Skip to content

Commit 2cc96bf

Browse files
committed
Fixing merge issue
2 parents 91d2dba + c79f639 commit 2cc96bf

36 files changed

+254
-237
lines changed

AKS-Hybrid/aks-edge-howto-setup-machine.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to prepare your machines for AKS Edge Essentials clusters
44
author: rcheeran
55
ms.author: rcheeran
66
ms.topic: how-to
7-
ms.date: 02/13/2024
7+
ms.date: 08/19/2024
88
ms.custom: template-how-to
99
---
1010

@@ -111,6 +111,5 @@ This command displays output similar to the following list:
111111

112112
## Next steps
113113

114-
- Create a [simple deployment](aks-edge-howto-single-node-deployment.md)
115-
- Create a [full deployment](aks-edge-howto-multi-node-deployment.md)
116-
114+
- [Create a single machine deployment](aks-edge-howto-single-node-deployment.md)
115+
- [Create a full Kubernetes deployment](aks-edge-howto-multi-node-deployment.md)

azure-stack/asdk/asdk-admin-basics.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,8 @@ description: Learn how to do basic admin tasks for the Azure Stack Development K
44
author: sethmanheim
55

66
ms.topic: article
7-
ms.date: 10/29/2021
7+
ms.date: 08/19/2024
88
ms.author: sethm
9-
ms.reviewer: misainat
10-
ms.lastreviewed: 10/15/2019
119

1210
# Intent: As an ASDK user, I want to familiarize myself with the admin basics so my users can become productive as quickly as possible.
1311
# Keyword: asdk admin basics
@@ -16,22 +14,22 @@ ms.lastreviewed: 10/15/2019
1614

1715

1816
# ASDK admin basics
17+
1918
There are several things you need to know if you're new to Azure Stack Development Kit (ASDK) administration. This guidance provides an overview of your role as an Azure Stack operator in the evaluation environment. Familiarizing yourself with this info ensures your test users will become productive as quickly as possible.
2019

2120
First, you should review the [What is Azure Stack Development Kit?](asdk-what-is.md) article to make sure you understand the purpose of the ASDK and its limitations. You should use the development kit as a "sandbox," where you can evaluate Azure Stack to develop and test your apps in a non-production environment.
2221

2322
Like Azure, Azure Stack innovates rapidly so we'll regularly release new builds of the ASDK. However, you can't upgrade the ASDK like you can Azure Stack integrated systems deployments. So, if you want to move to the latest build, you must completely [redeploy the ASDK](asdk-redeploy.md). You can't apply update packages. This process takes time, but the benefit is that you can try out the latest features as soon as they become available.
2423

2524
## What account should I use?
25+
2626
There are a few account considerations you should be aware of when managing Azure Stack. This is especially true in deployments using Windows Server Active Directory Federation Services (AD FS) as the identity provider instead of Microsoft Entra ID. The following account considerations apply to both Azure Stack integrated systems and ASDK deployments:
2727

2828
|Account|Microsoft Entra ID|AD FS|
2929
|-----|-----|-----|
3030
|Local Admin (.\Administrator)|ASDK host admin|ASDK host admin|
3131
|AzureStack\AzureStackAdmin|ASDK host admin<br><br>Can be used to sign in to the Azure Stack administrator portal<br><br>Access to view and administer Service Fabric rings|ASDK host admin<br><br>No access to the Azure Stack administrator portal<br><br>Access to view and administer Service Fabric rings<br><br>No longer owner of the Default Provider Subscription (DPS)|
3232
|AzureStack\CloudAdmin|Can access and run permitted commands within the Privileged Endpoint|Can access and run permitted commands within the Privileged Endpoint<br><br>Can't sign in to the ASDK host<br><br>Owner of the Default Provider Subscription (DPS)|
33-
|Microsoft Entra Global Administrator|Used during installation<br><br>Owner of the Default Provider Subscription (DPS)|Not applicable|
34-
|
3533

3634
## What tools do I use to manage?
3735
You can use the Azure Stack administrator portal `https://adminportal.local.azurestack.external` or PowerShell to manage Azure Stack. The easiest way to learn the basic concepts is through the portal. If you want to use PowerShell, you need to install [PowerShell for Azure Stack](asdk-post-deploy.md#install-azure-stack-powershell) and [download the Azure Stack tools from GitHub](asdk-post-deploy.md#download-the-azure-stack-tools).

