Skip to content

Commit fcaf858

Browse files
Merge pull request #281167 from AjKundnani/main
Added CLI roll-back support to VMSS
2 parents fc4ae2a + 172eeaa commit fcaf858

File tree

2 files changed

+16
-7
lines changed

2 files changed

+16
-7
lines changed

articles/virtual-machines/trusted-launch-existing-vmss.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Azure Virtual machine Scale sets supports enabling Trusted launch on existing [U
2222
## Limitations
2323

2424
- Enabling Trusted launch on existing [virtual machine Scale sets with data disks attached](../virtual-machine-scale-sets/virtual-machine-scale-sets-attached-disks.md) is currently not supported.
25-
- To validate if scale set is configured with data disk, navigate to scale set -> **Disks** under **Settings** menu -> check under heading **Data disks**
25+
- To validate if scale set is configured with data disk, navigate to scale set -> **Disks** under **Settings** menu -> check under heading **Data disks**
2626
:::image type="content" source="./media/trusted-launch/00-vmss-with-data-disks.png" alt-text="Screenshot of the scale set with data disks.":::
2727

2828
- Enabling Trusted launch on existing [virtual machine Scale sets Flex](../virtual-machine-scale-sets/virtual-machine-scale-sets-orchestration-modes.md) is currently not supported.
@@ -305,7 +305,15 @@ To roll-back changes from Trusted launch to previous known good configuration, s
305305

306306
> [!NOTE]
307307
>
308-
> - Azure CLI currently does not supports roll-back of Scale set Uniform from Trusted launch to Standard. As workaround, use Azure PowerShell or ARM template to execute roll-back.
308+
> Required Azure CLI version **2.62.0** or above for roll-back of VMSS uniform from Trusted launch to Non-Trusted launch configuration.
309+
310+
To roll-back changes from Trusted launch to previous known good configuration, set `--security-type` to `Standard` as shown. Optionally, you can also revert other parameter changes - OS image, virtual machine size, and repeat steps 2-5 described with [Enable Trusted launch on existing scale set](#enable-trusted-launch-on-existing-scale-set-uniform)
311+
312+
```azurecli-interactive
313+
az vmss update --name MyScaleSet `
314+
--resource-group MyResourceGroup `
315+
--security-type Standard
316+
```
309317

310318
### [PowerShell](#tab/powershell)
311319

articles/virtual-machines/trusted-launch.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -81,9 +81,10 @@ Trusted Launch doesn't increase existing VM pricing costs.
8181

8282
Currently, the following VM features aren't supported with Trusted Launch:
8383

84-
- [Azure Site Recovery](../site-recovery/concepts-trusted-vm.md) (currently in preview).
84+
- [Azure Site Recovery](../site-recovery/concepts-trusted-vm.md) (*Generally available for Windows*).
8585
- [Managed Image](capture-image-resource.yml) (customers are encouraged to use [Azure Compute Gallery](trusted-launch-portal.md#trusted-launch-vm-supported-images)).
8686
- Nested virtualization (v5 VM size families supported).
87+
- [Linux VM Hibernation](./linux/hibernate-resume-linux.md)
8788

8889
## Secure Boot
8990

@@ -122,16 +123,16 @@ Trusted Launch is integrated with Defender for Cloud to ensure that your VMs are
122123

123124
- **Alert for VM attestation failure**: Defender for Cloud periodically performs attestation on your VMs. The attestation also happens after your VM boots. If the attestation fails, it triggers a medium-severity alert.
124125
VM attestation can fail for the following reasons:
125-
- The attested information, which includes a boot log, deviates from a trusted baseline. Any deviation can indicate that untrusted modules have been loaded, and the OS could be compromised.
126-
- The attestation quote couldn't be verified to originate from the vTPM of the attested VM. An unverified origin can indicate that malware is present and could be intercepting traffic to the vTPM.
126+
- The attested information, which includes a boot log, deviates from a trusted baseline. Any deviation can indicate that untrusted modules have been loaded, and the OS could be compromised.
127+
- The attestation quote couldn't be verified to originate from the vTPM of the attested VM. An unverified origin can indicate that malware is present and could be intercepting traffic to the vTPM.
127128

128129
> [!NOTE]
129130
> Alerts are available for VMs with vTPM enabled and the Attestation extension installed. Secure Boot must be enabled for attestation to pass. Attestation fails if Secure Boot is disabled. If you must disable Secure Boot, you can suppress this alert to avoid false positives.
130131
131132
- **Alert for untrusted Linux kernel module**: For Trusted Launch with Secure Boot enabled, it's possible for a VM to boot even if a kernel driver fails validation and is prohibited from loading. If this scenario happens, Defender for Cloud issues low-severity alerts. While there's no immediate threat, because the untrusted driver hasn't been loaded, these events should be investigated. Ask yourself:
132133

133-
- Which kernel driver failed? Am I familiar with this driver and do I expect it to load?
134-
- Is this the exact version of the driver I'm expecting? Are the driver binaries intact? If this is a third-party driver, did the vendor pass the OS compliance tests to get it signed?
134+
- Which kernel driver failed? Am I familiar with this driver and do I expect it to load?
135+
- Is this the exact version of the driver I'm expecting? Are the driver binaries intact? If this is a third-party driver, did the vendor pass the OS compliance tests to get it signed?
135136

136137
## Related content
137138

0 commit comments

Comments
 (0)