANT]
5549
> You can't create the resources in a separate resource group. Ensure you use the same resource group from where the Azure VMware Solution private cloud was created to create your resources.
@@ -60,7 +54,7 @@ You need the following items to ensure you're set up to begin the onboarding pro
6054
- A [management VM](/azure/azure-arc/resource-bridge/system-requirements#management-machine-requirements) with internet access that has a direct line of site to the vCenter Server.
6155
- From the Management VM, verify you have access to [vCenter Server and NSX Manager portals](/azure/azure-vmware/tutorial-access-private-cloud#connect-to-the-vcenter-server-of-your-private-cloud).
6256
- A resource group in the subscription where you have an owner or contributor role.
63-
- An unused, isolated [NSX network segment](/azure/azure-vmware/tutorial-nsx-t-network-segment) that is a static network segment used for deploying the Arc for Azure VMware Solution OVA. If an isolated NSX-T Data Center network segment doesn't exist, one gets created.
57+
- An unused, [NSX network segment](/azure/azure-vmware/tutorial-nsx-t-network-segment) that is a static network segment used for deploying the Arc for Azure VMware Solution OVA. If an isolated NSX-T Data Center network segment doesn't exist, one gets created.
6458
- The firewall and proxy URLs must be allowlisted to enable communication from the management machine and Appliance VM to the required Arc resource bridge URLs. See the [Azure Arc resource bridge network requirements](/azure/azure-arc/resource-bridge/network-requirements).
6559
- Verify your vCenter Server version is 7.0 or higher.
6660
- A resource pool or a cluster with a minimum capacity of 16 GB of RAM and four vCPUs.
@@ -72,7 +66,7 @@ You need the following items to ensure you're set up to begin the onboarding pro
7266
7367
If you want to use a custom DNS, use the following steps:
7468

75-
1. In your Azure VMware Solution private cloud, navigate to the DNS page, under **Workload networking**, select **DNS** and identify the default forwarder-zones under the **DNS zones** tab.
69+
1. In your Azure VMware Solution private cloud, navigate to the DNS page, under **Workload networking**, select **DNS, and identify the default forwarder-zones under the **DNS zones** tab.
7670
1. Edit the forwarder zone to add the custom DNS server IP. By adding the custom DNS as the first IP, it allows requests to be directly forwarded to the first IP and decreases the number of retries.
7771

7872
## Onboard process to deploy Azure Arc
@@ -108,7 +102,7 @@ Use the following steps to guide you through the process to onboard Azure Arc fo
108102
- `applianceControlPlaneIpAddress` is the IP address for the Kubernetes API server that should be part of the segment IP CIDR provided. It shouldn't be part of the K8s node pool IP range.
109103
- `k8sNodeIPPoolStart`, `k8sNodeIPPoolEnd` are the starting and ending IP of the pool of IPs to assign to the appliance VM. Both need to be within the `networkCIDRForApplianceVM`.
110104
- `k8sNodeIPPoolStart`, `k8sNodeIPPoolEnd`, `gatewayIPAddress` ,`applianceControlPlaneIpAddress` are optional. You can choose to skip all the optional fields or provide values for all. If you choose not to provide the optional fields, then you must use /28 address space for `networkCIDRForApplianceVM` with the first lp as the gateway.
111-
- If all the parameters are provided, the firewall and proxy URLs must be allowlisted for the lps between k8sNodeIPPoolStart, k8sNodeIPPoolEnd.
105+
- If all the parameters are provided, the firewall and proxy URLs must be allowlisted for the lps between K8sNodeIPPoolStart, k8sNodeIPPoolEnd.
112106
- If you're skipping the optional fields, the firewall and proxy URLs must be allowlisted the following IPs in the segment. If the networkCIDRForApplianceVM is x.y.z.1/28, the IPs to allowlist are between x.y.z.11 – x.y.z.14. See the [Azure Arc resource bridge network requirements](/azure/azure-arc/resource-bridge/network-requirements). 
113107

