Skip to content

Commit 3337daf

Browse files
committed
Merge branch 'release-local-disconnectednew' of https://github.com/MicrosoftDocs/azure-stack-docs-pr into rb-do-fallback
2 parents 08f55ed + be98117 commit 3337daf

23 files changed

+797
-843
lines changed

.openpublishing.redirection.azure-local.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1924,6 +1924,16 @@
19241924
"source_path": "azure-local/manage/manage-network-atc.md",
19251925
"redirect_url": "/windows-server/networking/network-atc/manage-network-atc",
19261926
"redirect_document_id": false
1927+
},
1928+
{
1929+
"source_path": "azure-local/migrate/migrate-cluster-same-hardware.md",
1930+
"redirect_url": "/azure-local/migrate/migration-azure-migrate-overview",
1931+
"redirect_document_id": false
1932+
},
1933+
{
1934+
"source_path": "azure-local/migrate/migrate-cluster-new-hardware.md",
1935+
"redirect_url": "/azure-local/migrate/migration-azure-migrate-overview",
1936+
"redirect_document_id": false
19271937
}
19281938
]
19291939
}

AKS-Arc/TOC.yml

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -80,12 +80,12 @@
8080
href: deploy-load-balancer-cli.md
8181
- name: Azure portal
8282
href: deploy-load-balancer-portal.md
83-
# - name: Troubleshoot issues
84-
# href: load-balancer-troubleshoot.md
8583
- name: Security
8684
items:
8785
- name: Encrypt etcd secrets
8886
href: encrypt-etcd-secrets.md
87+
- name: Validate signed container images
88+
href: validate-signed-container-images.md
8989
- name: AI and Machine Learning
9090
items:
9191
- name: Deploy an AI model with the AI toolchain operator
@@ -107,7 +107,7 @@
107107
- name: Restrict SSH access
108108
href: restrict-ssh-access.md
109109
- name: Deploy and configure Workload Identity
110-
href: workload-identity.md
110+
href: workload-identity.md
111111
- name: Storage
112112
href: concepts-storage.md
113113
items:
@@ -159,12 +159,18 @@
159159
items:
160160
- name: Troubleshoot and known issues
161161
href: aks-troubleshoot.md
162-
- name: AKS on Azure Local support policy
163-
href: aks-on-azure-local-support-policy.md
164162
- name: Get support
165-
href: help-support.md
166-
- name: Use diagnostic checker
167-
href: aks-arc-diagnostic-checker.md
163+
items:
164+
- name: AKS on Azure Local support policy
165+
href: aks-on-azure-local-support-policy.md
166+
- name: Get support
167+
href: help-support.md
168+
- name: Use the support remediation tool
169+
href: support-module.md
170+
- name: Use diagnostic checker
171+
href: aks-arc-diagnostic-checker.md
172+
- name: Storage provisioning issue in cluster and node pool creation
173+
href: storage-provision-issue.md
168174
- name: Control plane configuration validation errors
169175
href: control-plane-validation-errors.md
170176
- name: K8sVersionValidation error

AKS-Arc/aks-troubleshoot.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Troubleshoot common issues in AKS enabled by Azure Arc
33
description: Learn about common issues and workarounds in AKS enabled by Arc.
44
ms.topic: how-to
55
author: sethmanheim
6-
ms.date: 07/17/2025
6+
ms.date: 07/23/2025
77
ms.author: sethm
8-
ms.lastreviewed: 07/17/2025
8+
ms.lastreviewed: 07/23/2025
99
ms.reviewer: rcheeran
1010

1111
---
@@ -24,6 +24,7 @@ The following sections describe known issues for AKS enabled by Azure Arc:
2424

2525
| AKS Arc CRUD operation | Issue | Fix status |
2626
|------------------------|-------|------------|
27+
| AKS steady state | [Storage provisioning issue impacting cluster and node pool creation](storage-provision-issue.md)|Active|
2728
| AKS cluster delete | [Deleted AKS Arc cluster still visible on Azure portal](deleted-cluster-visible.md) | Active |
2829
| AKS steady state | [AKS Arc telemetry pod consumes too much memory and CPU](telemetry-pod-resources.md) | Fixed in 2507 release |
2930
| AKS cluster create | [Can't create AKS cluster or scale node pool because of issues with AKS Arc images](gallery-image-not-usable.md) | Fixed in 2507 release |

