Skip to content

Commit 12694e9

Browse files
committed
Merge branch 'main' into md-arm-parameters
2 parents 0e3c1e9 + 722d364 commit 12694e9

14 files changed

+67
-56
lines changed

AKS-Arc/aks-hci-network-system-requirements.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: AKS enabled by Azure Arc network requirements
33
description: Learn about AKS network prerequisites.
44
ms.topic: overview
5-
ms.date: 04/23/2025
5+
ms.date: 07/02/2025
66
author: sethmanheim
77
ms.author: sethm
8-
ms.reviewer: abha
9-
ms.lastreviewed: 04/02/2024
8+
ms.reviewer: srikantsarwa
9+
ms.lastreviewed: 07/10/2025
1010
---
1111

1212
# AKS enabled by Azure Arc network requirements
@@ -42,7 +42,7 @@ The following parameters are required in order to use a logical network for AKS
4242

4343
### Control plane IP
4444

45-
Kubernetes uses a control plane to ensure every component in the Kubernetes cluster is kept in the desired state. The control plane also manages and maintains the worker nodes that hold the containerized applications. AKS enabled by Arc deploys the KubeVIP load balancer to ensure that the API server IP address of the Kubernetes control plane is available at all times. This KubeVIP instance requires a single immutable "control plane IP address" to function correctly. AKS Arc automatically chooses a control plane IP for you from the logical network passed during the Kubernetes cluster create operation.
45+
Kubernetes uses a control plane to ensure every component in the Kubernetes cluster is kept in the desired state. The control plane also manages and maintains the worker nodes that hold the containerized applications. AKS enabled by Arc deploys the KubeVIP load balancer to ensure that the API server IP address of the Kubernetes control plane is always available. This KubeVIP instance requires a single immutable "control plane IP address" to function correctly. AKS Arc automatically chooses a control plane IP for you from the logical network passed during the Kubernetes cluster create operation.
4646

4747
You also have the option of passing a control plane IP. In such cases, the control plane IP must be within the scope of the address prefix of the logical network. You must ensure that the control plane IP address does not overlap with anything else, including Arc VM logical networks, infrastructure network IPs, load balancers, etc. Overlapping IP addresses can lead to unexpected failures for both the AKS cluster and any other place the IP address is being used. You must plan to reserve one IP address per Kubernetes cluster in your environment.
4848

@@ -73,7 +73,7 @@ Firewall requirements for AKS have been consolidated with Azure Local firewall r
7373

7474
## DNS server settings
7575

76-
You need to ensure that the DNS server of the logical network can resolve the FQDN of the Azure Local cluster. DNS name resolution is required for all Azure Local nodes to be able to communicate with the AKS VM nodes.
76+
You need to ensure that the DNS server of the logical network can resolve the FQDN of the Azure Local cluster. DNS name resolution is required for all Azure Local nodes to be able to communicate with the AKS VM nodes.
7777