114108
**Json example**
@@ -142,7 +136,7 @@ Use the following steps to guide you through the process to onboard Azure Arc fo
142136
$ chmod +x run.sh
143137
$ sudo bash run.sh onboard {config-json-path}
144138
```
145-
---
139+
146140

147141
4. More Azure resources are created in your resource group.
148142
- Resource bridge
@@ -179,14 +173,14 @@ Once you connected your Azure VMware Solution private cloud to Azure, you can br
179173
> Enabling Azure Arc on a VMware vSphere resource is a read-only operation on vCenter Server. It doesn't make changes to your resource in vCenter Server.
180174

181175
1. On your Azure VMware Solution private cloud, in the left navigation, locate **vCenter Server Inventory**.
182-
2. Select the resource(s) you want to enable, then select **Enable in Azure**.
176+
2. Select the resources you want to enable, then select **Enable in Azure**.
183177
3. Select your Azure **Subscription** and **Resource Group**, then select **Enable**.
184178

185179
The enable action starts a deployment and creates a resource in Azure, creating representative objects in Azure for your VMware vSphere resources. It allows you to manage who can access those resources through Role-based access control granularly.
186180

187181
Repeat the previous steps for one or more virtual machine, network, resource pool, and VM template resources.
188182

189-
Additionally, for virtual machines there is an additional section to configure **VM extensions**. This will enable guest management to facilitate additional Azure extensions to be installed on the VM. The steps to enable this would be:
183+
Additionally, for virtual machines there's an another section to configure **VM extensions**. This enables guest management to facilitate more Azure extensions to be installed on the VM. The steps to enable this would be:
190184

191185
1. Select **Enable guest management**.
192186
2. Choose a __Connectivity Method__ for the Arc agent.
@@ -220,9 +214,26 @@ You need to enable guest management on the VMware VM before you can install an e
220214
1. Select **Configuration** from the left navigation for a VMware VM.
221215
1. Verify **Enable guest management** is now checked.
222216

223-
From here additional extensions can be installed. See the [VM extensions Overview](/azure/azure-arc/servers/manage-vm-extensions) for a list of current extensions.
217+
From here more extensions can be installed. See the [VM extensions Overview](/azure/azure-arc/servers/manage-vm-extensions) for a list of current extensions.
218+
219+
## Manually integrate an Arc-enabled VM into Azure VMware Solutions
220+
221+
When a VM in Azure VMware Solution private cloud is Arc-enabled using a method distinct from the one outlined in this document, the following steps are provided to refresh the integration between the Arc-enabled VMs and Azure VMware Solution.
222+
223+
These steps change the VM machine type from _Machine – Azure Arc_ to type _Machine – Azure Arc (AVS),_ which has the necessary integrations with Azure VMware Solution. 
224+
225+
There are two ways to refresh the integration between the Arc-enabled VMs and Azure VMware Solution:  
226+
227+
1. In the Azure VMware Solution private cloud, navigate to the vCenter Server inventory and Virtual Machines section within the portal. Locate the virtual machine that requires updating and follow the process to 'Enable in Azure'. If the option is grayed out, you must first **Remove from Azure** and then proceed to **Enable in Azure**
228+
229+
2. Run the [az connectedvmware vm create](/cli/azure/connectedvmware/vm?view=azure-cli-latest%22%20\l%20%22az-connectedvmware-vm-create&preserve-view=true) Azure CLI command on the VM in Azure VMware Solution to update the machine type. 
230+
231+
232+
```azurecli
233+
az connectedvmware vm create --subscription <subscription-id> --location <Azure region of the machine> --resource-group <resource-group-name> --custom-location /providers/microsoft.extendedlocation/customlocations/<custom-location-name> --name <machine-name> --inventory-item /subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.ConnectedVMwarevSphere/VCenters/<vcenter-name>/InventoryItems/<machine-name>
234+
```
224235

225236
### Next Steps
226237

227238
To manage Arc-enabled Azure VMware Solution go to: [Manage Arc-enabled Azure VMware private cloud - Azure VMware Solution](/azure/azure-vmware/manage-arc-enabled-azure-vmware-solution)
228-
To remove Arc-enabled  Azure VMWare Solution resources from Azure go to: [Remove Arc-enabled Azure VMware Solution vSphere resources from Azure - Azure VMware Solution](/azure/azure-vmware/remove-arc-enabled-azure-vmware-solution-vsphere-resources-from-azure)
239+
To remove Arc-enabled  Azure VMware Solution resources from Azure go to: [Remove Arc-enabled Azure VMware Solution vSphere resources from Azure - Azure VMware Solution.](/azure/azure-vmware/remove-arc-enabled-azure-vmware-solution-vsphere-resources-from-azure)

0 commit comments

Comments
 (0)