azure-stack/asdk/asdk-deploy-considerations.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,8 @@ description: Learn about the hardware, software, and environment requirements fo
44
author: sethmanheim
55

66
ms.topic: article
7-
ms.date: 09/23/2020
7+
ms.date: 08/19/2024
88
ms.author: sethm
9-
ms.reviewer: misainat
10-
ms.lastreviewed: 09/23/2020
119

1210
# Intent: As an ASDK user, I want to know the requirements for properly deploying the ASDK.
1311
# Keyword: asdk requirements
@@ -91,7 +89,7 @@ If your environment isn't connected to the internet, or you don't want to use Mi
9189
<a name='azure-active-directory-accounts'></a>
9290

9391
### Microsoft Entra accounts
94-
To deploy Azure Stack by using a Microsoft Entra account, you must prepare a Microsoft Entra account before you run the deployment PowerShell script. This account becomes the Global Admin for the Microsoft Entra tenant. It's used to provision and delegate apps and service principals for all Azure Stack services that interact with Microsoft Entra ID and Graph API. It's also used as the owner of the default provider subscription (which you can later change). You can sign in to your Azure Stack system's administrator portal by using this account.
92+
To deploy Azure Stack by using a Microsoft Entra account, you must prepare a Microsoft Entra account before you run the deployment PowerShell script. This account becomes the administrator for the Microsoft Entra tenant. It's used to provision and delegate apps and service principals for all Azure Stack services that interact with Microsoft Entra ID and Graph API. It's also used as the owner of the default provider subscription (which you can later change). You can sign in to your Azure Stack system's administrator portal by using this account.
9593

9694
1. Create a Microsoft Entra account that is the directory admin for at least one Microsoft Entra ID. If you already have one, you can use that. Otherwise, you can create one for free at [https://azure.microsoft.com/free/](https://azure.microsoft.com/free/) (in China, visit <https://go.microsoft.com/fwlink/?LinkID=717821> instead). If you plan to later [register Azure Stack with Azure](asdk-register.md), you must also have a subscription in this newly created account.
9795

@@ -100,13 +98,11 @@ To deploy Azure Stack by using a Microsoft Entra account, you must prepare a Mic
10098

10199
| **Microsoft Entra account** | **Supported?** |
102100
| --- | --- |
103-
| Work or school account with valid global Azure subscription |Yes |
104-
| Microsoft Account with valid global Azure subscription |Yes |
101+
| Work or school account with valid Azure subscription |Yes |
102+
| Microsoft Account with valid Azure subscription |Yes |
105103
| Work or school account with valid China Azure subscription |Yes |
106104
| Work or school account with valid US Government Azure subscription |Yes |
107105

108-
After deployment, Microsoft Entra global admin permission isn't required. However, some operations may require the global admin credential. Examples of such operations include a resource provider installer script or a new feature requiring a permission to be granted. You can either temporarily reinstate the account's global admin permissions or use a separate global admin account that's an owner of the *default provider subscription*.
109-
110106
## Network
111107
### Switch
112108
One available port on a switch for the ASDK machine.

azure-stack/asdk/asdk-deploy-powershell.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,8 @@ description: Learn how to deploy the ASDK from the command line using PowerShell
44
author: sethmanheim
55

66
ms.topic: article
7-
ms.date: 10/14/2020
7+
ms.date: 08/19/2024
88
ms.author: sethm
9-
ms.reviewer: misainat
10-
ms.lastreviewed: 10/14/2020
119