7878
## Network port and cross-VLAN requirements
7979

AKS-Arc/ssh-connect-to-windows-and-linux-worker-nodes.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connect to Windows or Linux worker nodes with SSH
33
description: Learn how to use SSH to connect to Windows or Linux worker nodes in an AKS Arc cluster.
4-
ms.date: 07/02/2025
4+
ms.date: 07/10/2025
55
ms.topic: how-to
66
author: sethmanheim
77
ms.author: sethm
@@ -39,6 +39,8 @@ You can use the Kubernetes CLI, [**kubectl**](https://kubernetes.io/docs/referen
3939
Install-AzAksCliTool
4040
```
4141

42+
---
43+
4244
## Use SSH to connect to worker nodes
4345

4446
1. To access the Kubernetes cluster with the specified permissions, you must retrieve the certificate-based admin **kubeconfig** file using the [az aksarc get-credentials](/cli/azure/aksarc#az-aksarc-get-credentials) command. For more information, see [Retrieve certificate-based admin kubeconfig](retrieve-admin-kubeconfig.md):

azure-local/concepts/physical-network-requirements.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -192,19 +192,26 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
192192

193193
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
194194
|----- |---| :-: | :-: | :-: | :-: |
195-
| [QFX5120 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5120-ethernet-switch-datasheet.pdf) <br>(10, 25, 100 GbE) |Junos 23.4R2.13 or later|&check;| &check;| &check;| &check; |
195+
| [QFX5220 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5220-switch-datasheet.pdf)<br>(100, 400 GbE) |Junos 20.2R3-S2 or later|&check;| &check;| &check;| &check; |
196+
| [QFX5210 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5210-switch-datasheet.pdf) <br>(25, 100 GbE) |Junos 23.4R2-S4.11 or later|&check;| &check;| &check;| &check; |
197+
| [QFX5200 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5200-switch-datasheet.pdf) <br>(10, 25, 100 GbE) |Junos 23.4R2-S4.11 or later |&check;| &check;| &check;| &check; |
198+
| [QFX5130 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5130-switch.pdf) <br>(400 GbE)|Junos 20.2R3-S2 or later|&check;| &check;| &check;| &check; |
199+
| [QFX5120 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5120-ethernet-switch-datasheet.pdf) <br>(10, 25, 100 GbE) |Junos 23.4R2-S4.11 or later |&check;| &check;| &check;| &check; |
200+
| [QFX5110 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5110-ethernet-switch-datasheet.pdf) <br>(10 GbE) |Junos 23.4R2-S4.11 or later|&check;| &check;| &check;| &check; |
201+
196202
> [!NOTE]
197203
> Guest RDMA requires both Compute (Standard) and Storage.
198204
### 23H2
199205

200-
|Model |Firmware|Management |Storage |Compute (Standard)|Compute (SDN)|
206+
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
201207
|----- |---| :-: | :-: | :-: | :-: |
202-
| [QFX5110 series](https://www.juniper.net/assets/es/es/local/pdf/datasheets/1000605-en.pdf) <br>(10 GbE) |Junos 20.2R3-S2 or later|&check;| &check;| &check;| &check; |
203-
| [QFX5120 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5120-ethernet-switch-datasheet.pdf) <br>(10, 25, 100 GbE) |Junos 20.2R3-S2 or later|&check;| &check;| &check;| &check; |
204-
| [QFX5130 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5130-switch.pdf) <br>(400 GbE)|Junos 20.2R3-S2 or later|&check;| &check;| &check;| &check; |
205-
| [QFX5200 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5200-switch-datasheet.pdf)<br>(10, 25, 100 GbE)|Junos 20.2R3-S2 or later |&check;| &check;| &check;| &check; |
206-
| [QFX5210 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5210-switch-datasheet.pdf)<br>(25, 100 GbE) |Junos 20.2R3-S2 or later|&check;| &check;| &check;| &check; |
207208
| [QFX5220 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5220-switch-datasheet.pdf)<br>(100, 400 GbE) |Junos 20.2R3-S2 or later|&check;| &check;| &check;| &check; |
209+
| [QFX5210 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5210-switch-datasheet.pdf) <br>(25, 100 GbE) |Junos 23.4R2-S4.11 or later|&check;| &check;| &check;| &check; |
210+
| [QFX5200 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5200-switch-datasheet.pdf) <br>(10, 25, 100 GbE) |Junos 23.4R2.13 or later|&check;| &check;| &check;| &check; |
211+
