Skip to content

Commit cbc5a53

Browse files
authored
Merge pull request #178190 from eva-seydl/eva
Update autoscale-scaling-plan.md
2 parents cf07ff2 + 0fb583d commit cbc5a53

File tree

1 file changed

+38
-52
lines changed

1 file changed

+38
-52
lines changed

articles/virtual-desktop/autoscale-scaling-plan.md

Lines changed: 38 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,8 @@ The autoscale feature (preview) lets you scale your Azure Virtual Desktop deploy
2121
- Session limits per session host
2222

2323
>[!NOTE]
24-
>Windows Virtual Desktop (classic) doesn't support the autoscale feature. It also doesn't support scaling ephemeral disks.
24+
> - Azure Virtual Desktop (classic) doesn't support the autoscale feature.
25+
> - Autsoscale doesn't support scaling of ephemeral disks.
2526
2627
For best results, we recommend using autoscale with VMs you deployed with Azure Virtual Desktop Azure Resource Manager templates or first-party tools from Microsoft.
2728

@@ -30,7 +31,7 @@ For best results, we recommend using autoscale with VMs you deployed with Azure
3031
>
3132
> - You can only use autoscale in the Azure public cloud.
3233
> - You can only configure autoscale with the Azure portal.
33-
> - You can only deploy the scaling plan in the US and Europe regions.
34+
> - You can only deploy the scaling plan to US and European regions.
3435
3536
## Requirements
3637

@@ -44,8 +45,7 @@ Before you create your first scaling plan, make sure you follow these guidelines
4445

4546
To start creating a scaling plan, you'll first need to create a custom Role-based Access Control (RBAC) role in your subscription. This role will allow Windows Virtual Desktop to power manage all VMs in your subscription. It will also let the service apply actions on both host pools and VMs when there are no active user sessions.
4647

47-
To create the custom role, follow the instructions in [Azure custom roles](../role-based-access-control/custom-roles.md), using this JSON template:
48-
48+
To create the custom role, follow the instructions in [Azure custom roles](../role-based-access-control/custom-roles.md) while using the following JSON template. This template already includes any permissions you need. For more detailed instructions, see [Assign custom roles with the Azure portal](#assign-custom-roles-with-the-azure-portal).
4949
```json
5050
{
5151
"properties": {
@@ -57,19 +57,20 @@ To create the custom role, follow the instructions in [Azure custom roles](../ro
5757
"permissions": [
5858
{
5959
"actions": [
60-
"Microsoft.Insights/eventtypes/values/read",
61-
"Microsoft.Compute/virtualMachines/deallocate/action",
62-
"Microsoft.Compute/virtualMachines/restart/action",
63-
"Microsoft.Compute/virtualMachines/powerOff/action",
64-
"Microsoft.Compute/virtualMachines/start/action",
65-
"Microsoft.Compute/virtualMachines/read",
66-
"Microsoft.DesktopVirtualization/hostpools/read",
67-
"Microsoft.DesktopVirtualization/hostpools/write",
68-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/read",
69-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/write",
70-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/delete",
71-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/read", "Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/sendMessage/action",
72-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/read"
60+
"Microsoft.Insights/eventtypes/values/read",
61+
"Microsoft.Compute/virtualMachines/deallocate/action",
62+
"Microsoft.Compute/virtualMachines/restart/action",
63+
"Microsoft.Compute/virtualMachines/powerOff/action",
64+
"Microsoft.Compute/virtualMachines/start/action",
65+
"Microsoft.Compute/virtualMachines/read",
66+
"Microsoft.DesktopVirtualization/hostpools/read",
67+
"Microsoft.DesktopVirtualization/hostpools/write",
68+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/read",
69+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/write",
70+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/delete",
71+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/read",
72+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/sendMessage/action",
73+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/read"
7374
],
7475
"notActions": [],
7576
"dataActions": [],
@@ -80,11 +81,9 @@ To create the custom role, follow the instructions in [Azure custom roles](../ro
8081
}
8182
```
8283

83-
## Assign custom roles
84-
85-
Next, you'll need to use the Azure portal to assign the custom role you created to your subscription.
84+
## Assign custom roles with the Azure portal
8685

