You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
AKS enabled by Arc enables you to run Kubernetes clusters with both Linux and Windows nodes, but you must make small edits to your apps for use in these mixed-OS clusters. This how-to guide describes how to ensure your application gets scheduled on the right host OS using either node selectors or taints and tolerations.
19
+
AKS enabled by Azure Arc enables you to run Kubernetes clusters with both Linux and Windows nodes, but you must make small edits to your apps for use in these mixed-OS clusters. This how-to guide describes how to ensure your application gets scheduled on the right host OS using either node selectors or taints and tolerations.
20
20
21
21
This article assumes a basic understanding of Kubernetes concepts. For more information, see [Kubernetes core concepts for AKS enabled by Arc](kubernetes-concepts.md).
This step is only required if you installed the AKS cluster provisioning from Azure preview. The preview ended with the release of [AKS enabled by Azure Arc on Azure Local version 23H2](aks-overview.md). This article describes the steps to uninstall the preview bits before upgrading to AKS Arc.
17
+
This step is only required if you installed the AKS cluster provisioning from Azure preview. The preview ended with the release of [AKS enabled by Azure Arc on Azure Local](aks-overview.md). This article describes the steps to uninstall the preview bits before upgrading to AKS Arc.
18
18
19
19
## Step 1: delete all preview AKS clusters and Azure vnets created using Az CLI
Copy file name to clipboardExpand all lines: AKS-Arc/help-support.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
title: Get support for AKS Arc and AKS Edge Essentials
3
3
description: Learn about how to get support and open a support request for AKS enabled by Azure Arc or AKS Edge Essentials.
4
4
ms.topic: conceptual
5
-
ms.date: 07/11/2024
5
+
ms.date: 04/03/2025
6
6
ms.custom: fasttrack-edit
7
7
ms.author: sethm
8
8
ms.lastreviewed: 1/14/2022
9
-
ms.reviewer: mikek
10
9
author: sethmanheim
10
+
11
11
# Intent: As an IT Pro, I want to find out what options are available to get help and support, such as creating a ticket.
12
12
# Keyword: AKS support AKS help support requests
13
13
---
@@ -20,10 +20,10 @@ If you encounter an issue with AKS enabled by Azure Arc or AKS Edge Essentials,
20
20
21
21
Select the product you're using to see the relevant instructions on opening a support request.
22
22
23
-
# [AKS on Azure Local](#tab/akshci)
23
+
# [AKS on Windows Server](#tab/akshci)
24
24
25
25
1. Sign in to the [Azure portal](https://portal.azure.com).
26
-
1. Browse to the subscription you're using for Azure Kubernetes Services on Azure Local. Select the subscription to open its dashboard.
26
+
1. Browse to the subscription you're using for Azure Kubernetes Services on Windows Server. Select the subscription to open its dashboard.
27
27
1. From the **Support + troubleshooting** category in the navigation menu in the left-hand pane, select **New Support Request**:
28
28
29
29
:::image type="content" source="media/help-support/new-support-request-sidebar.png" alt-text="Screenshot of the Azure portal Help and Support sidebar." lightbox="media/help-support/new-support-request-sidebar.png":::
@@ -34,7 +34,7 @@ Select the product you're using to see the relevant instructions on opening a su
34
34
35
35
1. Your subscription name should auto-populate in the **Subscription** field. If it doesn't, select it from the dropdown.
36
36
37
-
1. Select the **All services** button, then select the **Service type** dropdown. Begin typing **Azure Kubernetes Service** in the search box to locate the **Azure Kubernetes Service on Azure Local (AKS-HCI)** service in the **Compute** category.
37
+
1. Select the **All services** button, then select the **Service type** dropdown. Begin typing **Azure Kubernetes Service** in the search box to locate the **Azure Kubernetes Service on Windows Server** service in the **Compute** category.