| [QFX5130 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5130-switch.pdf) <br>(400 GbE)|Junos 20.2R3-S2 or later|&check;| &check;| &check;| &check; |
212+
| [QFX5120 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5120-ethernet-switch-datasheet.pdf) <br>(10, 25, 100 GbE) |Junos 23.4R2.13 or later|&check;| &check;| &check;| &check; |
213+
| [QFX5110 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5110-ethernet-switch-datasheet.pdf) <br>(10 GbE) |Junos 23.4R2-S4.11 or later|&check;| &check;| &check;| &check; |
214+
208215
> [!NOTE]
209216
> Guest RDMA requires both Compute (Standard) and Storage.
210217

azure-local/concepts/sdn-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Here's a summary of unsupported scenarios for SDN enabled by Arc on Azure Local:
5959
|Multiple NICs | Scenarios that require multiple NICs simultaneously aren't supported. |
6060
|AKS workloads | AKS workloads aren't supported. |
6161
|Disaster recovery | Disaster recovery support isn't available. |
62-
62+
|Multi-cast workloads | Multi-cast workloads aren't supported. |
6363

6464
## Supported networking patterns for SDN enabled by Arc
6565

azure-local/deploy/deployment-arc-register-server-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Register your Azure Local machines with Azure Arc and assign permissions for deployment
3-
description: Learn how to Register your Azure Local machines with Azure Arc and assign permissions for deployment.
3+
description: Learn how to register your Azure Local machines with Azure Arc and assign permissions for deployment.
44
author: alkohli
55
ms.topic: how-to
6-
ms.date: 05/06/2025
6+
ms.date: 06/09/2025
77
ms.author: alkohli
88
ms.service: azure-local
99
ms.custom: devx-track-azurepowershell

azure-local/includes/hci-download-vhdx-2.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,26 +3,16 @@ author: alkohli
33
ms.author: alkohli
44
ms.service: azure-local
55
ms.topic: include
6-
ms.date: 05/29/2025
6+
ms.date: 07/08/2025
77
---
88

99
SDN uses a VHDX file containing either the Azure Stack HCI or Windows Server operating system (OS) as a source for creating the SDN virtual machines (VMs).
1010

1111
> [!NOTE]
1212
> The version of the OS in your VHDX must match the version used by the Azure Local Hyper-V machines. This VHDX file is used by all SDN infrastructure components.
1313
14-
[Download an English-language version of the VHDX file](https://aka.ms/PVvxVBVCVVC).
14+
Depending on the OS version, download one of the following VHDX files::
1515

16-
Currently, a non-English VHDX file isn't available for download. If you require a non-English version, [download the corresponding ISO file](../deploy/download-23h2-software.md) and convert it to VHDX using the `Convert-WindowsImage` cmdlet. You must run this script from a Windows client computer. You'll probably need to run this script as Administrator and modify the execution policy for scripts using the `Set-ExecutionPolicy` command.
16+
- OS version 25398.xxxx: [Download an English-language version of the VHDX file](https://aka.ms/PVvxVBVCVVC).
17+
- OS version 26100.xxxx: [Download an English-language version of the VHDX file](https://aka.ms/AAvqy3y).
1718

18-
The following syntax shows an example of using `Convert-WindowsImage`:
19-
20-
```powershell
21-
Install-Module -Name Convert-WindowsImage
22-
Import-Module Convert-WindowsImage
23-
24-
$wimpath = "E:\sources\install.wim"
25-
$vhdpath = "D:\temp\AzureStackHCI.vhdx"
26-
$edition=1
27-
Convert-WindowsImage -SourcePath $wimpath -Edition $edition -VHDPath $vhdpath -SizeBytes 500GB -DiskLayout UEFI
28-
```

azure-local/includes/hci-registration-azure-prerequisites.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ author: alkohli
33
ms.author: alkohli
44
ms.service: azure-local
55
ms.topic: include
6-
ms.date: 04/30/2025
6+
ms.date: 06/09/2025
77
ms.reviewer: alkohli
88
ms.lastreviewed: 03/20/2025
99
---
@@ -25,10 +25,12 @@ ms.lastreviewed: 03/20/2025
2525
Register-AzResourceProvider -ProviderNamespace "Microsoft.HybridContainerService"
2626
Register-AzResourceProvider -ProviderNamespace "Microsoft.Attestation"
2727
Register-AzResourceProvider -ProviderNamespace "Microsoft.Storage"
28+
Register-AzResourceProvider -ProviderNamespace "Microsoft.Insights"
2829
```
2930