AKS-Arc/azure-rbac-local.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.custom: devx-track-azurecli
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: leslielin
9-
ms.date: 05/21/2025
10-
ms.lastreviewed: 05/21/2025
9+
ms.date: 07/25/2025
10+
ms.lastreviewed: 07/25/2025
1111

1212
# Intent: As an IT Pro, I want to use Azure RBAC to authenticate connections to my AKS clusters over the Internet or on a private network.
1313
# Keyword: Kubernetes role-based access control AKS Azure RBAC AD
@@ -45,7 +45,17 @@ Before you begin, make sure you have the following prerequisites:
4545
az extension update --name connectedk8s
4646
```
4747

48-
- To interact with Kubernetes clusters, you must install [**kubectl**](https://kubernetes.io/docs/tasks/tools/) and [**kubelogin**](https://azure.github.io/kubelogin/install.html).
48+
- To interact with Kubernetes clusters, you must install [**kubectl**](https://kubernetes.io/docs/tasks/tools/) and [**kubelogin**](https://azure.github.io/kubelogin/install.html). You can use the following Azure CLI or Azure PowerShell commands to install both **kubectl** and **kubelogin**:
49+
50+
# [Azure CLI](#tab/cli)
51+
52+
Install kubectl locally using the [az aks install-cli](/cli/azure/aks?view=azure-cli-latest#az-aks-install-cli&preserve-view=true) command.
53+
54+
# [PowerShell](#tab/powershell)
55+
56+
Install kubectl locally using the [Install-AzAksCliTool](/powershell/module/az.aks/install-azaksclitool?view=azps-14.2.0&preserve-view=true) cmdlet.
57+
58+
---
4959
- The following permissions are required to enable Azure RBAC when creating a Kubernetes cluster:
5060
- To create a Kubernetes cluster, the [**Azure Kubernetes Service Arc Contributor**](/azure/role-based-access-control/built-in-roles/containers#azure-kubernetes-service-arc-contributor-role) role is required.
5161
- To use the `--enable-azure-rbac` parameter, the [**Role Based Access Control Administrator**](/azure/role-based-access-control/built-in-roles/privileged#role-based-access-control-administrator) role is required for access to the **Microsoft.Authorization/roleAssignments/write** permission.
@@ -222,4 +232,4 @@ az role definition delete -n "AKS Arc Deployment Reader"
222232
- [Access and identity options](concepts-security-access-identity.md) for AKS enabled by Azure Arc
223233
- [Create an Azure service principal with Azure CLI](/cli/azure/azure-cli-sp-tutorial-1)
224234
- Available Azure permissions for [Hybrid + Multicloud](/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes)
225-
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book?toc=/azure/aks/aksarc/toc.json&bc=/azure/aks/aksarc/breadcrumb/toc.json).
235+
- Help to protect your cluster in other ways by following the guidance in the [security book for AKS enabled by Azure Arc](/azure/azure-arc/kubernetes/conceptual-security-book?toc=/azure/aks/aksarc/toc.json&bc=/azure/aks/aksarc/breadcrumb/toc.json).

AKS-Arc/kubernetes-rbac-local.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Control access using Microsoft Entra ID and Kubernetes RBAC in AKS enable
33
description: Learn how to use Microsoft Entra group membership to restrict access to cluster resources using Kubernetes role-based access control (Kubernetes RBAC) in AKS Arc.
44
author: sethmanheim
55
ms.author: sethm
6-
ms.lastreviewed: 06/25/2025
7-
ms.reviewer: abha
6+
ms.lastreviewed: 07/25/2025
7+
ms.reviewer: leslielin
88
ms.topic: how-to
99
ms.custom:
1010
- devx-track-azurecli
11-
ms.date: 06/25/2025
11+
ms.date: 07/25/2025
1212

1313
# Intent: As an IT Pro, I need to learn how to enable Kubernetes role-based access control so that I can manage access to resources.
1414
# Keyword: Kubernetes role-based access control
@@ -20,16 +20,24 @@ ms.date: 06/25/2025
2020

2121
You can configure Azure Kubernetes Service (AKS) to use Microsoft Entra ID for user authentication. In this configuration, you sign in to a Kubernetes cluster using a Microsoft Entra authentication token. Once authenticated, you can use the built-in Kubernetes role-based access control (Kubernetes RBAC) to manage access to namespaces and cluster resources based on a user's identity or group membership.