38
38
39
39
:::image type="content" source="media/help-support/service-type.png" alt-text="Screenshot showing service selection." lightbox="media/help-support/service-type.png":::
Copy file name to clipboardExpand all lines: AKS-Arc/known-issues-arc.yml
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ metadata:
10
10
11
11
title: Resolve errors when enabling or disabling Azure Arc on your AKS workload clusters in AKS enabled by Arc
12
12
summary: |
13
-
Applies to: AKS on Azure Local, AKS on Windows Server
13
+
Applies to: AKS on Windows Server
14
14
15
15
This article describes errors you might encounter (and their workarounds) while connecting or disconnecting your AKS workload clusters to Azure Arc using the PowerShell cmdlets [`Enable-AksHciArcConnection`](./reference/ps/enable-akshciarcconnection.md) and [`Disable-AksHciArcConnection`](./reference/ps/disable-akshciarcconnection.md) in AKS Arc. For issues that are not covered in this article, see [Troubleshooting Arc enabled Kubernetes](/azure/azure-arc/kubernetes/troubleshooting).
16
16
@@ -57,10 +57,10 @@ sections:
57
57
answer: |
58
58
This error usually points to one of the following issues:
59
59
60
-
- The clusters were created in an Azure VM in a virtualized environment, or you deployed AKS on Azure Local on multiple levels of virtualization.
60
+
- The clusters were created in an Azure VM in a virtualized environment, or you deployed AKS on Windows Server on multiple levels of virtualization.
61
61
- A slow internet caused the timeout.
62
62
63
-
If one of the above scenarios applies to you, run [Disable-AksHciArcConnection](./reference/ps/disable-akshciarcconnection.md), and try connecting again. If the above scenario doesn't apply to you, [open a support issue](./help-support.md) for AKS on Azure Local.
63
+
If one of the above scenarios applies to you, run [Disable-AksHciArcConnection](./reference/ps/disable-akshciarcconnection.md), and try connecting again. If the above scenario doesn't apply to you, [open a support issue](./help-support.md) for AKS on Windows Server.
64
64
- question: |
65
65
Error: "Secrets "sh.helm.release.v1.azure-arc.v1" not found"
66
66
@@ -90,7 +90,7 @@ sections:
90
90
91
91
answer: |
92
92
This error usually means that you already connected your AKS cluster to Arc-enabled Kubernetes.
93
-
To confirm it's connected, go to the [Azure portal](https://portal.azure.com) and check under the subscription and resource group you provided when you ran [`Set-AksHciRegistration`](./reference/ps/set-akshciregistration.md) (if you used default values) or [`Enable-AksHciArcConnection`](./reference/ps/enable-akshciarcconnection.md) (if you didn't use default values). You can also confirm if your AKS on Azure Local cluster is connected to Azure by running the [`az connectedk8s show` ](/cli/azure/connectedk8s#az-connectedk8s-show) Azure CLI command. If you don't see your workload cluster, run `Disable-AksHciArcConnection` and try again.
93
+
To confirm it's connected, go to the [Azure portal](https://portal.azure.com) and check under the subscription and resource group you provided when you ran [`Set-AksHciRegistration`](./reference/ps/set-akshciregistration.md) (if you used default values) or [`Enable-AksHciArcConnection`](./reference/ps/enable-akshciarcconnection.md) (if you didn't use default values). You can also confirm if your AKS on Windows Server cluster is connected to Azure by running the [`az connectedk8s show` ](/cli/azure/connectedk8s#az-connectedk8s-show) Azure CLI command. If you don't see your workload cluster, run `Disable-AksHciArcConnection` and try again.
Copy file name to clipboardExpand all lines: AKS-Arc/known-issues-installation.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ metadata:
10
10
ms.date: 07/26/2024
11
11
title: Resolve issues and errors during an AKS Arc installation
12
12
summary: |
13
-
**Applies to: AKS on Azure Local, AKS on Windows Server**
13
+
**Applies to: AKS on Windows Server**
14
14
This article describes known issues and errors you may encounter when installing AKS Arc. You can also review known issues with when [upgrading AKS Arc](/azure-stack/aks-hci/known-issues-upgrade) and when using [Windows Admin Center](/azure-stack/aks-hci/known-issues-windows-admin-center).
