Skip to content

Commit c8fc73d

Browse files
authored
Merge pull request #183839 from MicrosoftDocs/master
12/30/2021 AM Publish
2 parents d39051a + c934bb3 commit c8fc73d

File tree

48 files changed

+1330
-154
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+1330
-154
lines changed

articles/active-directory/managed-identities-azure-resources/services-support-managed-identities.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: List of services that support managed identities for Azure resource
44
services: active-directory
55
author: barclayn
66
ms.author: barclayn
7-
ms.date: 10/26/2021
7+
ms.date: 11/09/2021
88
ms.topic: conceptual
99
ms.service: active-directory
1010
ms.subservice: msi
@@ -81,6 +81,15 @@ All Azure Arc-enabled servers have a system assigned identity. You cannot disabl
8181
- [Authenticate against Azure resources with Azure Arc-enabled servers](../../azure-arc/servers/managed-identity-authentication.md)
8282
- [Using a managed identity with Azure Arc-enabled servers](../../azure-arc/servers/security-overview.md#using-a-managed-identity-with-azure-arc-enabled-servers)
8383

84+
### Azure Arc resource bridge
85+
86+
| Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
87+
| --- | :-: | :-: | :-: | :-: |
88+
| System assigned | ![Available][check] | Not available | Not available | Not available |
89+
| User assigned | Not available | Not available | Not available | Not available |
90+
91+
Azure Arc resource bridge currently [supports system assigned identity](../../azure-arc/resource-bridge/security-overview.md). The managed service identity is used by agents in the resource bridge for communication with Azure.
92+
8493
### Azure Automanage
8594

8695
| Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
@@ -116,7 +125,6 @@ Refer to the following list to use a managed identity with [Azure Blueprints](..
116125
- [Azure portal - blueprint assignment](../../governance/blueprints/create-blueprint-portal.md#assign-a-blueprint)
117126
- [REST API - blueprint assignment](../../governance/blueprints/create-blueprint-rest-api.md#assign-a-blueprint)
118127

119-
120128
### Azure Cognitive Search
121129

122130
Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
@@ -144,7 +152,6 @@ Refer to the following list to configure managed identity for Azure Container In
144152
- [Azure Resource Manager template](~/articles/container-instances/container-instances-managed-identity.md#enable-managed-identity-using-resource-manager-template)
145153
- [YAML](~/articles/container-instances/container-instances-managed-identity.md#enable-managed-identity-using-yaml-file)
146154

147-
148155
### Azure Container Registry Tasks
149156

150157
Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
@@ -238,7 +245,6 @@ Managed identity type | All Generally Available<br>Global Azure Regions | Azure
238245
| System assigned | ![Available][check] | ![Available][check] | Not available | Not available |
239246
| User assigned | Preview | ![Available][check] | Not available | Not available |
240247

241-
242248
For more information, see [Use managed identities in Azure Kubernetes Service](../../aks/use-managed-identity.md).
243249

244250
### Azure Log Analytics cluster
@@ -257,7 +263,6 @@ Managed identity type | All Generally Available<br>Global Azure Regions | Azure
257263
| System assigned | ![Available][check] | ![Available][check] | Not available | ![Available][check] |
258264
| User assigned | ![Available][check] | ![Available][check] | Not available | ![Available][check] |
259265

260-
261266
Refer to the following list to configure managed identity for Azure Logic Apps (in regions where available):
262267

263268
- [Azure portal](../../logic-apps/create-managed-service-identity.md#enable-system-assigned-identity-in-azure-portal)
@@ -298,7 +303,6 @@ Refer to the following list to configure managed identity for Azure Policy (in r
298303
- [Azure Resource Manager templates](/azure/templates/microsoft.authorization/policyassignments)
299304
- [REST](/rest/api/policy/policyassignments/create)
300305

301-
302306
### Azure Service Fabric
303307

304308
[Managed Identity for Service Fabric Applications](../../service-fabric/concepts-managed-identity.md) is available in all regions.
@@ -344,8 +348,6 @@ Refer to the following list to configure managed identity for Azure Virtual Mach
344348
- [Azure Resource Manager templates](qs-configure-template-windows-vm.md)
345349
- [REST](qs-configure-rest-vm.md)
346350

347-
348-
349351
### Azure Virtual Machines
350352

351353
| Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
@@ -362,7 +364,6 @@ Refer to the following list to configure managed identity for Azure Virtual Mach
362364
- [REST](qs-configure-rest-vm.md)
363365
- [Azure SDKs](qs-configure-sdk-windows-vm.md)
364366

