Skip to content

Commit 29ab619

Browse files
committed
Merge branch 'md-update-release-image' of https://github.com/ManikaDhiman/azure-stack-docs-pr into 250424h2
2 parents 9883754 + e6ed24d commit 29ab619

15 files changed

+127
-19
lines changed

AKS-Arc/TOC.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,11 +181,12 @@
181181
href: check-vm-sku.md
182182
- name: Connectivity issues with MetalLB
183183
href: load-balancer-issues.md
184-
185184
- name: Reference
186185
items:
187186
- name: Azure CLI
188187
href: /cli/azure/aksarc
188+
- name: Azure PowerShell
189+
href: /powershell/module/az.aksarc/
189190
- name: REST API reference
190191
href: /rest/api/hybridcontainer/operation-groups
191192
- name: Resources

azure-local/concepts/observability.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Local observability
33
description: Learn about observability in Azure Local.
44
author: alkohli
55
ms.author: alkohli
6-
ms.date: 10/18/2024
6+
ms.date: 04/25/2025
77
ms.topic: conceptual
88
ms.service: azure-local
99
---
@@ -109,6 +109,36 @@ The following table describes the types of data, their storage location, default
109109
| Metrics | Metrics are numerical values collected at regular intervals, describing aspects of a system. | Metrics data is sent to the respective region in which resource is deployed. | Enabled by default and can be disabled anytime. | Platform metrics are stored for 93 days, however, you can only query (in the Metrics tile) for a maximum of 30 days' worth of data on any single chart. | You can use metrics explorer to interactively analyze the data in your metric database. |
110110
| Billing and census | Billing data includes the system ID and the number of physical cores and hours used. Census data is required to enable basic management from Azure and includes system information (system name and ID, system connection status, storage pool ID, trial days remaining and billing model), machine information (number of machines, machine name, OS version, machine manufacturer, model and serial number, number of physical cores and memory size), and basic configuration such as, enablement of Azure verification for VMs, Azure managed identity and diagnostics level setting. | Billing and census data is sent to the respective resource region where the customer registered the device. | Billing is always enabled as it is required to charge for Azure Local usage. Census data is also always enabled, as it includes the minimal information required to manage Azure Local from Azure. | Data is deleted when the resource is deleted, except for billing data, which is retained. | To view billing data, navigate to the Azure Local system resource page in Azure portal, select **Overview** in the left pane, in the Essentials section select the **Billing status** link, followed by **View Cost Management**. To view census data, select **JSON View** located in the top right corner of the Essentials section. |
111111

112+
## Crash dump collection
113+
114+
Crash dump collection is a feature in Azure Local that allows for the automatic collection, analysis, and debugging of crashes. The data collected from a crash, referred to as the crash dump, is used for analysis and debugging.
115+
116+
### Key features
117+
118+
Here are the key features of crash dump collection for Azure Local:
119+
120+
- **Automatic collection and analysis.** Automatically gathers data from Azure Local crashes and analyzes it to pinpoint the root causes of failures, aiding in quick diagnosis and resolution. This minimizes downtime and enhances service reliability.
121+
- **Compliance and security.** Ensures crash data is handled securely and in compliance with data protection regulations across all Azure regions and national clouds.
122+
- **Customizable settings.** Enabled by default for optimal performance and reliability, but can be disabled using specific commands if necessary. However, we recommend to keep it enabled to benefit from its diagnostic capabilities.
123+
124+
### Prerequisites
125+
126+
To use the crash dump collection feature, install the `AzureEdgeTelemetryAndDiagnostics` extension, version 2.0.18 or later. For information about the extension, see [Azure Local telemetry and diagnostics extension overview](./telemetry-and-diagnostics-overview.md).
127+
128+
### Disable crash dump collection
129+
130+
To disable the crash dump collection capability, use the following command:
131+
132+
```powershell
133+
Set-EdgeCrashDumpCollection -SetState Disable
134+
```
135+
136+
To re-enable it, use the following command:
137+
138+
```powershell
139+
Set-EdgeCrashDumpCollection -SetState Enable
140+
```
141+
112142
## Next steps
113143

114144
- [Azure Local telemetry and diagnostics extension](./telemetry-and-diagnostics-overview.md)

azure-local/concepts/system-requirements-23h2.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
88
ms.custom: references_regions
9-
ms.date: 04/03/2025
9+
ms.date: 04/25/2025
1010
---
1111

1212
# System requirements for Azure Local
@@ -32,6 +32,10 @@ Here are the Azure requirements for your Azure Local instance:
3232

3333
- **Azure regions**: Azure Local is supported for the following regions:
3434

35+
# [Azure public](#tab/azure-public)
36+
37+
These public regions support geographic locations worldwide, for clusters deployed anywhere in the world:
38+
3539
- East US
3640
- West Europe
3741
- Australia East
@@ -41,6 +45,15 @@ Here are the Azure requirements for your Azure Local instance:
4145
- Japan East
4246
- South Central US
4347