15
15
16
16
sections:
@@ -23,7 +23,7 @@ sections:
23
23
This error message appears after running [Install-AksHci](./reference/ps/install-akshci.md).
24
24
25
25
> [!NOTE]
26
-
> The error might be caused by having Private Link enabled on the setup. Currently, there is no workaround for this scenario. AKS on Azure Local does not work with Private Link.
26
+
> The error might be caused by having Private Link enabled on the setup. Currently, there is no workaround for this scenario. AKS on Windows Server does not work with Private Link.
27
27
28
28
If you are not using Private Link, to resolve this issue use the following steps:
> Microsoft is retiring the current architecture of AKS on Windows Server 2019 and AKS on Windows Server 2022 on March 27, 2028. We recommend that you upgrade to [AKS on Azure Local](aks-whats-new-23h2.md). For more information, see [Retirement of AKS architecture on Windows Server 2019 and Windows Server 2022](aks-windows-server-retirement.md).
20
+
18
21
Azure Kubernetes Service (AKS) on Windows Server is an on-premises Kubernetes implementation of AKS. AKS on Windows Server automates running containerized applications at scale. AKS on Windows Server makes it quicker to get started hosting Linux and Windows containers in your datacenter.
19
22
20
23
To get started with on-premises Kubernetes using AKS, [set up AKS enabled by Azure Arc](setup.md).
@@ -46,7 +46,7 @@ To run a Windows container with a group managed service account, you need the fo
46
46
- An Active Directory domain with at least one domain controller running Windows Server 2012 or later. There are no forest or domain functional level requirements to use gMSAs, but only domain controllers running Windows Server 2012 or later can distribute gMSA passwords. For more information, see [Active Directory requirements for gMSAs](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts#BKMK_gMSA_Req).
47
47
- Permission to create a gMSA account. To create a gMSA account, you must be a Domain Administrator or use an account that has permissions to create **msDS-GroupManagedServiceAccount** objects.
48
48
- Access to the internet to download the [CredentialSpec](https://aka.ms/credspec) PowerShell module. If you're working in a disconnected environment, you can [save the module](/powershell/module/powershellget/save-module?preserve-view=true&view=powershell-5.1) on a computer with internet access and copy it to your development machine or container host.
49
-
- To ensure gMSA and AD authentication work, ensure that the Azure Local and Windows Server cluster nodes are configured to synchronize their time with either a domain controller or other time source. You should also make sure Hyper-V is configured to synchronize time to any virtual machines.
49
+
- To ensure gMSA and AD authentication work, ensure that the Windows Server cluster nodes are configured to synchronize their time with either a domain controller or other time source. You should also make sure Hyper-V is configured to synchronize time to any virtual machines.
50
50
51
51
## Prepare the gMSA in the domain controller
52
52
@@ -72,7 +72,7 @@ To prepare the gMSA credential spec JSON file, follow the steps for [creating a
72
72
73
73
## Configure gMSA for Windows pods and containers in the cluster
74
74
75
-
The Kubernetes community already supports domain joined Windows worker nodes for [gMSA](https://kubernetes.io/docs/tasks/configure-pod-container/configure-gmsa/). Although you don't need to domain join a Windows worker node in AKS on Azure Local and Windows Server, there are other required configuration steps. These steps include installing the webhook, the custom resource definition (CRD), and the credential spec, and enabling role-based access control (RBAC role). The following steps use PowerShell commands that are built to help simplify the configuration process.
75
+
The Kubernetes community already supports domain joined Windows worker nodes for [gMSA](https://kubernetes.io/docs/tasks/configure-pod-container/configure-gmsa/). Although you don't need to domain join a Windows worker node in AKS on Windows Server, there are other required configuration steps. These steps include installing the webhook, the custom resource definition (CRD), and the credential spec, and enabling role-based access control (RBAC role). The following steps use PowerShell commands that are built to help simplify the configuration process.
76
76
77
77
Before completing the following steps, make sure the **AksHci** PowerShell module is installed and `kubectl` can connect to your cluster.
0 commit comments