365-
366367
### Azure VM Image Builder
367368

368369
| Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
@@ -504,5 +505,4 @@ Managed identity type | All Generally Available<br>Global Azure Regions | Azure
504505
> [!NOTE]
505506
> You can use Managed Identities to authenticate an [Azure Stream analytics job to Power BI](../../stream-analytics/powerbi-output-managed-identity.md).
506507
507-
508-
[check]: media/services-support-managed-identities/check.png "Available"
508+
[check]: media/services-support-managed-identities/check.png "Available"

articles/azure-arc/breadcrumb/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,3 +12,6 @@
1212
- name: Azure Arc
1313
tocHref: /azure-arc/kubernetes/
1414
topicHref: /azure/azure-arc/index
15+
- name: Azure Arc
16+
tocHref: /azure-arc/vmware-vsphere/
17+
topicHref: /azure/azure-arc/index

articles/azure-arc/index.yml

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ metadata:
1010
description: Learn how to deploy resources to complex and distributed environments across on-premises, edge and multicloud. Azure Arc enables deployment of Azure services anywhere and extends Azure management to any infrastructure.
1111
ms.service: azure-arc
1212
ms.topic: hub-page
13-
author: MGoedtel
13+
author: mgoedtel
1414
ms.author: magoedte
15-
ms.date: 06/28/2021
15+
ms.date: 10/25/2021
1616
ms.custom: e2e-hybrid
1717