2222

23-
This article describes how to control access using Kubernetes RBAC in a Kubernetes cluster based on Microsoft Entra group membership in AKS. You create a demo group and users in Microsoft Entra ID. Then, you create roles and role bindings in the cluster to grant the appropriate permissions to create and view resources.
23+
This article describes how to control access using Kubernetes RBAC in a Kubernetes cluster based on Microsoft Entra group membership in AKS. First, you create a demo group and users in Microsoft Entra ID. Then you create roles and role bindings in the cluster to grant the appropriate permissions to create and view resources.
2424

2525
## Prerequisites
2626

2727
Before you set up Kubernetes RBAC using Microsoft Entra ID, you must have the following prerequisites:
2828

29-
- An AKS enabled by Azure Arc cluster. If you need to set up your cluster, see the instructions for using the [Azure portal](aks-create-clusters-portal.md) or [Azure CLI](aks-create-clusters-cli.md).
29+
- An AKS Arc cluster. If you need to set up your cluster, see the instructions for using the [Azure portal](aks-create-clusters-portal.md) or [Azure CLI](aks-create-clusters-cli.md).
3030
- Azure CLI installed and configured. If you need to install CLI or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
31-
- **Azure CLI and the connectedk8s extension**. The Azure command-line interface (Azure CLI) is a set of commands used to create and manage Azure resources. To check whether you have the Azure CLI, open a command line tool, and type: `az -v`. Also, install the [connectedk8s extension](https://github.com/Azure/azure-cli-extensions/tree/main/src/connectedk8s) in order to open a channel to your Kubernetes cluster. For installation instructions, see [How to install the Azure CLI](/cli/azure/install-azure-cli).
32-
- **Kubectl**. The Kubernetes command-line tool, **kubectl**, enables you to run commands that target your Kubernetes clusters. To check whether you have installed kubectl, open a command line tool, and type: `kubectl version --client`. Make sure your kubectl client version is at least `v1.24.0`. For installation instructions, see [kubectl](https://kubernetes.io/docs/tasks/tools/#kubectl).
31+
- Azure CLI and the **connectedk8s** extension. The Azure command-line interface (Azure CLI) is a set of commands used to create and manage Azure resources. To check whether you have the Azure CLI, open a command prompt and type `az -v`. Also, install the [connectedk8s extension](https://github.com/Azure/azure-cli-extensions/tree/main/src/connectedk8s) in order to open a channel to your Kubernetes cluster. For installation instructions, see [How to install the Azure CLI](/cli/azure/install-azure-cli).
32+
- **Kubectl**. The Kubernetes command line tool, **kubectl**, enables you to run commands that target your Kubernetes clusters. To check whether you installed **kubectl**, open a command prompt and type `kubectl version --client`. Make sure your **kubectl** client version is at least **v1.24.0**. You can use the following Azure CLI or Azure PowerShell commands to install **kubectl**:
33+
34+
# [Azure CLI](#tab/cli)
35+
36+
Install kubectl locally using the [az aks install-cli](/cli/azure/aks?view=azure-cli-latest#az-aks-install-cli&preserve-view=true) command.
37+
38+
# [PowerShell](#tab/powershell)
39+
40+
Install kubectl locally using the [Install-AzAksCliTool](/powershell/module/az.aks/install-azaksclitool?view=azps-14.2.0&preserve-view=true) cmdlet.
3341
- You can access your Kubernetes cluster with the specified permissions either with direct mode or proxy mode.
3442
- To access the Kubernetes cluster directly using the `az aksarc get-credentials` command, you need the **Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action**, which is included in the **Azure Kubernetes Service Arc Cluster User** role permissions
3543