1210
# Intent: As an ASDK user, I want to deploy the ASDK using the command line in Powershell so I can evaluate Azure Stack features.
1311
# Keyword: deploy asdk command line
@@ -84,9 +82,7 @@ Run the following PowerShell commands to deploy the ASDK using Microsoft Entra I
8482
.\InstallAzureStackPOC.ps1 -AdminPassword $adminpass.Password
8583
```
8684

87-
A few minutes into ASDK installation you'll be prompted for Microsoft Entra credentials. Provide the global admin credentials for your Microsoft Entra tenant.
88-
89-
After deployment, Microsoft Entra global admin permission isn't required. However, some operations may require the global admin credential. Examples of such operations include a resource provider installer script or a new feature requiring a permission to be granted. You can either temporarily reinstate the account's global admin permissions or use a separate global admin account that's an owner of the *default provider subscription*.
85+
A few minutes into ASDK installation you'll be prompted for Microsoft Entra credentials. Provide the Microsoft Entra admin credentials for your tenant.
9086

9187
### Deploy Azure Stack using AD FS
9288
To deploy the ASDK **using AD FS as the identity provider**, run the following PowerShell commands (you just need to add the -UseADFS parameter):
@@ -115,15 +111,15 @@ If your Microsoft Entra identity is only associated with **one** Microsoft Entra
115111
```powershell
116112
cd C:\CloudDeployment\Setup
117113
$adminpass = Get-Credential Administrator
118-
$aadcred = Get-Credential "<Azure AD global administrator account name>"
114+
$aadcred = Get-Credential "<Microsoft Entra administrator account name>"
119115
.\InstallAzureStackPOC.ps1 -AdminPassword $adminpass.Password -InfraAzureDirectoryTenantAdminCredential $aadcred -TimeServer 52.168.138.145 #Example time server IP address.
120116
```
121117

122118
If your Microsoft Entra identity is associated with **greater than one** Microsoft Entra directory:
123119
```powershell
124120
cd C:\CloudDeployment\Setup
125121
$adminpass = Get-Credential Administrator
126-
$aadcred = Get-Credential "<Azure AD global administrator account name>" #Example: [email protected]
122+
$aadcred = Get-Credential "<Microsoft Entra administrator account name>" #Example: [email protected]
127123
.\InstallAzureStackPOC.ps1 -AdminPassword $adminpass.Password -InfraAzureDirectoryTenantAdminCredential $aadcred -InfraAzureDirectoryTenantName "<Azure AD directory in the form of domainname.onmicrosoft.com or an Azure AD verified custom domain name>" -TimeServer 52.168.138.145 #Example time server IP address.
128124
```
129125

azure-stack/asdk/asdk-install.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,8 @@ description: Learn how to install the Azure Stack Development Kit (ASDK).
44
author: sethmanheim
55

66
ms.topic: article
7-
ms.date: 05/06/2019
7+
ms.date: 08/19/2024
88
ms.author: sethm
9-
ms.reviewer: misainat
10-
ms.lastreviewed: 02/08/2019
119

1210
# Intent: As an ASDK user, I want to install the ASDK so I can start using it.
1311
# Keyword: install asdk
@@ -34,9 +32,7 @@ The steps in this article show you how to deploy the ASDK using a graphical user
3432

3533
![Identity provider type drop-down in ASDK](media/asdk-install/2.PNG)
3634

37-
If you choose an Azure subscription identity provider, you need an internet connection, the full name of a Microsoft Entra directory tenant in the form of *domainname*.onmicrosoft.com, or a Microsoft Entra ID verified custom domain name. You also need global admin credentials for the specified directory.
38-
39-
After deployment, Microsoft Entra global admin permission isn't required. However, some operations may require the global admin credential. For example, a resource provider installer script or a new feature requiring a permission to be granted. You can either temporarily reinstate the account's global admin permissions or use a separate global admin account that's an owner of the *default provider subscription*.
35+
If you choose an Azure subscription identity provider, you need an internet connection, the full name of a Microsoft Entra directory tenant in the form of *domainname*.onmicrosoft.com, or a Microsoft Entra ID verified custom domain name. You also need admin credentials for the specified directory.
4036

4137
When using AD FS as the identity provider, the default stamp directory service is used. The default account to sign in with is [email protected], and the password to use is the one you provided as part of setup.
4238

@@ -67,7 +63,7 @@ The steps in this article show you how to deploy the ASDK using a graphical user
6763
> [!TIP]
6864
> Here you can also copy the PowerShell setup commands that'll be used to install the ASDK. This is helpful if you ever need to [redeploy the ASDK on the host computer using PowerShell](asdk-deploy-powershell.md).
6965
70-
8. If you're doing a Microsoft Entra deployment, you'll be prompted to enter your Microsoft Entra global admin account credentials a few minutes after setup starts.
66+
8. If you're doing a Microsoft Entra deployment, you'll be prompted to enter your Microsoft Entra admin account credentials a few minutes after setup starts.
7167

7268
9. The deployment process will take a few hours, during which time the host computer will automatically reboot once. If you want to monitor the deployment progress, sign in as azurestack\AzureStackAdmin after the ASDK host restarts. When the deployment succeeds, the PowerShell console displays: **COMPLETE: Action 'Deployment'**.
7369
> [!IMPORTANT]
@@ -85,4 +81,5 @@ If the deployment fails for some reason, you can [redeploy](asdk-redeploy.md) fr
8581
```
8682