48+
49+
# [Azure Government (Preview)](#tab/azure-government)
50+
51+
Regions supported in the Azure Government cloud:
52+
53+
- US Gov Virginia
54+
55+
---
56+
4457
- **Azure Key Vault**: Make sure to enable public network access when you set up a key vault. This setting allows Azure Local instances to connect to the key vault without any access issues.
4558

4659
## Machine and storage requirements

azure-local/deploy/download-23h2-software.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 04/23/2025
8+
ms.date: 04/28/2025
99
---
1010

1111
# Download operating system for Azure Local deployment
@@ -34,7 +34,8 @@ Before you begin the download of the software from Azure portal, ensure that you
3434
## Download the software from the Azure portal
3535

3636
> [!IMPORTANT]
37-
> English is the only supported language for the deployment.
37+
> - English is the only supported language for the deployment.
38+
> - For deployments in Azure Government only, download the OS image from the following location: [OS image](https://aka.ms/hcireleaseimage).
3839
3940
Follow these steps to download the software:
4041

azure-local/deploy/single-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Currently you can't use Windows Admin Center to deploy Azure Stack HCI on a sing
2323

2424
## Prerequisites
2525

26-
- A server from the [Azure Stack HCI Catalog](https://hcicatalog.azurewebsites.net/#/catalog) certified for use as a single-node cluster and configured with all NVMe or all SSD drives.
26+
- A server from the [Azure Stack HCI Catalog](https://azurelocalsolutions.azure.microsoft.com/#/catalog) certified for use as a single-node cluster and configured with all NVMe or all SSD drives.
2727
- For network, hardware and other requirements, see [Azure Stack HCI network and domain requirements](../deploy/operating-system.md#determine-hardware-and-network-requirements).
2828
- Optionally, [install Windows Admin Center](/windows-server/manage/windows-admin-center/deploy/install) to register and manage the server after it's deployed.
2929

azure-local/known-issues.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,7 @@ The following table lists the known issues in this release:
6464
|---------|---------|---------|
6565
| Add server <br> Repair server <!--32447442--> | The `Add-server` and `Repair-server` cmdlets fail with the error: <br> `Cluster Build ID matches node to add's Build ID`. | Use the OS image of the same solution version as that running on the existing cluster. To get the OS image, identify and download the image version from this [Release table](https://github.com/Azure-Samples/AzureLocal/tree/main/os-image). |
6666

67+
6768
## Known issues from previous releases
6869

6970
The following table lists the known issues from previous releases:
@@ -152,6 +153,8 @@ The following table lists the known issues in this release:
152153
| Updates <!--32073115--> | Updating to 2503.0.13 failed `Update PreRequisites` for Role 'MocArb' with exception: `SyntaxWarning: invalid escape sequence '\W' at CheckAndInstall-CliExtensions`. | For detailed steps on how to resolve this issue, see the [Troubleshooting guide](https://github.com/Azure/AzureLocal-Supportability/blob/main/TSG/Update/). |
153154
| Security vulnerability <!--32074481--> | There is a known security vulnerability in this release that may affect security scans for the updates. For more information, see [Azure Arc Installer vulnerability CVE-2025-26627 - Host](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26627) | |
154155
| Azure Local VMs <!--32074457O--> | There is a known security vulnerability in this release that may affect security scans for the updates. For more information, see [Azure Arc Installer vulnerability CVE-2025-26627 - Guest](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26627) | |
156+
| Microsoft Defender for Cloud <br><br> Azure Government <!--32555179-->| In the Azure Government cloud, Microsoft Defender for Cloud recommendations for Azure Local do not show up in the Microsoft Defender for Cloud portal.| |
157+
| Metrics <br><br> Azure Government <!--IcM-620345316-->| Metrics from Azure Local clusters in the Azure Government cloud fail to reach Azure. As a result, metrics don't show up in the Monitoring, Metrics, or workbook graphs. Metrics based alerts aren't triggered and new alerts can't be set up.| |
155158

156159

157160
## Known issues from previous releases

azure-local/manage/manage-security-with-defender-for-cloud.md

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: This article describes how to use Microsoft Defender for Cloud to s
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 04/09/2025
7+
ms.date: 04/23/2025
8+
89
ms.service: azure-local
910
---
1011

@@ -32,15 +33,16 @@ Before you begin, make sure that the following prerequisites are completed:
3233
Follow these steps to enable Defender for Cloud for Azure Local.
3334

3435
- Step 1: Turn on Foundational CSPM.
35-
- Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs enabled by Arc.
36+
- Step 2: Turn on Defender for Servers for individual machines and Azure Local virtual machines (VMs) enabled by Azure Arc.
37+
3638

3739
### Step 1: Turn on Foundational CSPM
3840

3941
This step turns on the basic Defender for Cloud plan—at no extra cost. This plan lets you monitor and identify the steps that you can take to secure Azure Local, along with other Azure and Arc resources. For instructions, see [Enable Defender for Cloud on your Azure subscription](/azure/defender-for-cloud/connect-azure-subscription#enable-defender-for-cloud-on-your-azure-subscription).
4042

4143
### Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs
4244

43-
This step gets you enhanced security features including security alerts for individual machines and VMs.
45+
This step gets you enhanced security features including security alerts for individual machines and Azure Local VMs.
4446

