Skip to content

Commit 013879a

Browse files
authored
Sync release-local-2503 with main
Sync release-local-2503 with main
2 parents bf5291d + 0e61984 commit 013879a

File tree

4 files changed

+25
-35
lines changed

4 files changed

+25
-35
lines changed

adaptive-cloud/index.yml

Lines changed: 3 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -107,9 +107,6 @@ conceptualContent:
107107
- url: /azure-stack/user/azure-stack-kubernetes-aks-engine-overview
108108
itemType: overview
109109
text: Azure Kubernetes Services on Azure Stack Hub
110-
- url: /azure/aks/hybrid
111-
itemType: overview
112-
text: Azure Kubernetes Services on Azure Stack HCI/AKS hybrid
113110
- url: /azure/docker/
114111
itemType: overview
115112
text: Docker on Azure
@@ -166,7 +163,7 @@ conceptualContent:
166163
links:
167164
- url: /azure/databox-online/data-box-gateway-overview
168165
itemType: overview
169-
text: Azure Databox Gateway
166+
text: Azure Data Box Gateway
170167
- url: /azure/iot-edge/
171168
itemType: overview
172169
text: Azure IoT Edge
@@ -231,9 +228,9 @@ conceptualContent:
231228
- url: /azure/site-recovery/
232229
itemType: overview
233230
text: Azure Site Recovery
234-
- url: /azure-stack/hci/overview
231+
- url: /azure/azure-local/hybrid-capabilities-with-azure-services-23h2
235232
itemType: overview
236-
text: Azure Stack HCI hybrid capabilities
233+
text: Azure Local hybrid capabilities
237234
- url: /windows-server/manage/windows-admin-center/azure/
238235
itemType: overview
239236
text: Windows Admin Center Azure hybrid services
@@ -326,20 +323,6 @@ additionalContent:
326323
- title: Evaluation and learning resources
327324
items:
328325
# Cards
329-
- title: Azure Stack
330-
links:
331-
- url: /azure-stack/hci/guided-quick-deploy-eval
332-
text: Azure Stack HCI evaluation guide
333-
- url: https://www.youtube.com/watch?v=to8D7Xl9SU8
334-
text: Azure Stack hybrid apps intro
335-
- url: https://channel9.msdn.com/Shows/Azure-Friday/Building-modern-hybrid-applications-with-Azure-Arc-and-Azure-Stack
336-
text: Building modern hybrid applications with Azure Arc and Azure Stack
337-
- url: https://www.youtube.com/watch?v=2lw8zOpJTn0
338-
text: Dynamically scale from Azure Stack Hub to Azure
339-
- url: https://azure.microsoft.com/resources/videos/azure-modular-datacenter/
340-
text: Introducing the Azure Modular Datacenter
341-
- url: https://www.youtube.com/watch?v=DPG7wGhh3sA
342-
text: What's new for Azure Stack HCI
343326
- title: Development and integration
344327
links:
345328
- url: https://www.youtube.com/watch?v=to8D7Xl9SU8

azure-local/known-issues.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Release notes with fixed and known issues in Azure Local
33
description: Read about the known issues and fixed issues in Azure Local.
44
author: alkohli
55
ms.topic: conceptual
6-
ms.date: 03/06/2025
6+
ms.date: 03/13/2025
77
ms.author: alkohli
88
ms.reviewer: alkohli
99
---
@@ -39,7 +39,11 @@ There are no fixed issues in this release.
3939

4040
## Known issues in this release
4141

42-
Microsoft is not aware of any known issues in this release.
42+
The following table lists the known issues in this release:
43+
44+
|Feature |Issue |Workaround |
45+
|---------|---------|---------|
46+
| Operating system | Restoring the registry using *RegBack* isn't supported on Azure Local. This operation can remove the Lifecycle Manager (LCM) and Microsoft On-premises Cloud (MOC) settings on your Azure Local instance, which can corrupt the solution. | |
4347

4448
## Known issues from previous releases
4549

azure-stack/operator/graph-api-retirement.md

Lines changed: 15 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to mitigate the retirement of the Entra ID Graph API.
44
author: sethmanheim
55
ms.author: sethm
66
ms.topic: conceptual
7-
ms.date: 02/25/2025
7+
ms.date: 03/14/2025
88
ms.reviewer: rtiberiu
99

1010
---
@@ -26,12 +26,12 @@ To ensure that your Azure Stack Hub environments that use Entra ID as an identit
2626
2727
## Run the script
2828

29-
Run the following PowerShell script in your Entra ID environment that is used by Azure Stack Hub as the "home directory" (the main identity provider of your Azure Stack Hub). The script interacts with Azure, so you don't need to run it on a specific machine. However, you need at least "application administrator" privileges in the respective Entra ID tenant to run the script.
29+
Run the following PowerShell script in your Entra ID environment that's used by Azure Stack Hub as the *home directory* (the main identity provider of your Azure Stack Hub), as well as the Entra ID environment to which you registered your Azure Stack Hub system. This might be a different directory than your home directory. The script interacts with Azure, so you don't need to run it on a specific machine. However, you need at least **application administrator** privileges in the respective Entra ID tenant to run the script.
3030