8783
## Next steps
84+
8885
[Post deployment configuration](asdk-post-deploy.md)

azure-stack/asdk/asdk-register.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,13 @@
22
title: Register the ASDK with Azure
33
description: Learn how to register the Azure Stack Development Kit (ASDK) with Azure to enable marketplace syndication and usage reporting.
44
author: sethmanheim
5-
65
ms.topic: article
76
ms.custom:
87
- devx-track-azurepowershell
9-
ms.date: 1/20/2021
8+
ms.date: 08/19/2024
109
ms.author: sethm
11-
ms.reviewer: misainat
12-
ms.lastreviewed: 1/20/2021
1310

14-
# Intent: As an ASDK user, I want to register my ASDK with Azure so I can download marketplace items and report data back to global Azure.
11+
# Intent: As an ASDK user, I want to register my ASDK with Azure so I can download marketplace items and report data back to Azure.
1512
# Keyword: register asdk azure
1613
---
1714

@@ -34,7 +31,7 @@ $ExecutionContext.SessionState.LanguageMode
3431

3532
Ensure the output returns **FullLanguage**. If any other language mode is returned, registration needs to be run on another computer or the language mode set to **FullLanguage** before continuing.
3633

37-
The Microsoft Entra account used for registration needs to have access to the Azure subscription and have permissions to create identity apps and service principals in the directory associated with that subscription. We recommend you register Azure Stack Hub with Azure by [creating a service account to use for registration](../operator/azure-stack-registration-role.md) rather than using global admin credentials.
34+
The Microsoft Entra account used for registration needs to have access to the Azure subscription and have permissions to create identity apps and service principals in the directory associated with that subscription. We recommend you register Azure Stack Hub with Azure by [creating a service account to use for registration](../operator/azure-stack-registration-role.md).
3835

3936
## Register the ASDK
4037

azure-stack/hci/concepts/physical-network-requirements.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,21 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
220220
> [!NOTE]
221221
> Guest RDMA requires both Compute (Standard) and Storage.
222222
223-
---
223+
# [SuperMicro](#tab/SuperMicro)
224+
### 23H2
225+
226+
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
227+
|----- |---| :-: | :-: | :-: | :-: |
228+
| [SSE-C4632](https://www.supermicro.com/datasheet/datasheet_SSE-C4632.pdf) <br>(10, 25, 100 GbE)|Broadcom Advanced Enterprise SONiC OS 4.2.1 or later |&check;| &check;| &check;| &check; |
229+
> [!NOTE]
230+
> Guest RDMA requires both Compute (Standard) and Storage.
231+
### 22H2
232+
233+
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
234+
|----- |---| :-: | :-: | :-: | :-: |
235+
| [SSE-C4632](https://www.supermicro.com/datasheet/datasheet_SSE-C4632.pdf) <br>(10, 25, 100 GbE)|Broadcom Advanced Enterprise SONiC OS 4.2.1 or later |&check;| &check;| &check;| &check; |
236+
> [!NOTE]
237+
> Guest RDMA requires both Compute (Standard) and Storage.
224238
225239
---
226240

Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
---
2+
title: Collect log files for Azure Arc VM on Azure Stack HCI
3+
description: Learn how to collect log files for an Azure Arc VM on your Azure Stack HCI system.
4+
author: alkohli
5+
ms.topic: how-to
6+
ms.date: 08/16/2024
7+
ms.author: alkohli
8+
ms.reviewer: vlakshmanan
9+
---
10+
11+
# Collect log files for Azure Arc VM on your Azure Stack HCI system
12+
13+
[!INCLUDE [hci-applies-to-23h2](../../includes/hci-applies-to-23h2.md)]
14+
15+
Collect logs and other files to identify and troubleshoot issues with Arc virtual machines (VMs) in your Azure Stack HCI system.
16+
17+
## Collect files when VM provisioning fails
18+
19+
Use these files to gather key information about a VM provisioning failure before you contact Microsoft Support for more help.
20+
21+
### Windows VMs
22+
23+
The Windows Panther folder contains Windows setup, installation, and upgrade log files. This folder also includes logs for all scripts used to customize the VM.
24+
25+
| File | Directory | Description |
26+
|-------------------|-----------------|-------------|
27+
| agent-log-0 | C:\ProgramData\mocguestagent\log\ | Operational logs |
28+
| SetupAct.log | C:\Windows\panther\ | Contains information about setup actions during the installation. |
29+
| SetupErr.log | C:\Windows\panther\ | Contains information about setup errors during the installation. |
30+
| SetupComplete.log | C:\Windows\panther\ | Contains custom scripts that run during or after the Windows Setup process. For HCI, includes enabling WinRM, enabling ssh, and installing Microsoft On-premises Cloud (MOC) guest agent. |
31+
| Script files | C:\Windows\setup\scripts\ | Scripts from ISO |
32+
| System.evtx | C:\Windows\system32\winevt\logs\ | Windows event logs |
33+
34+
### Linux VMs
35+
36+
Examine these log files to investigate a VM provisioning failure:
37+
38+
| File | Directory | Description |
39+
|-------------------|-----------------|-------------|
40+
| cloud-init-output.log | /var/log/ | Captures the output from each stage of cloud-init when it runs. |
41+
| cloud-init.log | /var/log/ | A detailed log with debugging output, detailing each action taken. |
42+
| log files | /run/cloud-init/ | Contains logs about how cloud-init decided to enable or disable itself, and what platforms/datasources were detected. These logs are most useful when trying to determine what cloud-init ran or didn't run. |
43+
44+
## Collect guest logs
45+
46+
Collect guest logs to gather information on Arc VM issues before you contact Microsoft Support.
47+
48+
### Logs inside the VM
49+
50+
Windows VM domain join and extension logs:
51+
52+
| File | Directory | Description |
53+
|-------------------|-----------------|-------------|
54+
| Netsetup.log | C:\Windows\debug\ | Netlogon logs are used for domain join failure. If you don't see a domain join error, this log is optional. |
55+
| Extension logs | C:\ProgramData\GuestConfig\extension_logs\ | Extension logs |
56+
57+
For more information, see [Active Directory domain join troubleshooting guidance](/troubleshoot/windows-server/active-directory/active-directory-domain-join-troubleshooting-guidance).
58+
59+
### MOC guest agent logs
60+
61+
MOC guest agent logs are useful when Arc VM provisioning fails with the following error:
62+
63+
`Could not establish HyperV connection for VM ID...`
64+
65+
Example error:
66+
67+
`{"code":"moc-operator virtualmachine serviceClient returned an error while reconciling: rpc error: code = Unknown desc = Could not establish HyperV connection for VM ID [E5BF0FC3-DB6D-40AA-BB46-DD94E4E0719A] within [900] seconds, error: [<nil>]","message":"moc-operator virtualmachine serviceClient returned an error while reconciling: rpc error: code = Unknown desc = Could not establish HyperV connection for VM ID [E5BF0FC3-DB6D-40AA-BB46-DD94E4E0719A] within [900] seconds, error: [<nil>]","additionalInfo":[{"type":"ErrorInfo","info":{"category":"Uncategorized","recommendedAction":"","troubleshootingURL":""}}]}`
68+
69+
#### Windows VMs
70+
71+
Examine these MOC guest agent log files:
72+
73+
| File | Directory | Description |
74+
|-------------------|-----------------|-------------|
75+
| mocguestagent.log | C:\ProgramData\mocguestagent\log\ | Critical logs |
76+
| agent-log-0 | C:\ProgramData\mocguestagent\log\ | Operational logs |
77+
78+
#### Linux VMs
79+
80+
Examine these MOC guest agent log files:
81+
82+
| File | Directory | Description |
83+
|-------------------|-----------------|-------------|
84+
| mocguestagent.service | sudo journalctl -u | Critical logs |
85+
| agent-log-0 | /opt/mocguestagent/log/ | Operational logs |
86+
87+
## Next steps
88+
89+
- [Collect logs](./collect-logs.md).

0 commit comments

Comments
 (0)