- To access the Kubernetes cluster from anywhere with a proxy mode using `az connectedk8s proxy` command, you need the **Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action**, which is included in **Azure Arc-enabled Kubernetes Cluster User** role permission. Meanwhile, you need to verify that the agents and the machine performing the onboarding process meet the network requirements in [Azure Arc-enabled Kubernetes network requirements](/azure/azure-arc/kubernetes/network-requirements?tabs=azure-cloud#details).

AKS-Arc/storage-provision-issue.md

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
title: Troubleshoot issue in which storage provisioning fails
3+
description: Learn how to troubleshoot and mitigate an issue that occurs when storage provisioning fails.
4+
ms.topic: troubleshooting
5+
author: rcheeran
6+
ms.author: rcheeran
7+
ms.date: 07/23/2025
8+
ms.reviewer: rcheeran
9+
ms.lastreviewed: 07/23/2025
10+
11+
---
12+
13+
# Troubleshoot storage provisioning issue during cluster and node pool creation
14+
15+
This article describes an issue in which new AKS Arc nodes are created on a single storage path/volume of the Azure Local cluster, breaking the expected round-robin distribution among volumes. Over time, this might cause insufficient disk space on that path, potentially resulting in deployment failures.
16+
17+
## Symptoms
18+
19+
During cluster creation or node pool creation and scale operations, you might see the following error message:
20+
21+
```output
22+
The system failed to create <Azure resource name>: There is not enough space on the disk.
23+
```
24+
25+
## Cause
26+
27+
The issue is caused by a recent regression introduced in Azure Local, version 2506.
28+
29+
## Mitigation
30+
31+
This issue was fixed in AKS on [Azure Local, version 2507](/azure/azure-local/whats-new?view=azloc-2507&preserve-view=true#features-and-improvements-in-2507). However, this mitigation works only when you create new Azure Local instances with version 2507. Upgrading from Azure Local versions 2506 to 2507 does not resolve the issue.
32+
33+
### Workaround for Azure Local version 2506
34+
35+
This issue only affects clusters in Azure Local version 2506. Install the [support module](support-module.md) and run the commands provided in this module.
36+
37+
First, run the following command to check for known issues in your AKS Arc environment:
38+
39+
```powershell
40+
Test-SupportAksArcKnownIssues
41+
```
42+
43+
Then, run the following command to fix this known issue on your deployment. This command finds all available fixes for the current version, and installs those fixes:
44+
45+
```powershell
46+
Invoke-SupportAksArcRemediation
47+
```
48+
49+
## Verification
50+
51+
Once the fix is done, you should be able to create your clusters and node pools. If you still encounter issues, please [reach out to Microsoft Support](#contact-microsoft-support).
52+
53+
## Contact Microsoft Support
54+
55+
If the problem persists, collect the [AKS cluster logs](get-on-demand-logs.md) before you [create a support request](help-support.md).
56+
57+
## Next steps
58+
59+
- [Use the diagnostic checker tool to identify common environment issues](aks-arc-diagnostic-checker.md)
60+
- [Review AKS on Azure Local architecture](cluster-architecture.md)

AKS-Arc/support-module.md

Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
---
2+
title: Support.AksArc diagnostic and remediation tool
3+
description: Learn how to run commands in the Support.AksArc PowerShell module to diagnose and remediate issues in AKS Arc environments.
4+
ms.topic: troubleshooting
5+
author: sethmanheim
6+
ms.author: sethm
7+
ms.date: 07/22/2025
8+
ms.reviewer: sumsmith
9+
ms.lastreviewed: 07/22/2025
10+
11+
---
12+
13+
# Support.AksArc module
14+
15+
The [**Support.AksArc**](https://www.powershellgallery.com/packages/Support.AksArc) PowerShell module provides diagnostic and remediation capabilities for AKS Arc environments. Before you open a support request, you can run the specified commands in this module to help diagnose and potentially resolve issues.
16+
17+
You should run the commands if you experience any of the following symptoms:
18+
19+
- Solution upgrade fails in MOC binaries state.
20+
- Solution upgrade fails in Arc Resource Bridge stage.