1818
# highlightedContent section (optional)
@@ -133,3 +133,12 @@ conceptualContent:
133133
- url: /sql/sql-server/azure-arc/configure-advanced-data-security
134134
itemType: how-to-guide
135135
text: Configure advanced data security
136+
# Card
137+
- title: Azure Arc-enabled private clouds
138+
links:
139+
- url: /resource-bridge/overview
140+
itemType: overview
141+
text: Azure Arc resource bridge overview
142+
- url: /vmware-vsphere/quick-start-connect-vcenter-to-arc-using-script
143+
itemType: quickstart
144+
text: Connect your VMware vCenter to Azure Arc
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: "Overview of Custom Locations with Azure Arc"
3+
services: azure-arc
4+
ms.service: azure-arc
5+
ms.date: 10/13/2021
6+
ms.topic: conceptual
7+
author: mgoedtel
8+
ms.author: magoedte
9+
description: "This article provides a conceptual overview of Custom Locations capability of Azure Arc"
10+
---
11+
12+
# What is a Custom location?
13+
14+
As an extension of the Azure location construct, *Custom Locations* provides a reference as deployment target which administrators can setup, and user can point to, when creating an Azure resource. It abstracts the backend infrastructure details from application developers, database admin users, or other users in the organization. Since Custom Locations is an Azure Resource Manager resource that supports [Role based Access Control](../../role-based-access-control/overview.md) (RBAC), an administrator or operator can determine which users have access to create resource instances on:
15+
16+
* A namespace within a Kubernetes cluster to target deployment of Azure Arc-enabled SQL Managed Instance and Azure Arc-enabled PostgreSQL Hyperscale instances.
17+
* The compute, storage, networking, and other vCenter or Azure Stack HCI resources to deploy and manage VMs.
18+
19+
They are represented by a custom location by assigning RBAC permissions to users within your organization on the custom location.
20+
21+
For example, a cluster operator can create a custom location **Contoso-Michigan-Healthcare-App** representing a namespace on a Kubernetes cluster in your organization's Michigan Data Center and assign permissions to application developers on this custom location to deploy healthcare related web applications without the developer having to know details of the namespace and Kubernetes cluster where the application would be deployed on.
22+
23+
On Arc-enabled Kubernetes clusters, Custom Locations represents an abstraction of a namespace within the Azure Arc-enabled Kubernetes cluster. Custom Locations creates the granular [RoleBindings and ClusterRoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) necessary for other Azure services to access the cluster. These other Azure services require cluster access to manage resources you want to deploy on your clusters.
24+
25+
## Architecture for Arc-enabled Kubernetes
26+
27+
When an administrator enables the Custom Locations feature on the cluster, a ClusterRoleBinding is created on the cluster, authorizing the Azure AD application used by the Custom Locations Resource Provider (RP). Once authorized, Custom Locations RP can create ClusterRoleBindings or RoleBindings needed by other Azure RPs to create custom resources on this cluster. The cluster extensions installed on the cluster determines the list of RPs to authorize.
28+
29+
[ ![Use custom locations](../kubernetes/media/conceptual-custom-locations-usage.png) ](../kubernetes/media/conceptual-custom-locations-usage.png#lightbox)
30+
31+
[!INCLUDE [preview features note](../kubernetes/includes/preview/preview-callout.md)]
32+
33+
When the user creates a data service instance on the cluster:
34+
1. The **PUT** request is sent to Azure Resource Manager.
35+
1. The **PUT** request is forwarded to the Azure Arc-enabled Data Services RP.
36+
1. The RP fetches the `kubeconfig` file associated with the Azure Arc-enabled Kubernetes cluster, on which the Custom Location exists.
37+
* Custom Location is referenced as `extendedLocation` in the original PUT request.
38+
1. Azure Arc-enabled Data Services RP uses the `kubeconfig` to communicate with the cluster to create a custom resource of the Azure Arc-enabled Data Services type on the namespace mapped to the Custom Location.
39+
* The Azure Arc-enabled Data Services operator was deployed via cluster extension creation before the Custom Location existed.
40+
1. The Azure Arc-enabled Data Services operator reads the new custom resource created on the cluster and creates the data controller, translating into realization of the desired state on the cluster.
41+
42+
The sequence of steps to create the SQL managed instance and PostgreSQL instance are identical to the sequence of steps described above.
43+
44+
## Next steps
45+
46+
* Use our quickstart to [connect a Kubernetes cluster to Azure Arc](../kubernetes/quickstart-connect-cluster.md). Then [Create a custom location](../kubernetes/custom-locations.md) on your Azure Arc-enabled Kubernetes cluster.
137 KB
Loading
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Azure Arc resource bridge (preview) overview
3+
description: Learn how to use Azure Arc resource bridge (preview) to support VM self-servicing on Azure Stack HCI, VMware, and System Center Virtual Machine Manager.
4+
ms.date: 11/08/2021
5+
ms.topic: overview
6+
ms.custom: references_regions
7+
---
8+
9+
# What is Azure Arc resource bridge (preview)?
10+
11+
Azure Arc resource bridge (preview) is part of the core Azure Arc platform, and is designed to host other Azure Arc services. In this release, the resource bridge supports VM self-servicing and management from Azure, for virtualized Windows and Linux virtual machines hosted in an on-premises environment on [Azure Stack HCI](/azure-stack/hci/overview) and VMware. The resource bridge is a packaged virtual machine, which hosts a *management* Kubernetes cluster that requires no user management. This virtual appliance delivers the following benefits:
12+
13+
* Enables VM self-servicing from Azure without having to create and manage a Kubernetes cluster
14+
* It is fully supported by Microsoft, including update of core components.
15+
* Designed to recover from software failures.
16+
* Supports deployment to any private cloud hosted on Hyper-V or VMware from the Azure portal or using the Azure Command-Line Interface (CLI).
17+
18+
All management operations are performed from Azure, no local configuration is required on the appliance.
19+
20+
## Overview
21+
22+
Azure resource bridge (preview) hosts other components such as Custom Locations, cluster extensions, and other Azure Arc agents in order to deliver the level of functionality with the private cloud infrastructures it supports. This complex system is composed of three layers:
23+
24+
* The base layer that represents the resource bridge and the Arc agents
25+
* The platform layer that includes the Custom Location and Cluster extension
26+
* The solution layer for each service supported by Arc resource bridge (that is, the different type of VMs).
27+
28+
:::image type="content" source="media/overview/architecture-overview.png" alt-text="Azure Arc resource bridge architecture diagram." border="false":::
29+
30+
Azure Arc resource bridge (preview) can host other Azure services or solutions running on-premises. For this preview, there are two objects hosted on the Arc resource bridge (preview):
31+
32+
* Cluster extension: Is the Azure service deployed to run on-premises. For the preview release, it supports two services:
33+
34+
- Azure Arc-enabled VMware
35+
36+
- Azure Arc-enabled Azure Stack HCI
37+
38+
* Custom Locations: Is a deployment target, where you can create Azure resources. It maps to different resource for different Azure services. For example, for Arc-enabled VMware, the Custom Locations resource maps to an instance of vCenter, and for Arc-enabled Azure Stack HCI, it maps to an HCI cluster instance.
39+
40+
Custom Locations and cluster extension are both Azure resources, they are linked to the Azure Arc resource bridge (preview) resource in Azure Resource Manager. When you create an on-premises VM from Azure, you can select the custom location, and that routes that *create action* to the mapped vCenter or Azure Stack HCI cluster.
41+
42+
There is a set of resources unique to the infrastructure. For example, vCenter has a resource pool, network, and template resources. During VM creation, these resources need to be specified. With Azure Stack HCI, you just need to select the custom location, network and template to create a VM.
43+
44+
To summarize, the Azure resources are projections of the resources running in your on-premises private cloud. If the on-premises resource is not healthy, it can impact the health of the related resources. For example, if the Arc resource bridge (preview) has been deleted by accident, all the resources hosted in the Arc resource bridge (preview) are impacted. That is, the Custom Locations and cluster extensions are deleted as a result. The actual VMs are not impacted, as they are running on vCenter, but the management path to those VMs is interrupted. You won't be able to start/stop the VM from Azure. It is not recommended to manage or modify the Arc resource bridge (preview) using any on-premises applications directly.
45+
46+
## Benefits of Azure Arc resource bridge (preview)
47+
48+
Through the Azure Arc resource bridge (preview), you can accomplish the following for each private cloud infrastructure from Azure:
49+
50+
* VMware vSphere - By registering resource pools, networks, and VM templates in Azure you can represent a subset of your vCenter resources in Azure to enable self-service. Integration with Azure allows you to not only manage access to your vCenter resources in Azure to maintain a secure environment, but also to perform various operations on the VMware virtual machines that are enabled by Arc-enabled VMware vSphere:
51+
52+
- Start, stop, and restart a virtual machine
53+
- Control access and add Azure tags
54+
- Add, remove, and update network interfaces
55+
- Add, remove, and update disks and update VM size (CPU cores and memory)
56+
- Enable guest management
57+
- Install extensions
58+
59+
* Azure Stack HCI - You can provision and manage on-premises Windows and Linux virtual machines (VMs) running on Azure Stack HCI clusters.
60+
61+
## Prerequisites
62+
63+
[Azure CLI](/cli/azure/install-azure-cli) is required to deploy the Azure Arc resource bridge on supported private cloud environments.
64+
65+
If you are deploying on VMware, a x64 Python environment is required. The [pip](https://pypi.org/project/pip/) package installer for Python is also required.
66+
67+
If you are deploying on Azure Stack HCI, the x32 Azure CLI installer can be used to install Azure CLI.
68+
69+
### Supported regions
70+
71+
Azure Arc resource bridge currently supports the following Azure regions:
72+
73+
- East US
74+
75+
- West Europe
76+
77+
### Regional resiliency
78+
79+
While Azure has a number of redundancy features at every level of failure, if a service impacting event occurs, this preview release of Azure Arc resource bridge does not support cross-region failover or other resiliency capabilities. In the event of the service becoming unavailable, the on-premises VMs continue to operate unaffected. Management from Azure is unavailable during that service outage.
80+
81+
### Private cloud environments
82+
83+
The following private cloud environments and their versions are officially supported for the Azure Arc resource bridge:
84+
85+
* VMware vSphere version 6.5
86+
* Azure Stack HCI
87+
88+
### Required Azure permissions
89+
90+
* To onboard the Arc resource bridge, you are a member of the [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role in the resource group.
91+
92+
* To read, modify, and delete the resource bridge, you are a member of the **Name of role** role in the resource group.
93+
94+
### Networking
95+
96+
The Arc resource bridge communicates outbound securely to Azure Arc over TCP port 443. If the appliance needs to connect through a firewall or proxy server to communicate over the internet, it communicates outbound using the HTTPS protocol.
97+
98+
If outbound connectivity is restricted by your firewall or proxy server, make sure the URLs listed below are not blocked.
99+
100+
URLS:
101+
102+
| Agent resource | Description |
103+
|---------|---------|
104+
|`https://mcr.microsoft.com`|Microsoft container registry|
105+
|`https://*.his.arc.azure.com`|Azure Arc Identity service|
106+
|`https://*.dp.kubernetesconfiguration.azure.com`|Azure Arc configuration service|
107+
|`https://*.servicebus.windows.net`|Cluster connect|
108+
|`https://guestnotificationservice.azure.com` |Guest notification service|
109+
|`https://*.dp.prod.appliances.azure.com`|Resource bridge data plane service|
110+
|`https://ecpacr.azurecr.io` |Resource bridge container image download |
111+
|`.blob.core.windows.net`<br> `*.dl.delivery.mp.microsoft.com`<br> `*.do.dsp.mp.microsoft.com` |Resource bridge image download |
112+
113+
## Next steps
114+
115+
To learn more about how Azure Arc-enabled VMware vSphere extends Azure's governance and management capabilities to VMware vSphere infrastructure, see the following [Overview](/vmware-vsphere/overview.md) article.

0 commit comments

Comments
 (0)