87-
To assign the custom role:
86+
To create and assign the custom role to your subscription with the Azure portal:
8887

8988
1. Open the Azure portal and go to **Subscriptions**.
9089

@@ -98,18 +97,20 @@ To assign the custom role:
9897
4. On the **Permissions** tab, add the following permissions to the subscription you're assigning the role to:
9998

10099
```azcopy
101-
"Microsoft.Compute/virtualMachines/deallocate/action",
102-
"Microsoft.Compute/virtualMachines/restart/action",
103-
"Microsoft.Compute/virtualMachines/powerOff/action",
104-
"Microsoft.Compute/virtualMachines/start/action",
105-
"Microsoft.Compute/virtualMachines/read",
106-
"Microsoft.DesktopVirtualization/hostpools/read",
107-
"Microsoft.DesktopVirtualization/hostpools/write",
108-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/read",
109-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/write",
110-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/delete",
111-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/sendMessage/action",
112-
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/read",
100+
"Microsoft.Insights/eventtypes/values/read"
101+
"Microsoft.Compute/virtualMachines/deallocate/action"
102+
"Microsoft.Compute/virtualMachines/restart/action"
103+
"Microsoft.Compute/virtualMachines/powerOff/action"
104+
"Microsoft.Compute/virtualMachines/start/action"
105+
"Microsoft.Compute/virtualMachines/read"
106+
"Microsoft.DesktopVirtualization/hostpools/read"
107+
"Microsoft.DesktopVirtualization/hostpools/write"
108+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/read"
109+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/write"
110+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/delete"
111+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/read"
112+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/sendMessage/action"
113+
"Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/read"
113114
```
114115
115116
5. When you're finished, select **Ok**.
@@ -120,29 +121,14 @@ To assign the custom role to grant access:
120121
121122
1. In the **Access control (IAM) tab**, select **Add role assignments**.
122123
123-
2. Select the role you just created.
124+
2. Select the role you just created and continue to the next screen.
124125
125-
3. In the search bar, enter and select **Windows Virtual Desktop**, as shown in the following screenshot.
126+
3. Select **+Select members**. In the search bar, enter and select **Windows Virtual Desktop**, as shown in the following screenshot. When you have a Azure Virtual Desktop (classic) deployment and an Azure Virtual Desktop with Azure Resource Manager Azure Virtual Desktop objects, you will see two apps with the same name. Select them both.
126127
127128
> [!div class="mx-imgBorder"]
128129
> ![A screenshot of the add role assignment menu. The Select field is highlighted in red, with the user entering "Windows Virtual Desktop" into the search field.](media/search-for-role.png)
129130
130-
When adding the custom role in the Azure portal, make sure you've also selected the following permissions:
131-
132-
- Microsoft.Compute/virtualMachines/deallocate/action
133-
- Microsoft.Compute/virtualMachines/restart/action
134-
- Microsoft.Compute/virtualMachines/powerOff/action
135-
- Microsoft.Compute/virtualMachines/start/action
136-
- Microsoft.Compute/virtualMachines/read
137-
- Microsoft.DesktopVirtualization/hostpools/read
138-
- Microsoft.DesktopVirtualization/hostpools/write
139-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/read
140-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/write
141-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/delete
142-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/sendMessage/action
143-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/read
144-
145-
These are the same permissions you entered back in step 4.
131+
4. Select **Review + assign** to complete the assignment.
146132
147133
## How creating a scaling plan works
148134
@@ -189,7 +175,7 @@ To create a scaling plan:
189175
190176
6. Optionally, you can also add a "friendly" name that will be displayed to your users and a description for your plan.
191177
192-
7. For **Region**, select a region for your scaling plan. The metadata for the object will be stored in the geography associated with the region. Currently, autoscale only supports the Central US and East US 2 regions. To learn more about regions, see [Data locations](data-locations.md).
178+
7. For **Region**, select a region for your scaling plan. The metadata for the object will be stored in the geography associated with the region. To learn more about regions, see [Data locations](data-locations.md).
193179
194180
8. For **Time zone**, select the time zone you'll use with your plan.
195181

0 commit comments

Comments
 (0)