4547
To do so, follow all the instructions in the [Enable the Defender for Servers plan](/azure/defender-for-cloud/tutorial-enable-servers-plan#enable-the-defender-for-servers-plan) section, which includes:
4648

@@ -100,11 +102,27 @@ After you've [enabled Defender for Cloud for Azure Local](#enable-defender-for-c
100102
101103
To learn more about the security recommendations specific to Azure Local, refer to the [Azure compute recommendations](/azure/defender-for-cloud/recommendations-reference-compute#azure-compute-recommendations) section in the [Compute security recommendations](/azure/defender-for-cloud/recommendations-reference-compute) article.
102104

103-
## Monitor servers and Azure Local VMs
105+
### Security recommendation exclusions
106+
107+
You can ignore the Windows Defender for Cloud recommendations below for storage accounts and Azure Key Vaults that are associated with Azure Local instances. However, don't ignore these recommendations for other storage accounts and Azure Key Vaults you may have.
108+
109+
| Affected resource | Recommendation | Exclusion reason |
110+
| --- | --- | --- |
111+
| Storage account | Storage accounts should have infrastructure encryption. | Storage account encryption isn't supported for Azure Local instances because it doesn't allow passing in an encryption key. |
112+
| Storage account | Storage accounts should prevent shared key access. | Azure Local supports accessing storage accounts exclusively through shared keys. |
113+
| Storage account | Storage account should use a private link connection. | Azure Local doesn't currently support private link connections. |
114+
| Azure Key Vault | Azure Key Vaults should use a private link. | Azure Local doesn't currently support private link connections. |
115+
| Machine – Azure Arc | Windows Defender Exploit Guard should be enabled on Azure Local machines. | Windows Defender Exploit Guard isn't applicable to server-core SKUs without a GUI such as the Azure Local OS. |
116+
| Machine – Azure Arc | Azure Local machines should be configured to periodically check for missing system updates. | Azure Local machines shouldn't be updated individually. Use the Azure Local section in Azure Update Manager to update multiple systems or the Updates page on the Azure Local resource view whenever an update is available for the Azure Local instance. Updating individual machines could result in a mixed-mode state, which isn't supported. |
117+
| Machine – Azure Arc | System updates should be installed on your Azure Local machines using Azure Update Manager. | Azure Local machines shouldn't be updated individually. Utilize the Azure Local section in Azure Update Manager to update multiple systems or the Updates page on the Azure Local resource view whenever an update is available for the Azure Local instance. Updating individual machines could result in a mixed-mode state, which isn't supported. |
118+
| Machine – Azure Arc | Azure Local machines should have a vulnerability assessment solution. | Microsoft Defender Vulnerability Management doesn't currently support Azure Local. |
104119

105-
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual servers and VMs running on Azure Local. You can utilize the regulatory compliance and attack path analysis features, among other enhanced security features.
120+
## Monitor Azure Local machines and Azure Local VMs
121+
122+
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual Azure Local machines and Azure Local VMs.
123+
124+
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and Azure Local VMs:
106125

107-
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and VMs:
108126

109127
1. Sign into the Azure portal, and search for and select **Microsoft Defender for Cloud**.
110128

@@ -114,6 +132,7 @@ Follow these steps to access the Microsoft Defender for Cloud portal's pages to
114132

115133
:::image type="content" source="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" alt-text="Screenshot of the Defender for Cloud Overview page." lightbox="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" :::
116134

135+
117136
## Next steps
118137

119138
- [Review the deployment checklist and install Azure Local](../deploy/deployment-checklist.md).

azure-local/release-information-23h2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: conceptual
77
ms.service: azure-local
8-
ms.date: 04/28/2025
8+
ms.date: 04/29/2025
99
---
1010

1111
# Azure Local release information

azure-local/security-update/security-update.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ This security update includes quality improvements. Below is a summary of the ke
141141

142142
Data to be set: 1
143143

144-
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [February 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-Feb).
144+
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [March 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-Mar).
145145

146146
## Known issues
147147

@@ -169,7 +169,7 @@ To install the LCU on your Azure Local instance, see [Update Azure Stack Local i
169169

170170
## File list
171171

172-
For a list of the files that are provided in this update, download the file information for [Cumulative update KB 5053599](security-update.md).
172+
For a list of the files that are provided in this update, download the file information for [Cumulative update KB 5053599](https://go.microsoft.com/fwlink/?linkid=2309855).
173173

174174
::: moniker-end
175175

azure-local/upgrade/install-solution-upgrade.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ You install the solution upgrade via the Azure portal.
4545
> [!IMPORTANT]
4646
> - Microsoft only supports upgrade applied from Azure Local resource page. Use of 3rd party tools to install upgrades is not supported.
4747
> - If you have Azure Kubernetes Service (AKS) workloads on Azure Local, wait for the solution upgrade banner to appear on the Azure Local resource page. Then, remove AKS and all AKS hybrid settings before you apply the solution upgrade.
48+
> - By installing the solution upgrade, existing Hyper-V VMs won't automatically become Azure Arc VMs.
4849
4950
Follow these steps to install the solution upgrade:
5051

0 commit comments

Comments
 (0)