3031
> [!NOTE]
31-
> The assumption is that the person registering the Azure subscription with the resource providers is a different person than the one who is registering the Azure Local machines with Arc.
32+
> - The assumption is that the person registering the Azure subscription with the resource providers is a different person than the one who is registering the Azure Local machines with Arc.
33+
> - `Microsoft.Insights` resource provider is required for monitoring and logging. If this RP is not registered, the diagnostic account and Key Vault audit logging fails during validation.
3234
3335
- **Create a resource group**. Follow the steps to [Create a resource group](/azure/azure-resource-manager/management/manage-resource-groups-portal#create-resource-groups) where you want to register your machines. Make a note of the resource group name and the associated subscription ID.
3436

azure-local/includes/hci-vm-image-prerequisites-storage-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ author: alkohli
33
ms.author: alkohli
44
ms.service: azure-local
55
ms.topic: include
6-
ms.date: 07/18/2024
6+
ms.date: 07/08/2025
77
---
88

99

@@ -16,4 +16,4 @@ ms.date: 07/18/2024
1616
- Make sure that you're uploading your VHD or VHDX as a page blob image into the Storage account. Only page blob images are supported to create VM images via the Storage account.
1717
- If using a VHDX:
1818
- The VHDX image must be Gen 2 type and secure boot enabled.
19-
- The VHDX image must be prepared using `sysprep /generalize /shutdown /oobe`. For more information, see [Sysprep command-line options](/windows-hardware/manufacture/desktop/sysprep-command-line-options?view=windows-11#oobe&preserve-view=true).
19+
- The VHDX image must be prepared using `sysprep /generalize /shutdown /oobe`. For more information, see [Sysprep command-line options](/windows-hardware/manufacture/desktop/sysprep-command-line-options?view=windows-11#oobe&preserve-view=true). This is true for both Windows and Linux VM images.

azure-local/manage/manage-data-disks.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Download Azure managed disk to Azure Local
33
description: Learn how to download Azure managed disk to Azure Local.
44
author: alkohli
55
ms.topic: how-to
6-
ms.date: 04/09/2025
6+
ms.date: 06/27/2025
77
ms.author: alkohli
88
ms.service: azure-local
99
---
@@ -44,7 +44,7 @@ Download an Azure managed disk as follows:
4444
1. Once the SAS URL is generated, use the following command to download it to your Azure Local:
4545
4646
```azurecli
47-
az stack-hci-vm disk create -resource-group $resource-group --disk-file-format vhd --custom-location $custom-location --download-url $download-url --name $name
47+
az stack-hci-vm disk create -resource-group $resource-group --custom-location $custom-location --download-url $download-url --name $name
4848
```
4949
5050
The parameters are described in the following table:
@@ -55,7 +55,6 @@ The parameters are described in the following table:
5555
| `resource-group` | Resource group for Azure Local that you associate with this image. |
5656
| `name` | Name of the data disk for Azure Local. |
5757
| `custom-location` | Resource ID of the custom location for Azure Local. |
58-
| `disk-file-format` | File format of the data disk. This can be `vhd` or `vhdx`. |
5958
| `download-url` | SAS URL of the Azure managed disk.|
6059
6160
Here is an example output:

azure-local/manage/manage-network-security-groups.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ This article describes how to manage network security groups (NSGs) on your Azur
4343

4444
---
4545

46-
*## Manage network securi*ty groups and network security rules
46+
## Manage network security groups and network security rules
4747