3131
Make sure to run the following script with administrator privileges on the local machine:
3232

3333
```powershell
34-
# Install the graph modules if necessary
34+
# Install the Graph modules if necessary
3535
#Install-Module Microsoft.Graph.Authentication
3636
#Install-Module Microsoft.Graph.Applications
3737
@@ -42,22 +42,22 @@ Import-Module Microsoft.Graph.Applications
4242
# Repeat this flow for each of your target directory tenants
4343
$tenantId = 'MyTenantId'
4444
45-
# Sign-in with admin permissions to read and write all application objects
45+
# Sign in with admin permissions to read and write all application objects
4646
Connect-MgGraph -TenantId $tenantId -Scopes Application.ReadWrite.All
4747
4848
# Retrieve all applications in the current directory
4949
Write-Host "Looking-up all applications in directory '$tenantId'..."
5050
$applications = Get-MgApplication -All -Property id, displayName, appId, identifierUris, requiredResourceAccess, authenticationBehaviors
5151
Write-Host "Found '$($applications.Count)' total applications in directory '$tenantId'"
5252
53-
# Find all the unique deployment guids, each one representing an Azure Stack deployment in the current directory
53+
# Find all the unique deployment GUIDs, each one representing an Azure Stack deployment or registration in the current directory
5454
$deploymentGuids = $applications.IdentifierUris |
55-
Where-Object { $_ -like 'https://management.*' -or $_ -like 'https://adminmanagement.*' } |
55+
Where-Object { $_ -like 'https://management.*' -or $_ -like 'https://adminmanagement.*' -or $_ -like 'https://azurebridge.*' } |
5656
ForEach-Object { "$_".Split('/')[3] } |
5757
Select-Object -Unique
58-
Write-Host "Found '$($deploymentGuids.Count)' total Azure Stack deployments in directory '$tenantId'"
58+
Write-Host "Found '$($deploymentGuids.Count)' total Azure Stack deployments or registrations in directory '$tenantId'"
5959
60-
# Find all the Azure Stack application objects for each deployment
60+
# Find all the Azure Stack application objects for each deployment or registration
6161
$azureStackApplications = @()
6262
foreach ($application in $applications)
6363
{
@@ -66,19 +66,22 @@ foreach ($application in $applications)
6666
if (($application.IdentifierUris -join '') -like "*$deploymentGuid*")
6767
{
6868
$azureStackApplications += $application
69+
break
6970
}
7071
}
7172
}
7273
73-
# Find which Azure Stack applications require access to Legacy Graph Service
74+
# Find which Azure Stack applications require access to the legacy Graph Service
7475
$azureStackLegacyGraphApplications = $azureStackApplications |
75-
Where-Object { $_.RequiredResourceAccess.ResourceAppId -contains '00000002-0000-0000-c000-000000000000' }
76+
Where-Object {
77+
($_.RequiredResourceAccess.ResourceAppId -contains '00000002-0000-0000-c000-000000000000') -or
78+
($_.IdentifierUris | Where-Object { $_ -like 'https://azurebridge.*' }) }
7679
77-
# Find which of those applications need to have their authentication behaviors patched to allow access to Legacy Graph
80+
# Find which of those applications need to have their authentication behaviors patched to allow access to legacy Graph
7881
$azureStackLegacyGraphApplicationsToUpdate = $azureStackLegacyGraphApplications |
7982
Where-Object { -not ($ab = $_.AdditionalProperties.authenticationBehaviors) -or -not $ab.ContainsKey(($key='blockAzureADGraphAccess')) -or $ab[$key] }
8083
81-
# Update the applications which require their authentication behaviors patched to allow access to Legacy Graph
84+
# Update the applications that require their authentication behaviors patched to allow access to legacy Graph
8285
Write-Host "Found '$($azureStackLegacyGraphApplicationsToUpdate.Count)' total Azure Stack applications which need permission to continue calling Legacy Microsoft Graph Service"
8386
$count = 0
8487
foreach ($application in $azureStackLegacyGraphApplicationsToUpdate)

azure-stack/user/azure-stack-network-howto-vnet-to-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ This article describes how to create a connection between two virtual networks i
3030

3131
This procedure uses the [Single FortiGate-VM deployment](https://docs2.fortinet.com/document/fortigate-public-cloud/6.2.0/azure-administration-guide/632940/single-fortigate-vm-deployment). You can find steps on how to connect the FortiGate NVA to the Azure Stack Hub VNET to in your on-premises network.
3232

33-
For more information on how to deploy the FortiGate solution in an active-passive (HA) set up, see the details in the Fortinet Document Library article [HA for FortiGate-VM on Azure](https://docs2.fortinet.com/document/fortigate-public-cloud/6.2.0/azure-administration-guide/983245/ha-for-fortigate-vm-on-azure).
33+
For more information on how to deploy the FortiGate solution in an active-passive (HA) set up, see the details in the Fortinet Document Library article [HA for FortiGate-VM on Azure](https://docs.fortinet.com/document/fortigate-public-cloud/7.6.0/azure-administration-guide/598754/deploying-the-fortigate-vm).
3434

3535
## Deployment parameters
3636

0 commit comments

Comments
 (0)