21+
- MOC service doesn't stay online.
22+
- Arc Resource Bridge is offline.
23+
24+
## Commands
25+
26+
The **Support.AksArc** module contains the following PowerShell commands:
27+
28+
- `Test-SupportAksArcKnownIssues`: tests for known issues.
29+
- `Invoke-SupportAksArcRemediation`: fixes identified issues.
30+
31+
## Installation
32+
33+
To install the module, run the following commands:
34+
35+
```powershell
36+
Install-Module -Name Support.AksArc
37+
Import-Module Support.AksArc
38+
```
39+
40+
## Usage
41+
42+
> [!NOTE]
43+
> Make sure to run these PowerShell commands locally, not in a PowerShell remote session.
44+
45+
The following command performs a health check:
46+
47+
```powershell
48+
Test-SupportAksArcKnownIssues
49+
```
50+
51+
This command performs auto-remediation (tests and fixes all issues):
52+
53+
```powershell
54+
Invoke-SupportAksArcRemediation
55+
```
56+
57+
## Example output
58+
59+
The following example output from the `Test-SupportAksArcKnownIssues` command shows the results of a failed test:
60+
61+
```output
62+
Test Name Status Message
63+
--------- --------------
64+
Validate Failover Cluster Service Responsiveness Passed Failover Cluster service is responsive.
65+
Validate Missing MOC Cloud Agents Passed No missing MOC cloud agents found.
66+
Validate MOC Cloud Agent Running Passed MOC Cloud Agent is running
67+
Validate Missing MOC Node Agents Passed All MOC nodes have the Node Agent service installed and healthy.
68+
Validate Missing MOC Host Agents Passed All nodes have MOC host agents installed and healthy
69+
Validate MOC is on Latest Patch Version Failed MOC is not on the latest patch version. Current: 1.15.5.10626, Latest: 1.15.7.10719
70+
Validate Expired Certificates Passed No expired certificates found
71+
Validate MOC Nodes Not Active Passed All MOC nodes are in the 'Active' state
72+
Validate Multiple MOC Cloud Agent Instances Passed No multiple instances of MOC Cloud Agent found
73+
Validate Windows Event Log Running Passed Windows Event Log is running
74+
Validate Gallery Image Stuck In Deleting Passed No gallery images are stuck in deleting state
75+
Validate Virtual Machine Stuck In Pending Passed No virtual machines are stuck in pending state
76+
Validate Virtual Machine Management Service Responsiveness Passed Virtual Machine Management service is responsive
77+
```
78+
79+
The following example output shows a successful result for all tests:
80+
81+
```output
82+
Test Name Status Message
83+
--------- --------------
84+
Validate Failover Cluster Service Responsiveness Passed Failover Cluster service is responsive.
85+
Validate Missing MOC Cloud Agents Passed No missing MOC cloud agents found.
86+
Validate MOC Cloud Agent Running Passed MOC Cloud Agent is running
87+
Validate Missing MOC Node Agents Passed All MOC nodes have the Node Agent service installed and healthy.
88+
Validate Missing MOC Host Agents Passed All nodes have MOC host agents installed and healthy.
89+
Validate MOC is on Latest Patch Version Passed MOC is on the latest patch version.
90+
Validate Expired Certificates Passed No expired certificates found.
91+
Validate MOC Nodes Not Active Passed All NMC nodes are in the 'Active' state.
92+
Validate NMC Nodes Sync with Cluster Nodes Passed All NMC nodes are in sync with cluster nodes.
93+
Validate Multiple NMC Cloud Agent Instances Passed No multiple instances of NMC Cloud Agent found.
94+
Validate NMC Powershell Not Stuck in Updating Passed NMC Powershell is not stuck in updating state.
95+
Validate Windows Event Log Running Passed Windows Event Log is running
96+
Validate Gallery Image Stuck In Deleting Passed No gallery images are stuck in deleting state.
97+
Validate Virtual Machine Stuck In Pending Passed No virtual machines are stuck in pending state.
98+
Validate Virtual Machine Management Service Responsiveness Passed Virtual Machine Management service is responsive.
99+
```
100+
101+
## Next steps
102+
103+
[Use the diagnostic checker tool to identify common environment issues](aks-arc-diagnostic-checker.md)

0 commit comments

Comments
 (0)