4848
# [Azure CLI](#tab/azurecli)
4949

@@ -140,7 +140,7 @@ Follow these steps to show details of a network security group:
140140
az stack-hci-vm network nsg show -g $resource_group --name $nsgname
141141
```
142142
143-
2. The command outputs the details of a specified network security group (NSG).
143+
1. The command outputs the details of a specified network security group (NSG).
144144
145145
- In this example, the NSG has no network interface attached.
146146
@@ -233,7 +233,7 @@ Follow these steps to delete a network security group:
233233
$nsgname = "examplensg"
234234
```
235235
236-
2. Run the following command to delete a network security group (NSG) on your Azure Local instance.
236+
1. Run the following command to delete a network security group (NSG) on your Azure Local instance.
237237
238238
```azurecli
239239
az stack-hci-vm network nsg delete -g $resource_group --name $nsgname --yes
@@ -257,7 +257,7 @@ In this example, we create a network interface with an existing network security
257257
$nicname="examplenic"
258258
```
259259
260-
2. Run the following command to create a network interface (NIC) on your Azure Local instance.
260+
1. Run the following command to create a network interface (NIC) on your Azure Local instance.
261261
262262
```azurecli
263263
az stack-hci-vm network nic create --resource-group $resource_group --custom-location $customLocationId --location $location --subnet-id $lnetname --ip-address $ipaddress --name $nicname --network-security-group $nsgname
@@ -469,6 +469,7 @@ In this example, we associate a static logical network with an existing network
469469
You can dissociate a network security group from a logical network. This dissociation allows you to remove the network security rules applied to the logical network.
470470
471471
Follow these steps to dissociate a network security group from logical network:
472+
472473
1. Set the following parameters in your Azure CLI session. Make sure to pass the NSG name as an empty string encased in double quotes followed by single quotes ('""').
473474
474475
```azurecli
@@ -478,6 +479,7 @@ Follow these steps to dissociate a network security group from logical network:
478479
$nsgname = '""'
479480
$lnetname="static-lnet3"
480481
```
482+
481483
2. To dissociate a network security group from a logical network, run the following command:
482484
483485
```azurecli
@@ -575,7 +577,8 @@ Follow these steps to dissociate a network security group from logical network:
575577
"tags": {},
576578
"type": "microsoft.azurestackhci/logicalnetworks"
577579
}
578-
```
580+
```
581+
579582
</details>
580583
581584
## Dissociate network security group from network interface
@@ -594,7 +597,7 @@ Follow these steps to dissociate a network security group from a network interfa
594597
$nicname ="examplenic"
595598
```
596599
597-
2. To dissociate a network security group from a network interface, run the following command:
600+
1. To dissociate a network security group from a network interface, run the following command:
598601
599602
```azurecli
600603
az stack-hci-vm network nic update -g $resource_group --name $nicname --network-security-group '""'
@@ -676,8 +679,7 @@ This section describes the manage operations supported for network security rule
676679
$nsgname = "examplensg"
677680
```
678681
679-
2. Run this command to show details of a network security rule:
680-
682+
1. Run this command to show details of a network security rule:
681683
682684
```azurecli
683685
az stack-hci-vm network nsg rule show -g $resource_group -n $securityrulename --nsg-name $nsgname
@@ -733,7 +735,6 @@ This section describes the manage operations supported for network security rule
733735
734736
### Update a network security rule
735737
736-
737738
1. Set the following parameters in your Azure CLI session.
738739
739740
```azurecli
@@ -967,7 +968,7 @@ To dissociate a network security group from a network interface, follow these st
967968
968969
1. Go to **Azure Local resource page > Resources > Network interfaces**.
969970
970-
:::image type="content" source="./media/manage-network-security-groups/associate-network-security-group-network-interface-1.png" alt-text="Screenshot of selecting network interface to dissociate from the network security group." lightbox="./media/manage-network-security-groups/associate-network-security-group-network-interface-1.png":::
971+
:::image type="content" source="./media/manage-network-security-groups/associate-network-security-group-network-interface-1.png" alt-text="Screenshot of selecting network interface to dissociate from the network security group." lightbox="./media/manage-network-security-groups/associate-network-security-group-network-interface-1.png":::
971972
972973
1. In the right pane, from the list of network interfaces, select an interface that has a network security group attached to it.
973974
1. Go to **Settings > Network security groups**.
@@ -982,7 +983,6 @@ To dissociate a network security group from a network interface, follow these st
982983
The operation takes a few minutes to complete. You can see the status of the operation in the **Notifications** pane.
983984
After the network security group is dissociated from the network interface, the page refreshes to indicate the dissociation.
984985
985-
986986
## List network security rules in a network security group
987987
988988
To list network security rules in a network security group, follow these steps:
@@ -1004,12 +1004,10 @@ To update a network security rule, follow these steps:
10041004
10051005
---
10061006
1007-
10081007
## Next steps
10091008
10101009
- [Troubleshoot SDN enabled by Arc](../index.yml).
10111010
1012-
10131011
::: moniker-end
10141012
10151013
::: moniker range="<=azloc-2505"

0 commit comments

Comments
 (0)